JFrog Runtime Security integrates with JFrog Artifactory to identify the source and owner of vulnerable packages and prioritize remediation. Credit: Kurit afshen / Shutterstock With the introduction of JFrog Runtime, JFrog has added a component to its software supply chain security and devsecops platform to help users secure container-based applications in production. Introduced September 10, JFrog Runtime integrates with JFrog Artifactory to allow devops and security teams to easily identify the source and owner of a vulnerable package and determine the fastest and most efficient way to mitigate risks, JFrog said. The technology monitors Kubernetes clusters, identifies and remediates vulnerabilities, and ensures the integrity of images in production. Leveraging the JFrog Platform, JFrog Runtime offers real-time visibility into runtime vulnerabilities and risks and automates integrity checks to ensure trusted images are running in production. Also featured are triage and prioritization for faster remediation of critical vulnerabilities. JFrog stressed that keeping an application secure in runtime is a complex task. Organizations can struggle with maintaining real-time visibility into runtime vulnerabilities, managing and prioritizing risks, and ensuring deployment integrity, JFrog said. The goal is to identify and remediate vulnerabilities while minimizing business impact and tracking runtime components. Key features and benefits of JFrog Runtime include: Real-time vulnerability visibility within the runtime environment. Accelerated triage and prioritization for remediation of security incidents. Reduced risk through exposure management. Protection for cloud-based workloads, to safeguard applications from data breaches or unauthorized access. Analytics for Kubernetes clusters. Centralized incident awareness. JFrog said that users of JFrog Runtime can identify who uploaded a package to JFrog Artifactory, its owner, its deployment status, and applicable risks. They can identify which workloads are affected across an environment and plan how to address vulnerabilities. Related content feature Can Wasm replace containers? WebAssembly revolutionized browser apps, and promises to upend the server stack. How will it impact containers and Kubernetes? Six experts weigh in. By Bill Doerrfeld Nov 11, 2024 12 mins Containers Kubernetes Cloud Native analysis Enter the Neoverse with Azure’s Cobalt servers Microsoft’s own Arm hardware is now available on the Azure cloud, ready to offer power savings and higher density. By Simon Bisson Oct 24, 2024 7 mins Kubernetes Microsoft Azure Cloud Computing feature How Kubecost shines a light on GPU efficiency GPU monitoring differs significantly from the monitoring of general CPU and memory resources, and requires a different approach. Here’s how Kubecost meets the challenge. By Kai Wombacher Oct 21, 2024 6 mins Containers Kubernetes Cloud Native analysis Secure Azure Kubernetes with Advanced Container Networking Services Microsoft bundles open source security and observability tools for its managed cloud-native platform. By Simon Bisson Oct 17, 2024 7 mins Containers Kubernetes Microsoft Azure Resources Videos