ThreatMapper

ThreatStryker

Vulnerability and Compliance Scanning

Discover and visualize running pods, containers, and hosts

Detect vulnerabilities during CI/CD

Detect vulnerabilities in production registries

Detect vulnerabilities in production infrastructure

Highest-risk scoring of production vulnerabilities

Compliance Scanning against Industry Benchmarks

Roadmap

ThreatMapper

ThreatStryker

Runtime Sensors

Host and container resources

On-host file integrity

Roadmap

On-host process integrity

Roadmap

Deep packet inspection (DPI) of network traffic

Roadmap

TLS key extraction and DPI decryption

Roadmap

Network and resource anomaly detection

Roadmap

ThreatMapper

ThreatStryker

Realtime Protection

Alert classification and correlation

Attack evolution and intent discovery

Attack alerting

Automated workload quarantine

Automated adversary network firewalling

ThreatMapper

ThreatStryker

Integrations

Notifications and alerting

SIEM

Ticketing

Archival

Offline reports

ThreatMapper

ThreatStryker

Large-Scale Deployment

Multi-cloud support

High-availability, high-scalability deployment

Multi-tenancy and user management

ThreatMapper

ThreatStryker

Platform Support

Supported host operating systems

Linux, Windows

Supported platforms

Bare metal, virtual machines, containers, serverless

Container support

Kubernetes, Docker

Serverless support

AWS Fargate

ThreatMapper

ThreatStryker

Technical Support

Community support

Enterprise support

Option

Deepfence Roadmap

Deepfence recognizes the challenges that security professionals face in order to secure their infrastructure and the applications created by their DevOps teams.

Deepfence ThreatMapper is a fully open source platform that makes it easy to scan for vulnerabilities and build a map of threats across multiple clouds and application types.

Deepfence ThreatStryker extends ThreatMapper with compliance scanning, runtime sensors and a correlation and protection engine. Our intent is to migrate all security and observability capabilities, including compliance scanning and runtime sensors, into the open source ThreatMapper platform. ThreatMapper will make all threat and runtime data available through public APIs, for dashboards, SIEM, and other external applications to consume.

ThreatStryker is to be refactored as a standalone application that consumes vulnerability and telemetry data from the ThreatMapper platform using the public APIs, and provides runtime attack analysis and protection.

Get ThreatMapper

Deepfence ThreatMapper is 100% open source and available on GitHub

Alternatively, please contact us for a demo or to discuss support.