Integration into the development process
Detection of vulnerabilities in running containers
Scanning running applications can identify vulnerabilities in code that can`t be detected during the build phase
Checks container images from the registry
Automated scanning can detect irrelevant images and identify vulnerabilities, secrets and violations in configurations
Monitors resource consumption and communications between containers
Intuitive widgets help detect suspicious activity and proactively respond to security threats