- Stars
- 30,036
- License
- Apache-2.0
- Last commit
- 3 days ago
Best Container Security Tools
Explore leading tools in the Container Security category, including open-source options and SaaS products. Compare features, use cases, and find the best fit for your workflow.
8 open-source projects · 3 SaaS products
Top open-source Container Security
These projects are active, self-hostable choices for knowledge management teams evaluating alternatives to SaaS tools.
- Stars
- 11,081
- License
- Apache-2.0
- Last commit
- 3 days ago
- Stars
- 11,074
- License
- Apache-2.0
- Last commit
- 3 days ago

Clair
Transparent vulnerability scanning for container images using static analysis
- Stars
- 10,871
- License
- Apache-2.0
- Last commit
- 4 days ago
- Stars
- 8,436
- License
- Apache-2.0
- Last commit
- 4 days ago

ThreatMapper
Runtime threat detection and attack path visualization for cloud-native workloads
- Stars
- 5,207
- License
- Apache-2.0
- Last commit
- 4 months ago
Unified scanner for vulnerabilities, misconfigurations, secrets, and SBOMs
Kubescape secures Kubernetes clusters, YAML, and Helm charts against NSA‑CISA, MITRE ATT&CK, and CIS benchmarks, with CLI, operator, and CI/CD integrations.
Popular SaaS Platforms to Replace
Understand the commercial incumbents teams migrate from and how many open-source alternatives exist for each product.
Anchore
Container security and compliance platform for scanning container images and software supply chains
Aqua Security
Cloud-native security platform focusing on container and Kubernetes protection from development to runtime
Sysdig
Cloud-native security and monitoring
Anchore is a container security and compliance platform that helps organizations automate the scanning of container images for vulnerabilities and policy violations. It integrates into CI/CD pipelines to enforce security standards, providing a central place to identify, report, and remediate risks in containerized applications and their dependencies.
Frequently replaced when teams want private deployments and lower TCO.
Explore related categories
Browse neighbouring categories in Security to widen your evaluation.
- Application Security Testing (SAST/DAST/SCA)Static/dynamic analysis and dependency (SCA) scanning for application vulnerabilities.
- Compliance Automation & GRCAutomated controls, evidence collection and audits for SOC 2, ISO 27001, HIPAA and more.
- Data Discovery & ClassificationSensitive data discovery, classification and privacy compliance across data stores.
- Identity & SSOIdentity and single sign-on (SSO) servers for authentication and user management.
- Secrets ManagementVaults and key management systems for secure storage of credentials and secrets.
- SIEM & Threat DetectionSecurity information and event management platforms for threat monitoring and analysis.



