aqua logo fullcolor

Security Means Freedom
Aqua unleashes the power of cloud native security so your business and applications can run free.

Aqua Security enables enterprises to secure their container-based and cloud-native applications from development to production, accelerating container adoption and bridging the gap between DevOps and IT security.

Aqua’s Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security while helping to enforce policy and simplify regulatory compliance.

Video

   

Products
Container Security

Full Lifecycle Container Security

Protect container-based cloud native applications from development to production, using the industry’s most advanced container security solution.

Reduce Risk and Prove Compliance of Containerized Applications

Gain constant visibility into vulnerability posture in your pipeline, reducing the attack surface before containers are deployed. The get detailed auditing and forensics data of your container and Kubernetes runtime environment to track violation events and compliance posture.

Aqua scans CI builds and images

Aqua scans container images based on a constantly updated stream of aggregate sources of vulnerability data (CVEs, vendor advisories, and proprietary research), which ensures up-to-date, broad coverage while minimizing false positives. Additionally, find malware, embedded secrets, OSS licenses, and configuration issues in your images to further reduce the attack surface.

Aqua scans CI builds and images For Web

 

Dynamic Threat Analysis For Web

Dynamic Container Analysis

Discover sophisticated malware hidden in open source packages and 3rd party images, preventing attacks on your container-based applications, including credential theft, cryptocurrency mining, and data exfiltration. Aqua DTA dynamically analyzes images before they in a secure isolated sandboxed environment, examining and tracing behavioral anomalies to uncover advanced malware that cannot be detected by static scanners.

Aqua DTA >

 

Serverless Security

Security for Serverless Functions (FaaS)

Ensure that serverless functions are secured and in compliance. Reduce the attack surface, control deployment, and protect functions in runtime using performance-optimized controls.

Reduce the risk from serverless functions
 
Gain visibility into running functions, assess and control risk in the pipeline, preventing OWASP top 10 serverless threat.

Integrate in your CI/CD pipelines

Aqua enables you to “shift left” security into early stages of development by scanning functions as they are built, shortening the fix cycle for security issues. We provide native plug-ins as well as a CLI tool that automate scanning within CI tools such as Jenkins, Bamboo, and Azure DevOps. As a step in the build, developers can view scanning results and suggested mitigation from within a familiar environment.

Aqua scans CI builds and images For Web

 

Dynamic Threat Analysis For Web

Ensure least-privilege permissions

A key risk in serverless functions is over-provisioned permissions, that allow a potential attacker to gain access to additional resources. Aqua prevents this by flagging over-provisioned permissions, as well as monitoring for unused permissions and roles over time, allowing you to reduce them to what’s needed.

 

VM Security

Protecting Cloud VMs and Instances

Automate VM security in private, public & hybrid cloud environments. Ensure compliance with PCI-DSS, HIPAA and other requirements, detect configuration issues quickly, and protect VM-based workloads in runtime.

Assess cloud VM configuration and ensure compliance
 
Implement security configuration best practices by evaluating OS configuration against the CIS Benchmark for Linux, scanning for malware and vulnerabilities, and ensuring that your VMs are properly hardened.

Vulnerability scanning

Scan cloud VMs for known vulnerabilities and malware, check OS configuration against the CIS Benchmark for Linux, ensuring that the security posture of your cloud VMs is aligned with compliance policy and free from malwares

Aqua scans CI builds and images For Web

 

Dynamic Threat Analysis For Web

Host assurance

Get alerts on system and application configuration violations, define a compliance baseline for VMs by using built-in and custom configuration checks, review remediation steps for aligning non-compliant VMs.

 

   

aqua logo fullcolor