RapidFort is a comprehensive vulnerability management platform that helps organizations reduce software risk across the software development lifecycle. RapidFort combines RF Near Zero CVE Images with a Software Attack Surface Management (SASM) system to identify, prioritize, and reduce vulnerabilities without source code changes. RF Near Zero CVE Images are FIPS 140-3 validated and hardened using STIG and CIS benchmarks aligned with NIST SP 800-70 guidance. Built on open-source LTS distributions, these container images provide a secure foundation for application deployment. The platform includes DevTime and RunTime tools that perform binary and runtime analysis to generate Software and Runtime Bills of Materials (SBOM and RBOM), detect unused components, and reduce the attack surface based on execution behavior. Organizations use RapidFort to improve visibility into software supply chain risks and support compliance readiness.
Do You Manage Peer Insights at RapidFort?
Access Vendor Portal to update and manage your profile.
They provide near-zero CVE base images, and keep their library up-to-date. This had been a nightmare for us earlier - by the time we patch our base version, a few more CVEs get reported and we ended up chasing our tail. Now, we pull their latest version on a daily basis - and if we do find any CVEs in our internal scans and report it to them, we get a fresh update pretty quick. Their portal also provides an exploitability score for the CVEs, plus an instrumentation & tracking mechanism to identify the actual binaries that are loaded by our services (ie: many DLLs may be included in a package, but not necessarily used). This gives us a realistic view when reviewing the Security aspects of a build, prior to release - ie: there are X number of CVEs reported by the scanners, but they are in DLLs that are not loaded - or have low/zero exploitability score. Their CLI interface helps us to integrate their tools easily into our build pipelines.
The vast majority of our environments use open source images and RapidFort has directly swappable vuln reduced or vuln free images. Their tooling allows easy scanning, profiling and hardening of images that are custom or not offered by RapidFort. Their documentation is top notch and their customer success engineers have yet to not find an ideal solution for the issues that have cropped up.
The platform is simple and just works. I've tried other base images and they all work exactly as you'd expect them to. RapidFort support is stellar--we share a Slack channel with some of their engineers. While it's rare that we need to reach out, any time we have, they've responded quickly and knowledgeably. Closing out the last few CVEs in a system is always the hardest part. Sometimes you can't fix them and need to provide justification. RapidFort takes care of that by providing details when CVEs remain open--text I can often copy and paste as-is into a remediation report.
The fact that I have to pay for them? (:-) just kidding, we did our build-v/s-buy analysis, and they are value for money) Nothing really. This is a very specific need - to have secure base images - and they do it well, and maintain the expected security levels. Plus, they are very responsive to specific asks.
This is a nit pick, but the way Projects/Clusters are setup in their control panel shows every vulnerability on the cluster that has ever shown up in the cluster until it's manually curated to remove old images with those vulnerabilities.
The price. The platform is not cheap. But let's be honest: how much would it cost in labor and opportunity cost to task an experienced software engineer with working through a list of 200 vulnerabilities? Looking at it from that perspective, the platform does pay for itself.