runtime -> Inspecting Live Software Components -> Identifying Risk Locations in Runtime by Mapping Vulnerable Images to Clusters and Workloads

external_document

Products
JFrog Runtime
Content Type
User Guide