Deep Recursive Scan Through All Layers of a Docker Image
Docker Security Continuous Analysis
Xray does not stop at your Docker image base layer. It recursively peels away the different layers and their dependencies ensuring that every software artifact that is included in your Docker image has been scanned for issues and vulnerabilities.
When a vulnerability is detected, Xray shows you all the Docker images that contain the infected artifact so you can instantly understand the impact that any vulnerable layer has on all Docker images in your system.
Even when images uploaded to your Docker registries in the Docker repository are given a clean bill of health, Xray continues to securely scan them to make sure they are not infected with any new vulnerabilities that are registered with Xray’s global vulnerability database.
As scaling complexity grows, the need for vulnerability analysis becomes more important. Xray allows you to drill down or zoom out within your entire components graph and identify the real impact of every violation found. This can help you reduce the cost, time, and risk of delivering changes by allowing for more incremental updates to applications in production. Xray's highly available active-active cluster architecture ensures continuous security and governance to your software packages. Scale your environment to as many nodes as you need and enhance Xray's performance by delegating all shared workload across available cluster nodes, through a load balancer. Seamlessly and instantly synchronize all data, configuration, cached objects and scheduled job changes across all cluster nodes.
Through Xray’s integration with common CI servers, you can stop infected builds from ever getting to your Docker repositories. During the build process, Xray will notify your CI server if an infected artifact is being included in your Docker image so the build can be halted before completion.
Through its extensive REST API, Xray lets you set up a fully automated Docker security scanning protocol. Manage all aspects of component security with automated control over Users, Permissions, Watches, Components, Integrations and more.