mirror of
https://github.com/aquasecurity/trivy.git
synced 2026-01-31 13:53:14 +08:00
docs: add commercial content (#8030)
This commit is contained in:
@@ -107,7 +107,7 @@ trivy k8s --report summary cluster
|
|||||||
## Want more? Check out Aqua
|
## Want more? Check out Aqua
|
||||||
|
|
||||||
If you liked Trivy, you will love Aqua which builds on top of Trivy to provide even more enhanced capabilities for a complete security management offering.
|
If you liked Trivy, you will love Aqua which builds on top of Trivy to provide even more enhanced capabilities for a complete security management offering.
|
||||||
You can find a high level comparison table specific to Trivy users [here](https://github.com/aquasecurity/resources/blob/main/trivy-aqua.md).
|
You can find a high level comparison table specific to Trivy users [here](https://trivy.dev/commercial/comparison).
|
||||||
In addition check out the <https://aquasec.com> website for more information about our products and services.
|
In addition check out the <https://aquasec.com> website for more information about our products and services.
|
||||||
If you'd like to contact Aqua or request a demo, please use this form: <https://www.aquasec.com/demo>
|
If you'd like to contact Aqua or request a demo, please use this form: <https://www.aquasec.com/demo>
|
||||||
|
|
||||||
|
|||||||
86
docs/commercial/compare.md
Normal file
86
docs/commercial/compare.md
Normal file
@@ -0,0 +1,86 @@
|
|||||||
|
# Aqua Security is the home of Trivy
|
||||||
|
|
||||||
|
Trivy is proudly maintained by [Aqua Security](https://aquasec.com).
|
||||||
|
If you liked Trivy, you will love Aqua which builds on top of Trivy to provide even more enhanced capabilities for a complete security management offering.
|
||||||
|
In this page you can find a high level comparison between Trivy Open Source and Aqua's commercial product.
|
||||||
|
If you'd like to learn more or request a demo, [click here to contact us](./contact.md).
|
||||||
|
|
||||||
|
## User experience
|
||||||
|
|
||||||
|
| Feature | Trivy OSS | Aqua |
|
||||||
|
| --- | --- | --- |
|
||||||
|
| Interface | CLI tool | CLI tool <br> Enterprise-grade web application <br> SaaS or on-prem |
|
||||||
|
| Search & Discover | - | Easily search for security issues across all workloads and infrastructure in your organization <br> Visually discover risks across your organization |
|
||||||
|
| User management | - | Multi account <br> Granular permissions (RBAC) <br> Single Sign On (SSO) |
|
||||||
|
| Support | Some skills required for setup and integration <br> Best effort community support | Personal onboarding by Aqua Customer Success <br> SLA backed professional support |
|
||||||
|
| Scalability & Availability | Single scan at a time | Centralized scanning service supports concurrent scans efficiently <br> Highly available production grade architecture |
|
||||||
|
| Rate limiting | Assets hosted on public free infrastructure and could be rate limited | Assets hosted on Aqua infrastructure and does not have limitations |
|
||||||
|
|
||||||
|
## Vulnerability scanning
|
||||||
|
|
||||||
|
| Feature | Trivy OSS | Aqua |
|
||||||
|
| --- | --- | --- |
|
||||||
|
| Vulnerabilities sources | Based on open source vulnerability feeds | Based on open source and commercial vulnerability feeds |
|
||||||
|
| New Vulnerabilities SLA | No SLA | Commercial level SLA |
|
||||||
|
| Package managers | Find packages in lock files | Find packages in lock files or reconstructed lock files |
|
||||||
|
| Vulnerability management | Manually ignore specific vulnerabilities by ID or property | Advanced vulnerability management solution <br> Vulnerability tracking and suppression <br> Incident lifecycle management |
|
||||||
|
| Vulnerability prioritization | Manually triage by severity | Multiple prioritization tools: <br> Accessibility of the affected resources <br> Exploitability of the vulnerability <br> Open Source packages health and trustworthiness score <br> Affected image layers |
|
||||||
|
| Reachability analysis | - | Analyze source code to eliminate vulnerabilities of unused dependencies |
|
||||||
|
| Contextual vulnerabilities | - | Reduce irrelevant vulnerabilities based on environmental factors (e.g. Spring4Shell not relevant due to JDK version) |
|
||||||
|
| Compiled binaries | Find embedded dependencies in Go and Rust binaries <br> Find SBOM by hash in public Sigstore | In addition, identify popular applications |
|
||||||
|
|
||||||
|
## Container scanning
|
||||||
|
|
||||||
|
