Get a custom-made offer

Request a demo
← Back

Great! Tell us a little about yourself.

Simple and Transparent Pricing

Choose a plan that's right for you

Free Forever

Kubernetes Advisor

  • K8s infrastructure vulnerability scanning
  • Hunting misplaced secrets
  • K8s operators security
  • Istio security configuration
  • Ingress Controllers
  • Up to 3 nodes
  • K8s infrastructure vulnerability scanning
  • Hunting misplaced secrets
  • K8s operators security
  • Istio security configuration
  • Ingress Controllers
  • Up to 3 nodes
Get Started

Kubernetes Hygiene Guardrails

Continuous security guardrails for Kubernetes deployments: K8s Security Hardening and Best Practices

Continuous security guardrails for Kubernetes deployments: K8s Security Hardening and Best Practices

$40

per node | per month
billed annually

Get Advisor

Automated K8s Forensics and Analysis

Identify anomalous behaviours and suspicious activity in Kubernetes deployments

Identify anomalous behaviours and suspicious activity in Kubernetes deployments

$75

per node | per month billed annually | Min. 30 nodes

Get kAudit

K8s Runtime Security: Detect, Alert, Enforce

Microservices FW, Threat Intel., Anomaly Detection, Process Whitelist, Admission Controller

Microservices firewall

Threat Intelligence

Anomaly Detection

Process Whitelist

Admission Controller

$125

per node | per month billed annually

Get Started

See Alcide Platform in action

Request a demo

Frequently Asked Questions

What are the different deployment models available?

Alcide is available as a SaaS-based solution.

What available integrations does Alcide support?

Alcide natively integrates with many devOps and SIEM products. Visit our Community page for the full list.

What is the Alcide Admission Controller capability?

Alcide Admission Controller allows you to define and customize what is allowed to run in a Kubernetes cluster. Deploy guardrails that:

  • Constantly watch your Kubernetes deployments
  • Find deviations from desired baselines
  • Can alert or deny on policy violation

Coupled with Alcide Kubernetes Advisor, an on-demand Kubernetes assessment tool, admission control offers a complete security solution from Dev. to production. Together, they provide automated, centralized protection and remediation, backed up with supreme visibility spanning multi-cluster, and multi-account environments.

What features does Alcide Kubernetes Advisor provide for policy customization?

The Alcide Advisor provides the ability to fully customize the scan policy: pick and choose what scan checks are enabled based on use case and persona, override the severity, and create exceptions to certain microservice/resources for example – allowing a monitoring microservice to run as a privileged Pod in order for it perform its intended functionality.

Can I get default blacklists out of the box from Alcide Kubernetes Advisor?

Yes, we have out-of-the-box-black lists. For example, Pod that mounts host file system paths such as /proc or /etc – would create check violation as these are clearly not best practice and introduce risk

What attack scenarios does Alcide detect?

Within our Kubernetes Security Platform, we monitor and detect possible security breaches and advanced threats, as well as security anomalies and common cyber attack techniques like DNS tunneling, spoofing, and poisoning. In addition, the platform detects endpoints scanning within the datacenter and ports scanning from outside the data center, and known malicious external IPs and domain names (reputation feeds).

What does Alcide’s reputation feed provide security teams with?

Alcide Reputation Intelligence Feed reports on suspicious traffic that is associated with the reputation-related (IP or DNS) and blocks connections before entering the workloads running on the compute. And in specific: Ability to view and review alerts: View an alert from the events feed or on the topology map or search for a specific asset by name, IP address, labels or type; Review alerts details to understand the nature of the observed indication; Identify a component of a known attack or anomaly behavior that might indicate an attack on your network; Collect information to understand the full scope of the incident, review network traffic and network rules defined for the asset; Derive possible courses of actions and proceed to act on them; Respond Quickly to the detected attack by quarantining an application and isolating it from the network.

Adopting Alcide saved us from doing a manual review of our Dev. environment, allowing us to go live on the original set date.
Terence Runge, Chief Information Security Officer, Reltio Reltio_Logo_for-quotes
By using Alcide Microservices firewall, DFDS were able to enforce application-aware and label based policies.
Rune Abrahamsson, Site Reliability Engineer, DFDS dfds-logo for homepage
Alcide Advisor easily enables us to scan for known vulnerabilities across our EKS Kubernetes clusters and quickly remediate any risk before it exposes our production environment.
Einav Friedman, Head of DevOps, Reali reali logo 32px high
Enhanced Visibility is a top priority for Takeaway.com. With our multiple K8s deployments, we wanted to make sure we are in control of our EKS Kubernetes environments
Vyacheslav Fadyushin , Lead IT-Security Specialist, Takeaway.com TakeAway logo for website