Showing 22 open source projects for "java security for linux"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    Lens Mirantis

    Lens Mirantis

    Lens - The way the world runs Kubernetes

    Kubernetes is the OS for the cloud. Thousands of businesses and people develop and operate their Kubernetes on Lens, the largest and most advanced Kubernetes platform in the world. Lens Desktop works with any Kubernetes. It removes complexity and increases productivity. It’s used by everyone, from devs to ops and startups to large companies. Expand the core functionality of Lens Desktop with Desktop Kubernetes, Teamwork, Security and Commercial Support for increased productivity and time...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    Harbor

    Harbor

    An open source trusted cloud native registry project that stores

    Harbor is an open-source trusted cloud native registry project that stores, signs, and scans content. Harbor extends the open-source Docker Distribution by adding the functionalities usually required by users such as security, identity and management. Having a registry closer to the build-and-run environment can improve the image transfer efficiency. Harbor supports replication of images between registries, and also offers advanced security features such as user management, access control...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Moby

    Moby

    Project for the container ecosystem to assemble containe-based systems

    ..., OS, container runtime, orchestration, infrastructure management, networking, storage, security, build, image distribution, etc. Tools to assemble the components into runnable artifacts for a variety of platforms and architectures: bare metal (both x86 and Arm); executables for Linux, Mac and Windows; VM images for popular cloud and virtualization providers.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    kube2iam

    kube2iam

    Provides different AWS IAM roles for pods running on Kubernetes

    ... is that in a multi-tenanted containers based world, multiple containers will be sharing the underlying nodes. Given containers will share the same underlying nodes, providing access to AWS resources via IAM roles would mean that one needs to create an IAM role which is a union of all IAM roles. This is not acceptable from a security perspective.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
    Get free CRM
  • 5
    StackRox Kubernetes

    StackRox Kubernetes

    Performs a risk analysis of the container environment

    The StackRox Kubernetes Security Platform performs a risk analysis of the container environment, delivers visibility and runtime alerts, and provides recommendations to proactively improve security by hardening the environment. StackRox integrates with every stage of the container lifecycle: build, deploy and runtime. The StackRox Kubernetes Security platform is built on the foundation of the product formerly known as Prevent, which itself was called Mitigate and Apollo. You may find references...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Rancher

    Rancher

    Complete container management platform

    From datacenter to cloud to edge, Rancher lets you deliver Kubernetes-as-a-Service. Rancher is a complete software stack for teams adopting containers. It addresses the operational and security challenges of managing multiple Kubernetes clusters, while providing DevOps teams with integrated tools for running containerized workloads. From datacenter to cloud to edge, Rancher's open source software lets you run Kubernetes everywhere. You don’t need to figure Kubernetes out all on your own...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Pumba

    Pumba

    Chaos testing, network emulation, stress testing tool for containers

    Pumba is a chaos testing command line tool for Docker containers. Pumba disturbs your containers by crashing containerized applications, emulating network failures and stress-testing container resources (cpu, memory, fs, io, and others).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Trivy Operator

    Trivy Operator

    Kubernetes-native security toolkit

    The Trivy Operator leverages Trivy to continuously scan your Kubernetes cluster for security issues. The scans are summarised in security reports as Kubernetes Custom Resource Definitions, which become accessible through the Kubernetes API. The Operator does this by watching Kubernetes for state changes and automatically triggering security scans in response. For example, a vulnerability scan is initiated when a new Pod is created. This way, users can find and view the risks that relate...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Deckhouse

    Deckhouse

    Kubernetes platform from Flant

    Deckhouse is a Kubernetes platform that allows you to create homogeneous K8s clusters on any infrastructure. It manages clusters comprehensively and “automagically” and provides all necessary modules and add-ons for autoscaling, observability, security, and service mesh implementation. Deckhouse has vanilla Kubernetes under the hood and integrates a balanced set of Open Source tools that have become the industry standard. Out-of-the-box secure configuration of the Kubernetes cluster, least...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Start building the next generation of GenAI apps today Icon
    Start building the next generation of GenAI apps today

    MongoDB and Google Cloud bring together powerful technologies that enable you to confidently build GenAI experiences.

    MongoDB Atlas is a fully-managed developer data platform built by developers, for developers. With tight integration to Google Cloud services such as Vertex AI and BigQuery, you can accelerate application deployment to stay at the forefront of AI innovation.
    Learn More
  • 10
    LINKERD

    LINKERD

    Ultralight, security-first service mesh for Kubernetes

    Enterprise power without enterprise complexity. Linkerd adds security, observability, and reliability to any Kubernetes cluster. 100% open source, CNCF graduated, and written in Rust. Instantly add latency-aware load balancing, request retries, timeouts, and blue-green deploys to keep your applications resilient. Incredibly small and blazing fast Linkerd2-proxy micro-proxy written in Rust for security and performance. Self-contained control plane, incrementally deployable data plane, and lots...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    KubeLinter

    KubeLinter

    KubeLinter is a static analysis tool that checks Kubernetes YAML files

    KubeLinter analyzes Kubernetes YAML files and Helm charts, and checks them against a variety of best practices, with a focus on production readiness and security. KubeLinter runs sensible default checks, designed to give you useful information about your Kubernetes YAML files and Helm charts. This is to help teams check early and often for security misconfigurations and DevOps best practices. Some common examples of these include running containers as a non-root user, enforcing least privilege...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Kuma

