Automated Continuous Security & Compliance

Inside Anchore Technology: Open Source to Enterprise

This new guide details insights into determining the right combination of open source and enterprise tools for automated security and compliance across the toolchain.

Anchore Enterprise 2.4

In this newest release, customer-driven enhancements spanning features and operational improvements have been made. Read more in our announcement.

Anchore and Red Hat build DevSecOps pipeline for Department of Defense (banner)
Anchore and Red Hat teamed up to help the United States Department of Defense implement a streamlined, policy-based DevSecOps platform.

Learn More About Anchore

Logo banner GitHub client testimonial

"Actions like Anchore Container Scan are exactly why we built GitHub Actions. By making it easy for developers to build security directly into their workflows, it helps them ship better code more quickly."

Logo banner Red Hat client testimonial

“We believe the availability of more freely redistributable, well-curated base images can simplify the development process for our partners and enhance the support experience of mutual customers.”

Logo banner NVIDIA client testimonial

“Anchore is a top-notch tool for mapping the most relevant CVE to software version and creating custom policy checks and their support team is one of the best we’ve encountered.”

Logo banner eBay client testimonial

“We use Anchore Engine to enforce security and compliance checking for production container workloads distributed across dozens of Kubernetes clusters.”

Logo banner Cisco client testimonial

"Anchore has proven to be a valuable tool, helping to ensure that the Cisco Container Platform matches our compliance standards."

Logo banner Atlassian client testimonial

"Anchore allows us to maintain security and transparency over thousands of container images throughout the build process and is exactly the type of solution we were looking for."

Anchore Solutions

Anchore offers container inspection and compliance solutions for a wide variety of use cases. Whether you are a small open source project or a large team in a highly-regulated industry, Anchore can help.

Polyline Accent Top

Anchore Enterprise

Policy-Based Security and Compliance

Anchore Enterprise is a complete container security workflow solution for professional teams. Easily integrating with the software delivery lifecycle stack, it allows developers to bolster security without compromising velocity and enables security teams to audit and verify compliance in real time. It is based on Anchore Engine, an open-source image inspection and scanning tool.

ANCHORE FEDERAL

End-to-end security and compliance for federal agencies

Anchore Federal is uniquely designed to identify and understand the exact composition of software containers and can enforce user-defined acceptance policies based on any U.S. Department of Defense (DoD) compliance standards. It includes a collection of out-of-the-box policy rules to validate compliance with the rigid security requirements of the DoD program. It also provides access, via support arrangements, to the engineering resources at the very forefront of the project to ensure partners and programs are implementing best practices.

Anchore Open Source Homepage
Anchore Open Source Homepage

Anchore Open Source

Open Source Container Inspection and Analysis

Anchore's open source tools for deep image inspection and vulnerability scanning allow users to perform detailed analysis of container workloads, producing reports and defining policies that can be used in the software delivery lifecycle stack. Our open source tools are the foundation of Anchore Enterprise, a container security workflow solution.

The Most Comprehensive Container
Security Inspection Platform

Anchore performs deep inspection of container images, generating a detailed software bill-of-materials and allowing you to apply specific policy gates and checks for your entire container workload on premises and in the cloud.

Bug Icon

Vulnerability Scanning

Perform a detailed and thorough scan for any known vulnerabilities in your application and operating system packages

Lock Icon

Secrets & Passwords

Ensure all secrets are not present in your image including passwords, API keys, and any other sensitive information

Code Icon

Operating System Packages

Anchore performs a thorough scan on your container image to identify any known operating system packages

Javascript Icon

3rd Party Libraries

Easily identify non-OS third party libraries, including Node.js NPM, Ruby GEM, Python PIP, DotNet, JAVA archives and more

Shield Icon

Allowlist

Allowlist elements of your image when performing analysis to ensure that detection does not block the deployment of an image

Not Allowed Icon

Denylist

With Anchore you can easily denylist elements like usernames, user ID’s, licenses, packages, or images in their entirety

Folder Icon

Dockerfile Checks

Analyze and perform a check on the contents of a Dockerfile or the Docker history for any container image

Checkbox Icon

Other Checks

Identify configuration files, file permissions, unpackaged files, and anything else you’d like to uncover