Products
Rezilion Enforce
Effortless cloud workload protection at $25 per vCPU/year.
Enable Developers to Continuously Push Code Without Risk
Rezilion Enforce provides continuous visibility into the provenance of all code running in production, and assurance that workloads and applications are running in their desired states.
With Enforce, you can automatically mitigate unpatched and 0-day vulnerabilities across containers, servers, VMs and applications — ensuring that all everything in runtime originated from a trusted source.

Identify and sanction the sources of all code in production
Automatically create a deterministic whitelist of allowed code, commands and functions
Eliminate friction between Security and DevOps
Agentless monitoring of runtime, alerts upon deviation from desired state
Implement Security-as-Code mitigation using existing IT-orchestration tools and workflows
Completely autonomous — Requires no manual tuning or administration
Enforce Architecture
Rezilion Enforce adds active mitigation capabilities to Rezilion Prioritize. Our Desired State Enforcement™ technology assures cloud workloads are always protected from vulnerability exploitation, unauthorized code execution, and privilege escalation.
Notary
Instrumentor
Rezilion Core
Mitigator
Notary
Instrumentor
Rezilion Core
Mitigator
Notary
Instrumentor
Rezilion Core
Mitigator
Connect to container and VM image repositories (such as JFrog Artifactory, Docker Registry, AWS and VMware) and statically analyze every new image or artifact pushed in order to determine the desired state in production.
- Notary Plugins connect to the repository and pull every new image deployed
- Output includes a whitelist of code, commands and functions that will be allowed for every application in runtime — no PII or sensitive customer data is ever captured or transmitted
- Notary plugins can run remotely (from the Rezilion core) or locally (as a standalone VM or container) — in the latter case, only the Notary output will be sent back to the Rezilion Core
Connect to container and VM image repositories (such as JFrog Artifactory, Docker Registry, AWS and VMware) and statically analyze every new image or artifact pushed in order to determine the desired state in production.
- Notary Plugins connect to the repository and pull every new image deployed
- Output includes a whitelist of code, commands and functions that will be allowed for every application in runtime — no PII or sensitive customer data is ever captured or transmitted
- Notary plugins can run remotely (from the Rezilion core) or locally (as a standalone VM or container) — in the latter case, only the Notary output will be sent back to the Rezilion Core
Agentless instrumentation of runtime to monitor service instant states in real-time and transmit health telemetry to the Rezilion Core for analysis.
For enhanced visibility:
- Continuous: Deploy a daemonset in Kubernetes or a privileged Docker container
- Periodical: Use a Chef recipe or Ansible playbook that executes native linux commands and sends their output to the Rezilion core
Correlates Instrumentor telemetry with the Notary output in order to detect deviations from the desired state. In the event of a deviation, the Core triggers the Mitigator.
- SaaS by-default (ISO 27001 Certified)
- Can be deployed on-prem as a stand-alone VM or container
Integrates with orchestration and ITSM APIs take actions based on the output from the Rezilion Core to help restore a breached instance to its known good state. Such actions include:
- Gracefully recommissioning infected Kubernetes pods and AWS-EC2 instances
- Recycling breached VM or container keys
- Notifying admins over Slack in the event of manual or unsanctioned user activity Opening Jira or ServiceNow tickets in the event of an exploitation or a breach
Rezilion Prioritize
Reclaim 60% of the time and resources spent on patching by prioritizing cloud security issues that pose actual (vs. theoretical) risk
Get Started Now
Rezilion is a true turnkey SaaS solution for your cloud workload headaches. You are three clicks away from continuous protection.