VMware Carbon Black
Container
Enable continuous visibility, security, and compliance for the full
lifecycle of containers and Kubernetes applications from
development to production.
Full Lifecycle Container Security at the Speed of DevOps
Balance business agility and speed to market without compromising security. VMware empowers organizations to secure the complete lifecycle of Kubernetes applications. Detect and fix vulnerabilities and misconfigurations before deployment, meet compliance standards, and achieve simple, secure Kubernetes environments at scale.

Automate and Customize Compliance Policy
Create automated, customizable policies to enforce secure configuration and ensure compliance with organizational requirements and industry standards such as CIS benchmarking.

Complete Visibility into Kubernetes Security Posture
Provide the visibility and control that Application Security and DevOps teams need to secure Kubernetes clusters and the applications deployed on them throughout the development lifecycle.

Governance and Enforcement
Enforce policies from build to deployment to detect vulnerabilities and misconfigurations and prevent them from being deployed to production. Focus on the most severe risks to Kubernetes environments.

Scan Container Images for Vulnerabilities from Development to Production
Provide visibility into vulnerabilities and misconfigurations — from the CI/CD pipeline through the runtime layer. Policy customization allows DevOps teams to scan images deployed from third-party registries, restrict registries, and get notified of any violations.
Use Cases

Kubernetes security posture management
Planning your security strategy starts with understanding your environment. This requires visibility into running workloads, how they are configured, and how your Kubernetes environment is configured. You also need to prioritize the risk associated with each workload to effectively focus your remediation efforts.

Workload visibility and hardening
Kubernetes continues to gain traction as the leading open-source platform for managing containerized workloads and services. However, the increased agility, portability and scalability are juxtaposed with susceptibility to vulnerabilities specific to Kubernetes environments. Gain insight into the vulnerabilities, how they came to be, and mistakes to avoid — all to help you strengthen your security posture.

Container Image and Runtime Cluster Image Scanning
When you secure apps early in development, you reduce vulnerabilities in production. Learn how to integrate security into your DevOps processes to easily deploy quality apps faster.

Security and Compliance Automation
Improve the effectiveness of your SOC through automated vulnerability scanning and network anomaly detection for your production environment, to ensure continuous compliance.