{"id":103074,"date":"2022-11-20T12:49:03","date_gmt":"2022-11-20T10:49:03","guid":{"rendered":"https:\/\/jfrog.com\/xray-2022\/"},"modified":"2025-07-01T10:32:48","modified_gmt":"2025-07-01T08:32:48","slug":"xray","status":"publish","type":"page","link":"https:\/\/jfrog.com\/de\/xray\/","title":{"rendered":"Xray Main &#8211; 2023"},"content":{"rendered":"<p>&nbsp;<\/p>\n<h3>Buchen Sie eine Demo, um zu sehen, wie Sie:<\/h3>\n<ul>\n<li>B\u00f6sartige oder riskante Pakete aus Ihrem Unternehmen verbannen<\/li>\n<li>Ihren Entwicklern erstklassige Sicherheitsfeatures, wie IDE-Plug-ins, CLI und Git-Scan-Tools bereitstellen<\/li>\n<li>Code und Builds durch eine nahtlose Entwicklerumgebung sch\u00fctzen<\/li>\n<li>Ganzheitlichen Schutz auf einer zentralen Plattform mit Curation-, SAST-, SCA-, IaC-, Secrets- und Container-Sicherheitsl\u00f6sungen genie\u00dfen<\/li>\n<li>JFrog Security schnell und einfach in Ihre Umgebung integrieren<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Buchen Sie eine Demo, um zu sehen, wie Sie: B\u00f6sartige oder riskante Pakete aus Ihrem Unternehmen verbannen Ihren Entwicklern erstklassige Sicherheitsfeatures, wie IDE-Plug-ins, CLI und Git-Scan-Tools bereitstellen Code und Builds durch eine nahtlose Entwicklerumgebung sch\u00fctzen Ganzheitlichen Schutz auf einer zentralen Plattform mit Curation-, SAST-, SCA-, IaC-, Secrets- und Container-Sicherheitsl\u00f6sungen genie\u00dfen JFrog Security schnell und &hellip;<\/p>\n","protected":false},"author":22,"featured_media":0,"parent":0,"menu_order":858,"comment_status":"closed","ping_status":"closed","template":"templates\/lp-curation.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-103074","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enterprise Software Composition Analysis (SCA) Tool | JFrog Xray<\/title>\n<meta name=\"description\" content=\"Sichern Sie Ihren Entwicklungsprozess mit JFrog Xray&amp;apos;s Software Composition Analysis (SCA). Erkennen Sie Schwachstellen, verwalten Sie die Einhaltung von Lizenzen und reduzieren Sie Open-Source-Risiken im gesamten SDLC. Beseitigen Sie Bedrohungen proaktiv und in Echtzeit, um in jeder Version einen sicheren, konformen Code zu gew\u00e4hrleisten.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/pages\/103074\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Xray Main - 2023\" \/>\n<meta property=\"og:description\" content=\"Sichern Sie Ihren Entwicklungsprozess mit JFrog Xray&amp;apos;s Software Composition Analysis (SCA). Erkennen Sie Schwachstellen, verwalten Sie die Einhaltung von Lizenzen und reduzieren Sie Open-Source-Risiken im gesamten SDLC. Beseitigen Sie Bedrohungen proaktiv und in Echtzeit, um in jeder Version einen sicheren, konformen Code zu gew\u00e4hrleisten.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jfrog.com\/de\/xray\/\" \/>\n<meta property=\"og:site_name\" content=\"JFrog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/artifrog\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-01T08:32:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2018\/06\/20132021\/JFROG.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@jfrog\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jfrog.com\/de\/xray\/\",\"url\":\"https:\/\/jfrog.com\/de\/xray\/\",\"name\":\"Enterprise Software Composition Analysis (SCA) Tool | JFrog Xray\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/de\/#website\"},\"datePublished\":\"2022-11-20T10:49:03+00:00\",\"dateModified\":\"2025-07-01T08:32:48+00:00\",\"description\":\"Sichern Sie Ihren Entwicklungsprozess mit JFrog Xray&apos;s Software Composition Analysis (SCA). Erkennen Sie Schwachstellen, verwalten Sie die Einhaltung von Lizenzen und reduzieren Sie Open-Source-Risiken im gesamten SDLC. Beseitigen Sie Bedrohungen proaktiv und in Echtzeit, um in jeder Version einen sicheren, konformen Code zu gew\u00e4hrleisten.\",\"breadcrumb\":{\"@id\":\"https:\/\/jfrog.com\/de\/xray\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jfrog.com\/de\/xray\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jfrog.com\/de\/xray\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jfrog.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Xray Main &#8211; 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jfrog.com\/de\/#website\",\"url\":\"https:\/\/jfrog.com\/de\/\",\"name\":\"JFrog\",\"description\":\"Deliver Trusted Software Releases at Speed and Scale\",\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jfrog.com\/de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jfrog.com\/de\/#organization\",\"name\":\"JFrog\",\"url\":\"https:\/\/jfrog.