eBPF Runtime Protection
Deploy kernel-level security monitoring with eBPF technology. Real-time threat detection, compliance evidence collection, and workload protection with less than 3% CPU overhead.
Supported Platforms
Deploy the TigerGate agent across your infrastructure
Kubernetes
Deploy as DaemonSet for cluster-wide protection
- Pod-level visibility
- Namespace isolation
- Label-based policies
Docker
Lightweight container for Docker environments
- Container monitoring
- Network visibility
- Volume protection
AWS ECS
Sidecar deployment for ECS tasks
- Task metadata
- Fargate support
- CloudWatch integration
Bare Metal / VMs
Systemd service for traditional infrastructure
- Full system visibility
- SSH monitoring
- Process tracking
eBPF Probes
Kernel-level visibility without kernel modules
Process Execution (execve)
Monitor all process executions with full command-line arguments, parent process, and user context.
File Operations (open/write/unlink)
Track file access, modifications, and deletions on critical paths like /etc, /var, and config files.
Network Connections (connect)
Monitor outbound network connections with destination IP, port, and process context.
Privilege Changes (setuid/setgid)
Detect privilege escalation attempts and capability changes in real-time.
Secrets Access
Monitor access to sensitive files, environment variables, and credential stores.
Process Behavior
Detect anomalous process behavior, unexpected child processes, and respawning.
Compliance Controls
Automated evidence collection for SOC 2, ISO 27001, PCI-DSS
Binary Execution
Prevent unauthorized binary execution
File Integrity
Detect critical file modifications
Log Tampering
Prevent log file manipulation
Network Egress
Monitor outbound connections
Privilege Escalation
Detect privilege changes
Secrets Exposure
Protect sensitive data access
Process Anomalies
Detect behavioral anomalies
Config Drift
Track configuration changes
Quick Start
Deploy the TigerGate agent in minutes
Kubernetes
Docker
Bare Metal / VM
System Requirements
Kernel Requirements
- Linux 4.15+ for basic monitoring
- Linux 5.7+ for LSM enforcement
- BTF (BPF Type Format) enabled
- CONFIG_BPF=y, CONFIG_BPF_SYSCALL=y
Resource Usage
- CPU: <3% overhead
- Memory: ~50MB baseline
- Network: ~1MB/hour telemetry
- No kernel modules required
Ready for Runtime Protection?
Deploy eBPF-based security monitoring across your infrastructure with real-time threat detection and compliance evidence.