Learn ThreatMapper and unlock unparalleled security insights to ensure seamless protection across Kubernetes nodes, Docker hosts, bare metal, VMs, and serverless.
In this Udacity course designed by Nick Reva, Head of Corporate Security Engineering at Snap, you will learn about the need for Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP). Get the big picture of how ThreatMapper allows Engineering, DevOps and Security teams to continue shifting left to identify security defects.
Map the attack surface of your applications
Rank and prioritize vulnerabilities in ThreatGraph
Prioritize remediations to eliminate risk
Sensors are deployed as a daemonset, a common pattern for log, metrics, monitoring, and security services that run alongside Kubernetes workloads in a non-intrusive manner.
Sensors are deployed as a Docker container on each Docker host.
Sensors are deployed as a Docker container on each operating system instance, using a Docker runtime. Both Windows and Linux instances are supported.
Deepfence supports AWS Fargate, where sensors are deployed as a daemon service alongside each serverless instance.