Dynamic Threat Analysis for Containers

Detect and mitigate advanced threats and unknown malware in container images using a secure container sandbox

Identify Risks Early
Detect Smart Malware
Containerized Apps Protection
Identify hidden risk in your container CI pipeline
Select 3rd party, sensitive, or pre-production images for dynamic analysis to identify hidden risks, automatically adding advanced threat detection to your CI pipeline and registries.
Safely detect sophisticated malware before deployment
Run images in a secure sandboxed environment that traces indicators of compromise (IOCs) such as container escapes, reverse shell backdoors, malware drops, code injection backdoors and network anomalies.
Protect your containerized applications against attacks
Mitigate the risks of data theft, credential theft, using containers for DDoS, and cryptocurrency resource abuse targeted by Advanced Persistent Threats and polymorphic malware.

Expose Hidden Malware in CI Builds and Registries

Aqua DTA scans designated images directly from your registries and CI pipelines, preventing malicious images from being deployed in production environments, and “shifting left” incident response.

Get Detailed, Actionable Data on Anomalous Container Behavior

Detects clear indicators of compromise (IoCs) such as container escapes, reverse shell backdoors, malware, cryptocurrency miners, and code injection backdoors, and provides full tracing of all activities.

Understand Attacks Before They Happen

Aqua DTA classifies detected behaviors into categories of the MITRE ATT@CK framework, enabling SecOps and forensics teams to see the entire kill chain and understand and bolster weaknesses in their security infrastructure.

Map Suspicious Network Activity

Tracks and displays on a map all communications between the container and external destinations, including file downloads, C&C servers, and data exfiltration destinations.

Extend Aqua CSPM with Automated Image Analysis and Scanning

Augments cloud security best practices with automated scanning of cloud registries and images, ensuring that no malicious or vulnerable workloads are deployed into your cloud-based clusters.