DEV
PROD
$15/mo
For 1-100 contributing developers*
OSS Dependencies
Scan and prioritize vulnerabilities in third-party dependencies
- OSS dependency scans
- Monitor license compliance
- Software Bill of Materials (SBOM) in SPDX and CycloneDX formats
- EOL components
- Exploitability with EPSS and CISA KEV
- Transitive vs. direct vulnerabilities
- Remediation guidance with fixed-in versions
- Risk vs. Effort mapping
- CI integration and gating builds
- Policies for generating alerts
$15/mo
For 1-100 contributing developers*
Container Scans
Scan and prioritize vulnerabilities in container images
- Container scans
- Monitor license compliance
- Software Bill of Materials (SBOM) in SPDX and CycloneDX formats
- Vulnerabilities per container layer
- Base layer vulnerabilities
- EOL components
- Exploitability with EPSS and CISA KEV
- Remediation guidance with fixed-in versions
- Risk vs. Effort mapping
- CI integration and gating builds
- Policies for generating alerts
$20/mo
For 1-100 contributing developers*
Runtime SCA
Prioritize SCA findings based on correlation with runtime usage behavior and reachability; identify reachable and used OSS dependencies and OS packages.
- Runtime dependency usage: View which classes/files are used within each OSS dependency at runtime.
- Runtime container usage: View which shared objects/ executables are used within OS packages at runtime.
- Venn diagram showing which vulnerable components are used/ unused and reachable at runtime
- Works with popular third-party SCA tools such as Snyk, Synopsys Black Duck, Sonatype, Mend, and others
*A contributing developer is any active contributor to the project you are securing with Deepfactor who has made at least one commit in the last 90 days.
$15/mo
For 1-100 contributing developers*
Kubernetes SCA
Detect vulnerable, exploitable, and reachable containers in K8s clusters and namespaces
- Kubernetes webhook to scan pods
- Automatic SCA/SBOM scans of K8s workloads
- Search and filter high-risk K8s pods based on CVSS, EPSS, CISA KEV, reachability, and more
$20/mo
For 1-100 contributing developers*
Container Runtime Security
Detect insecure file, network, and memory behavior to identify unknown vulnerabilities and achieve compliance with SOC2 Type 2 and other frameworks.
- Runtime analysis during dev, test, and prod to detect insecure application behaviors across network, file, process, and memory activity
- Configure rules based on expected application behavior; alerts delivered when anomaly discovered
- Remediation guidance with stack trace information
- Mapping of security risks to compliance violations for PCI DSS, SOC2 Type 2 and NIST 800-53
*A contributing developer is any active contributor to the project you are securing with Deepfactor who has made at least one commit in the last 90 days.
-
DEV (3 Products)
Scan and Prioritize Risks in Code and Containers
$15/mo
For 1-100 contributing developers*
OSS Dependencies
Scan and prioritize vulnerabilities in third-party dependencies
- OSS dependency scans
- Monitor license compliance
- Software Bill of Materials (SBOM) in SPDX and CycloneDX formats
- EOL components
- Exploitability with EPSS and CISA KEV
- Transitive vs. direct vulnerabilities
- Remediation guidance with fixed-in versions
- Risk vs. Effort mapping
- CI integration and gating builds
- Policies for generating alerts
$15/mo
For 1-100 contributing developers*
Container Scans
Scan and prioritize vulnerabilities in container images
- Container scans
- Monitor license compliance
- Software Bill of Materials (SBOM) in SPDX and CycloneDX formats
- Vulnerabilities per container layer
- Base layer vulnerabilities
- EOL components
- Exploitability with EPSS and CISA KEV
- Remediation guidance with fixed-in versions
- Risk vs. Effort mapping
- CI integration and gating builds
- Policies for generating alerts
$20/mo
For 1-100 contributing developers*
Runtime SCA
Prioritize SCA findings based on correlation with runtime usage behavior and reachability; identify reachable and used OSS dependencies and OS packages.
- Runtime dependency usage: View which classes/files are used within each OSS dependency at runtime.
- Runtime container usage: View which shared objects/ executables are used within OS packages at runtime.
- Venn diagram showing which vulnerable components are used/ unused and reachable at runtime
- Works with popular third-party SCA tools such as Snyk, Synopsys Black Duck, Sonatype, Mend, and others
*A contributing developer is any active contributor to the project you are securing with Deepfactor who has made at least one commit in the last 90 days.
-
PROD (2 Products)
Detect and Monitor Risks at Runtime
$15/mo
For 1-100 contributing developers*
Kubernetes SCA
Detect vulnerable, exploitable, and reachable containers in K8s clusters and namespaces
- Kubernetes webhook to scan pods
- Automatic SCA/SBOM scans of K8s workloads
- Search and filter high-risk K8s pods based on CVSS, EPSS, CISA KEV, reachability, and more
$20/mo
For 1-100 contributing developers*
Container Runtime Security
Detect insecure file, network, and memory behavior to identify unknown vulnerabilities and achieve compliance with SOC2 Type 2 and other frameworks.
- Runtime analysis during dev, test, and prod to detect insecure application behaviors across network, file, process, and memory activity
- Configure rules based on expected application behavior; alerts delivered when anomaly discovered
- Remediation guidance with stack trace information
- Mapping of security risks to compliance violations for PCI DSS, SOC2 Type 2 and NIST 800-53
*A contributing developer is any active contributor to the project you are securing with Deepfactor who has made at least one commit in the last 90 days.
Bundle All 5 Products
Includes all Deepfactor products and capabilities
$75/mo
For 1-100 contributing developers*
For 100+ contributing developers, or a multi-year discount, please request a quote.