2022-07-19T15:03:58Z

What is your primary use case for Amazon Inspector?

Miriam Tover - PeerSpot reviewer
  • 0
  • 5
PeerSpot user
2

2 Answers

Nikhil Sehgal - PeerSpot reviewer
Real User
Top 5Leaderboard
2024-01-10T08:10:08Z
Jan 10, 2024

Initially, we used it for client performance for four months; we completed the automation. It's primarily used for automated vulnerability detection. It continuously scans your AWS workloads for software vulnerabilities, helping us maintain an overall security posture. Think of it as an automated vulnerability management service for our cloud environment.

Search for a product comparison
Derek Justinger - PeerSpot reviewer
Real User
Top 10
2022-07-19T15:03:58Z
Jul 19, 2022

The use case is that any deployable container we have in our infrastructure should get scanned for vulnerabilities. It is on a public cloud, and as soon as the containers get deployed to ECR, it automatically scans for vulnerability. It scans every hour on the hour. Its version is out of the box with Amazon.

Find out what your peers are saying about Amazon Web Services (AWS), Tenable, Microsoft and others in Vulnerability Management. Updated: March 2024.
765,234 professionals have used our research since 2012.
Vulnerability Management
What is vulnerability management? Vulnerability management is the meticulous, exhaustive, systematic process implemented to discover any potential threats or vulnerabilities, stop those threats, and repair those vulnerabilities before any serious problems develop with your important operating systems. Vulnerability management also involves fixes and patches to repair those threats and vulnerabilities. It is generally accomplished in combination with additional risk assessment and...
Download Vulnerability Management ReportRead more