StackRox Reviews & Pricing
by StackRox | Founded 2014, Mountain View, CA
Categories:
What is StackRox?
Industry Specialties: Serves all industries.
StackRox is a container and Kubernetes-native security platform that protects the entire container life cycle, including build, deploy and runtime. It handles vulnerabilities, incidents and threats. DevOps and security teams can manage security issues to simplify the protection of a cloud-native stack. Businesses can reduce the time and effort required to remediate threats by using a single data source to streamline security analysis and investigation processes.
PRICE
$
$
$
$
$
COMPANY SIZE
DEPLOYMENT
PLATFORM
Try Before You Buy.
Request a Free Demo Today!
Request Demo
It's completely free!
Product Screenshots and Videos
StackRox Pricing
Based on our most recent analysis, StackRox pricing starts at $0.
- Price
- $$$$$
- Starting From
- $0
- Pricing Model
- Still gathering data
- Free Trial
- Still gathering data
Training Resources
StackRox is supported with the following types of training:
- Documentation
- In Person
- Live Online
- Videos
- Webinars
Support
The following support services are available for StackRox:
- Phone
- Chat
- FAQ
- Forum
- Help Desk
- Knowledge Base
- Tickets
- Training
- 24/7 Live Support
StackRox Benefits and Insights
Why use StackRox?
Key differentiators & advantages of StackRox
- Enhance Risk Detection: Prioritize risks for targeting vulnerabilities to ensure immediate action by deriving data from Kubernetes.
- Streamline Workflows: Improve scalability and tackle operational challenges by leveraging built-in controls. Deep integration with Kubernetes ensures network segmentation, stops non-compliant applications from launching, prevents infected containers from running and promotes native policy enforcement.
- Reduce Attack Surface: Stop rogue procedures from repeatedly running by improving security through a CI/CD model. Strengthens configurations during builds and deployments by leveraging data from runtime behavior.
- Portable: Use features built by a cloud-native community. Access various controls applicable to on-premise, hybrid or cloud environments.
- Easy Integrations: Integrate services and tools with a rich API and pre-built plugins, securing and enhancing DevOps workflows.
Industry Expertise
Serves a variety of hosts across all industries.
Key Features
- Visibility:
- Offers a comprehensive threat summary to security and DevOps teams.
- Discover, identify and analyze container images for all image registries.
- Explore and visualize network traffic with any CNI plugin.
- Provides visibility into workflows to avoid compliance issues.
- Identifies risks in processes, deployments and communications based on containers working in test or production mode.
- Vulnerability Management:
- Identifies vulnerabilities in container images with a built-in image scanner. Facilitates runtime threat discovery for faster remediation.
- Block vulnerable deployments and repair failed builds using developer details.
- Enforce policies throughout the entire threat cycle based on vulnerability data.
- Compliance Regulations: Conducts standard-specific checks with 300+ controls and regular compliance assessments.
- Scans systems not complying with various regulations like CIS Benchmarks, NIST SP 800-190, PCI DSS and HIPAA.
- Access compliance details based on Kubernetes boundaries like nodes, clusters and namespaces or specific standards.
- Generate PDF reports to analyze organizational compliance status from a single dashboard.
- Enforce custom policies to prevent building or deployment of assets violating rules.
- Network Segmentation:
- Visualize network traffic for secure configurations. Interprets YAML files that embed network policies in Kubernetes.
- A network policy simulator monitors policy changes to reduce operational risks.
- Leverage network enforcement capabilities for portable and scalable network segmentation.
- Extends security visibility to the Istio service mesh for a better understanding of network traffic.
- Risk Prioritization & Profiling: Ranks deployments based on their holistic security risk and offers details about threats, configurations and processes requiring instant actions. Multi-factor risk profiling includes details like network exposure, suspicious operations running, misconfigurations and more.
- Threat Detection: Combines whitelists, regulations, pre-defined policies and behavioral modeling to detect threats.
- Automates identification of unknown procedures to eliminate the manual selection of allow lists.
- Leverages data from build and deployment phases to strengthen runtime protection.
- Incident Response: Automates incident response to tackle suspicious runtime behavior. Accelerates forensic investigations and provides native integrations with Sumo Logic, PagerDuty, Splunk and more for better security insights and efficient response.
Limitations
At the time of this review, these are the limitations according to user feedback:
- Pre-installed network policies don’t have satisfactory profile enforcement rules.
- Creating custom configurations isn’t easy.
Suite Support
mail_outlineEmail: Contact form and live chat option available.
phonePhone: (650) 385-8329.
schoolTraining: Videos and on-demand Webinars.
local_offerTickets: Not available.