runtime -> Inspecting Live Software Components -> Identifying Risk Locations in Runtime by Mapping Vulnerable Images to Clusters and Workloads
external_document
Products
JFrog Runtime
Content Type
User Guide