Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Anchore Alternatives

Anchore Reviews & Product Details

Anchore Overview

What is Anchore?

Anchore, Inc., based in Santa Barbara, CA, was founded in 2016 by Saïd Ziouani and Daniel Nurmi to help organizations implement secure container-based workflows without compromising velocity. Anchore Enterprise is a complete container security workflow solution for professional teams. Integrating seamlessly with a wide variety of development tools and platforms, it allows teams to adhere to defined industry security standards. The Anchore Enterprise user interface provides visibility to security teams, allowing them to audit and verify compliance throughout the organization. It can be deployed in air-gapped and public cloud environments and is built for large scale. Anchore Enterprise is based on Anchore Engine, an open-source tool for deep image inspection and vulnerability scanning.

Anchore Details
Show LessShow More
Product Description

Achore offers end to end security and compliance tools to help deploy containers with confidence.


Seller Details
Seller
Anchore
Year Founded
2016
HQ Location
Santa Barbara, CA
Twitter
@anchore
2,797 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
Description

Anchore Inc. is a company specializing in software security and compliance solutions, particularly for containerized applications. Founded in 2016, Anchore offers tools that help organizations secure their software supply chains by scanning, verifying, and ensuring compliance for container images and other software artifacts. Their flagship product, Anchore Enterprise, provides deep inspection and policy-based compliance checks to support DevSecOps practices. By integrating seamlessly into CI/CD pipelines, Anchore assists businesses in identifying vulnerabilities, managing risks, and maintaining regulatory compliance across diverse IT environments. The company's solutions are widely used in industries with stringent security requirements, such as financial services, government, and healthcare.


Ross T.
RT
Overview Provided by:
Marketing, Evangelism, Communities, Technology

Anchore Integrations

(2)
Integration information sourced from real user reviews.

Recent Anchore Reviews

Raja A.
RA
Raja A.Mid-Market (51-1000 emp.)
4.0 out of 5
"Love the intuitive interface and dashboard to assess security posture in a single place"
I have been using Anchore for container image scans for more than a year and the interface is clean and easy to use. Was able to integrate it to De...
Dr habeeb M.
DM
Dr habeeb M.Mid-Market (51-1000 emp.)
4.0 out of 5
"Anchore: Essential Tool for Container Security and Compliance"
The main advantage of Anchore is how easy it is to use in our DevOps pipeline. We love the automated container security tool that is scalable and t...
Verified User
C
Verified UserEnterprise (> 1000 emp.)
4.5 out of 5
"Anchore"
The flawless software supply chain tool. Haven't seen any other software that robust

Anchore Media

Anchore Demo - Anchore Summary Dashboard
This screenshot shows the summary dashboard, including compliance data on the entire set of managed containers.
Anchore Demo - Anchore Compliance Report
This shows a sample report that indicates compliance with a defined policy set.
Answer a few questions to help the Anchore community
Have you used Anchore before?
Yes

4 Anchore Reviews

4.4 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
4 Anchore Reviews
4.4 out of 5
4 Anchore Reviews
4.4 out of 5

Anchore Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Raja A.
RA
Engineering Manager
Computer Software
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Anchore?

I have been using Anchore for container image scans for more than a year and the interface is clean and easy to use. Was able to integrate it to DefectDojo and then Jira, so now our security issues remediation workflows could be well planned from the backlog as the tickets have all the required details and prioritised by due dates. I have been using Policy Compliance and Vulnerabilities tabs in the dashboard exclusively and they give a good summary of the overall issues identified for an artifact. Review collected by and hosted on G2.com.

What do you dislike about Anchore?

SBOM takes time to load but otherwise the information is good. Review collected by and hosted on G2.com.

What problems is Anchore solving and how is that benefiting you?

Continous Security. Anchore helps to plan and address the security tech debt in our sprints on a timely manner. Review collected by and hosted on G2.com.

Dr habeeb M.
DM
Data scientist
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about Anchore?

The main advantage of Anchore is how easy it is to use in our DevOps pipeline. We love the automated container security tool that is scalable and thorough. Since we began looking for a cloud-native security solution, we have been delighted to have it. It not only provides vulnerability checks for our containerized applications and reports, but it also complements our container strategy for automated security. Furthermore, Anchore bolsters the security checks by providing customizable policies which help us uphold our security based on industry standards and internal guidelines. Review collected by and hosted on G2.com.

