1

Container vulnerability management | Snyk

 2 years ago
source link: https://snyk.io/product/container-vulnerability-management/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Why choose Snyk Container?

Developer-focused

Automated base image fixes via native pull requests combined with mapping vulnerabilities to Dockerfile commands makes it simpler for developers to fix container Issues, without requiring a deep security background

Security Intelligence

Snyk’s combined expertise in open source and container security combines to help developers create more secure applications.

Enterprise ready

Snyk Container works across the entire SDLC – from the developers’ desktops in to production – to help fix issues early and provide consistent controls and reporting across across your organization.

Snyk Container Integrations

Snyk Container is designed to work with a range of container image operating systems and package managers, Kubernetes platform, and container registries

Kubernetes platforms

  • Amazon Elastic Kubernetes Service (EKS)
  • Microsoft Azure Kubernetes Service (AKS)
  • Google Kubernetes Engine (GKE)
  • Red Hat OpenShift
  • VMware Tanzu Grid
  • And other platforms built with Kubernetes

Container registries

  • Docker Hub
  • Amazon Elastic Container Registry (ECR)
  • Microsoft Azure Container Registry (ACR)
  • Google Container Registry (GCR)
  • JFrog Artifactory
  • VMware Harbor
  • Red Hat Quay

Container base operating systems

  • Amazon Linux
  • Red Hat Enterprise Linux and UBI
  • Alpine Linux
  • Debian
  • Ubuntu
  • CentOS
  • Oracle Linux

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK