- 1. Overview
- 2. Container Defender (Linux and Windows)
- 3. Host Defender (Linux and Windows)
- 4. Serverless Defender
- 5. App Embedded Defender
- 6. Tanzu Application Service Defender
- 7. Defender capabilities
- 8. Connectivity
- 9. Deployment scenarios
Defenders enforce the policies you set in Console. They come in a number of different flavors. Each flavor is designed for protecting specific types of cloud-native resources and for optimal deployment into the environment, with full support for automated workflows. Use the following flow chart to choose the best Defender for the job.
In general, deploy Container Defender whenever you can. It offers the most features, it can simultaneously protect both containers and host, and nothing needs to be embedded inside your containers for Defender to be able to protect them.