Cloud-native feed consumption
Based on periodic scans
The entire cloud posture including cross account and clouds dependencies
Security Posture
See the impact of every change, detect critical exposure in real-time.
Not Supported, due to periodic scans there is no way to see previous states.
Declare Access Governance and Zero-trust, define your organizational best-practices.
Resource based rules only.
Real-time detection of newly created toxic combinations against any change with root cause analysis.
May show false positives, missing reachability validations.
Agentless - Network, Identity, k8s. Prioritized based on the potential exploitability and possible attack vector.
Not Supported, enriches third party findings with last scan results.