Tripwire debuts early access program for Container Analyser Service
Tripwire, Inc., a global provider of security and compliance solutions for enterprises and industrial organisations, announced the debut of its Container Analyser Service. This DevOps solution for scanning vulnerabilities in the build phase is now available for beta customers.
The early access program for Tripwire’s Container Analyser Service now embeds security at the beginning of the DevOps process. During the build phase, it can be used to perform complete vulnerability analysis of Docker images, systematically approving images or preventing further use of them.
“With the new Container Analyser Service, Tripwire helps address security needs throughout the entire DevOps life cycle – from build to production,” said Tim Erlin, vice president of product management and strategy at Tripwire. “It’s critical that security controls work at the speed of DevOps, and we’re excited to provide security teams with the tools that help them address the continuous and rapid release of new applications and services.”
Images are built earlier in the DevOps process and are the basis for building a container – a runtime instance of an image. The Container Analyser Service combines with continuous integration (CI) and continuous deployment (CD) tools to perform vulnerability scanning at each layer of the Docker image.
This new capability builds upon Tripwire’s existing capabilities for scanning online, offline and non-running Docker containers later in the DevOps life cycle. Scanning for vulnerabilities throughout the life cycle is important as change happens frequently and rapidly through the DevOps process.
In addition to delivering this enhanced visibility into vulnerabilities, Tripwire also provides integration with the DevOps toolchain for initiating scans, securing the build pipeline infrastructure, and monitoring for changes throughout the continuous deployment life cycle.
To learn more about the early access program for Tripwire’s Container Analyser Service, please click here.