• Product

      Product

      Application Security Platform

      Use Cases

      Shift Left & DevSecOps Supply Chain Security Software Bill of Materials (SBOM) Container Runtime Security & Compliance Cloud Native Application Security
      What is Deepfactor and How Does It Work?
      4-Minute Video
      What is Deepfactor and How Does It Work? >
  • Pricing
    • Pricing Plans
  • Resources

      Resources

      All Resources Next-Gen AppSec Series Case Studies Demos Videos Glossary Webinars Whitepapers Workshops Latest Blogs Documentation
      Implement Effective Next-Gen Container Runtime Security in Kubernetes and Cloud Native Apps
      Whitepaper
      Implement Effective Next-Gen Container Runtime Security in Kubernetes and Cloud Native Apps >
  • Company
    • About
    • Leadership
    • Partners
    • News and Events
    • Careers
    • Contact Us
  • LOGIN
Cisco Logo Deepfactor is now part of Cisco | Learn more
Learn more
Deepfactor Logo
  • Product

      Product

      Use Cases

      Application Security Platform

      Use Cases

      Shift Left & DevSecOps Supply Chain Security Software Bill of Materials (SBOM) Container Runtime Security & Compliance Cloud Native Application Security
      What is Deepfactor and How Does It Work?
      4-Minute Video
      What is Deepfactor and How Does It Work? >
  • Pricing
    • Pricing Plans
  • Resources

      Resources

      All Resources Next-Gen AppSec Series Case Studies Demos Videos Glossary
      Webinars Whitepapers Workshops Latest Blogs Documentation
      Next-Gen AppSec Series—Deepfactor SCA: 80% Less Noise, 50% Lower Cost
      Next-Gen AppSec Series
      Next-Gen AppSec Series—Deepfactor SCA: 80% Less Noise, 50% Lower Cost >
  • Company
    • About
    • Leadership
    • Partners
    • News and Events
    • Careers
    • Contact Us
LOGIN
Deepfactor's Application Security Platform will no longer be offered for sale or renewal effective September 20, 2024.

Getting Started

  • QuickStart Guide
  • Install Deepfactor CLI
  • Deepfactor Support Matrix

Tutorials

  • SBOM & SCA
    • Artifact Releases
    • Deepfactor Scanner
    • Integrate Deepfactor scanner in your CI/CD pipelines
    • Scanning container images from private registries using Deepfactor CLI
    • Scan container images in K8s cluster
      • Scanning images from private registries in K8s cluster using Deepfactor
      • Scanning container images from private registries with basic authentication support in K8s
      • Scanning container images from private AWS Elastic Container Registry (ECR) in EKS on AWS Fargate
      • Scanning container images from private AWS Elastic Container Registry (ECR) in EKS on AWS EC2
  • Runtime Security
    • Introduction to Deepfactor Runtime Security
    • Deepfactor CLI Reference
    • Kubernetes workload
      • Run your Kubernetes workload with Deepfactor
      • Install Deepfactor Mutating Webhook
      • Configure Deepfactor Kubernetes admission webhook
      • Install Deepfactor K8s webhook on EKS Fargate
      • Selecting the pods you want to run with Deepfactor
      • Configuring application name, component name and component version in K8s webhook
      • Install Deepfactor mutating admission webhook using Argo CD
      • Install Deepfactor portal & webhook using Argo CD and vault
      • Use image pull secret for Runtime images
    • Containers/Other orchestration platforms
      • Run your Container Images with Deepfactor
      • Run containers in ECS with Deepfactor
    • Non-containerized workloads
      • Running non-containerized applications with Deepfactor

