Best Vulnerability Scanners for Amazon Elastic Container Registry (ECR)

Find and compare the best Vulnerability Scanners for Amazon Elastic Container Registry (ECR) in 2025

Use the comparison tool below to compare the top Vulnerability Scanners for Amazon Elastic Container Registry (ECR) on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Docker Scout Reviews

    Docker Scout

    Docker

    $5 per month
    Container images are made up of various layers and software packages that can be at risk of vulnerabilities, which may jeopardize the safety of both containers and applications. These security risks necessitate proactive measures, and Docker Scout serves as an effective tool to bolster the security of your software supply chain. By examining your images, Docker Scout creates a detailed inventory of the components, referred to as a Software Bill of Materials (SBOM). This SBOM is then compared against a constantly updated database of vulnerabilities to identify potential security flaws. Operating as an independent service, Docker Scout can be accessed through Docker Desktop, Docker Hub, the Docker CLI, and the Docker Scout Dashboard. Furthermore, it supports integrations with external systems, including container registries and CI platforms. Take the opportunity to uncover and analyze the structure of your images, ensuring that your artifacts conform to the best practices of the supply chain. By leveraging Docker Scout, you can maintain a robust defense against emerging threats in your software environment.
  • 2
    ThreatStryker Reviews
    Runtime threat assessment, runtime attack analysis, and targeted protection of your infrastructure and applications. Zero-day attacks can be stopped by staying ahead of attackers. Observe attack behavior. ThreatStryker monitors, correlates, learns, and acts to protect your applications. Deepfence ThreatStryker displays a live, interactive, color-coded view on the topology and all processes and containers running. It inspects hosts and containers to find vulnerable components. It also interrogates configuration to identify file system, processes, and network-related misconfigurations. ThreatStryker uses industry and community standards to assess compliance. ThreatStryker conducts a deep inspection of network traffic, system behavior, and application behavior and accumulates suspicious events over time. The events are classified and correlated with known vulnerabilities and suspicious patterns.
  • 3
    ThreatMapper Reviews
    Open source, multi-cloud platform to scan, map, and rank vulnerabilities in containers, images hosts, repositories, and running containers. ThreatMapper detects threats to your applications in production across clouds, Kubernetes and serverless. You cannot secure what you can't see. ThreatMapper automatically discovers your production infrastructure. It can identify and interrogate cloud instances, Kubernetes nodes and serverless resources. This allows you to discover the applications and containers, and map their topology in real time. ThreatMapper allows you to visualize and discover the external and internal attack surfaces for your applications and infrastructure. Bad actors can gain access to your infrastructure by exploiting vulnerabilities in common dependencies. ThreatMapper scans hosts and containers for known vulnerable dependencies. It also takes threat feeds from more than 50 sources.
  • Previous
  • You're on page 1
  • Next