-
Notifications
You must be signed in to change notification settings - Fork 2.4k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
docs: add commercial content (#8030)
- Loading branch information
Showing
7 changed files
with
113 additions
and
5 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,86 @@ | ||
# Aqua Security is the home of Trivy | ||
|
||
Trivy is proudly maintained by [Aqua Security](https://aquasec.com). | ||
If you liked Trivy, you will love Aqua which builds on top of Trivy to provide even more enhanced capabilities for a complete security management offering. | ||
In this page you can find a high level comparison between Trivy Open Source and Aqua's commercial product. | ||
If you'd like to learn more or request a demo, [click here to contact us](./contact.md). | ||
|
||
## User experience | ||
|
||
| Feature | Trivy OSS | Aqua | | ||
| --- | --- | --- | | ||
| Interface | CLI tool | CLI tool <br> Enterprise-grade web application <br> SaaS or on-prem | | ||
| Search & Discover | - | Easily search for security issues across all workloads and infrastructure in your organization <br> Visually discover risks across your organization | | ||
| User management | - | Multi account <br> Granular permissions (RBAC) <br> Single Sign On (SSO) | | ||
| Support | Some skills required for setup and integration <br> Best effort community support | Personal onboarding by Aqua Customer Success <br> SLA backed professional support | | ||
| Scalability & Availability | Single scan at a time | Centralized scanning service supports concurrent scans efficiently <br> Highly available production grade architecture | | ||
| Rate limiting | Assets hosted on public free infrastructure and could be rate limited | Assets hosted on Aqua infrastructure and does not have limitations | | ||
|
||
## Vulnerability scanning | ||
|
||
| Feature | Trivy OSS | Aqua | | ||
| --- | --- | --- | | ||
| Vulnerabilities sources | Based on open source vulnerability feeds | Based on open source and commercial vulnerability feeds | | ||
| New Vulnerabilities SLA | No SLA | Commercial level SLA | | ||
| Package managers | Find packages in lock files | Find packages in lock files or reconstructed lock files | | ||
| Vulnerability management | Manually ignore specific vulnerabilities by ID or property | Advanced vulnerability management solution <br> Vulnerability tracking and suppression <br> Incident lifecycle management | | ||
| Vulnerability prioritization | Manually triage by severity | Multiple prioritization tools: <br> Accessibility of the affected resources <br> Exploitability of the vulnerability <br> Open Source packages health and trustworthiness score <br> Affected image layers | | ||
| Reachability analysis | - | Analyze source code to eliminate vulnerabilities of unused dependencies | | ||
| Contextual vulnerabilities | - | Reduce irrelevant vulnerabilities based on environmental factors (e.g. Spring4Shell not relevant due to JDK version) | | ||
| Compiled binaries | Find embedded dependencies in Go and Rust binaries <br> Find SBOM by hash in public Sigstore | In addition, identify popular applications | | ||
|
||
## Container scanning | ||
|
||
| Feature | Trivy OSS | Aqua | | ||
| --- | --- | --- | | ||
| Windows containers | - | Support scanning windows containers | | ||
| Scan container registries | - | Connect to any container registries and automatically scan it | | ||
| Private registries | Standard registry authenticationCloud authentication with ECR, GCR, ACR | Supports registry specific authentication schemes | | ||
| Layer cache | Local cache directory | Scalable Cloud cache | | ||
|
||
## Advanced scanning | ||
|
||
| Feature | Trivy OSS | Aqua | | ||
| --- | --- | --- | | ||
| Malware scanning | - | Scan container images for malware | | ||
| Sandbox scanning | - | Use DTA (Dynamic threat analysis) to run and test container images' behavior to detect sophisticated threats | | ||
| SAST (code scanning) | - | Analyze source code for security issues and vulnerabilities | | ||
|
||
## Policy and enforcement | ||
|
||
| Feature | Trivy OSS | Aqua | | ||
| --- | --- | --- | | ||
| Kubernetes admission | - | Validating Kubernetes Admission based on automatic or user defined policy | | ||
| CI/CD policies | Can fail the entire build on any finding | Granular policies to fail builds based on custom criteria | | ||
| Container engine | - | Block incompliant images from running at container engine level | | ||
| Block vulnerable packages | - | vShield – monitor and block usage of vulnerable packages | | ||
|
||
## Secrets scanning | ||
|
||
| Feature | Trivy OSS | Aqua | | ||
| --- | --- | --- | | ||
| Detected patterns | Basic patterns | Advanced patterns | | ||
| Leaked secrets validation | - | Automatically checks if leaked secrets are valid and usable | | ||
|
||
## IaC/CSPM scanning | ||
|
||
| Feature | Trivy OSS | Aqua | | ||
| --- | --- | --- | | ||
| Infrastructure as Code (IaC) | Many popular languages as detailed [here](https://aquasecurity.github.io/trivy/latest/docs/scanner/misconfiguration/policy/builtin/) | In addition, Build Pipeline configuration scanning | | ||
| Checks customization | Create custom checks with Rego | Create custom checks in no-code interface <br> Customize existing checks with organizational preferences | | ||
| Cloud scanning | AWS (subset of services) | AWS, Azure, GCP, Alibaba Cloud, Oracle Cloud | | ||
| Compliance frameworks | CIS, NSA, vendor guides | More than 25 compliance programs | | ||
| Custom compliance | Create in YAML | Create in a web UI | | ||
| Remediation advice | Basic | AI powered specialized remediation guides | | ||
|
||
## Kubernetes scanning | ||
|
||
| Feature | Trivy OSS | Aqua | | ||
| --- | --- | --- | | ||
Scan initiation | CLI / Kubernetes Operator | Kubernetes Operator / Management web application | | ||
Results consumption | kubectl / CRD / Prometheus exporter | In addition, Advanced UI dashboards, Automatic notifications and incident management flows | | ||
Cluster discovery | Kubeconfig | Automatic discovery thorough cloud onboarding | | ||
Workload image scanning | Scanning in cluster, requires capacity planning | Scanning offloaded to Aqua service, little impact on scanned clusters | | ||
| Cluster scanning | CIS, NSA, PSS | More than 25 compliance programs | | ||
| Scope | Single cluster | Multi cluster, Cloud relationship | | ||
| Scalability | Reports limited by in-cluster etcd storage (size and number of reports) | Cloud-based storage (unlimited scalability) | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
<style> | ||
.md-content .md-content__inner a, h1 { | ||
display:none; | ||
} | ||
input.hs-input, textarea.hs-input { | ||
border: silver solid 1px !important; | ||
font-size: 0.8em; | ||
padding: 5px; | ||
} | ||
</style> | ||
<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script> | ||
<script> | ||
hbspt.forms.create({ | ||
portalId: "1665891", | ||
formId: "a1d0c098-3b3a-40d8-afb4-e04ddb697afe" | ||
}); | ||
</script> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters