
Scale Security as Fast as You Scale Your Platform
Scale Security as Fast as You Scale Your Platform
Autonomous remediation scales infinitely. Your team does not. Root handles the volume so you can focus on strategy.
Autonomous remediation scales infinitely. Your team does not. Root handles the volume so you can focus on strategy.

Infinite scaling capacity for 2,000 or 2,000,000 containers

Infinite scaling capacity for 2,000 or 2,000,000 containers

Zero headcount growth required to manage 100 container growth

Zero headcount growth required to manage 100 container growth

180-second median remediation time, at any scale

180-second median remediation time, at any scale




Scale Security as Fast as You Scale Your Platform
Autonomous remediation scales infinitely. Your team does not. Root handles the volume so you can focus on strategy.

Infinite scaling capacity for 2,000 or 2,000,000 containers

Zero headcount growth required to manage 100 container growth

180-second median remediation time, at any scale


The Challenge Modern Security Teams Face
The Challenge Modern Security Teams Face
We tried the usual fix: dump it on the devs. The so-called Shift Left. But after over a decade, let's be honest...Shift Left is a failure of epic proportions.
Today all hell breaks loose: open-source CVEs are multiplying like crazy, fixes still take weeks or months, and attackers armed with AI exploit them the same day they're published. That leaves you in a state of constant exposure, playing whack-a-mole at human speed against threats at AI speed, and there's nothing Shift Left Security can do about it.
The pain, by the numbers:
We tried the usual fix: dump it on the devs. The so-called Shift Left. But after over a decade, let's be honest...Shift Left is a failure of epic proportions.
Today all hell breaks loose: open-source CVEs are multiplying like crazy, fixes still take weeks or months, and attackers armed with AI exploit them the same day they're published. That leaves you in a state of constant exposure, playing whack-a-mole at human speed against threats at AI speed, and there's nothing Shift Left Security can do about it.
The pain, by the numbers:

under management, growing 40% YoY (800 new containers last year alone)
2,000 containers

under management, growing 40% YoY (800 new containers last year alone)
2,000 containers

under management, growing 40% YoY (800 new containers last year alone)
2,000 containers

with a frozen budget, cannot hire fast enough
3 person AppSec team

with a frozen budget meaning you can't hire fast enough to keep pace
3 person AppSec team

with a frozen budget, cannot hire fast enough
3 person AppSec team

across the fleet, 100 CVEs per container on average
200,000+ CVEs

across the entire fleet (100 CVEs per container average)
200,000+ total CVEs

across the fleet, 100 CVEs per container on average
200,000+ CVEs

monthly backlog growth, new CVEs outpace manual remediation
5 to 10 percent

new CVEs added faster than team can close old ones
5-10% monthly backlog growth

monthly backlog growth, new CVEs outpace manual remediation
5 to 10 percent

required to keep pace manually at current remediation rates
10x headcount

rejected in every budget cycle
"We need 2 more security engineers"

required to keep pace manually at current remediation rates
10x headcount
As product velocity climbs, security teams hit a wall. Vulnerabilities stack up faster than humans can triage, let alone fix. Hiring can't keep pace with app sprawl, and every new service adds more tools, more alerts, and more risk. Without predictable throughput, SLAs slip and stakeholders lose confidence.
The Math That Doesn't Work:
Average time to remediate 1 CVE manually: 2-4 hours (triage, patch, test, deploy)
3 AppSec engineers × 40 hrs/week = 120 hrs/week capacity
At 3 hours/CVE average: ~40 CVEs closed per week
New CVEs incoming: ~80-100 per week (with 2,000 containers growing 40% YoY)
Result: Backlog grows 40-60 CVEs/week. Game over.
As product velocity climbs, security teams hit a wall. Vulnerabilities stack up faster than humans can triage, let alone fix. Hiring can't keep pace with app sprawl, and every new service adds more tools, more alerts, and more risk. Without predictable throughput, SLAs slip and stakeholders lose confidence.
As product velocity climbs, security teams hit a wall. Vulnerabilities stack up faster than humans can triage, let alone fix. Hiring can't keep pace with app sprawl, and every new service adds more tools, more alerts, and more risk. Without predictable throughput, SLAs slip and stakeholders lose confidence.


