Anchore Solutions for the Public Sector

  • Anchore Engine

    Anchore Engine, first released in 2017, is an open source tool for deep image inspection and vulnerability scanning. It is the only solution focused entirely on deep inspection of container images, as it goes beyond basic source and binary scanning by probing into their configuration and contents. Anchore Engine allows users to perform detailed analysis on their container images, run queries, produce reports, and define policies that can be used in CI/CD pipelines. It is the foundation of Anchore Enterprise, a fully-featured container security workflow solution for organizations in highly-regulated industries.

  • Anchore Enterprise

    Anchore Enterprise is a complete container security workflow solution for professional teams. Integrating seamlessly with a wide variety of development tools and platforms, it allows teams to adhere to defined industry security standards without compromising velocity. The Anchore Enterprise user interface provides visibility to security teams, allowing them to audit and verify compliance throughout the organization. It can be deployed in air-gapped and public cloud environments and is built for large scale. Anchore Enterprise is based on Anchore Engine, an open-source tool for deep image inspection and vulnerability scanning.

  • Anchore Federal

    Anchore Federal is a complete container security workflow solution for federal agencies. Integrating with a variety of development tools and platforms, it enables teams to adhere to defined industry, agency, and program-specific security standards without compromising velocity. Anchore Federal includes policy checks that validate compliance with NIST, STIG, and FedRAMP guidelines. The Anchore Federal UI provides visibility to security teams, allowing them to audit compliance throughout the organization. It can be deployed in air-gapped and public cloud environments and is built for scale. Anchore Federal is based on Anchore Engine, an open-source tool for deep image inspection and vulnerability scanning.