Anchore raises $20 million to automate container security management

Anchore raises $20 million to automate container security management

Containers — sets of self-contained executables, binary code, libraries, and configuration files — are ubiquitous in cloud computing. According to a survey by managed service provider Diamanti, cloud-native apps were the No. 1 container use case for 33% of organizations in 2019. That’s surely music to the ears of Santa Barbara, California-based Anchore, which Saïd Ziouani and Daniel Nurmi cofounded in 2016 to help organizations implement secure container-based workflows. The company today announced the close of a $20 million in series A financing led by SignalFire, bringing its total raised to around $30 million.


“We created Anchore to empower developers to build secure software quickly and more efficiently,” said Anchore CEO Ziouani, who said the fresh capital will be put toward R&D. “Given our progress to date backed by the strong adoption this past year, we’re now ready to scale our sales, professional services, and engineering resources globally to meet the need and achieve our mission to bring the benefits of container workflow security to customers around the world.”

Anchore offers container inspection and compliance solutions tailored for a range of different applications, including open source projects and large teams in highly regulated industries. They’re built atop the Anchore Engine, a tool for deep image inspection and vulnerability scanning that can be used to generate reports and define continuous integration/deployment pipeline policies, and that searches for attack vectors in apps and operating system (OS) packages while ensuring secrets like passwords, API keys, and other sensitive information aren’t exposed.


Anchore’s products are able to identify non-OS third-party libraries, like Java archives and Node.js NPMs, and they support both the whitelisting and blacklisting of elements like usernames, user IDs, li ..

Support the originator by clicking the read the rest link below.