Try our new research platform with insights from 80,000+ expert users

What is Trivy?

Get the report
Helped 881,707 peers since 2012

Featured Trivy reviews

Trivy mindshare

As of February 2026, the mindshare of Trivy in the Container Security category stands at 4.9%, up from 4.4% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Container Security Market Share Distribution
ProductMarket Share (%)
Trivy4.9%
Wiz12.4%
Prisma Cloud by Palo Alto Networks9.0%
Other73.7%
Container Security

PeerResearch reports based on Trivy reviews

TypeTitleDate
CategoryContainer SecurityFeb 7, 2026Download
ProductReviews, tips, and advice from real usersFeb 7, 2026Download
ComparisonTrivy vs WizFeb 7, 2026Download
ComparisonTrivy vs Prisma Cloud by Palo Alto NetworksFeb 7, 2026Download
ComparisonTrivy vs SentinelOne Singularity Cloud SecurityFeb 7, 2026Download
Suggested products
TitleRatingMindshareRecommending
Wiz4.512.4%97%35 interviewsAdd to research
Snyk4.14.4%100%50 interviewsAdd to research
 
 
Key learnings from peers

Valuable Features

Room for Improvement

Pricing

Popular Use Cases

Service and Support

Deployment

Scalability

Stability

Review data by company size

By reviewers
Company SizeCount
Small Business3
Midsize Enterprise1
Large Enterprise8
By reviewers
By visitors reading reviews
Company SizeCount
Small Business237
Midsize Enterprise141
Large Enterprise613
By visitors reading reviews

Top industries

By visitors reading reviews
Financial Services Firm
13%
Computer Software Company
13%
Manufacturing Company
12%
Government
7%
Comms Service Provider
7%
University
5%
Retailer
4%
Media Company
4%
Healthcare Company
3%
Insurance Company
3%
Outsourcing Company
3%
Energy/Utilities Company
3%
Educational Organization
3%
Aerospace/Defense Firm
2%
Construction Company
2%
Real Estate/Law Firm
2%
Legal Firm
2%
Performing Arts
2%
Transportation Company
1%
Non Profit
1%
Consumer Goods Company
1%
Hospitality Company
1%
Logistics Company
1%
Pharma/Biotech Company
1%
Recreational Facilities/Services Company
1%
Wholesaler/Distributor
1%
Marketing Services Firm
1%

Compare Trivy with alternative products

Learn more about Trivy

Related questions

 
Trivy Reviews Summary
Author infoRatingReview Summary
Senior Security Consultant at Ernst & Young5.0I primarily use Trivy for container and Kubernetes security, integrating it with Azure DevOps for vulnerability scans. Its feature set is impressive, though it generates false positives and struggles with database updates. Transitioning from Clair and Anchore proved beneficial.
Cloud DevOps Lead at Venturenox4.5I use Trivy for vulnerability scanning in Docker images as part of our CI/CD pipelines due to its open-source nature, simplicity, and speed. Although effective, it needs enhanced report analysis features and YAML configuration scanning capabilities for better utility.
Software Engineer at a tech vendor with 10,001+ employees4.5I have used Trivy for three years to scan packages and Docker images for vulnerabilities, integrating it with Jenkins to fail builds with issues. Trivy's ease of use and reliable, up-to-date database set it apart from previous solutions.
Project Associate Engineer at a tech vendor with 501-1,000 employees4.5I use Trivy for scanning Docker images and containers within CI/CD pipelines. Its standout features include repository scanning, automatic solutions for vulnerabilities, and easy Linux integration. The tool could improve its UI and expand its policies and signatures.
DevOps Developer at a comms service provider with 11-50 employees4.0I use Trivy to scan for vulnerabilities in code before deployment, ensuring no issues with dependencies or secrets. Its ability to handle various formats is valuable. However, improved marketing and potential AI integration could enhance its functionality.
Site Reliability Engineer at a tech vendor with 10,001+ employees4.0We use Trivy for vulnerability scans and identifying open secrets in Kubernetes clusters. It is easy to set up with minimal configuration and generates user-friendly reports. Improvement is needed in differentiating OS and application vulnerabilities and enhancing report customization.
Principal DevSecOPs at a computer software company with 10,001+ employees4.0I primarily use Trivy to scan Docker images and application code for vulnerabilities. Its open-source nature, ease of integration, and vulnerability checks are invaluable. However, it could benefit from dynamic scanning during runtime, a user interface, and better SIEM integration.
Cybersecurity & DevSecOps Lead at WhizAI4.5I use Trivy for CI/CD and container scanning due to its ease of integration and lightweight nature. It effectively scans images and file systems, though it lacks reporting features and could improve by offering Software Composition Analysis capabilities.