Deepfence

Security that Scales

Deepfence provides application layer intrusion prevention for modern workloads. Deepfence’s Security as a Microservice® gets deployed as a lightweight sidecar container on every host, and can be scaled and orchestrated in exactly the same manner as your other containers. Deepfence is zero touch — it does not depend on third-party kernel modules, manual behavior modeling, or user-defined rules and policies.

Measure & Map

Deepfence discovers all running containers, processes and online hosts, and presents a live and interactive color-coded view of the topology. It audits containers and hosts to detect file system, process and network related misconfigurations, using industry standard and custom checks to detect potential runtime attack surface.

Deepfence-measure-map

Monitor & Secure

Deepfence monitors and performs deep inspection of network traffic, system and application behavior, and correlates suspicious events across the entire infrastructure to detect threats with minimal false positives. Deepfence does not depend on manually generated behavioral models which are susceptible to user follies and adversarial attacks, or hand-coded static rulesets to detect threats.

monitor-secure

Triage & Control

Containers and hosts are color-coded to visually aid rapid detection and response to threats. Every reported alert contains details on affected resources and type of anomalies right down to the level of system calls. Deepfence can also quarantine tainted workloads, stopping potential lateral spread of the infection.

triage-control
Deepfence

Features

Audit

Deepfence
  • Harden host and containers based on standard benchmarks like CIS, Dockerbench & as mandated by compliances
  • Language-specific vulnerability scanning as part of CI/CD process

Monitor

Deepfence
  • Color-coded topology of running containers, processes and online hosts
  • Real time connection and flow tracking, visibility into all network traffic including east-west

Secure

Deepfence
  • Protects against the whole gamut of application layer attacks including zero days
  • Process, file system, network monitoring to detect anomalies
  • Detailed forensic trails including packet captures, system calls, and anomalous system events

Control

Deepfence
  • Kill, pause, or clone tainted containers automatically or manually to stop potential lateral spread if anomalous behavior is detected

Notify

Deepfence
  • Integrations with widely used notification and incident management tools like Slack, Pagerduty, Hipchat.

Explore the features in detail.

SCHEDULE DEMO