Using Deepfence ThreatStryker
Deepfence ThreatStryker supports a range of security-related use cases:
📄️ Scanning Production Workloads
Once the ThreatStryker Management Console has been deployed and Sensor Agents have been deployed to your production platforms, the Management Console will begin to discover the workloads and infrastructure in your production platforms.
📄️ Generating SBOMs
As part of the vulnerability scanning process, the ThreatStryker sensor interrogates the running workloads and hosts and generates a runtime SBOM (Software Bill of Materials) for each target. This runtime SBOM is forwarded to the Management Console for vulnerability matching.
📄️ Compliance Posture Scanning
Once the ThreatStryker management console has been deployed, and you have configured one or more targets for compliance posture scanning, you can then scan those targets against various compliance benchmarks.
🗃️ Scanning Registries
📄️ East-West Deep Packet Inspection
Inspect Internal Application Traffic
📄️ Attack Disruption
MultiStage, Wide-Area Attack Disruption
📄️ Scanning in CI
You can use ThreatMapper to scan artifacts in a CI (Continuous Integration) pipeline. If a vulnerability is detected and the CI build is blocked, ThreatMapper will submit the details to the configured notification services.
📄️ Support and Diagnostics