Getting Started
QScanner is a command-line utility that transforms the way you scan for vulnerabilities. By providing inline vulnerability reports directly in your command-line interface, it integrates effortlessly into your existing workflow. Designed with enterprise needs in mind, QScanner enhances your security measures without adding any extra footprint to your ecosystem. With QScanner, you're empowered to maintain robust security while enjoying a more streamlined and efficient scanning process. It's not just a tool, it's a new approach to container image security.
Key Features
- Zero Installation
QScanner is a standalone executable - just download it and start scanning. No installation or deployment is needed, unlike traditional tools that require bulky setup and configurations. - Versatile Image Scanning
- Local Runtimes: Scan images from Docker, Containerd, or Podman.
- Local Archives: Analyze Docker images or OCI layouts from local files.
- Remote Registries: Connect to AWS ECR, Azure Container Registry, JFrog, GHCR, and more.
- Immediate Results
Get instant vulnerability reports directly in your console, with output formats like SBOM, JSON, Table, and SARIF. This flexibility allows you to integrate QScanner seamlessly into various tools and workflows. - Fast Performance
Utilizes local caching for quicker scans. With supported storage drivers, data collection is even faster. - Policy Enforcement
QScanner offers centralized policy management through the Qualys Portal without disrupting engineering or DevOps workflows. Security teams can centrally define compliance standards and vulnerability thresholds, ensuring all scans automatically adhere to organizational policies. Developers and DevOps professionals continue using their preferred tools while QScanner enforces these policies in the background. This seamless integration facilitates a shift-left approach, addressing security concerns early without hindering productivity. - Comprehensive Security
QScanner offers robust security features that integrate seamlessly with your existing infrastructure. It leverages a trusted enterprise-grade vulnerability management system that you already trust and use to securely store and manage vulnerabilities.