How Root solves this
How Root solves this
Root pairs automated, in place remediation with contracted fix rate capacity, giving you a predictable path to zero regardless of how fast the business grows. Infinite scale. Zero headcount growth required.
We say, it's time to Shift Out. Shift Out is a movement built on a simple idea: open source should arrive clean of all vulnerabilities, secured by default. It may sound crazy, but we've made it real.
Root's Shift Out Platform is powered by thousands of AI agents trained to detect, patch, and validate vulnerabilities for any piece of open source code on this planet.
Root pairs automated, in-place remediation with contracted fix-rate capacity, giving you a predictable path to zero regardless of how fast the business grows. Infinite scale. Zero headcount growth required.
Root pairs automated, in place remediation with contracted fix rate capacity, giving you a predictable path to zero regardless of how fast the business grows. Infinite scale. Zero headcount growth required.

Libraries handle the rest at contracted throughput
60,000 remaining CVEs from application dependencies. Contracted fix rate such as 10 fixes per week equals 520 per year. Critical and High vulnerabilities are auto prioritized. CISA KEV items are expedited within 72 hours.
Result: Clear path to zero with a forecastable timeline. The backlog shrinks monthly instead of growing.

Root Image Catalog (RIC) eliminates 60-70% of CVEs instantly
2,000 containers × 100 CVEs average = 200,000 CVEs. Root Image Catalog (RIC) wipes out base image CVEs across all containers simultaneously. 180-second average fix time. Zero human involvement.
Result: 200,000 → 60,000 CVEs in week 1. No new hires needed.

Libraries handle the rest at contracted throughput
60,000 remaining CVEs from application dependencies. Contracted fix rate such as 10 fixes per week equals 520 per year. Critical and High vulnerabilities are auto prioritized. CISA KEV items are expedited within 72 hours.
Result: Clear path to zero with a forecastable timeline. The backlog shrinks monthly instead of growing.

Scale infinitely without hiring
Add 800 more containers next year. RIC auto remediates their base images as well. Libraries throughput scales with your budget, not your headcount.
Result: 40 percent container growth. Zero security team growth. CFO happy. CISO confident.

Libraries handles the rest at contracted throughput
60,000 remaining CVEs (app dependencies). Contracted fix-rate (e.g., 10 fixes/week = 520/year). Critical/High auto-prioritized. CISA KEV expedited within 72 hours.
Result: Clear path to zero with forecastable timeline. Backlog shrinks monthly.

Scale infinitely without hiring
Add 800 more containers next year. RIC auto remediates their base images as well. Libraries throughput scales with your budget, not your headcount.
Result: 40 percent container growth. Zero security team growth. CFO happy. CISO confident.

Scale infinitely without hiring
Add 800 more containers next year. RIC auto remediates their base images as well. Libraries throughput scales with your budget, not your headcount.
Result: 40 percent container growth. Zero security team growth. CFO happy. CISO confident.

RIC eliminates 60 to 70 percent of CVEs instantly
2,000 containers times 100 CVEs equals 200,000 CVEs. RIC wipes out base image CVEs across all containers simultaneously. 180 second average fix time. Zero human involvement.
Result: 200,000 to 60,000 CVEs in week one. No new hires needed.

Scale infinitely without hiring
Add 800 more containers next year? Root Image Catalog (RIC) auto-remediates their base images too. Libraries throughput scales with your budget, not your headcount.
Result: 40% container growth. 0% security team growth. CFO happy. CISO confident.

RIC eliminates 60 to 70 percent of CVEs instantly
2,000 containers times 100 CVEs equals 200,000 CVEs. RIC wipes out base image CVEs across all containers simultaneously. 180 second average fix time. Zero human involvement.
Result: 200,000 to 60,000 CVEs in week one. No new hires needed.

RIC eliminates 60 to 70 percent of CVEs instantly
2,000 containers times 100 CVEs equals 200,000 CVEs. RIC wipes out base image CVEs across all containers simultaneously. 180 second average fix time. Zero human involvement.
Result: 200,000 to 60,000 CVEs in week one. No new hires needed.

Key Capabilities for Security and Platform Leaders

Contracted Fix Throughput
Libraries deliver at your chosen weekly fix rate, from 1 to 25 or more, with Critical and High vulnerabilities prioritized automatically.

Contracted Fix Throughput
Libraries deliver at your chosen weekly fix rate, from 1 to 25 or more, with Critical and High vulnerabilities prioritized automatically.

Contracted Fix Throughput
Libraries deliver at your chosen weekly fix rate, from 1 to 25 or more, with Critical and High vulnerabilities prioritized automatically.

