Using Deepfence ThreatStryker
Deepfence ThreatStryker supports a range of security-related use cases:
📄️ Visualization
See all from a single point of control
📄️ Vulnerability Management
Find vulnerabilities present in running workloads
🗃️ Scanning Registries
1 item
📄️ Compliance Posture Scanning
Once the ThreatStryker management console has been deployed, and you have configured one or more targets for compliance posture scanning, you can then scan those targets against various compliance benchmarks.
📄️ Workload Firewall
Define Access Control Policies for Workloads
📄️ East-West Deep Packet Inspection
Inspect Internal Application Traffic
📄️ Integrity Monitoring
Monitor on-host events
📄️ Attack Disruption
MultiStage, Wide-Area Attack Disruption
📄️ Generate Reports
Offline Reports can be shared across teams
🗃️ CI-CD Integration
3 items
📄️ Notifications
Forward Notifications to External Services