Want to see who topped the 2019 Best Software Awards?

Best Container Security Software

Container security software is used to secure multiple components of containerized applications or files, along with their infrastructure and connected networks. Containers are a popular way to format units of software during application development, most commonly used by DevOps teams. After development, they are orchestrated, deployed, and networked. Security is essential during all stages of container usage.

Container security software is used to manage access, test security, and protect cloud computing infrastructure running containerized applications. Management features will help administrators determine who can access containerized data or integrate with containerized applications. Testing capabilities will assist in developing security policies, discover zero-day vulnerabilities, and simulate attacks from common threat sources.

Some application security software include the ability to defend and test the security of containerized applications. But container-specific security tools provide increased security, monitoring, and networking, for microservices and containerized applications.

To qualify for inclusion in the Database Security category, a product must:

  • Integrate security with DevOps tools
  • Monitor and secure container networks or pipelines
  • Enforce access and security policies
  • Provide runtime protection capabilities
Compare Container Security Software
Results: 27
    G2 Crowd takes pride in showing unbiased ratings on user satisfaction. G2 Crowd does not allow for paid placement in any of our ratings.
    Sort By:

    Aqua Security provides scalable security for the complete development-to-deployment lifecycle of containerized applications.

    FlexNet Code Insight is a single integrated solution for open source license compliance and security. Find vulnerabilities and remediate associated risk, while you build your products and during their lifecycle.

    Qualys' integrated approach to IT security and compliance enables organizations of all sizes to successfully achieve both vulnerability management and policy compliance initiatives cohesively. Our solutions empower various roles within the organization to meet your unique requirements. Built on top of Qualys’ Infrastructure and Core Services, the Qualys Cloud Suite incorporates the following applications, all of which are delivered via the cloud: • AssetView • Vulnerability Management • Continuous Monitoring • ThreatPROTECT • Policy Compliance • Security Assessment Questionnaire • PCI Compliance • Web Application Scanning • Web Application Firewall • Malware Detection

    Snyk is a security solution designed to find and fix vulnerabilities in Node.js and Ruby apps.

    Sysdig is an open source, system-level exploration that capture system state and activity from a running Linux instance, then save, filter and analyze.

    Achore offers end to end security and compliance tools to help deploy containers with confidence.

    Aporeto is a cloud-native security startup that offers comprehensive security solutions for applications, containers, and microservices.

    AppArmor is a Mandatory Access Control (MAC) system which is a kernel (LSM) enhancement to confine programs to a limited set of resources.

    Capsule8 is the industry's only real-time, zero-day attack detection platform capable of scaling to massive production deployments.

    Cavirin provides security management across physical, public, and hybrid clouds, supporting AWS, Microsoft Azure, Google Cloud Platform, VMware, KVM, and Docker.

    For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

    Deepfence provides application layer intrusion prevention for modern workloads. Deepfence's Security as a Microservice gets deployed as a lightweight sidecar container on every host, and can be scaled and orchestrated in exactly the same manner as your other containers.

    Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale.

    Networks Allow the Lateral Spread of Threats. Adaptive Segmentation Stops Them

    InsightVM, Rapid7’s vulnerability assessment solution, utilizes the power of the Insight platform and the heritage of our award-winning Nexpose product to provide full visibility of your modern ecosystem, prioritize risk using attacker analytics, contain threats, and remediate with SecOps agility. Leveraging InsightVM’s advanced analytics and endpoint technology enables you to discover vulnerabilities in real time and prioritize them actionably. Then, automate remediation by integrating into your IT team’s existing workflows and tools—a process made easy by InsightVM’s 40+ technology integrations.

    Layered Insight, the pioneer and global leader in Container Native Application Protection, enables organizations to unify DevOps and SecOps by providing complete visibility and control of containerized applications.

    NeuVector delivers an application and network intelligent container security solution that automatically adapts to protect running containers.

    The ShieldX Elastic Security Platform dynamically scales to deliver comprehensive and consistent controls to protect data centers, cloud infrastructure, applications and data no matter where they are or where they go to make the cloud more secure than on-premise deployments.

    StackRox enables enterprises to detect and disrupt attacks and make their container environments more resilient. Our solutions represent a unique, innovative approach to securing containers across their lifecycle, from build to runtime.

    Automate security for your public cloud workloads and containers, and scan Amazon S3 buckets for malware with cloud-native protection that integrates with DevOps and CI/CD pipelines

    Security integrated into DevOps. Protect containers in development and operations.

    Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss.

    Trend Micro Deep Security is designed to mprove visibility and simplify security management across physical, virtual, and cloud environments.

    The Trend Micro Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.

    Tripwire provides an enterprise-class vulnerability management solution that accurately prioritizes risk so you can take action on your most exposed assets.

    Tufin is the leader in Security Policy Orchestration, enabling enterprises to centrally manage, visualize and control security policies across hybrid cloud

    Automated, integrated, and built for scale, Twistlock provides comprehensive container security for teams using Docker, Kubernetes, and other cloud native technologies. From container-aware firewalls to active threat protection and incident response to identifying and triaging vulnerabilities across the application lifecycle, Twistlock is the centralized cybersecurity platform for protecting containers, cloud native stacks, and the applications they run against the threats of today and tomorrow.