SlideShare a Scribd company logo
Anchore Enterprise:
Product Updates
Neil Levine
VP of Product
Anchore
Alan Pope
Director of DevRel
Anchore
Housekeeping
01
02
03
All participant lines are muted
Questions will be accepted throughout, enter questions via Q&A panel
You will receive a follow-up email with a link to the recording
04 Please respond to poll questions as they are appear on your screen
Agenda
Introductions
01
02 Vulnerability Feeds & NVD Challenges
03 Anchore Vulnerability Feed Service & Enhancements in 5.5
04 Q&A
CISA KEV feed
CISA KEV
CISA KEV
CISA KEV
NVD
GHSA
Red Hat,
Ubuntu
etc
Python
NPM
etc
CISA KEV
Feed
Service
Anchore
Enterprise
Internet
Customer
Anchore
Vuln
Data
Anchore Policy Rule Sets
Ecosystem coverage with
Syft
Additional scanners for
Content, Secrets, etc
Syft in Enterprise
AnchoreCTL (Distributed Mode)
Additional scanners for
Content, Secrets, etc
Enterprise (Centralized Mode)
Malware
Vulnerability Scan
And Policy Analysis
Image
Registry
CI/CD
Syft Ecosystem coverage
Alpine (apk)
C (conan)
C++ (conan)
Dart (pubs)
Debian (dpkg)
Dotnet (deps.json)
Objective-C (cocoapods)
Elixir (mix)
Erlang (rebar3)
Go (go.mod, Go binaries)
Haskell (cabal, stack)
Java (jar, ear, war, par, sar, nar, native-image)
JavaScript (npm, yarn)
Jenkins Plugins (jpi, hpi)
Linux kernel archives (vmlinuz)
Linux kernel a (ko)
Nix (outputs in /nix/store)
PHP (composer)
Python (wheel, egg, poetry, requirements.txt)
Red Hat (rpm)
Ruby (gem)
Rust (cargo.lock)
Swift (cocoapods, swift-package-manager)
Wordpress plugins
SBOM view
Anchore Data Service
Feed Service (>5.9)
NVD
GHSA
Red Hat,
Ubuntu
etc
Python
NPM
etc
CISA KEV
Feed
Service
Anchore
Enterprise
Internet
Customer
Anchore
Vuln
Data
ClamAV
Feed Service (>5.9)
NVD
GHSA
Red Hat,
Ubuntu
etc
Python
NPM
etc
CISA KEV
Feed
Service
Anchore
Enterprise
Internet
Customer
Anchore
Vuln
Data
ClamAV
❌
!
Anchore Data Service
NVD
GHSA
Red Hat,
Ubuntu
etc
Python
NPM
etc
CISA KEV
Anchore
Data Service
Anchore
Enterprise
Internet
Anchore Service
Customer
Anchore
Enriched
Data
ClamAV
Future
options
Air-gap
NVD
GHSA
Red Hat,
Ubuntu
etc
Python
NPM
etc
CISA KEV
Anchore
Data Service
DMZ/Laptop
Internet
Anchore Service
Customer
Anchore
Enriched
Data
ClamAV
Future
options
Anchore
Enterprise
anchorectl airgap feed download -f <filename> -k <your api key> anchorectl airgap feed upload -f <filename>
Data Service Status
status.anchore-enterprise.com
Roadmap
2025 Candidates
Operations
SBOM
Asset Management
Secure
Security Scanning
Enforce
Compliance Management
“Bring-your-own-SBOM”
EPSS
Updated Policy Packs
Simplified operations on major clouds
Next Steps
Get started with a free-trial Anchore Enterprise
https://get.anchore.com/free-trial/
Learn more about Anchore Enterprise
https://anchore.com/platform
Visit our GitHub and Discourse
github.com/anchore and https://anchore.com/discourse
Download customer case studies
www.anchore.com/nvidia
Thank you for joining!
Schedule a demo of our platform @ get.anchore.com/demo-request

