Visualizing Bottlerocket Based Clusters with Deepfence ThreatMapper
Use case — Runtime Threat Mapping for Bottlerocket containers using Deepfence ThreatMapper

You can use Deepfence ThreatMapper to visualize and scan unlimited number of hosts, containers, and pods at runtime as well as container images out of container registries, as part of CI/CD pipelines. In last few articles, we described how to install Deepfence... Read More >

Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo
Deepfence Unifies Cloud Native Workload Protection
Automating Threat Mapping for Multicloud Environments

As enterprises adopt to micro-services and cloud based architecture, they are slowly moving from a single cloud deployment to a multicloud deployment involving a mixture of private and public cloud platforms. Multicloud deployments will accelerate in the future due to... Read More >

Dr. Swarup Kumar Sahoo
Dr. Swarup Kumar Sahoo
Windows container types
Threat Mapping for Windows Containers

In the last few posts, we described how to install the Deepfence community edition i.e., ThreatMapper, and use it for run-time threat mapping for containers and hosts. In this article, we will use ThreatMapper to scan Windows container images hosted... Read More >

Shyam Krishnaswamy
Shyam Krishnaswamy
GCR image vulnerabilities shown with ThreatMapper UI
Use case — Runtime Threat Mapping for GKE using Deepfence ThreatMapper

You can use Deepfence ThreatMapper to visualize and scan unlimited number of hosts, containers and pods at runtime as well as container images out of container registries, as part of CI/CD pipelines. In last few articles, we had described how to install... Read More >

Ramanan Ravikumar
Ramanan Ravikumar
Azure registry scan settings
Use case — Runtime Threat Mapping for AKS using Deepfence ThreatMapper

Last month we had described how to install Deepfence community edition i.e. ThreatMapper on AWS ECS, and use it for vulnerability scanning of hosts and containers. Last week, we also removed all node and usage restrictions from Deepfence ThreatMapper; now you can visualize and... Read More >

Shyam Krishnaswamy
Shyam Krishnaswamy