Secure your pipeline by securing your config files

Automated tools for identifying, scanning and securing the configuration files of IaC, container, OS and application and their dependencies.

Thank you! We will respond within 1 business day.
Something went wrong while submitting the form. Please try again.
-Templates are a starting point-

Identify misconfigurations in default templates

Software misconfigurations are a common threat vector for organizations of all sizes.

Software configurations are increasingly complex. It's simple to set-up and integrate new services. The speed and scale provided by spinning new services and containers often means the configuration is overlooked.

CoGuard seeks out configurations and looks across interdependencies, to detect breach paths pre-deployment.

Identify common misconfigurations across IaC, orchestration, container, OS and applications

Description of configuration parameters and security vulnerabilities found

Remediation steps for fixes

Seamless policy as code for config files & dependencies

Identify misconfigurations pre-Deployment
Image of a gear and lock
Extend CI/CD Security

Discovers configuration files for IaC, containers, applications, and their dependencies.

Cyber Security
Cyber Security

Scans configuration files against known database of known vulnerabilities for misconfigurations including CIS benchmarks, OWASP...

SBOM and Auditing
SBOM and Auditing

Framework for collecting and monitoring application configuration files including software bill of materials (SBOM) and auditing.

Custom Security Checks
Custom Checks

Implement custom rules, policies and reporting for your development, IT infrastructure and security departments requirements.

Best practices
Best practice for teams

Fits in your existing CI/CD pipeline. Extensible and adaptable rules. Grows with teams as size and software complexity increases.

Trusted by DevOps, Infrastructure and Security teams
- CoGuard supports -

Configuration security for all layers

CoGuard scans all layers of your IT infrastructure including: IaC, OS, container, and application layers and their dependencies.

IaC Tools

Chef Server
AWS CloudFormation
Azure Resource Manager
TerraForm

Containers

Docker
Kubernetes

Databases

MongoDB
PostgreSQL
MySQL
Microsoft SQL

Streaming services

Apache Kafka
Apache Solr

Text search engines

ElasticSearch

Distributed file systems

Apache Hadoop
MinIO

Web servers

NGINX
Apache Webserver
Microsoft IIS
Apache Tomcat

Authentication Services

Kerberos
Keycloak

GitHub
GitLab
TerraForm
Progress Chef
Puppet
Docker
CoGuard CLI
Azure Pipelines
GitHub Actions
Jenkins
Bitbucket Pipelines
GitHub
GitLab
TerraForm
Progress Chef
Puppet
Docker
CoGuard CLI
Azure Pipelines
GitHub Actions
Jenkins
Bitbucket Pipelines
TerraForm
Puppet
Progress Chef
Jenkins
GitLab
GitHub Actions
GitHub
Docker
CoGuard CLI
Bitbucket Pipelines
Azure Pipelines
TerraForm
Puppet
Progress Chef
Jenkins
GitLab
GitHub Actions
GitHub
Docker
CoGuard CLI
Bitbucket Pipelines
Azure Pipelines
CoGuard CLI output

Add to existing workflows

Embeds configuration files into secure development practices.

Identify configuration files and misconfigurations

Vulnerability remediation for configurations at IaC, Container and application layers

Seamless policy as code for config files & dependencies

Developer-Centric Tools
CoGuard Cluster Management screenshotCoGuard Configuration Drift screenshot
Dashboard

Security Policy
as Code

Reduce risk by identifying and automating IaC, container and application security in development workflows pre-deployment and detecting drifted and missing resources post-deployment.

Adaptable policy engine to improve compliance at the source

Identify resources in your software environment

Build your SBOM through detected configurations and dependencies

Drift detection by identifying changing resources and configurations

Your security configuration management
action plan

Human error caused data breach and downtime is on the rise. We believe pre-deployment static analysis is the solution! You've done it for your code, it's time to dive into your configurations and to make them stable too.

Reduce post deployment downtime

Reduce data breach risk due to human error

Reduce setup time of new services and updates

Establish configuration baselines and detect configuration drift

Assess and identify configuration vulnerabilities across applications, containers and cloud providers

Pricing

Flexible pricing for developers, projects, teams and enterprises.

Community

2 users
Always
Free
Get started

Team

up to 10 users
Starting at

Enterprise

unlimited users
Starting at
$1499/m
Contact us

Custom

unlimited users
Starting at
$2499/m
Contact us
Arrow pointing right

Static analysis
for config files

Automated tools for discovering, scanning and securing the configuration files for IaC, containers, applications and their interdependencies.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.