Learn Deepfence

Learn ThreatMapper and unlock unparalleled security insights to ensure seamless protection across Kubernetes nodes, Docker hosts, bare metal, VMs, and serverless.

Operationalizing Cloud Security with Deepfence ThreatMapper

Udacity Course

Coming in June 2023

FREE TRAINING COURSE

In this Udacity course designed by Nick Reva, Head of Corporate Security Engineering at Snap, you will learn about the need for Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP). Get the big picture of how ThreatMapper allows Engineering, DevOps and Security teams to continue shifting left to identify security defects.

You will learn:

Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP)

  • How Deepfence ThreatMapper Fits In
  • Deepfence Architecture Overview

Install and configure Deepfence

  • Install Deepfence ThreatMapper Management Console
  • Configure the Deepfence ThreatMapper Management Console
  • Deploying the Deepfence sensors
  • Configuring Cloud Scanner for Microsoft Azure

Operationalize Deepfence

  • Understand Deepfence ThreatMapper threat graph
  • Scan production workloads for vulnerabilities
  • Scan for secrets and malware
  • Scan for hardened posture/compliance and image registries.
  • Integrate with third-party products.

ThreatMapper Enterprise Integrations

  • Scanning during CI/CD
  • Integrating with SIEM

ThreatMapper Benefits

Map the attack surface of your applications

Rank and prioritize vulnerabilities in ThreatGraph

Prioritize remediations to eliminate risk

Supported Platforms

ThreatMapper works with:

Kubernetes

Sensors are deployed as a daemonset, a common pattern for log, metrics, monitoring, and security services that run alongside Kubernetes workloads in a non-intrusive manner.

Docker

Sensors are deployed as a Docker container on each Docker host.

Bare metal and VM-based platforms

Sensors are deployed as a Docker container on each operating system instance, using a Docker runtime. Both Windows and Linux instances are supported.

Serverless

Deepfence supports AWS Fargate, where sensors are deployed as a daemon service alongside each serverless instance.

Learn More about ThreatMapper