It provides eBPF-based transparent security observability combined with real-time runtime enforcement. The deep visibility is achieved without requiring application changes and is provided at low overhead thanks to smart in-kernel filtering and aggregation logic built directly into the eBPF-based kernel-level collector.
Tetragon is a tool in the Security category of a tech stack.
No pros listed yet.
No cons listed yet.
What are some alternatives to Tetragon?
It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.
It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
Ensighten is a comprehensive website security company, offering next generation compliance, enforcement and client-side protection against data loss, ad injection and intrusion.
AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses Hardware Security Modules (HSMs) to protect the security of your keys. AWS Key Management Service is integrated with other AWS services including Amazon EBS, Amazon S3, and Amazon Redshift. AWS Key Management Service is also integrated with AWS CloudTrail to provide you with logs of all key usage to help meet your regulatory and compliance needs.
Kubernetes, Splunk, Fluentd, Prometheus, OpenTelemetry are some of the popular tools that integrate with Tetragon. Here's a list of all 5 tools that integrate with Tetragon.