Aporeto Logo
Aporeto Logo

Aporeto’s approach

Aporeto’s approach to workload segmentation and isolation provides:

Diagram of Identity-Powered Security

Aporeto provides granular control over vulnerabilities and threat activities by conducting static and runtime analysis of container images and their interactions with the broader system to enable remediation through real-time policy response.  Aporeto also monitors runtime behavior by analyzing workload network communication patterns and lower-level system call activity against benchmarked and anticipated norms. Easy-to-write policies can provide protective action against CVEs levels or specific CVEs to quarantine containers, stop communications, and snapshot them for further analysis.