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"width\":74,\"height\":73,\"caption\":\"JFrog\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/artifrog\",\"https:\/\/x.com\/jfrog\",\"https:\/\/www.linkedin.com\/company\/455737\",\"https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg\",\"https:\/\/www.wikidata.org\/wiki\/Q98608948\"],\"description\":\"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.\",\"legalName\":\"Jfrog, Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Enterprise Software Composition Analysis (SCA) Tool | JFrog Xray","description":"Sichern Sie Ihren Entwicklungsprozess mit JFrog Xray&apos;s Software Composition Analysis (SCA). Erkennen Sie Schwachstellen, verwalten Sie die Einhaltung von Lizenzen und reduzieren Sie Open-Source-Risiken im gesamten SDLC. Beseitigen Sie Bedrohungen proaktiv und in Echtzeit, um in jeder Version einen sicheren, konformen Code zu gew\u00e4hrleisten.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/pages\/103074","og_locale":"de_DE","og_type":"article","og_title":"Xray Main - 2023","og_description":"Sichern Sie Ihren Entwicklungsprozess mit JFrog Xray&apos;s Software Composition Analysis (SCA). Erkennen Sie Schwachstellen, verwalten Sie die Einhaltung von Lizenzen und reduzieren Sie Open-Source-Risiken im gesamten SDLC. Beseitigen Sie Bedrohungen proaktiv und in Echtzeit, um in jeder Version einen sicheren, konformen Code zu gew\u00e4hrleisten.","og_url":"https:\/\/jfrog.com\/de\/xray\/","og_site_name":"JFrog","article_publisher":"https:\/\/www.facebook.com\/artifrog","article_modified_time":"2025-07-01T08:32:48+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2018\/06\/20132021\/JFROG.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@jfrog","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jfrog.com\/de\/xray\/","url":"https:\/\/jfrog.com\/de\/xray\/","name":"Enterprise Software Composition Analysis (SCA) Tool | JFrog Xray","isPartOf":{"@id":"https:\/\/jfrog.com\/de\/#website"},"datePublished":"2022-11-20T10:49:03+00:00","dateModified":"2025-07-01T08:32:48+00:00","description":"Sichern Sie Ihren Entwicklungsprozess mit JFrog Xray&apos;s Software Composition Analysis (SCA). Erkennen Sie Schwachstellen, verwalten Sie die Einhaltung von Lizenzen und reduzieren Sie Open-Source-Risiken im gesamten SDLC. Beseitigen Sie Bedrohungen proaktiv und in Echtzeit, um in jeder Version einen sicheren, konformen Code zu gew\u00e4hrleisten.","breadcrumb":{"@id":"https:\/\/jfrog.com\/de\/xray\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jfrog.com\/de\/xray\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jfrog.com\/de\/xray\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jfrog.com\/de\/"},{"@type":"ListItem","position":2,"name":"Xray Main &#8211; 2023"}]},{"@type":"WebSite","@id":"https:\/\/jfrog.com\/de\/#website","url":"https:\/\/jfrog.com\/de\/","name":"JFrog","description":"Deliver Trusted Software Releases at Speed and Scale","publisher":{"@id":"https:\/\/jfrog.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jfrog.com\/de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/jfrog.com\/de\/#organization","name":"JFrog","url":"https:\/\/jfrog.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","width":74,"height":73,"caption":"JFrog"},"image":{"@id":"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/artifrog","https:\/\/x.com\/jfrog","https:\/\/www.linkedin.com\/company\/455737","https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg","https:\/\/www.wikidata.org\/wiki\/Q98608948"],"description":"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.","legalName":"Jfrog, Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}}]}},"_links":{"self":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/pages\/103074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/comments?post=103074"}],"version-history":[{"count":13,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/pages\/103074\/revisions"}],"predecessor-version":[{"id":154977,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/pages\/103074\/revisions\/154977"}],"wp:attachment":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/media?parent=103074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}