Categories:

#50

StackRox is ranked #50 in the Endpoint Management Software product directory based on the latest available data collected by SelectHub. Compare the leaders with our In-Depth Report.

StackRox Pricing

Based on our most recent analysis, StackRox pricing starts at $0.

Price
$
$
$
$
$
i
Starting From
$0
Pricing Model
Still gathering data
Free Trial
Still gathering data

Training Resources

StackRox is supported with the following types of training:

Documentation
In Person
Live Online
Videos
Webinars

Support

The following support services are available for StackRox:

Email
Phone
Chat
FAQ
Forum
Help Desk
Knowledge Base
Tickets
Training
24/7 Live Support

StackRox Benefits and Insights

Why use StackRox?

Key differentiators & advantages of StackRox

  • Enhance Risk Detection: Prioritize risks for targeting vulnerabilities to ensure immediate action by deriving data from Kubernetes. 
  • Streamline Workflows: Improve scalability and tackle operational challenges by leveraging built-in controls. Deep integration with Kubernetes ensures network segmentation, stops non-compliant applications from launching, prevents infected containers from running and promotes native policy enforcement. 
  • Reduce Attack Surface: Stop rogue procedures from repeatedly running by improving security through a CI/CD model. Strengthens configurations during builds and deployments by leveraging data from runtime behavior. 
  • Portable: Use features built by a cloud-native community. Access various controls applicable to on-premise, hybrid or cloud environments. 
  • Easy Integrations: Integrate services and tools with a rich API and pre-built plugins, securing and enhancing DevOps workflows. 

Industry Expertise

Serves a variety of hosts across all industries.

Key Features

  • Visibility:  
    •  Offers a comprehensive threat summary to security and DevOps teams. 
    •  Discover, identify and analyze container images for all image registries. 
    •  Explore and visualize network traffic with any CNI plugin. 
    •  Provides visibility into workflows to avoid compliance issues. 
    •  Identifies risks in processes, deployments and communications based on containers working in test or production mode. 
  • Vulnerability Management:  
    •  Identifies vulnerabilities in container images with a built-in image scanner. Facilitates runtime threat discovery for faster remediation. 
    •  Block vulnerable deployments and repair failed builds using developer details. 
    •  Enforce policies throughout the entire threat cycle based on vulnerability data. 
  • Compliance Regulations: Conducts standard-specific checks with 300+ controls and regular compliance assessments. 
    •  Scans systems not complying with various regulations like CIS Benchmarks, NIST SP 800-190, PCI DSS and HIPAA. 
    •  Access compliance details based on Kubernetes boundaries like nodes, clusters and namespaces or specific standards. 
    •  Generate PDF reports to analyze organizational compliance status from a single dashboard. 
    •  Enforce custom policies to prevent building or deployment of assets violating rules. 
  • Network Segmentation:  
    •  Visualize network traffic for secure configurations. Interprets YAML files that embed network policies in Kubernetes. 
    •  A network policy simulator monitors policy changes to reduce operational risks. 
    •  Leverage network enforcement capabilities for portable and scalable network segmentation. 
    •  Extends security visibility to the Istio service mesh for a better understanding of network traffic. 
  • Risk Prioritization & Profiling: Ranks deployments based on their holistic security risk and offers details about threats, configurations and processes requiring instant actions. Multi-factor risk profiling includes details like network exposure, suspicious operations running, misconfigurations and more. 
  • Threat Detection: Combines whitelists, regulations, pre-defined policies and behavioral modeling to detect threats. 
    •  Automates identification of unknown procedures to eliminate the manual selection of allow lists. 
    •  Leverages data from build and deployment phases to strengthen runtime protection. 
  • Incident Response: Automates incident response to tackle suspicious runtime behavior. Accelerates forensic investigations and provides native integrations with Sumo Logic, PagerDuty, Splunk and more for better security insights and efficient response. 

Limitations

At the time of this review, these are the limitations according to user feedback:

  •  Pre-installed network policies don’t have satisfactory profile enforcement rules. 
  •  Creating custom configurations isn’t easy. 

Suite Support

mail_outlineEmail: Contact form and live chat option available.
phonePhone: (650) 385-8329.
schoolTraining: Videos and on-demand Webinars.
local_offerTickets: Not available.