Unlimited Container Coverage
RIC per seat pricing provides unlimited container remediation with a 30 day registry SLA for Critical and High vulnerabilities.

Unlimited Container Coverage
RIC per seat pricing provides unlimited container remediation with a 30 day registry SLA for Critical and High vulnerabilities.

Unlimited Container Coverage
RIC per seat pricing provides unlimited container remediation with a 30 day registry SLA for Critical and High vulnerabilities.

Agentic Remediation Engine
Autonomous patch generation validated by Root researchers for safe, in place fixes.

Agentic Remediation Engine
Autonomous patch generation validated by Root researchers for safe, in place fixes.

Agentic Remediation Engine
Autonomous patch generation validated by Root researchers for safe, in place fixes.

Operational Visibility
Dashboards and Slack or Jira updates show burn down progress and artifact delivery in real time.

Operational Visibility
Dashboards and Slack or Jira updates show burn down progress and artifact delivery in real time.

Operational Visibility
Dashboards and Slack or Jira updates show burn down progress and artifact delivery in real time.

Key Capabilities for Security and Platform Leaders

Contracted Fix Throughput
Libraries deliver at your chosen weekly fix rate (1–25+) with Critical/High vulnerabilities prioritized automatically.

Unlimited Image Coverage
Root Image Catalog (RIC) per-seat pricing provides unlimited container remediation with 30-day registry SLA for Critical/High vulnerabilities.

Agentic Remediation Engine
Autonomous patch generation validated by Root researchers for safe, in-place fixes.

Operational Visibility
Dashboards and Slack/Jira updates show burn-down progress and artifact delivery in real time.

See How Leading Security Teams Use Root
“Root turned vulnerability remediation into a background job. Overnight we traded spreadsheets and sprints for a hands free, fully automated process.”
LP Gros, VP Engineering, DeleteMe

See How Leading Security Teams Use Root
“Root turned vulnerability remediation into a background job. Overnight we traded spreadsheets and sprints for a hands free, fully automated process.”
LP Gros, VP Engineering, DeleteMe

See How Leading Security Teams Use Root
“Root turned vulnerability remediation into a background job. Overnight we traded spreadsheets and sprints for a hands free, fully automated process.”
LP Gros, VP Engineering, DeleteMe

See How Leading Security Teams Use Root
“Root turned vulnerability remediation into a background job. Overnight we traded spreadsheets and sprints for a hands free, fully automated process.”
LP Gros, VP Engineering, DeleteMe
Why Root Works for Scaling Teams
Why Root Works for Scaling Teams
Root transforms remediation from heroics into a repeatable, capacity driven program.
Root transforms remediation from heroics into a repeatable, capacity driven program.

Predictable outcomes with a clear view of how many fixes ship each week

Predictable outcomes
Know exactly how many fixes ship each week.

Predictable outcomes with a clear view of how many fixes ship each week

Predictable outcomes with a clear view of how many fixes ship each week

Faster time to zero with registry and library fixes landing before customer SLAs are at risk

Faster time-to-zero
Registry and library fixes land before customer SLAs are at risk.

Faster time to zero with registry and library fixes landing before customer SLAs are at risk

Faster time to zero with registry and library fixes landing before customer SLAs are at risk

Budget clarity by aligning spend with growth using container bundles or per seat pricing

Budget clarity
Align spend with growth using container bundles or per-seat pricing.

Budget clarity by aligning spend with growth using container bundles or per seat pricing

Budget clarity by aligning spend with growth using container bundles or per seat pricing

Stakeholder alignment by sharing progress with executives, product, and compliance using signed evidence

Stakeholder alignment
Share progress with executives, product, and compliance using signed evidence.

Stakeholder alignment by sharing progress with executives, product, and compliance using signed evidence

Stakeholder alignment by sharing progress with executives, product, and compliance using signed evidence

Connects to Your Security Stack
Root fits into your existing tools and workflows without adding complexity.
AWS ECR • Docker Hub • GCR or GAR • Azure Container Registry • Jira • Slack • ServiceNow • Prisma Cloud • Snyk

Connects to Your Security Stack
Root fits into your existing tools and workflows without adding complexity.
AWS ECR • Docker Hub • GCR or GAR • Azure Container Registry • Jira • Slack • ServiceNow • Prisma Cloud • Snyk

Connects to Your Security Stack
Root fits into your existing tools and workflows without adding complexity.
AWS ECR • Docker Hub • GCR or GAR • Azure Container Registry • Jira • Slack • ServiceNow • Prisma Cloud • Snyk
The Root impact