What do you dislike about Anchore?

The first experience to set up and configure maybe complex, particularly for teams that are new to container security tools. The learning curve is steep, and additional documentation or guided tutorials would be beneficial. Review collected by and hosted on G2.com.

What problems is Anchore solving and how is that benefiting you?

Container security and accurate SBOM generation are both significant challenges that Anchore is helping us address in our DevOps environment. When we integrated Anchore into our CI/CD pipeline, it had an immediate impact, reducing the chances of us deploying vulnerable containers. By conducting thorough image scanning, Anchore tells us about any security vulnerabilities, misconfigurations or policy violations before the container ends up in production - which ensures our applications are secure and compliant. Review collected by and hosted on G2.com.

Verified User in Hospital & Health Care
CH
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
Rating Updated ()
What do you like best about Anchore?

The flawless software supply chain tool. Haven't seen any other software that robust Review collected by and hosted on G2.com.

What do you dislike about Anchore?

The Ui can be slightly better , just feels a little old school from my perspective Review collected by and hosted on G2.com.

Recommendations to others considering Anchore:

Keep improving this great product. Totally in love with this. Review collected by and hosted on G2.com.

What problems is Anchore solving and how is that benefiting you?

Trying to contain the vulnerabilities to secure the platform Review collected by and hosted on G2.com.

Peter L.
PL
Head of Worldwide Developer Marketing
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
Rating Updated ()
What do you like best about Anchore?

Very powerful, policy capabilities are a key differentiator which enable it to support real world CI/CD workflows. Review collected by and hosted on G2.com.

What do you dislike about Anchore?

The CLI requires python to run native, but its docker native so only an issue on my workstation. Review collected by and hosted on G2.com.

Recommendations to others considering Anchore:

Consider Anchore with complex workflows or more sophisticated requirements. The product has an internal database that supports complex rules for a wide variety of use cases. Review collected by and hosted on G2.com.

What problems is Anchore solving and how is that benefiting you?

It prevents vulnerabilities from shipping and embarrassing the company with key customers. Review collected by and hosted on G2.com.

There are not enough reviews of Anchore for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Lacework FortiCNAPP Logo
Lacework FortiCNAPP
4.4
(381)
Lacework FortiCNAPP is a comprehensive Cloud-Native Application Protection Platform (CNAPP) that consolidates Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes security, and compliance into a single solution. Using AI-based anomaly detection and behavioral analytics, FortiCNAPP continuously monitors cloud environments to identify misconfigurations, vulnerabilities, and active threats in real time. The platform supports agentless and agent-based deployment models, ensuring flexible coverage across diverse architectures. FortiCNAPP also integrates with the Fortinet Security Fabric, correlating cloud data with network and endpoint insights from FortiGuard, FortiSOAR, and more, delivering full-stack threat context, faster remediation, and unified risk management.
2
Wiz Logo
Wiz
4.7
(702)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
3
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
4
Orca Security Logo
Orca Security
4.6
(218)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
5
Snyk Logo
Snyk
4.5
(122)
Snyk is a security solution designed to find and fix vulnerabilities in Node.js and Ruby apps.
6
AlgoSec Logo
AlgoSec
4.5
(190)
AlgoSec is a business-driven security management solution.
7
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(183)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
8
Aqua Security Logo
Aqua Security
4.2
(57)
Aqua Security stops cloud native attacks and is the only company with a $1M Cloud Native Protection Warranty to guarantee it. As the pioneer and largest pure-play cloud native security company, Aqua helps customers unlock innovation and build the future of their business. The Aqua Platform is the industry’s most integrated Cloud Native Application Protection Platform (CNAPP), prioritizing risk and automating prevention, detection and response across the lifecycle. Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, IL with Fortune 1000 customers in over 40 countries. For more information, visit https://www.aquasec.com/.
9
Qualys VMDR Logo
Qualys VMDR
4.4
(166)
Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.
10
Check Point CloudGuard CNAPP Logo
Check Point CloudGuard CNAPP
4.5
(157)
Check Point CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter.
Show More