Deepfactor Platform

  • Introduction to Deepfactor
  • Alert Policies
  • Alert States and Triaging Flows
  • Deepfactor’s Correlation Capabilities
  • Organization and Teams
  • Role Based Access Control
  • Insights Knowledge Base
    • Privilege Separation and Privilege Dropping
    • Buffer Overflow Alerts
  • Knowledge Base
    • Deepfactor scan errors
    • K8s Webhook & Runtime Troubleshooting Guide
    • Tools for viewing CycloneDX and SPDX SBOMs
    • Graceful handling of pod restarts
    • Deepfactor telemetry events
    • Deepfactor Instrumentation Warning Messages
    • Best Practices for running your applications with Deepfactor in production environments
    • Golang Specific Notes
    • How to access Deepfactor Portal in different AWS subnet types
    • How the Deepfactor Management Portal Communicates With The Outside World
    • Language Specific Agents (LSA)
    • Mixed libc environments
    • Sensitive Information and Secrets in Process Environment Remediation
    • Running HAProxy with Deepfactor
    • Augmenting Alert Evidence with Runtime Stack Traces
  • FAQs
    • General FAQs
    • Open Source Disclosure

Integrations

  • Single Sign On (SSO) for authentication to Deepfactor
  • Integrate Jira with Deepfactor
  • Integrate Slack with Deepfactor
  • Okta
  • Deepfactor HTTPS webhook

Self managed Deepfactor portal

  • Deepfactor Portal architecture & deployment options
  • Install Self managed Deepfactor portal
    • Kubernetes Cluster
      • Prerequisites for deploying Deepfactor portal in Kubernetes Cluster
      • Deploying Deepfactor Portal in your Kubernetes Cluster
      • Install Deepfactor portal using Helm
      • Customizing Deepfactor portal deployment
        • Customizing your Deepfactor Portal Deployment in K8s
        • Deploy Deepfactor Portal With Resource Limits
        • Deploying Deepfactor Portal using external IP
        • Deepfactor Portal Installation with Existing Ingress Controller
    • AWS EC2
      • Prerequisites for installing Deepfactor Portal in AWS Cloud
      • Deploying Deepfactor on AWS using CFT
      • Install AWS Certificate Manager(ACM) certificate on Deepfactor portal EC2 instance
    • VMWare vSphere
      • Deepfactor Portal Proxy Configuration for OVA deployments
      • Prerequisites for deploying Deepfactor portal in VWware vSphere
      • Deploying Deepfactor on VMware vSphere
  • Manage Deepfactor Portal
    • Using Deepfactor APIs
    • Managing Users
    • Updating your Deepfactor Portal
    • Updating Deepfactor portal certificate
  • Deepfactor Portal Certificate
    • Generate certificate using cert-manager for Deepfactor portal
    • Create self-signed certificate for Deepfactor Portal on your K8s cluster
    • Create AWS Private CA Certificate for Deepfactor Portal on your K8s cluster
    • Create Let’s Encrypt certificate for Deepfactor Portal on your K8s cluster

Release Notes

  • Deepfactor Release Notes
  • Home
  • Docs
  • Deepfactor Platform
  • FAQs

General FAQs

How is Deepfactor different from traditional Application Security tools? #

Deepfactor is designed, from the ground-up, to be cloud-native first and developer first. It is also designed as an integrated platform that combines dependency & container scans (SCA), runtime SCA, runtime security insights (container security) and, software bill of materials (SBOM) into one simple and powerful tool.

With an integrated platform for detecting risks in application code, dependencies, container images and web/API interfaces, Deepfactor eliminates the need to buy multiple tools and saves engineering teams time and effort by automating the process of researching vulnerabilities and finding resolutions.

The Deepfactor cloud-native first design seamlessly plugs into docker and Kubernetes environments, and integrates all the way across the SDLC from dev, test and CI/CD to production environments.

 

What can Deepfactor help customers achieve? #

Organizations typically embrace Deepfactor for the following reasons:

Make Developers More Efficient

When developers are asked to fix a list of vulnerabilities in their code, it takes time for them to research the vulnerabilities, pinpoint the location of the vulnerability in their code, and figure out how to resolve the issue. Deepfactor automates that process, saving developers time they can use to improve their code or add additional features.

Avoid Release Delays

Finding vulnerabilities early in development and testing enables developers and QA teams to fix security risks before they prevent releases. Deepfactor surfaces vulnerability information immediately as developers check-in their code and start testing their applications.

