Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Validate modifications across numerous supported resource types in all leading cloud service providers. Conduct scans of cloud resources during the build phase to identify misconfigured settings using a straightforward Python policy-as-code framework. Examine the connections between cloud resources through Checkov’s graph-oriented YAML policies. Run, test, and adjust runner parameters within the context of a specific repository's CI/CD processes and version control systems. Customize Checkov to create your own unique policies, providers, and suppression terms. Avoid the deployment of misconfigurations by integrating this process into the current workflows of developers. Facilitate automated annotations on pull or merge requests in your repositories, eliminating the need to establish a CI pipeline or perform routine checks. The Bridgecrew platform will automatically review new pull requests and provide comments highlighting any policy violations it uncovers, ensuring continuous compliance and security improvements in your cloud infrastructure. This proactive approach helps maintain best practices and enhances the overall security posture of your cloud environment.

Description

Trivy serves as a robust and adaptable security scanning tool. It features a variety of scanners designed to identify security vulnerabilities and the various targets where these issues may arise. This tool is compatible with a wide array of programming languages, operating systems, and platforms, making it highly accessible. You can find Trivy through numerous common distribution channels, enhancing its reach. Additionally, Trivy seamlessly integrates with many widely-used platforms and applications, allowing for effortless incorporation of security measures into your workflow. With Trivy, users can detect vulnerabilities, misconfigurations, secrets, and SBOM across diverse environments such as containers, Kubernetes, code repositories, and cloud infrastructures, ensuring comprehensive security coverage for their projects. Its extensive capabilities make it an invaluable asset for maintaining security in modern development practices.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Archipelo
GitHub
Kubernetes
Bitbucket
Brainboard
CircleCI
Concourse
Docker
Google Cloud Platform
Harbor
IntelliJ IDEA
Jenkins
Kondukto
Kyverno
Python
SonarQube Server
Visual Studio
Visual Studio Code
Zora

Integrations

Amazon Web Services (AWS)
Archipelo
GitHub
Kubernetes
Bitbucket
Brainboard
CircleCI
Concourse
Docker
Google Cloud Platform
Harbor
IntelliJ IDEA
Jenkins
Kondukto
Kyverno
Python
SonarQube Server
Visual Studio
Visual Studio Code
Zora

Pricing Details

Free
Free Trial
Free Version

Pricing Details

Free
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Prisma Cloud

Founded

2019

Country

United States

Website

www.checkov.io

Vendor Details

Company Name

Aqua Security

Country

United States

Website

trivy.dev/v0.57/

Product Features

Static Code Analysis

Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management

Product Features

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Alternatives

Datree Reviews

Datree

Datree.io

Alternatives

Dependabot Reviews

Dependabot

GitHub
Trivy Reviews

Trivy

Aqua Security
Checkov Reviews

Checkov

Prisma Cloud
Patrol Reviews

Patrol

Scrum Maister