Anchore Blog

Feature Series: Anchore Enterprise 2.1 SSO

Introduction With the release of Anchore Enterprise 2.1 (based on Anchore Engine v0.5.0), we are happy to announce integration with external identity providers that support SAML 2.0. Adding support for external identity providers allows users to enable Single Sign-On for Anchore, reducing the number of user stores that an enterprise needs to maintain. Authentication / …

Feature Series: Anchore Enterprise 2.1 SSO Read More »

GCP Marketplace | Anchore Engine

Containers make developing and deploying applications for multi and hybrid-cloud environments a whole lot easier. But they also require new best practices for development and operations teams in order to keep security paramount within your process. To keep up, industry leading DevOps teams have been quickly making the switch to more portable and agile platforms …

GCP Marketplace | Anchore Engine Read More »

Seeking: DevSecOps Engineers

Anchore is on a mission: to enable our customers to deploy software containers with confidence. We allow them to enjoy the benefits of cloud-native application development, safe in the knowledge that the containers they deploy into production are secure and compliant. With that confidence, they can continue to develop and ship software at breakneck speeds. …

Seeking: DevSecOps Engineers Read More »

Anchore Engine in the AWS Marketplace

Container adoption is soaring in enterprises and the public sector, making services such as Amazon Elastic Kubernetes Service extremely valuable for DevOps teams that want to run containerized workloads in Kubernetes easily and efficiently. For organizations that are already deploying, scaling and managing containerized applications with Kubernetes, Amazon EKS spreads your workload across availability zones …

Anchore Engine in the AWS Marketplace Read More »

Anchore Enterprise 2.1 Feature Series: Enhanced Vulnerability Data

With the release of Anchore Enterprise 2.1 (based on Anchore Engine 0.5.0), we are pleased to announce that Anchore Enterprise customers will now receive access to enhanced vulnerability data from Risk Based Security’s VulnDB for increased fidelity, accuracy, and live-ness of image vulnerability scanning results. Recognizing that container images need an added layer of security, …

Anchore Enterprise 2.1 Feature Series: Enhanced Vulnerability Data Read More »

Anchore Enterprise 2.1 Feature Series: Local Image Analysis

With the release of Anchore Enterprise 2.1 (based on Anchore Engine 0.5.0), local image analysis is now available. Inline Analysis gives users the ability to perform image analysis on a locally built Docker image without the need for it to exist inside a registry. Local image scanning analyzes an image from a local Docker engine …

Anchore Enterprise 2.1 Feature Series: Local Image Analysis Read More »

Announcing Anchore Enterprise 2.1

Today, we’re pleased to announce the immediate availability of Anchore Enterprise 2.1, our latest enterprise solution for container security. Anchore Enterprise provides users with the tools and techniques needed to enforce security, compliance and best-practices requirements with usable, flexible, cross-organization, and—above all—time-saving technology from Anchore. This release is based on the all-new Anchore Engine 0.5.0, …

Announcing Anchore Enterprise 2.1 Read More »

Answers to your Top 3 Compliance Questions

Policy first is a distinguishing tenet for Anchore as a product in today’s container security marketplace. When it comes to policy, we at Anchore receive a lot of questions from customers regarding different compliance standards, guidelines, and how the Anchore platform can help meet their requirements which remain a priority. Today, we will review our …

Answers to your Top 3 Compliance Questions Read More »

Using Anchore to identify secrets in container images

Building containerized applications inherently brings up the question of how to best give these applications access to any sensitive information they may need. This sensitive information can often be in the form of secrets, passwords, or other credentials. This week I decided to explore a couple of bad practices / common shortcuts and some simple …

Using Anchore to identify secrets in container images Read More »