Generate a trusted genetic profile of all software in your infrastructure (your applications, third party applications, operating system)
2. MONITOR
Monitor in runtime for any deviations in memory across the entire cloud native stack (IaaS, CaaS, PaaS) and layers (OS, K8s, containers), while providing full visibility over all software running on your system
3. INSPECT
Genetically inspect the deviation to determine if it’s unauthorized code or just a natural and legitimate deviation
4. ALERT
Alerts on unauthorized code and provides deep context for each threat; Connects to Intezer’s AutonomousDR dashboard for automated alert triage and investigation
5. TERMINATE
Terminate unauthorized code on demand
6. ENFORCE CLEAN
Ensure your systems are in a trusted state and run 100% trusted code