Capsule8 finds and stops unwanted activity on Linux systems that jeopardizes your containerized environments. Our detection is crafted with the threat models of containers in mind and pinpoints workloads, not just hosts. Capsule8’s team includes some of the most active researchers in container escapology. To continually test our product’s container protection, we actively develop new container escape exploits for Linux kernel vulnerabilities.
Capsule8 also allows you to create custom policies leveraging container metadata, so you can extend Capsule8’s protection to meet the concerns of your unique environments.
Request a demo or watch the video to see how Capsule8 detects container escapes.