Back to Trivy

Aqua Security is the home of Trivy

docs/commercial/compare.md

0.70.05.7 KB
Original Source

Aqua Security is the home of Trivy

Trivy is proudly maintained by Aqua Security. If you liked Trivy, you will love Aqua which builds on top of Trivy to provide even more enhanced capabilities for a complete security management offering. In this page you can find a high level comparison between Trivy Open Source and Aqua's commercial product. If you'd like to learn more or request a demo, click here to contact us.

User experience

FeatureTrivy OSSAqua
InterfaceCLI toolCLI tool
Enterprise-grade web application
SaaS or on-prem
Search & Discover-Easily search for security issues across all workloads and infrastructure in your organization
Visually discover risks across your organization
User management-Multi account
Granular permissions (RBAC)
Single Sign On (SSO)
SupportSome skills required for setup and integration
Best effort community supportPersonal onboarding by Aqua Customer Success
SLA backed professional support
Scalability & AvailabilitySingle scan at a timeCentralized scanning service supports concurrent scans efficiently
Highly available production grade architecture
Rate limitingAssets hosted on public free infrastructure and could be rate limitedAssets hosted on Aqua infrastructure and does not have limitations

Vulnerability scanning

FeatureTrivy OSSAqua
Vulnerabilities sourcesBased on open source vulnerability feedsBased on open source and commercial vulnerability feeds
New Vulnerabilities SLANo SLACommercial level SLA
Package managersFind packages in lock filesFind packages in lock files or reconstructed lock files
Vulnerability managementManually ignore specific vulnerabilities by ID or propertyAdvanced vulnerability management solution
Vulnerability tracking and suppression
Incident lifecycle management
Vulnerability prioritizationManually triage by severityMultiple prioritization tools:
Accessibility of the affected resources
Exploitability of the vulnerability
Open Source packages health and trustworthiness score
Affected image layers
Reachability analysis-Analyze source code to eliminate vulnerabilities of unused dependencies
Contextual vulnerabilities-Reduce irrelevant vulnerabilities based on environmental factors (e.g. Spring4Shell not relevant due to JDK version)
Compiled binariesFind embedded dependencies in Go and Rust binaries
Find SBOM by hash in public SigstoreIn addition, identify popular applications

Container scanning

FeatureTrivy OSSAqua
Windows containers-Support scanning windows containers
Scan container registries-Connect to any container registries and automatically scan it
Private registriesStandard registry authenticationCloud authentication with ECR, GCR, ACRSupports registry specific authentication schemes
Layer cacheLocal cache directoryScalable Cloud cache

Advanced scanning

FeatureTrivy OSSAqua
Malware scanning-Scan container images for malware
Sandbox scanning-Use DTA (Dynamic threat analysis) to run and test container images' behavior to detect sophisticated threats
SAST (code scanning)-Analyze source code for security issues and vulnerabilities

Policy and enforcement

FeatureTrivy OSSAqua
Kubernetes admission-Validating Kubernetes Admission based on automatic or user defined policy
CI/CD policiesCan fail the entire build on any findingGranular policies to fail builds based on custom criteria
Container engine-Block incompliant images from running at container engine level
Block vulnerable packages-vShield – monitor and block usage of vulnerable packages

Secrets scanning

FeatureTrivy OSSAqua
Detected patternsBasic patternsAdvanced patterns
Leaked secrets validation-Automatically checks if leaked secrets are valid and usable

IaC/CSPM scanning

FeatureTrivy OSSAqua
Infrastructure as Code (IaC)Many popular languages as detailed hereIn addition, Build Pipeline configuration scanning
Checks customizationCreate custom checks with RegoCreate custom checks in no-code interface
Customize existing checks with organizational preferences
Cloud scanningAWS (subset of services)AWS, Azure, GCP, Alibaba Cloud, Oracle Cloud
Compliance frameworksCIS, NSA, vendor guidesMore than 25 compliance programs
Custom complianceCreate in YAMLCreate in a web UI
Remediation adviceBasicAI powered specialized remediation guides

Kubernetes scanning

FeatureTrivy OSSAqua
Scan initiationCLI / Kubernetes OperatorKubernetes Operator / Management web application
Results consumptionkubectl / CRD / Prometheus exporterIn addition, Advanced UI dashboards, Automatic notifications and incident management flows
Cluster discoveryKubeconfigAutomatic discovery thorough cloud onboarding
Workload image scanningScanning in cluster, requires capacity planningScanning offloaded to Aqua service, little impact on scanned clusters
Cluster scanningCIS, NSA, PSSMore than 25 compliance programs
ScopeSingle clusterMulti cluster, Cloud relationship
ScalabilityReports limited by in-cluster etcd storage (size and number of reports)Cloud-based storage (unlimited scalability)