More Related Content

PDF
Cp r75.40 release_notes
PPTX
Introduction to Anchore Engine
PDF
Software update for IoT Embedded World 2017
PDF
Software update for IoT: the current state of play
PDF
Software Security in the Real World w/Kelsey Hightower
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
PDF
How the US Navy Approaches DevSecOps with Raise 2.0
PDF
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Cp r75.40 release_notes
Introduction to Anchore Engine
Software update for IoT Embedded World 2017
Software update for IoT: the current state of play
Software Security in the Real World w/Kelsey Hightower
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
How the US Navy Approaches DevSecOps with Raise 2.0
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM

More from Anchore (19)

PDF
Shift Right Security for EKS Webinar Slides
PDF
Webinar: How to Identify and Tackle SBOM Sprawl
PDF
Rapid Incident Response to Zero Day Vulnerabilities
PDF
STIG in Action: Continuous Compliance with MITRE & Anchore
PDF
Increase Supply Chain Transparency & Security with Harbor & Anchore
PDF
Understanding SBOMs: How to Automate, Generate & Manager SBOMs
PDF
Understanding SBOMs - Deep Dive with Kate Stewart.pdf
PDF
Understanding SBOMs: An Introduction to Modern Development
PDF
2024 Trends in Software Supply Chain Security
PDF
STIG 101 with MITRE & Anchore: Insights for Compliance & Cyber Readiness
PDF
Expert Series: Solving Real-World Challenges in FedRAMP Compliance
PDF
Accelerate FedRAMP Compliance on Amazon EKS with Anchore
PDF
How SBOMs Protect Google's Massive Software Supply Chain
PDF
Automated Policy Enforcement for CMMC with Anchore Enterprise
PDF
Adopting the DoD Software Factory Model: Insights & How Tos
PDF
Easy Compliance is Continuous Compliance
PDF
How to Secure Your Kubernetes Software Supply Chain at Scale
PDF
Adapting to the new normal at NVD with Anchore Vulnerability Feed
PDF
Tracking license compliance made easy - intro to Grant (OSS)
Shift Right Security for EKS Webinar Slides
Webinar: How to Identify and Tackle SBOM Sprawl
Rapid Incident Response to Zero Day Vulnerabilities
STIG in Action: Continuous Compliance with MITRE & Anchore
Increase Supply Chain Transparency & Security with Harbor & Anchore
Understanding SBOMs: How to Automate, Generate & Manager SBOMs
Understanding SBOMs - Deep Dive with Kate Stewart.pdf
Understanding SBOMs: An Introduction to Modern Development
2024 Trends in Software Supply Chain Security
STIG 101 with MITRE & Anchore: Insights for Compliance & Cyber Readiness
Expert Series: Solving Real-World Challenges in FedRAMP Compliance
Accelerate FedRAMP Compliance on Amazon EKS with Anchore
How SBOMs Protect Google's Massive Software Supply Chain
Automated Policy Enforcement for CMMC with Anchore Enterprise
Adopting the DoD Software Factory Model: Insights & How Tos
Easy Compliance is Continuous Compliance
How to Secure Your Kubernetes Software Supply Chain at Scale
Adapting to the new normal at NVD with Anchore Vulnerability Feed
Tracking license compliance made easy - intro to Grant (OSS)
Ad

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Big Data Technologies - Introduction.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Spectroscopy.pptx food analysis technology
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Empathic Computing: Creating Shared Understanding
PPTX
1. Introduction to Computer Programming.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Machine Learning_overview_presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Dropbox Q2 2025 Financial Results & Investor Presentation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation theory and applications.pdf
Programs and apps: productivity, graphics, security and other tools
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25-Week II
Big Data Technologies - Introduction.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
Spectroscopy.pptx food analysis technology
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A Presentation on Artificial Intelligence
Empathic Computing: Creating Shared Understanding
1. Introduction to Computer Programming.pptx
Network Security Unit 5.pdf for BCA BBA.
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
MYSQL Presentation for SQL database connectivity
Building Integrated photovoltaic BIPV_UPV.pdf
Machine Learning_overview_presentation.pptx
Ad

Release Webinar: Introducing the Anchore Data Service