File Integrity Monitoring (FIM)
Monitor files and paths for any change. Blacklist files and directories to prevent read/write/execute commands.
Vulnerability and Malware Scanning
Automatically scan VMs for known vulnerabilities, malware, OSS licensing issues, and exposed “secrets”.
Security Configuration Best Practices
Automatically check OS configuration against the CIS Benchmark for Linux, ensuring that your VMs are properly hardened.
User Activity Monitoring
Track user access, attempted logins, and full command arguments. Blacklist or whitelist users and groups based on LDAP/AD identity.
Discover and automatically create firewall rules for your VM, container, and serverless workloads.