Prevent breaches in production
Detecting security risks comprehensively across the various layers of a cloud-native application’s tech stack helps engineering teams get in the habit of creating secure & compliant applications by default. This significantly reduces the risk of breaches in production.

Shift Security Left
Identifying security risks during dev & test significantly reduces the chance of release delays, typically caused due to last minute surprise security findings, by your AppSec team or even your customers, towards the end of the release

Shift Compliance Left
Identifying violations to compliance frameworks such as SOC2, PCI etc, during dev & test, can help shift compliance left. This can help engineering teams stay on top of compliance and reduce release delays when compliance violations are discovered later in the stage of or after the release.

Secure The Software Supply Chain
Organizations selling software to the Federal Government are required to maintain software bill of materials. After high profile breaches that compromised software supply chains such as the SolarWinds exploit, many organizations are requiring all their vendors to provide transparency around the software’s vulnerabilities.  Deepfactor helps maintain both static and dynamic SBOM and tie that into software release versions and deployment environments.

 

How does Deepfactor fit into the SDLC pipeline? #

Deepfactor can run during your dev, test, stage or production environments.

Where does the Deepfactor portal reside?
#

Deepfactor offers both SaaS & Self-Managed options. With the SaaS option (coming soon), the Deepfactor portal is hosted in the public cloud in a multi-tenant environment. The self-managed option enables enterprise customers to set up their own single-tenant Deepfactor portal in their cloud of choice or on-premises. Deepfactor today provides self-managed options for Kubernetes (Amazon EKS, Azure AKS, Google GKE, or other Kubernetes environments), AWS EC2 using CloudFormation Template, or using an .OVA  (VMware).

What Types of Applications can be run with Deepfactor? #

Deepfactor’s runtime telemetry support code is provided in a shared library called libdf.so. This library is loaded into an application when it starts. The telemetry support code is written to instrument calls by an application to the underlying C runtime library (glibc or musl, based on the Linux distribution). Some types of applications do not directly use the C runtime library and thus fewer telemetry events will be collected for analysis. These include statically linked applications and applications written in Go.

Applications that have a set of capabilities registered with Linux (eg, by using the setcap(8) program) or protected by AppArmor/SELinux may not allow the Deepfactor shared library to load. In this case, no telemetry will be gathered. This also applies to applications whose setuid/setgid bit is set. This can be fixed by running the instrumented executable without this configuration; remember to re-enable such protections before deploying the application to production.

Deepfactor sets LD_PRELOAD to inject the Deepfactor runtime into your application. If you are using another tool that is setting LD_PRELOAD, Deepfactor will not be injected and a warning will be shown on Deepfactor portal UI.

 

Does Deepfactor work with non-containerized applications
#

Yes. While Deepfactor is built with a container-first approach, it also works with monolithic/non-containerized applications.

How much does it cost? #

Please visit our pricing page for details.

How do I get started?
#

Contact us. One of our customer success engineers will reach out to you for a free consultation to understand your tech stack and help you set up the product.

Was this article helpful?
Still stuck? How can we help?

How can we help?

Updated on December 13, 2023

Powered by BetterDocs

Table of Contents
  • How is Deepfactor different from traditional Application Security tools?
  • What can Deepfactor help customers achieve?
  • How does Deepfactor fit into the SDLC pipeline?
  • Where does the Deepfactor portal reside?
  • What Types of Applications can be run with Deepfactor?
  • Does Deepfactor work with non-containerized applications
  • How much does it cost?
  • How do I get started?
Deepfactor Icon

Deepfactor is a next-gen application security platform, using static container scan data + runtime analysis to prioritize vulnerabilities to those representing true risk to a business—based on reachability, runtime usage, deployment context, and exploit maturity.

Product Pricing Resources Company Documentation Login

SUBSCRIBE TO OUR NEWSLETTER!

Sign Up
LinkedIn Icon YouTube Icon GitHub Icon Twitter Icon

© 2025 Deepfactor, Inc. All Rights Reserved.

Privacy Statement | Terms of Service | Open Source Disclosure