NeuVector Operator logo

NeuVector Full Lifecycle Container Security

NeuVector Operator logo
NeuVector Operator logo

NeuVector Full Lifecycle Container Security

By NeuVector

Certified enterprise ready

Offers the only cloud-native Kubernetes security platform delivering uncompromising end-to-end protection from DevOps vulnerability protection to automated run-time security, and featuring a true Layer 7 container firewall.

Software version

3

Delivery method

Operator

Rating

2 reviews

Container-based environments, operating at highly automated scale, leave DevOps and security teams blind to attacks in east-west traffic and with zero network visibility. NeuVector delivers protection without compromise, from Dev to production, with automated security for Kubernetes and OpenShift and the only container firewall with packet-level interrogation and enforcement.

Container Firewall

Detect and mitigate application threats with Layer 7 network inspection. Application level attacks such as DDoS and DNS on containers are detected and prevented. Real-time detection and alerting adds a layer of network security to the dynamic container environment. Protects containers against attacks from internal and external networks. Prevent data stealing attacks which use DNS and ICMP tunneling techniques. Automatically captures packet used in an attack.

Workload Protection

NeuVector discovers the normal behavior of container processes, file system, and network activity and automatically builds a security policy to protect container based services. Using Layer 7 network inspection, unauthorized connections between containers or from external networks can be blocked without disrupting normal container sessions.

Vulnerability Scanning and Compliance Management

NeuVector automates security for the entire CI/CD pipeline, from Build to Ship to Run. Use the Jenkins plug-in to scan during build, monitor images in registries and run automated tests for security compliance. Prevent deployment of vulnerable images with admission control, but also monitor production containers. Run-time vulnerability scanning for containers, hosts, and orchestration platforms. Audits host and container security with Docker Bench and Kubernetes CIS Benchmark for security tests.

Pricing summary

Plans starting at

View all pricing options

Free 30-day trial

Up to 10 production nodes

Supports Ubuntu, CentOS/Red Hat; including all RHEL versions (6/7/8)

Additional resources

Want more product information? Explore detailed information about using this product and where to find additional help.

Reviews

Read what others are saying about this product in our review section.

  • CA

    Consultant in Accounting

    Review source: Invitation from G2
    Review source: Invitation from G2
    Not ratedSep 08, 2021

    "Brilliant platform."

    What do you like best?

    Diversified take on modern security vectors.

    What do you dislike?

    I don't feel like there's anything to dislike at all.

    Recommendations to others considering the product:

    Please review the materials carefully, it's very in depth.

    What problems are you solving with the product? What benefits have you realized?

    Most of these issues have very definite security roles. Not every business can do that.

  • Siddesh N.

    Siddesh N.

    Securing applications and organisations for over 7 years

    Review source: Invitation from G2
    Review source: Invitation from G2
    Not ratedSep 14, 2021

    "Good at capturing network map"

    What do you like best?

    Network mapping between containers .. vulnerabilities

    What do you dislike?

    Reporting isn't that great and user account management

    What problems are you solving with the product? What benefits have you realized?

    Identifying container vulnerabilities