Anchore Blog

Anchore Enterprise 2.1 Feature Series: Local Image Analysis

With the release of Anchore Enterprise 2.1 (based on Anchore Engine 0.5.0), local image analysis is now available. Inline Analysis gives users the ability to perform image analysis on a locally built Docker image without the need for it to exist inside a registry. Local image scanning analyzes an image from a local Docker engine …

Anchore Enterprise 2.1 Feature Series: Local Image Analysis Read More »

Announcing Anchore Enterprise 2.1

Today, we’re pleased to announce the immediate availability of Anchore Enterprise 2.1, our latest enterprise solution for container security. Anchore Enterprise provides users with the tools and techniques needed to enforce security, compliance and best-practices requirements with usable, flexible, cross-organization, and—above all—time-saving technology from Anchore. This release is based on the all-new Anchore Engine 0.5.0, …

Announcing Anchore Enterprise 2.1 Read More »

Answers to your Top 3 Compliance Questions

Policy first is a distinguishing tenet for Anchore as a product in today’s container security marketplace. When it comes to policy, we at Anchore receive a lot of questions from customers regarding different compliance standards, guidelines, and how the Anchore platform can help meet their requirements which remain a priority. Today, we will review our …

Answers to your Top 3 Compliance Questions Read More »

Using Anchore to identify secrets in container images

Building containerized applications inherently brings up the question of how to best give these applications access to any sensitive information they may need. This sensitive information can often be in the form of secrets, passwords, or other credentials. This week I decided to explore a couple of bad practices / common shortcuts and some simple …

Using Anchore to identify secrets in container images Read More »

Securing Multi-Cloud Environments with Anchore

Introduction Many organizations today are currently leveraging multiple cloud providers for their cloud-native workloads. An example of such could be, a mix of several public cloud providers such as AWS, GCP, or Azure. Or perhaps a combination of a private cloud such as OpenStack, along with any public cloud provider. By definition, multi-cloud is a …

Securing Multi-Cloud Environments with Anchore Read More »

Federal Container Security Best Practices- Unifying Configuration Management and Container Security with Anchore Enterprise. 

In today’s DevOps environment, developers and security teams are more intertwined than ever with increased speed to production. Enterprises are using hundreds to thousands of Docker images making it more difficult to maintain an accurate list of software inventory, and track software packages and vulnerabilities across their container workloads. This becomes a recurring headache for …

Federal Container Security Best Practices- Unifying Configuration Management and Container Security with Anchore Enterprise.  Read More »

Federal Container Security Best Practices: Whitelisting/Blacklisting with Anchore Enterprise

Last week, Anchore went public with our federal whitepaper “​Container Security for US Government Information Systems​” which contained key guidance for US government personnel responsible for securing container deployments on US government information systems. One of the key components of the whitepaper focused on utilizing a container-native security tool with the ability to whitelist and …

Federal Container Security Best Practices: Whitelisting/Blacklisting with Anchore Enterprise Read More »