| Feature | Trivy OSS | Aqua |
|
||||||
|
| --- | --- | --- |
|
||||||
|
| Windows containers | - | Support scanning windows containers |
|
||||||
|
| Scan container registries | - | Connect to any container registries and automatically scan it |
|
||||||
|
| Private registries | Standard registry authenticationCloud authentication with ECR, GCR, ACR | Supports registry specific authentication schemes |
|
||||||
|
| Layer cache | Local cache directory | Scalable Cloud cache |
|
||||||
|
|
||||||
|
## Advanced scanning
|
||||||
|
|
||||||
|
| Feature | Trivy OSS | Aqua |
|
||||||
|
| --- | --- | --- |
|
||||||
|
| Malware scanning | - | Scan container images for malware |
|
||||||
|
| Sandbox scanning | - | Use DTA (Dynamic threat analysis) to run and test container images' behavior to detect sophisticated threats |
|
||||||
|
| SAST (code scanning) | - | Analyze source code for security issues and vulnerabilities |
|
||||||
|
|
||||||
|
## Policy and enforcement
|
||||||
|
|
||||||
|
| Feature | Trivy OSS | Aqua |
|
||||||
|
| --- | --- | --- |
|
||||||
|
| Kubernetes admission | - | Validating Kubernetes Admission based on automatic or user defined policy |
|
||||||
|
| CI/CD policies | Can fail the entire build on any finding | Granular policies to fail builds based on custom criteria |
|
||||||
|
| Container engine | - | Block incompliant images from running at container engine level |
|
||||||
|
| Block vulnerable packages | - | vShield – monitor and block usage of vulnerable packages |
|
||||||
|
|
||||||
|
## Secrets scanning
|
||||||
|
|
||||||
|
| Feature | Trivy OSS | Aqua |
|
||||||
|
| --- | --- | --- |
|
||||||
|
| Detected patterns | Basic patterns | Advanced patterns |
|
||||||
|
| Leaked secrets validation | - | Automatically checks if leaked secrets are valid and usable |
|
||||||
|
|
||||||
|
## IaC/CSPM scanning
|
||||||
|
|
||||||
|
| Feature | Trivy OSS | Aqua |
|
||||||
|
| --- | --- | --- |
|
||||||
|
| Infrastructure as Code (IaC) | Many popular languages as detailed [here](https://aquasecurity.github.io/trivy/latest/docs/scanner/misconfiguration/policy/builtin/) | In addition, Build Pipeline configuration scanning |
|
||||||
|
| Checks customization | Create custom checks with Rego | Create custom checks in no-code interface <br> Customize existing checks with organizational preferences |
|
||||||
|
| Cloud scanning | AWS (subset of services) | AWS, Azure, GCP, Alibaba Cloud, Oracle Cloud |
|
||||||
|
| Compliance frameworks | CIS, NSA, vendor guides | More than 25 compliance programs |
|
||||||
|
| Custom compliance | Create in YAML | Create in a web UI |
|
||||||
|
| Remediation advice | Basic | AI powered specialized remediation guides |
|
||||||
|
|
||||||
|
## Kubernetes scanning
|
||||||
|
|
||||||
|
| Feature | Trivy OSS | Aqua |
|
||||||
|
| --- | --- | --- |
|
||||||
|
Scan initiation | CLI / Kubernetes Operator | Kubernetes Operator / Management web application |
|
||||||
|
Results consumption | kubectl / CRD / Prometheus exporter | In addition, Advanced UI dashboards, Automatic notifications and incident management flows |
|
||||||
|
Cluster discovery | Kubeconfig | Automatic discovery thorough cloud onboarding |
|
||||||
|
Workload image scanning | Scanning in cluster, requires capacity planning | Scanning offloaded to Aqua service, little impact on scanned clusters |
|
||||||
|
| Cluster scanning | CIS, NSA, PSS | More than 25 compliance programs |
|
||||||
|
| Scope | Single cluster | Multi cluster, Cloud relationship |
|
||||||
|
| Scalability | Reports limited by in-cluster etcd storage (size and number of reports) | Cloud-based storage (unlimited scalability) |
|
||||||
17
docs/commercial/contact.md
Normal file
17
docs/commercial/contact.md
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
<style>
|
||||||
|
.md-content .md-content__inner a, h1 {
|
||||||
|
display:none;
|
||||||
|
}
|
||||||
|
input.hs-input, textarea.hs-input {
|
||||||
|
border: silver solid 1px !important;
|
||||||
|
font-size: 0.8em;
|
||||||
|
padding: 5px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script>
|
||||||
|
<script>
|
||||||
|
hbspt.forms.create({
|
||||||
|
portalId: "1665891",
|
||||||
|
formId: "a1d0c098-3b3a-40d8-afb4-e04ddb697afe"
|
||||||
|
});
|
||||||
|
</script>
|
||||||
@@ -48,6 +48,6 @@ As mentioned in [the Core Principles](#detecting-unintended-states), detection o
|
|||||||
### User Interface
|
### User Interface
|
||||||
Trivy primarily operates via CLI for displaying results, with a richer UI available in [the commercial version][aqua].
