Frequently Asked Questions
Answers to Your Most Common Questions
RapidFort helps organizations start secure and stay secure across the software supply chain lifecycle.
Teams begin with Curated Near-Zero CVE Images as a secure container foundation. RapidFort then analyzes container software, profiles runtime behavior, removes unused components, and validates security baselines to continuously reduce vulnerabilities and attack surface across development and production environments.
RapidFort Curated Images are production-grade container base images designed to start with near-zero vulnerabilities.
They are hardened using security benchmarks such as CIS and STIG, built on trusted Linux distributions including Ubuntu, Debian, Red Hat, and Alpine, and manually patched and rebuilt by RapidFort engineers to maintain a near-zero CVE state.
These images provide a secure foundation for building containerized applications.
RapidFort Community Images are free hardened container images available through RapidFort’s open-source community repositories.
They are optimized using RapidFort’s Software Attack Surface Management approach, which removes unused packages and dependencies to significantly reduce vulnerabilities caused by unused software.
RapidFort Curated Images are production-grade images that are hardened, manually patched, and rebuilt to achieve a near-zero CVE state.
RapidFort Community Images are free hardened images that reduce a large number of vulnerabilities by removing unused software and shrinking the attack surface, but they may still contain vulnerabilities within the software that is actively used by the application.
RF Analyzer performs container vulnerability analysis across container images, registries, CI/CD pipelines, and Kubernetes environments.
It generates SBOMs, identifies vulnerabilities and licenses, provides fix intelligence, and prioritizes actionable security risks while reducing vulnerability noise.
Traditional scanners generate large volumes of vulnerability findings without prioritization.
RF Analyzer focuses on signal quality, reducing vulnerability noise, and helping teams focus on the vulnerabilities that actually require remediation.
RF Profiler observes containers during execution to identify which software components are actually used at runtime.
This allows teams to understand the true attack surface and prioritize vulnerabilities in software that is actively running in production.
An SBOM lists all software packages included in a container image.
An RBOM™ (Runtime Bill of Materials) captures the software components that are actually executed during runtime. This helps teams focus on vulnerabilities tied to real application behavior rather than components that are never used.
RF Optimizer automatically removes unused components from container images and rebuilds hardened versions of those images.
By eliminating unnecessary packages, binaries, and libraries, RF Optimizer reduces container attack surface while preserving application functionality.
RF CART evaluates container images and systems against security benchmarks and compliance frameworks.
It automates compliance validation, generates remediation scripts, and produces audit-ready reports that help organizations maintain security baselines across containerized environments.
No. RapidFort RunTime automatically establishes a baseline from real container execution. If new components or code paths run after deployment, the system detects the change, flags it as drift, and alerts you so you can decide whether to update the baseline or remediate.
By shrinking images and removing unused components, teams see leaner deployments, significantly fewer patches, and lower overhead. Documented outcomes include up to 10% reduction in development costs, up to 68% less patching effort, and up to 3% infrastructure cost reduction (results vary by environment).