CVEs in week one by eliminating base image vulnerabilities with RIC
200,000 to 60,000

in week 1 by eliminating base image vulnerabilities via Root Image Catalog (RIC)
200,000 to 60,000 CVEs

CVEs in week one by eliminating base image vulnerabilities with RIC
200,000 to 60,000

CVEs in week one by eliminating base image vulnerabilities with RIC
200,000 to 60,000

CVEs over 6 to 12 months with contracted Libraries throughput, for example 10 fixes per week
60,000 to zero

over 6-12 months with contracted Libraries throughput (e.g., 10 fixes/week)
60,000 → 0 CVEs

CVEs over 6 to 12 months with contracted Libraries throughput, for example 10 fixes per week
60,000 to zero

CVEs over 6 to 12 months with contracted Libraries throughput, for example 10 fixes per week
60,000 to zero

capacity to handle 2,000 or 2,000,000 containers with the same 3 person security team
Infinite scaling

handle 2,000 or 2,000,000 containers with the same 3-person security team
Infinite scaling capacity

capacity to handle 2,000 or 2,000,000 containers with the same 3 person security team
Infinite scaling

capacity to handle 2,000 or 2,000,000 containers with the same 3 person security team
Infinite scaling

growth required even with 40 to 100 percent year over year container growth
Zero headcount

required even with 40-100% YoY container growth
Zero headcount growth

growth required even with 40 to 100 percent year over year container growth
Zero headcount

growth required even with 40 to 100 percent year over year container growth
Zero headcount

per week of manual triage and patching time reclaimed per team
30 to 50 hours

of manual triage and patching time reclaimed per team
30 to 50 hours

per week of manual triage and patching time reclaimed per team
30 to 50 hours

per week of manual triage and patching time reclaimed per team
30 to 50 hours
Got questions?
Got questions?
How do we choose the right fix rate?
How does Root scale with our container growth without adding headcount?
How do we choose the right fix rate?
We scope backlog size, new CVE accrual, and compliance deadlines to recommend the tier that keeps you on track.
Root Image Catalog (RIC) auto-remediates base images across unlimited containers. Libraries throughput scales with your budget, not your headcount. Add 800 more containers? Same 3-person security team handles it.
We scope backlog size, new CVE accrual, and compliance deadlines to recommend the tier that keeps you on track.
Can we flex capacity up or down?
What happens when we exceed our contracted fix rate?
Can we flex capacity up or down?
Yes. Every contract includes onboarding surge and ongoing flex allowances, with options to amend tiers as needs change.
Every contract includes onboarding surge (25% in month 1) and ongoing flex allowances (15% monthly). We collaborate on amending tiers if demand consistently grows, but standard fixes maintain contracted throughput.
Yes. Every contract includes onboarding surge and ongoing flex allowances, with options to amend tiers as needs change.
What if a fix is more complex than expected?
How quickly can Root eliminate our base image CVEs?
What if a fix is more complex than expected?
Root flags complex items early and collaborates on timelines while maintaining contracted throughput for standard fixes.
Root Image Catalog (RIC) wipes out 60-70% of CVEs instantly across all containers simultaneously. 180-second average fix time. Zero human involvement. Your 200,000 CVEs become 60,000 in week 1.
Root flags complex items early and collaborates on timelines while maintaining contracted throughput for standard fixes.
Do we need to migrate off our current registries?
Do we need to migrate off our current registries or infrastructure?
Do we need to migrate off our current registries?
No. Root publishes directly to your preferred registries and supports air gapped delivery when required.
No. Root publishes directly to your preferred registries (AWS ECR, Docker Hub, GCR/GAR) and supports air-gapped delivery when required. Works with your existing infrastructure—no migration needed.
No. Root publishes directly to your preferred registries and supports air gapped delivery when required.
Do you cover Windows workloads?
Do you cover Windows workloads?
No. Root focuses exclusively on Linux based containers and libraries. Windows remediation is not supported.
No. Root focuses exclusively on Linux based containers and libraries. Windows remediation is not supported.

Ready to scale security without adding headcount?
Join growth stage and enterprise teams that rely on Root for predictable, automated remediation.

Ready to scale security without adding headcount?
Join growth stage and enterprise teams that rely on Root for predictable, automated remediation.

Ready to scale security without adding headcount?
Join growth stage and enterprise teams that rely on Root for predictable, automated remediation.