You currently have no Projects - please create a new Project to invite this vendor to
To receive a proposal from Docker, please complete the project submission.
Docker has been invited to the project, and will create a proposal for you to review.
Docker is a leading software platform company that standardizes how organizations build, ship, and run applications using lightweight containers. Its ecosystem—spanning Docker Engine, Docker Desktop, and Docker Hub—enables consistent development, rapid deployment, and seamless portability across cloud and on-premises environments.
Docker’s Hardened Images provide security-optimized, enterprise-grade container foundations designed to reduce attack surfaces, support compliance requirements, and ensure trusted software supply chains. Continuously scanned, digitally verified, and built with strict hardening practices, these images give organizations a reliable, production-ready starting point for modern application development.
The cost of security shouldn't limit protection. Docker now offers unlimited access to its Hardened Images (DHI) catalog via an affordable subscription. Get near-zero CVEs, a 95% smaller attack surface, and SRLabs-validated security with SBOM/VEX support for every team, from ML workloads to FedRAMP-ready environments.
Start your DHI trial strong! This guide shows how Docker Hardened Images move you to near-zero CVEs in 3 steps. We compared official Node.js to DHI and found a 100% vulnerability elimination (25 CVEs to 0), a 90% package reduction, and 41% smaller images, validating the compliance benefits with Docker Scout and SBOMs.
Docker’s Hardened Images (DHI) are secured by a dual approach: human expertise backed by AI. Discover how Docker’s internal AI guardrail spotted a critical logic flaw in an nginx-exporter update, blocked the release, and contributed the fix upstream, proving AI is the best force multiplier for security architects
Docker is simplifying Kubernetes security! Discover how new Helm charts in the Docker Hardened Images (DHI) Catalog give users a secure, compliance-ready alternative after the Broadcom/Bitnami changes. Deploy DHI by default, ensuring SLSA Level 3 security and SLA-backed patching for every Kubernetes workload.