DevOps Developer at a comms service provider with 11-50 employees
Real User
Top 20
2025-04-28T13:05:24Z
Apr 28, 2025
I recommend Trivy to others due to its powerful and useful features. However, I suggest increasing its marketing to raise awareness. I rate Trivy an eight out of ten.
It took about an hour to fully deploy Trivy to a working condition. The solution does not require any maintenance from my end. In terms of scalability, it's good for every project we build, especially in the web app domain. I would rate the overall solution a nine out of ten.
I rate Trivy an eight out of ten. This rating reflects its open-source nature, comprehensive scanning capabilities, and its regular updates. The only downside is the absence of a native UI, which would enhance user experience.
I would advise new users to explore all aspects of Trivy, not just using it for image scanning or clusters. It offers much more, including compliance and IAC scanning. Initially, I was unaware of its full capabilities, but it is more than a scanning tool. Overall, I would rate Trivy a ten out of ten.
Trivy is a Swiss knife. I recommend it because it is easy to integrate and provides quick results. On a scale of one to ten, I rate it nine out of ten for vulnerability scanning.
If you are looking for vulnerability scanning for your Docker images or infrastructure misconfigurations, like Terraform files or Helm charts, Trivy is the solution you should consider. Overall, I rate Trivy a nine out of ten.
I definitely recommend Trivy. Many companies are migrating to container platforms. It integrates well with observability stacks like ELK or Grafana Datadog. I advise using these tools for observability integration. I'd rate the solution nine out of ten.
I would recommend starting to use Trivy and explore the documentation, as it is quite comprehensive. Understanding the project pipeline first is important, as it affects the configuration and integration process. This understanding is crucial for integrating Trivy into your security pipeline. I'd rate the solution eight out of ten.
Trivy is a versatile tool for scanning container images and identifying vulnerabilities, favored for its integration with CI/CD pipelines and ease of use. It supports scanning both operating system packages and application dependencies.
Trivy is an efficient tool designed to automate security checks and ensure compliance. Its quick setup, detailed analysis capabilities, and support for multiple programming languages and environments make it a reliable choice for users. Trivy provides...
I recommend Trivy to others due to its powerful and useful features. However, I suggest increasing its marketing to raise awareness. I rate Trivy an eight out of ten.
It took about an hour to fully deploy Trivy to a working condition. The solution does not require any maintenance from my end. In terms of scalability, it's good for every project we build, especially in the web app domain. I would rate the overall solution a nine out of ten.
I rate Trivy an eight out of ten. This rating reflects its open-source nature, comprehensive scanning capabilities, and its regular updates. The only downside is the absence of a native UI, which would enhance user experience.
I would advise new users to explore all aspects of Trivy, not just using it for image scanning or clusters. It offers much more, including compliance and IAC scanning. Initially, I was unaware of its full capabilities, but it is more than a scanning tool. Overall, I would rate Trivy a ten out of ten.
Trivy is a Swiss knife. I recommend it because it is easy to integrate and provides quick results. On a scale of one to ten, I rate it nine out of ten for vulnerability scanning.
If you are looking for vulnerability scanning for your Docker images or infrastructure misconfigurations, like Terraform files or Helm charts, Trivy is the solution you should consider. Overall, I rate Trivy a nine out of ten.
I definitely recommend Trivy. Many companies are migrating to container platforms. It integrates well with observability stacks like ELK or Grafana Datadog. I advise using these tools for observability integration. I'd rate the solution nine out of ten.
I would recommend starting to use Trivy and explore the documentation, as it is quite comprehensive. Understanding the project pipeline first is important, as it affects the configuration and integration process. This understanding is crucial for integrating Trivy into your security pipeline. I'd rate the solution eight out of ten.