|
Trivy primarily operates via CLI for displaying results, with a richer UI available in [the commercial version][aqua].
|
||||||
|
|
||||||
[trivy-aqua]: https://github.com/aquasecurity/resources/blob/main/trivy-aqua.md
|
[trivy-aqua]: ../commercial/compare.md
|
||||||
[tracee]: https://github.com/aquasecurity/tracee
|
[tracee]: https://github.com/aquasecurity/tracee
|
||||||
[aqua]: https://www.aquasec.com/
|
[aqua]: https://www.aquasec.com/
|
||||||
@@ -11,7 +11,7 @@ Check out the [Scanning coverage page](../docs/coverage/index.md).
|
|||||||
### Is there a paid version of Trivy?
|
### Is there a paid version of Trivy?
|
||||||
|
|
||||||
If you liked Trivy, you will love Aqua which builds on top of Trivy to provide even more enhanced capabilities for a complete security management offering.
|
If you liked Trivy, you will love Aqua which builds on top of Trivy to provide even more enhanced capabilities for a complete security management offering.
|
||||||
You can find a high level comparison table specific to Trivy users [here](https://github.com/aquasecurity/resources/blob/main/trivy-aqua.md).
|
You can find a high level comparison table specific to Trivy users [here](../commercial/compare.md).
|
||||||
In addition check out the <https://aquasec.com> website for more information about our products and services.
|
In addition check out the <https://aquasec.com> website for more information about our products and services.
|
||||||
If you'd like to contact Aqua or request a demo, please use this form: <https://www.aquasec.com/demo>
|
If you'd like to contact Aqua or request a demo, please use this form: <https://www.aquasec.com/demo>
|
||||||
|
|
||||||
|
|||||||
@@ -69,6 +69,6 @@ Now that you up and ready, here are some resources to help you deepen your knowl
|
|||||||
# Want more? Check out Aqua
|
# Want more? Check out Aqua
|
||||||
|
|
||||||
If you liked Trivy, you will love Aqua which builds on top of Trivy to provide even more enhanced capabilities for a complete security management offering.
|
If you liked Trivy, you will love Aqua which builds on top of Trivy to provide even more enhanced capabilities for a complete security management offering.
|
||||||
You can find a high level comparison table specific to Trivy users [here](https://github.com/aquasecurity/resources/blob/main/trivy-aqua.md).
|
You can find a high level comparison table specific to Trivy users [here](../commercial/compare.md).
|
||||||
In addition, check out the <https://aquasec.com> website for more information about our products and services.
|
In addition, check out the <https://aquasec.com> website for more information about our products and services.
|
||||||
If you'd like to contact Aqua or request a demo, please use this form: <https://www.aquasec.com/demo>
|
If you'd like to contact Aqua or request a demo, please use this form: <https://www.aquasec.com/demo>
|
||||||
|
|||||||
@@ -221,7 +221,9 @@ nav:
|
|||||||
- Backporting: community/maintainer/backporting.md
|
- Backporting: community/maintainer/backporting.md
|
||||||
- Help Wanted: community/maintainer/help-wanted.md
|
- Help Wanted: community/maintainer/help-wanted.md
|
||||||
- Triage: community/maintainer/triage.md
|
- Triage: community/maintainer/triage.md
|
||||||
|
- Enterprise:
|
||||||
|
- Comparison: commercial/compare.md
|
||||||
|
- Contact Us: commercial/contact.md
|
||||||
theme:
|
theme:
|
||||||
name: material
|
name: material
|
||||||
custom_dir: docs/overrides
|
custom_dir: docs/overrides
|
||||||
@@ -272,6 +274,9 @@ extra:
|
|||||||
link: https://github.com/aquasecurity/trivy
|
link: https://github.com/aquasecurity/trivy
|
||||||
- icon: fontawesome/brands/slack
|
- icon: fontawesome/brands/slack
|
||||||
link: https://github.com/aquasecurity/trivy
|
link: https://github.com/aquasecurity/trivy
|
||||||
|
analytics:
|
||||||
|
provider: google
|
||||||
|
property: G-V9LJGFH7GX
|
||||||
|
|
||||||
plugins:
|
plugins:
|
||||||
- search
|
- search
|
||||||
|
|||||||
Reference in New Issue
Block a user