Deepfence: Full Lifecycle, Cloud Native Security Observability

An Intellyx Brain Candy Update

We last covered Deepfence in February 2022. Since that time, the company has updated its ThreatMapper open-source product as well as its ThreatStryker enterprise offering.

ThreatMapper discovers threats to applications across the full gamut of cloud native environments and maps their topology in real-time. It then enables security analysts to rank vulnerabilities by the type of attack surface as well as the severity of the risk.

ThreatStryker extends ThreatMapper with deep inspection of traffic, system, and application behavior, as well as anomaly detection across application behavior and network traffic.

In this way, ThreatStryker provides indicators of compromise with visibility into the time sequence order of an adversary’s actions, giving analysts the information they need to stop attacks.

Copyright © Intellyx LLC. Intellyx publishes the Cloud-Native Computing poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article is an Intellyx customer. To be considered for a Brain Candy article, email us at pr@intellyx.com.

SHARE THIS: