Container vulnerability management | Snyk
source link: https://snyk.io/product/container-vulnerability-management/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
Why choose Snyk Container?
Developer-focused
Automated base image fixes via native pull requests combined with mapping vulnerabilities to Dockerfile commands makes it simpler for developers to fix container Issues, without requiring a deep security background
Security Intelligence
Snyk’s combined expertise in open source and container security combines to help developers create more secure applications.
Enterprise ready
Snyk Container works across the entire SDLC – from the developers’ desktops in to production – to help fix issues early and provide consistent controls and reporting across across your organization.
Snyk Container Integrations
Snyk Container is designed to work with a range of container image operating systems and package managers, Kubernetes platform, and container registries
Kubernetes platforms
- Amazon Elastic Kubernetes Service (EKS)
- Microsoft Azure Kubernetes Service (AKS)
- Google Kubernetes Engine (GKE)
- Red Hat OpenShift
- VMware Tanzu Grid
- And other platforms built with Kubernetes
Container registries
- Docker Hub
- Amazon Elastic Container Registry (ECR)
- Microsoft Azure Container Registry (ACR)
- Google Container Registry (GCR)
- JFrog Artifactory
- VMware Harbor
- Red Hat Quay
Container base operating systems
- Amazon Linux
- Red Hat Enterprise Linux and UBI
- Alpine Linux
- Debian
- Ubuntu
- CentOS
- Oracle Linux
Recommend
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK