|
1 | 1 | # SCA |
2 | 2 |
|
3 | | -With JFrog's Software Composition Analysis, get enhanced CVE detection and enhanced CVE data with remediation options early on with the following JFrog capabilities: |
| 3 | +**The JFrog Security documentation has a new home!**\ |
| 4 | +You can now find it [here](https://jfrog.com/help/p/security-home), including sections on: |
4 | 5 |
|
5 | | -[**SCA in the JFrog CLI for Xray**](../../jfrog-cli/cli-for-jfrog-security/): |
6 | | - |
7 | | -* [Scan your source code](../../jfrog-applications/jfrog-cli/cli-for-jfrog-security/how-tos/scan-your-source-code.md) dependencies to find security vulnerabilities and license violations |
8 | | -* [Scan your binaries](../../jfrog-applications/jfrog-cli/cli-for-jfrog-security/how-tos/scan-your-binaries.md) with the [on-demand binary scanning](https://jfrog-staging-external.fluidtopics.net/r/help/DevSecOps-Xray/Xray-On-Demand-Binary-Scan) that enables you to point to a binary in your local file system and receive a report that contains a list of vulnerabilities, licenses, and policy violations. |
9 | | -* JFrog CLI is integrated with JFrog Xray and JFrog Artifactory, allowing you to have your [build](../../jfrog-applications/jfrog-cli/cli-for-jfrog-security/how-tos/scan-published-builds.md) artifacts and dependencies scanned for vulnerabilities and license violations. |
10 | | - |
11 | | -[**SCA in your IDE**](broken-reference/): |
12 | | - |
13 | | -* Find and fix security vulnerabilities in your projects and see valuable information about the status of your code by continuously scanning it locally. |
14 | | -* Scan your project dependencies for security issues. For selected security issues, get leverage-enhanced CVE data that is provided by our JFrog Security Research team. |
15 | | -* Supported in [Visual Studio Code](../../ide/visual-studio-code/) and [IntelliJ IDEA](../../ide/jetbrains-ides/). |
16 | | - |
17 | | -[**SCA in your Git repositories (Frogbot)**](../../frogbot/)**:** |
18 | | - |
19 | | -* Scan pull requests immediately after they are opened but before they are merged. |
20 | | -* Get notified if the pull request is about to introduce new vulnerabilities to your code. |
21 | | -* Scan the Git repository periodically and create pull requests with fixes for vulnerabilities that are detected. |
22 | | -* Frogbot uses JFrog's vast vulnerabilities database, to which we continuously add new component vulnerability data. |
| 6 | +* [CLI](https://jfrog.com/help/r/jfrog-security-user-guide/developers/cli) |
| 7 | +* [Frogbot](https://jfrog.com/help/r/jfrog-security-user-guide/developers/frogbot) |
| 8 | +* [IDEs](https://jfrog.com/help/r/jfrog-security-user-guide/developers/ides) |
0 commit comments