Ensuring full software lifecycle security enables enterprises to shift left and right simultaneously, helping developers save time through rapid threat detection and risk remediation
September 18, 2024 - JFrog, a streaming software company and creator of the JFrog Software Supply Chain Platform, recently announced the addition of JFrog Runtime to its suite of security features, enabling enterprises to seamlessly integrate security into every aspect of the development process - throughout source code writing, binary file deployment and production . JFrog simplifies the collaboration process between developers and security teams, automates DevSecOps tasks, saves time for modern cloud-native application development and further strengthens security. It enables teams to monitor Kubernetes clusters in real time to identify, prioritize and quickly resolve security risks based on actual risks. In addition, it helps ensure image integrity and effectively meet compliance requirements.
JFrog Security 首席技术官 Asaf Karas 表示:“ 随着企业越来越多地通过左移来应对当今日益严峻的安全威胁,孤立工具之间的脱节给开发人员、安全团队和 MLOps 团队带来了额外的压力。企业可以通过采用统一的平台,在整个开发和安全流程中提供端到端的可视性、修复和可追溯性,以此减轻工作负担。通过为 DevOps、数据科学家和平台工程师提供从左侧安全模型扫描和整理到右侧 JFrog Runtime 的集成解决方案,企业可以显著提高大规模交付可信软件的能力。”
A recent survey conducted by JFrog in partnership with IDC found that enterprises spend an average of $542 per developer per week on security-related or DevSecOps-related tasks, which equates to $1.89 million per year. Developers want to focus on coding, while security teams prioritize risk reduction. JFrog Runtime enables users to track and manage packages from different sources, organize repositories by environment type, and activate JFrog Xray policies, ultimately strengthening security from code to runtime. As part of JFrog, Runtime can also bridge the gap in visibility and coordination between teams, optimize version control and package development, while ensuring that R&D, DevOps, and security teams can collaborate efficiently, saving developers valuable time.
“Runtime security is critical to our customers because it ensures their applications are protected while they are running,” said Paul Goldman, CEO of iTMethods . “With the increasing complexity of cloud environments and the rise of containerized applications, real-time visibility into potential vulnerabilities is critical. JFrog Runtime will help our customers strengthen their security environment by quickly detecting and responding to threats, thereby protecting data and maintaining trust in cloud services.”
Industry research shows that one in five applications have runtime risks, and about 20% of all applications have high, severe, or catastrophic problems during execution. By automating security measures for fast, dynamic applications running in containers, JFrog Runtime Security meets the unique needs of cloud-native environments for visibility and insight.
Key features and benefits of JFrog Runtime include:
●Real-time vulnerability visibility: Real-time insight into vulnerabilities in the operating environment.
● Accelerate triage with advanced prioritization: Simplify the identification and prioritization of security incidents based on business impact.
● Reduce risk through exposure management: Quickly identify the source and ownership of vulnerable software packages to reduce risk faster.
●Cloud-based workload protection: Helps protect applications by continuously monitoring for post-deployment threats such as malware attacks and privilege escalation.
● Comprehensive analysis for Kubernetes clusters: Enables continuous runtime assessment of workloads and containers to detect vulnerabilities in real time and align them with the corresponding processes and files in JFrog Artifactory.
●Centralized event awareness: Maintain a comprehensive view of the runtime environment to facilitate accurate event identification and response.
“A platform that unifies software supply chain security from development to production provides developers and DevSecOps teams with critical visibility and traceability so they can effectively manage and mitigate risk,” said Katie Norton, research manager for DevSecOps and Software Supply Chain Security at IDC . “The addition of runtime security to JFrog supports both shift-left and shift-right strategies, enabling comprehensive protection and streamlining workflows, alleviating pressure on development and security teams.”
JFrog Runtime complements JFrog’s already robust suite of advanced security features, including:
●AI/ML Model Curation: JFrog Curation protects the software supply chain by detecting and blocking malicious ML models retrieved from open source repositories such as Hugging Face before they enter the enterprise. JFrog’s universal and extensible security platform also natively proxies Hugging Face, allowing developers to access open source AI/ML models while detecting malicious models, blocking their use when necessary, and ensuring license compliance, allowing for safer use of AI.
●Secure Open Source Software Catalog: The JFrog Open Source Software (OSS) Package Catalog provides a “package search engine” using the JFrog UI or API. Powered by public and JFrog data, the OSS Package Catalog allows users to quickly understand the security and risk metadata associated with all OSS packages.
Previous article:JFrog and GitHub expand partnership to empower developers with secure unified management interface and Copilot Chat
Next article:Mouser Electronics, Silicon Labs, and Arduino Join Forces to Sponsor 2024 Matter Challenge Now Open for Registration
- Popular Resources
- Popular amplifiers
- Red Hat announces definitive agreement to acquire Neural Magic
- 5G network speed is faster than 4G, but the perception is poor! Wu Hequan: 6G standard formulation should focus on user needs
- SEMI report: Global silicon wafer shipments increased by 6% in the third quarter of 2024
- OpenAI calls for a "North American Artificial Intelligence Alliance" to compete with China
- OpenAI is rumored to be launching a new intelligent body that can automatically perform tasks for users
- Arm: Focusing on efficient computing platforms, we work together to build a sustainable future
- AMD to cut 4% of its workforce to gain a stronger position in artificial intelligence chips
- NEC receives new supercomputer orders: Intel CPU + AMD accelerator + Nvidia switch
- RW61X: Wi-Fi 6 tri-band device in a secure i.MX RT MCU
Professor at Beihang University, dedicated to promoting microcontrollers and embedded systems for over 20 years.
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Red Hat announces definitive agreement to acquire Neural Magic
- 5G network speed is faster than 4G, but the perception is poor! Wu Hequan: 6G standard formulation should focus on user needs
- SEMI report: Global silicon wafer shipments increased by 6% in the third quarter of 2024
- OpenAI calls for a "North American Artificial Intelligence Alliance" to compete with China
- OpenAI is rumored to be launching a new intelligent body that can automatically perform tasks for users
- Nidec Intelligent Motion is the first to launch an electric clutch ECU for two-wheeled vehicles
- Nidec Intelligent Motion is the first to launch an electric clutch ECU for two-wheeled vehicles
- ASML provides update on market opportunities at 2024 Investor Day
- Arm: Focusing on efficient computing platforms, we work together to build a sustainable future
- AMD to cut 4% of its workforce to gain a stronger position in artificial intelligence chips
- Some ACDC switching power supply EE related posts, download center and classroom video
- MSP430 BootLoader Porting
- The problem of "neutral line" and "live line" in switching power supply
- [Reprint] Power supply test series: Output ripple noise (Output Ripple noise Test)
- Battery-free ultra-low power RISC-V microcontroller is launched
- Automatic build on Linux system based on IAR EW compilation tool
- Analysis of the Causes of MOS Tube Breakdown by Static Electricity
- Excuse me, what is this component with silk screen 6023?
- [NXP Live Review] LPC55S69: General-purpose secure low-power MCU with ARM Cortex-M33 core (including video, PPT, QA)
- Onboard JLink cannot be used