- What is JFrog Security?
- Products
- Curation
- Supported Technologies
- Features and Capabilities
- Configure Curation
- Manage Curation
- How-Tos
- How to Block Malicious or Vulnerable Packages from Entering the Repository
- How to Ensure Only Open-Source Packages with Approved Licenses Are Used
- How to Prevent the Use of Deprecated or Outdated Packages in Development
- How to Use JFrog Curation as a Developer with the JFrog CLI
- How to Utilize JFrog Catalog for Curation
- How to Manage Virtual Repository Behavior and Curation in JFrog Xray
- Xray
- Supported Technologies
- Features and Capabilities
- Quick Start
- Configure Xray
- Manage Xray
- How-Tos
- How to Filter Out Your 1st Party Components in CycloneDX SBOM report
- How to Assign Supplier to your resources in SBOM reports
- How to Block Malicious Packages in your SDLC
- How to Block Critical and High Vulnerabilities Before Promotion
- How to Create a Violation for a Specific Package Version
- How to Send Email Notifications for Each Critical Vulnerability Found in Resource
- How to Generate a Report with All Vulnerabilities in a Distributed Bundle
- How to Generate a Report with All Used Licenses in Your Environment Using JFrog Xray
- Advanced Security
- Runtime
- Catalog
- Curation
- Developers
- CLI
- IDEs
- Frogbot
- Working in Air-Gapped Environments