Integration into the development process
- Detection of vulnerabilities in running containers - Scanning running applications can identify vulnerabilities in code that can`t be detected during the build phase 
- Checks container images from the registry - Automated scanning can detect irrelevant images and identify vulnerabilities, secrets and violations in configurations 
- Monitors resource consumption and communications between containers - Intuitive widgets help detect suspicious activity and proactively respond to security threats 







