Dynamic Threat Analysis
for Containers

Detect and mitigate advanced threats and unknown malware in container images using a secure container sandbox

Aqua DTA dynamically analyzes images before they are deployed, in a secure isolated sandboxed environment, examining and tracing behavioral anomalies to uncover advanced malware that cannot be detected by static scanners

Identify hidden risk in your container CI pipeline

Select 3rd party, sensitive, or pre-production images for dynamic analysis to identify hidden risks, automatically adding advanced threat detection to your CI pipeline and registries.

Safely detect sophisticated malware before deployment

Run images in a secure sandboxed environment that traces indicators of compromise (IOCs) such as container escapes, reverse shell backdoors, malware drops, code injection backdoors and network anomalies.

Protect your containerized applications against attacks

Mitigate the risks of data theft, credential theft, using containers for DDoS, and cryptocurrency resource abuse targeted by Advanced Persistent Threats and polymorphic malware.
Expose Hidden Malware in CI Builds and Registries

Aqua DTA scans designated images directly from your registries and CI pipelines, preventing malicious images from being deployed in production environments, and “shifting left” incident response.

Get detailed, actionable data on anomalous container behavior

Detects clear indicators of compromise (IoCs) such as container escapes, reverse shell backdoors, malware, cryptocurrency miners, and code injection backdoors, and provides full tracing of all activities.

Understand attacks before they happen

Aqua DTA classifies detected behaviors into categories of the MITRE ATT@CK framework, enabling SecOps and forensics teams to see the entire kill chain and understand and bolster weaknesses in their security infrastructure.

Map Suspicious Network Activity

Tracks and displays on a map all communications between the container and external destinations, including file downloads, C&C servers, and data exfiltration destinations.

Extend Aqua CSPM with Automated Image Analysis and Scanning

Augments cloud security best practices with automated scanning of cloud registries and images, ensuring that no malicious or vulnerable workloads are deployed into your cloud-based clusters.