Documentation

TigerGate Documentation

Everything you need to deploy, configure, and use TigerGate for complete security coverage from code to runtime

Quick Start

Get up and running in minutes

1

Installation

Install TigerGate on Kubernetes, Docker, AWS ECS, or bare metal in under 5 minutes

Get Started
2

Configuration

Configure scanners, integrations, and policies for your environment

Configure
3

First Scan

Run your first security scan and review findings in the dashboard

Start Scanning

Additional Resources

Security Resources

Security best practices, threat intelligence, and vulnerability research

View Resources

Changelog

Latest updates, new features, and improvements to the TigerGate platform

View Changelog

GitHub Repository

Explore the open source code, contribute, and report issues

View on GitHub

Need Help?

Can't find what you're looking for? Contact our support team or join our community