Google Artifact Registry
Google Artifact Registry
Detect and identify vulnerabilities, malware, and secrets for Google Artifact Registry through continuous scanning of images, programming languages and packages.
Amazon Security Lake
Amazon Security Lake
The Amazon Security Lake collects security data from AWS environments. It uses the Open Cybersecurity Schema Framework to standardize and combine the data, making it easier to investigate security concerns and quickly respond to incidents.
AWS Secrets Manager
AWS Secrets Manager
Manage, retrieve, and rotate database credentials, API keys, and other secrets on AWS Secrets Manager; Then securely deliver them to running containers with no container restart needed and no persistence on the host OS.
Harbor
Harbor
Continuously scan container images in Harbor for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
VMware Tanzu Kubernetes Grid
VMware Tanzu Kubernetes Grid
Aqua secures the software supply chain, detects, prioritizes and reduce risks, and stops run-time attacks for applications built and deployed on VMware TKG with a comprehensive cloud native security platform.
Amazon EKS-Distro (EKS-D)
Amazon EKS-Distro (EKS-D)
Amazon EKS-Distro enables using the same tools on-prem as your cloud destination. Aqua's holistic Kubernetes security includes KSPM to deliver EKS security
OpsGenie
OpsGenie
Open tickets in OpsGenie for scanning, assurance and runtime security events discovered by Aqua, for rapid incident response and remediation.
Azure Service Fabric
Azure Service Fabric
Automate the deployment of Aqua Enforcers and Aqua Scanner instances with Azure Service Fabric, ensuring that your Azure and Windows-based container applications are protected.
Istio
Istio
Gain visibility into Istio routings and configure network security policies, protect the Envoy proxy containers, and prevent malicious activity.
Prometheus
Prometheus
Allow DevOps teams to monitor and alert on events sent from Aqua CSP, in real-time, directly from the Prometheus dashboards.
Red Hat Quay
Red Hat Quay
Continuously scan container images in Red Hat Quay for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
Google Cloud Functions
Google Cloud Functions
Ensure Google Cloud Functions meet assurance policies before being launched into production, with automated scans for vulnerabilities and sensitive data.
Azure Functions
Azure Functions
Assess the risk of Azure Functions by discovering vulnerabilities and sensitive data in function’s code and its environment variables. Prevent execution of functions that violate your organization’s security policy.
Slack
Slack
Send notifications on vulnerabilities and security events discovered by Aqua via dedicated Slack channels for rapid remediation and incident response.
Tanzu Application Service
Tanzu Application Service
Protect applications running on Tanzu Application Service across their entire lifecycle, from scanning droplet for vulnerabilities and embedded secrets, to securing app instance and Diego cells in runtime.
Kubernetes
Kubernetes
Enhance Kubernetes native security with deep image scanning, image assurance, and runtime security controls for container workloads, at enterprise scale.
Azure Container Instances (ACI)
Azure Container Instances (ACI)
Protect applications running on Azure Container Instances, using Aqua MicroEnforcer embedded in the containers to ensure that workloads perform their intended function and detect vulnerable or compromised containers.
Oracle Container Engine (OKE)
Oracle Container Engine (OKE)
Prevent untrusted images from running and assure compliant configurations for Oracle Container Engine for Kubernetes. Aqua delivers real-time visualization and actionable insights into the security posture of a Container Engine cluster.
Rancher
Rancher
Protect cloud native workloads on Rancher with full lifecycle security controls that include image scanning, secrets management, and runtime security at scale.
VMware Tanzu Kubernetes Grid
VMware Tanzu Kubernetes Grid
Protect cloud native workloads on Tanzu Kubernetes Grid with full lifecycle security controls, including image scanning, secrets management, and runtime security at scale.
sumo logic
sumo logic
Provide DevOps teams with visibility into real-time container security metrics and events in Sumo Logic, to enable quick remediation of security issues.
IBM QRadar
IBM QRadar
Provide security teams with centralized visibility into container and serverless function vulnerabilities and runtime security events, within IBM QRadar.
Loggly
Loggly
Send container and serverless security events to Loggly for centralized events management and incident response.
Amazon CloudWatch
Amazon CloudWatch
Provide DevOps teams with visibility into real-time container security metrics and events in AWS CloudWatch, to enable quick remediation of security issues.
Azure Operations Management Suite (OMS)
Azure Operations Management Suite (OMS)
Provide security and DevOps teams with centralized visibility into container and serverless function vulnerabilities and runtime security events, within Azure OMS.
Micro Focus ArcSight
Micro Focus ArcSight
Provide security teams with centralized visibility into container and serverless function vulnerabilities and runtime security events, within ArcSight.
Sonatype Nexus Repository
Sonatype Nexus Repository
Continuously scan container images in Sonatype Nexus for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
JFrog Artifactory
JFrog Artifactory
Continuously scan container images in Artifactory for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
Google Container Registry (GCR)
Google Container Registry (GCR)
Continuously scan container images in Google Container Registry for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
Mirantis Secure Registry
Mirantis Secure Registry
Continuously scan container images in Mirantis Secure Registry for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
Amazon ECR
Amazon ECR
Continuously scan container images in Amazon ECR for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
CyberArk Enterprise Password Vault
CyberArk Enterprise Password Vault
Securely deliver secrets managed in CyberArk EPV into running containers, on any orchestrator, with no container restart and no persistence on host.
Atlassian Jira
Atlassian Jira
Automatically open tickets for vulnerabilities and security issues discovered by Aqua, to enable rapid remediation by DevOps teams.
Azure Key Vault
Azure Key Vault
Securely deliver secrets managed in Azure Vault into running containers, on any orchestrator, with no container restart and no persistence on host.
AWS Key Management Service (KMS)
AWS Key Management Service (KMS)
Securely deliver secrets managed in Amazon KMS into running containers, on any orchestrator, with no container restart and no persistence on host.
Oracle Cloud Infrastructure
Oracle Cloud Infrastructure
Use Aqua Cloud Security Posture Management (CSPM) to reduce risks in your Oracle public cloud, including, best practices, comprehensive policies coverage, remediation assistance and compliance.
Alibaba Cloud
Alibaba Cloud
Identify and remediate misconfigurations and high-risk settings for Alibaba Cloud with Aqua’s Cloud Security Posture Management, and secure Alibaba Cloud Container Service for Kubernetes infrastructure and workloads with host scanning, assurance policies and run time protection.