Cloud-Native Ecosystem Integrations

Converging security and compliance with performance and capacity monitoring to create a secure DevOps workflow

Novità! 2022 Report sulla sicurezza e l'uso delle Applicazioni Cloud-Native

AWS logo

Embed security, maximize availability, and validate compliance for cloud-native workloads on Amazon EC2, ECS, and EKS

AWS Bottlerocket

Monitor and secure EC2 instances running the container-optimized Bottlerocket operating system from AWS.

Logo AWS Codebuild

Scan container images in the AWS CodeBuild continuous integration service to detect and block vulnerabilities before they reach production.

Logo AWS CodePipeline

Scan container images in the AWS CodePipeline continuous delivery service to detect and block vulnerabilities before they reach production.

Logo Amazon CloudTrail

Automate monitoring of AWS CloudTrail logs to detect unauthorized access and configuration changes on AWS services.

Logo Amazon Fargate

Monitor serverless services using Sysdig and Prometheus for a single-pane-of-glass approach to container visibility.

AWS Lambda

Leverage Prometheus integration to monitor performance, health, and availability for the serverless platform.

AWS Outposts

Extend cloud-native security and monitoring to your AWS infrastructure and services running on-premises.

AWS Security Hub logo

Consolidates alerts and findings from Sysdig Secure into AWS Security Hub

Logo Amazon ECS

Maximize performance and availability, validate compliance, and manage security risk with Amazon ECS

Amazon EKS logo

Maximize performance and availability, validate compliance, and manage security risk with Amazon EKS

Logo Amazon ECR

Scan images and manage vulnerabilities with Amazon ECR

Logo Amazon CloudWatch

Connect to CloudWatch to automatically collect AWS service metrics and metadata.

Logo Amazon Simple Notification Service SNS

Send alert notifications to Amazon SNS to accelerate incident response.

Logo Atlassian Bamboo

Scan container images in Atlassian Bamboo's CI/CD platform to detect and block vulnerabilities before they reach production.

Logo Atlassian Opsgenie

Send alert notifications to Opsgenie to accelerate incident response.

Logo circle ci

Scan container images in your CircleCI CI/CD pipelines to detect and block vulnerabilities before they reach production.

Logo Jenkins

Scan container images in your Jenkins CI/CD pipelines to detect and block vulnerabilities before they reach production.

D2IQ logo

Embed security, maximize availability, and validate compliance for cloud-native workloads on Mesosphere DC/OS and Kubernetes

Docker logo

Scan images and manage vulnerabilities with Docker Trusted Registries and DockerHub

GitHub

Scan images in your GitHub Actions pipelines to detect and block container vulnerabilities pre-production.

Logo Gitlab CI/CD

Scan container images in your GitLab CI/CD pipelines to detect and block vulnerabilities before they reach production.

Anthos logo

Maximize performance and availability, validate compliance, and manage security risk with Google Cloud's Anthos

Logo Go

Automatically collect golang expvar metrics for application and service performance monitoring.

Google Cloud logo

Embed security, maximize availability, and validate compliance for cloud-native workloads on GCP and Google Kubernetes Engine (GKE)

Google Cloud Kubernetes Engine

Maximize performance and availability, validate compliance, and manage security risk with GKE

Logo Google Cloud Build

Scan container images in the Google Cloud Build continuous integration service to detect and block vulnerabilities before they reach production.

Google Cloud Registry

Scan images and manage vulnerabilities with Google Cloud Registry

Google Cloud security command center

Consolidates alerts and findings from Sysdig Secure into Google Cloud Security Command Center

IBM Cloud logo

Embed security, maximize availability, and validate compliance for cloud-native workloads with IBM Cloud

IBM Cloud Kubernetes Service (IKS)

Monitor and troubleshoot containers on IKS to maximize performance and availability

Logo Java

Automatically collect JMX metrics for Java application and service performance monitoring.

Frog Artifactory logo

Scan images and manage vulnerabilities with JFrog Artifactory

Kubernetes logo

Embed security, maximize availability, and validate compliance for cloud-native workloads on Kubernetes

Azure logo

Embed security, maximize availability, and validate compliance for cloud-native workloads on Microsoft Azure and Azure Container Service (AKS)

Microsoft Azure Kubernetes Services (AKS) logo

Maximize performance and availability, validate compliance, and manage security risk with AKS

Microsoft Azure Container Registry logo

Scan images and manage vulnerabilities with Azure Container Registry

Logo Microsoft Azure Pipelines

Scan container images in Azure Pipelines to detect and block vulnerabilities before they reach production.

Red Hat OpenShift logo

Embed security, maximize availability, and validate compliance for cloud-native workloads on Red Hat OpenShift Container Platform

logo pagerduty

Send alert notifications to PagerDuty to accelerate incident response.

Logo Prometheus

Connect to Prometheus exporters and endpoints to automatically collect cloud-native application and infrastructure metrics.

Rancher logo

Embed security, maximize availability, and validate compliance for cloud-native workloads on Rancher

Red Hat Quay logo

Scan images and manage vulnerabilities with Red Hat Quay

Logo servicenow

Send alert notifications to ServiceNow to accelerate incident response.

Logo Slack

Send alert notifications to Slack to accelerate incident response.

Logo Victorops

Send alert notifications to VictorOps to accelerate incident response.

Logo StatsD

Automatically collect StatsD metrics for application and service performance monitoring.

Logo Tekton

Scan container images in your Tekton pipelines to detect and block vulnerabilities before they reach production.

VMware logo

Embed security, maximize availability, and validate compliance for cloud-native workloads on VMware and Tanzu.

Harbor registry

Scan images and manage vulnerabilities with the Harbor open source registry