    Kuma

    The multi-zone service mesh for containers, Kubernetes and VMs

    Kuma is a modern Envoy-based service mesh that can run on every cloud, in a single or multi-zone capacity, across both Kubernetes and VMs. Thanks to its broad universal workload support, combined with native support for Envoy as its data plane proxy technology (but with no Envoy expertise required), Kuma provides modern L4-L7 service connectivity, discovery, security, observability, routing, and more across any service on any platform, databases included. Easy to use, with built-in service mesh...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Apache APISIX for Kubernetes

    Apache APISIX for Kubernetes

    APISIX Ingress Controller for Kubernetes

    Apache APISIX provides rich traffic management features like Load Balancing, Dynamic Upstream, Canary Release, Circuit Breaking, Authentication, Observability, etc. Apache APISIX provides open source API Gateway to help you manage microservices, delivering the ultimate performance, security, and scalable platform for all your APIs and microservices. Apache APISIX is the first open-source API Gateway that includes a built-in low-code Dashboard, which offers a powerful and flexible UI...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    KubeClarity

    KubeClarity

    KubeClarity is a tool for detection and management of vulnerabilities

    KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and filesystems. It scans both runtime K8s clusters and CI/CD pipelines for enhanced software supply chain security. Effective vulnerability scanning requires an accurate Software Bill Of Materials (SBOM) detection. KubeClarity includes a CLI that can be run locally and especially useful for CI/CD pipelines. It allows to analyze images and directories to generate SBOM...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Envoy Gateway

    Envoy Gateway

    Manages Envoy Proxy as a Standalone or Kubernetes-based Gateway

    ... foundation. Supports a variety of Security features, such as TLS, TLS pass-through, secure gRPC, authentication. rate-limiting, etc. Built on top of the high-performance Envoy proxy, which can handle millions of requests per second.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Gloo Gateway

    Gloo Gateway

    The Feature-rich, Kubernetes-native, Next-Generation API Gateway

    Gloo Gateway is a powerful Kubernetes-native ingress controller and API gateway that is based on the Kubernetes Gateway API. It excels in function-level routing, supports legacy apps, microservices and serverless, offers robust discovery capabilities, integrates seamlessly with open-source projects, and is designed to support hybrid applications with various technologies, architectures, protocols, and clouds.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Kube-OVN

    Kube-OVN

    A Bridge between SDN and Cloud Native (Project under CNCF)

    If you miss the good old days of SDN, then Kube-OVN is your choice in Cloud Native era. Kube-OVN, a CNCF Sandbox Level Project, integrates the OVN-based Network Virtualization with Kubernetes. It offers an advanced Container Network Fabric for Enterprises with the most functions, extreme performance and the easiest operation. Each Namespace can have a unique Subnet (backed by a Logical Switch). Pods within the Namespace will have IP addresses allocated from the Subnet. It's also possible for...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Pipeline

    Pipeline

    Banzai Cloud Pipeline is a solution-oriented application platform

    Banzai Cloud Pipeline is a solution-oriented application platform which allows enterprises to develop, deploy and securely scale container-based applications in multi- and hybrid-cloud environments. Banzai Pipeline, or simply Pipeline is a tabletop reef break located in Hawaii, Oahu's North Shore. The most famous and infamous reef in the universe is the benchmark by which all other waves are measured. Banzai Cloud Pipeline is a solution-oriented application platform which allows enterprises...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ChaosBlade

    ChaosBlade

    An easy to use and powerful chaos engineering experiment toolkit

    ChaosBlade is an Alibaba open source experimental injection tool that follows the principles of chaos engineering and chaos experimental models to help enterprises improve the fault tolerance of distributed systems and ensure business continuity during the process of enterprises going to cloud or moving to cloud-native systems. Chaosblade is an internal open-source project of MonkeyKing. It is based on Alibaba's nearly ten years of failure testing and drill practice and combines the best...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Singularity

    Singularity

    Open source container platform designed to be simple, fast, and secure

    Singularity is an open-source container platform designed to be simple, fast, and secure. Many container platforms are available, but Singularity is designed for ease of use on shared systems and in high-performance computing (HPC) environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    kiam

    kiam

    Integrate AWS IAM with Kubernetes

    kiam runs as an agent on each node in your Kubernetes cluster and allows cluster users to associate IAM roles with Pods. [a] role is similar to a user, in that it is an AWS identity with permission policies that determine what the identity can and cannot do in AWS. However, instead of being uniquely associated with one person, a role is intended to be assumed by anyone who needs it. Also, a role does not have any credentials (password or access keys) associated with it. Instead, if a user is...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    pico

    pico

    A Git-driven task runner built to facilitate GitOps and Infrastructure

    Pico is a Git-driven task runner built to facilitate GitOps and Infrastructure-as-Code while securely passing secrets to tasks. What once was a place to chat and collaborate with people across the planet is now a platform for the commercialization of products and services. At the seat of the modern web is the browser. The modern browser is very much like an operating system, both in terms of complexity and code size. Only massive corporations can build and maintain it. Further, the web...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next