Cloud & Container Security Platform and Solutions
Sysdig Secure offers custom pricing plan
Yearly plans
Show all features
Container Security
Secure overview
Risk based visualizations
CI/CD pipeline and registry integrations
Continuous vulnerability monitoring at runtime
OOB scanning policies
CIS benchmarks (AWS, K8s, Docker, Linux) and Compliance policies (PCI, NIST 800-53, SOC2, etc)
OOB runtime policies (FIM, cryptomining, MITRE ATT&CK, compliance violations, etc.)
K8s API anomalous activity detection
Serverless Security
OOB scanning policies
OOB runtime policies (FIM, cryptomining, MITRE ATT&CK, etc)
Behavior-based detection (user, process, file, network)
CaaS runtime security (AWS Fargate, Google Cloud Run)
SIEM integrations
Forensics capture
Workflows Container Scanning for Fargate, Google Cloud Run Runtime security (based on Falco) Container compliance Incident Response & Forensics
Container Scanning for Fargate, Google Cloud Run
Cloud Security
Secure overview
Risk based visualizations
CIS benchmarks (AWS, Azure, GCP, K8s, Docker, Linux) and Compliance policies (PCI, NIST 800-53, SOC2, etc)
SIEM integrations
OOB scanning policies
OOB cloud threat detection policies (MITRE ATT&CK, AWS, Azure, GCP)
Anomalous cloud and K8s activity detection
Activity based suggested policies for Identities
Screenshot of the Sysdig Secure Pricing Page (Click on the image to visit Sysdig Secure 's Pricing page)
Disclaimer: Pricing information for Sysdig Secure is provided by the software vendor or sourced from publicly accessible materials. Final cost negotiations and purchasing must be handled directly with the seller. For the latest information on pricing, visit website. Pricing information was last updated on .
Pricing Models:
Offers Subscription
Quotation not available
Free Trial:
Pricing Models:
Does not Offer Subscription
Quotation available: Get a Free Quote
Free Trial:
Pricing Models:
Offers Subscription
Quotation available: Get a Free Quote
Free Trial:
Customer Service
Online
Location
San Francisco, California
Disclaimer: This research has been collated from a variety of authoritative sources. We welcome your feedback at [email protected].