Detection and Control

Activity and alert dashboard for a container

Features

  • Automatic fine-grained control, to go with the deep runtime visibility, over every aspect of the code running in a container
  • Full coverage of every activity, along the dimensions of network, I/O and in every layer of the application tier, within the container
  • Baked-in visibility and control moves with the containers
  • Zero touch to developers and Dev/SecOps
  • Continuous and realtime policy violation alerts
  • All features available through RESTful AP
  • Automatically created behavioral template/baseline for each container, and for the entire application, used to enforce container-specific isolation
  • Predefined security policy templates that could be manually or automatically selected for applications based on the corresponding behavioral templates
  • Deep learning driven automatic selection of security policy templates for individual containers and for the applications
  • Dynamic and realtime application of security policy change
  • Automatically created intra and inter application container interaction topologies
  • No dependency on the underlying container infrastructure or on container lifecycle management and orchestration
  • Works seemlessly for public, hybrid and private cloud containerized applications
  • Tightly integrated with PaaS platforms such as RedHat OpenShift and VMware vSphere Integrated Containers

Adaptive security and anomaly detection based on automatically created behavior templates

Alert dashboard for all the containerized applications

Benefits

  • Complete protection through single-click application of security policies for all the runtime instances of an application or of a container image
  • Choose from a list of predefined security policy templates for the most popular containerized applications
  • Deep learning driven automatic selection of security policy templates could also be used for applications or individual containers
  • Zero impact to developers and Dev/SecOps
  • Realtime tamper detection in running containers
  • Automatically created intra and inter application container interaction topologies provide insight into how security controls are being applied
  • No changes required to the underlying container infrastructure or to container lifecycle management and orchestration
  • Could as easily be used for public, hybrid and private cloud containerized applications
  • Complement the existing threat intelligence infrastructure by adding application security alerts to significantly reducing false positive and false negatives
  • One-click data protection (at-rest data encryption, transit channel encryption) for intra and inter application communication
  • Flexibility to quarantine certain aspects of a suspicious application while the behavior is analyzed
  • Easily integrate application topologies and fine-grained security enforcement into existing single-pane-of-glass through RESTful API
  • No changes required to the existing CI/CD pipeline and the PaaS workflows for container lifecycle management

Try Layered Insight for yourself today