Documentation
TigerGate Documentation
Everything you need to deploy, configure, and use TigerGate for complete security coverage from code to runtime
Quick Start
Get up and running in minutes
1
Installation
Install TigerGate on Kubernetes, Docker, AWS ECS, or bare metal in under 5 minutes
Get Started
2
Configuration
Configure scanners, integrations, and policies for your environment
Configure
3
First Scan
Run your first security scan and review findings in the dashboard
Start Scanning
Documentation
Comprehensive guides and references
Additional Resources
Security Resources
Security best practices, threat intelligence, and vulnerability research
View ResourcesNeed Help?
Can't find what you're looking for? Contact our support team or join our community