Curation

Keep Malicious Code Out of Your SDLC

Automatically enforce software policies on open source packages, IDE extensions, AI/ML models, and third party downloads so only trusted components reach your Developers

Build Fast

 Don’t let curation of malicious packages slow down your release velocity

Stay Secure

Prevent vulnerabilities from ever reaching your development environment

Remain Compliant

Establish a single source of truth for all software artifacts

 

THE CHALLENGE

Implementing security controls slows down development

Your developers download countless unvetted third-party components like open-source packages and IDE extensions directly from public sources. Current security controls often drastically slow down development, yet without a proactive checkpoint, each download is an unchecked entry point for malicious code, non-compliant licenses, and vulnerabilities to enter your software supply chain.

THE SOLUTION

Enhance security while maintaining your release velocity

JFrog Curation proactively secures your software supply chain at its entry point by automatically validating every open-source package, IDE extension, tool, and AI/ML model your developers try to use. This check instantly enforces your corporate policies on every request, replacing slow manual reviews with instant, automated approvals. It blocks non-compliant software whether it is being requested from a public registry or already in your cache, ensuring you maintain development velocity.

 

Block Risky Components Before They Reach Your Developers 

With JFrog Curation, we’re truly shifting left because we’re now able to block malicious packages and risky components before they even enter our cloud instance, easing the minds of our security leadership team.” 

Head of Software Engineering, IT
JFrog Customer: Leading Healthcare Provider, EMEA

THE RESULT

Build Fast, Stay Secure and Remain Complaint

Establish Consistent Security Policy

Ensure absolute consistency by automatically applying a single security policy to every third-party software request. This automated approach replaces manual, unreliable developer self-policing and provides a complete, auditable trail required for compliance.

Prevent Fires, Don’t Fight Them

Move from a costly reactive posture to a proactive defense. Curation automatically blocks malicious and non-compliant packages at the point of entry. This eliminates threats before they are ever downloaded, preventing expensive remediation at a later stage.

Build Without Bottlenecks

End developer waiting games. Automate security approvals to instantly replace tedious, manual review gates. Your teams gain velocity and can deliver faster, knowing every component they use is already pre-vetted and compliant.

Curation Solution Sheet - image1

Figure 1: Insights Overview Dashboard: Gain instant visibility into all open-source package requests, including what was approved, blocked, or flagged by your policies

Curation Solution Sheet - image2

Figure 2: Set and Review Automated Policies: Block specific risks and enforce security standards across your organization

Key Features and Benefits

Key Features  Benefits 
Automated policy enforcement  Gain a consistent, 100% enforceable security standard that automatically blocks malicious packages and license risk, freeing your team from slow, error-prone manual approvals.
Centralized audit log  Simplify compliance audits by instantly providing a complete log of every package request, block and approval. 
Recommended package alternatives Maintain developer productivity by automatically offering a compliant version of a blocked package, preventing “blocked workflows” and work interruptions.
Block immature packages  Reduce the risk of zero-day attacks by blocking newly published packages, before a threat is publicly discovered.
Block risky cached packages  Validates all cached packages against the latest policies, protecting the organization from new vulnerabilities found in previously “safe” components.

The Leading Platform for Software Supply Chain Management, Security & Governance

“Our Curation deployment provides effective and efficient supply chain protection. We were able to shut down recent provider attacks in mere minutes once discovered and the control has proven 100% successful since.”

Sr. Cybersecurity Executive
Leading Financial Services Company

The JFrog Platform is the single source of truth for over 7,000 companies. JFrog embeds trust and control directly into the software development lifecycle, giving your teams the confidence to accelerate releases and deliver secure trusted applications at speed.

For more information about how you can gain all the benefits of JFrog Curation, feel free to explore the JFrog Platform, schedule a one-on-one demo or visit our help center at your convenience.

Trusted Releases Built For Speed