Skip to content
Try it Free Request Your Demo

    Attack Surface: Containers & Serverless Computing

    Container Security Overview Demo June 2021

    New Technology Needs a New Kind of Security

    As organizations adopt new processes and technologies for building and running applications, they require new types of security observability. Uptycs equips modern defenders with the functionality to protect container-based applications, whether run on-premises, or in the cloud — on a VM or in a serverless deployment. With Uptycs, you identify vulnerabilities early in the process, verify secure configurations, ensure compliance, and continuously monitor in production.

    Product Bundles At-A-Glance: Containers & Serverless

    Insight Modules

    Management
    Inventory
    Audit

    Visibility Modules

    Management
    Inventory
    Audit
    Core

    Comply Modules

    Management
    Inventory
    Audit
    Core
    Flight-Recorder App & 7-Day History
    Compliance
    Investigation

    Secure Modules

    Management
    Inventory
    Audit
    Core
    Flight-Recorder App & 7-Day History
    Compliance
    Investigation
    Threat Intel
    Detection
    Response
    FIM

    Total Modules

    Management
    Inventory
    Audit
    Core
    Flight-Recorder App & 7-Day History
    Compliance
    Investigation
    Threat Intel
    Detection
    Response
    FIM
    Vulnerability Detection
    Product - Attack Surface - Containers - Insight

    The Insight Module

    • Simplify asset and inventory management for hosts and nodes
    • Map containers to nodes, and images to containers
    • Track when images start and stop
    • Build custom alert rules and reports to audit system configurations and perform real-time ad hoc queries
    Back to Top
    Product - Attack Surface - Containers - Visibility

    The Visibility Modules

    • TLS-based centralized data forwarding model
    • View of normal baseline and anomalous behavior for individual hosts, nodes, and groups
    Back to Top
    Product - Attack Surface - Containers - Compliance

    The Comply Modules

    • Secure and compliant configurations for hosts and nodes
    • Customizable audit rules and push-button reports for CIS Benchmarks covering Linux and Docker
    • FedRAMP, PCI, and SOC 2 compliance support (at additional cost)
    • Uptycs Flight Recorder feature which enables Incident Response Teams to reconstruct machine state for forensic investigation—even for ephemeral container nodes and serverless tasks 
    • 7 days of historical telemetry stored for the Flight Recorder
    Back to Top
    Product - Attack Surface - Containers - Secure

    The Secure Modules

    The Secure modules include industry-leading MITRE ATT&CK coverage, with 600+ behavioral rules run in real-time in the Uptycs cloud platform, plus: 

    • Container-specific rules, such as shell access, defined by industry best practices such as the MITRE ATT&CK containers matrix.
    • The ability to capture process and socket events captured inside containers via eBPF as well as Docker runtime events.
    • File integrity monitoring (FIM) and configuration file analysis inside of containers for security audits and operational visibility. For example, you can monitor container file systems to detect issues such as creating new entries in /etc/passwd within a container.
    • YARA malware detection scans in response to process or file events occurring inside containers.
    • Uptycs-curated threat intelligence database, file-carving, workflow integrations (SIEM, ticketing, SOAR, etc).
    Back to Top
    Product - Attack Surface - Containers - Total

    The Total Modules

    • Gain Continuous vulnerability monitoring for Linux hosts and nodes in production
    • Scan container images as part of the CI/CD pipeline (at additional cost)
    • Check for the latest CVEs included in security bulletins
    Back to Top

    As a cloud-based company running on AWS, finding a platform to solve all of our security needs across all of our accounts and services was a top priority. Finding a single solution that could solve for audit and inventory of our cloud assets, as well as endpoint detection and response, was a challenge — until we found Uptycs. Now we're able to do more with less, and save time, while maintaining a strong cloud security posture.

    Kevin Paige

    CISO, Flexport

    Schedule Your Personal Demo

    Schedule a 1:1 demo of the Uptycs Cloud-Native Security Analytics Platform and see how Uptycs can help you protect and defend across modern attack surfaces.

    Schedule Your Demo