Compare the Top Application Development Software that integrates with Helm as of July 2025

This a list of Application Development software that integrates with Helm. Use the filters on the left to add additional filters for products that have integrations with Helm. View the products that work with Helm in the table below.

What is Application Development Software for Helm?

Application development software is a type of software used to create applications and software programs. It typically includes code editors, compilers, and debuggers that allow developers to write, compile, and debug code. It also includes libraries of pre-written code that developers can use to create more complex and powerful applications. Compare and read user reviews of the best Application Development software for Helm currently available using the table below. This list is updated regularly.

  • 1
    Massdriver

    Massdriver

    Massdriver

    At Massdriver, we believe in prevention, not permission, letting ops teams enforce guardrails while developers deploy confidently. Our platform encodes your non-negotiables into self-service modules built with your preferred IaC (Terraform, Helm, OpenTofu, etc.) standardizing infrastructure across AWS, Azure, GCP, and Kubernetes out-of-the-box. By bundling policy, security, and cost controls into functional IaC assets, Massdriver cuts overhead for ops teams and speeds developer workflows. Through a central service catalog, developers can provision what they need with integrated monitoring, secrets management, and RBAC baked in. No more brittle IaC pipelines; ephemeral CI/CD spins up automatically from each module’s tooling. Scale faster with unlimited cloud accounts and projects, all while reducing risk and ensuring compliance. Massdriver—fast by default, safe by design.
    Starting Price: Free trial
  • 2
    Golioth

    Golioth

    Golioth

    Connect and secure devices, send sensor data to the web, update firmware over the air, and scale your fleet with our instant IoT cloud. Select hardware and connectivity that meets your needs from your preferred vendor. Use the open source Golioth Device SDK to integrate with your firmware securely. Once connected you can instantly monitor, manage, and update your devices from the Golioth console. We’re a group of industry-leading hardware, firmware, and cloud engineers. We understand the struggle to connect “sand” to the internet, so we built a better way to do just that. We’re built for the embedded developer workflow. Use the tools you’re already familiar with to build robust and reliable devices, faster. Choose from hundreds of hardware options and a variety of connectivity types, protocols, and multiple embedded RTOS providers. Golioth provides a single control plane for all your devices, whether you’re exploring an idea, or improving an existing project.
    Starting Price: $0
  • 3
    Kubernetes

    Kubernetes

    Kubernetes

    Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community. Designed on the same principles that allows Google to run billions of containers a week, Kubernetes can scale without increasing your ops team. Whether testing locally or running a global enterprise, Kubernetes flexibility grows with you to deliver your applications consistently and easily no matter how complex your need is. Kubernetes is open source giving you the freedom to take advantage of on-premises, hybrid, or public cloud infrastructure, letting you effortlessly move workloads to where it matters to you.
    Starting Price: Free
  • 4
    Contrast Security

    Contrast Security

    Contrast Security

    Modern software development must match the speed of the business. But the modern AppSec tool soup lacks integration and creates complexity that slows software development life cycles. Contrast simplifies the complexity that impedes today’s development teams. Legacy AppSec employs a one-size-fits-all vulnerability detection and remediation approach that is inefficient and costly. Contrast automatically applies the best analysis and remediation technique, dramatically improving efficiencies and efficacy. Separate AppSec tools create silos that obfuscate the gathering of actionable intelligence across the application attack surface. Contrast delivers centralized observability that is critical to managing risks and capitalizing on operational efficiencies, both for security and development teams. Contrast Scan is pipeline native and delivers the speed, accuracy, and integration demanded by modern software development.
    Starting Price: $0
  • 5
    Loft

    Loft

    Loft Labs

    Most Kubernetes platforms let you spin up and manage Kubernetes clusters. Loft doesn't. Loft is an advanced control plane that runs on top of your existing Kubernetes clusters to add multi-tenancy and self-service capabilities to these clusters to get the full value out of Kubernetes beyond cluster management. Loft provides a powerful UI and CLI but under the hood, it is 100% Kubernetes, so you can control everything via kubectl and the Kubernetes API, which guarantees great integration with existing cloud-native tooling. Building open-source software is part of our DNA. Loft Labs is CNCF and Linux Foundation member. Loft allows companies to empower their employees to spin up low-cost, low-overhead Kubernetes environments for a variety of use cases.
    Starting Price: $25 per user per month
  • 6
    Checkov

    Checkov

    Prisma Cloud

    Verify changes to hundreds of supported resource types in all major cloud providers. Scan cloud resources in build-time for misconfigured attributes with a simple Python policy-as-code framework. Analyze relationships between cloud resources using Checkov’s graph-based YAML policies. Execute, test, and modify runner parameters in the context of a subject repository CI/CD and version control integrations. Extend Checkov to define your own custom policies, providers, and suppressions terms. Prevent misconfigurations from being deployed by embedding it into existing developer workflows. Enable automated pull/merge request annotations on your repositories without having to build a CI pipeline or run scheduled checks. The Bridge crew platform will automatically scan new pull requests and annotate them with comments for any policy violations discovered.
    Starting Price: Free
  • 7
    Panoptica
    Panoptica makes it easy to secure your containers, APIs, and serverless functions, and manage software bills of materials. It analyzes internal and external APIs and assigns risk scores. Your policies govern which API calls the gateway permits or disables. New cloud-native architectures allow teams to develop and deploy software more quickly, keeping up with the pace of today’s market. But this speed can come with a cost—security. Panoptica closes the gaps by integrating automated, policy-based security and visibility into every stage of the software-development lifecycle. Decentralized cloud-native architectures have significantly increased the number of attack surfaces. At the same time, changes in the computing landscape have raised the risk of catastrophic security breaches. Here are some of the reasons why comprehensive security is more important than ever before. You need a platform that protects the entire application lifecycle—from development to runtime.
    Starting Price: $0
  • 8
    Lightlytics

    Lightlytics

    Lightlytics

    The ability to confidently deploy and continuously operate cloud infrastructure is the competitive advantage your team needs today. Know the impact of your code so you can eliminate critical mistakes before they are deployed by continuously simulating changes as part of the GitOps flow. Lightlytics will visualize a context-driven risk analysis on how your cloud environment will be impacted with every configuration change. Reduce the time it takes to review Terraform code changes and the risk of downtime or security breaches before deployment. Lightlytics simulation engine uses the current configuration state of your cloud in a combination with the Terraform code proposed change, to determine how your cloud is going to be impacted if the code will be deployed.
    Starting Price: $3.50 per resource per month
  • 9
    Kong Gateway
    The world’s most popular API gateway. Built for hybrid and multi-cloud, optimized for microservices and distributed architectures. Get started today – download Kong Gateway for free. Kong Gateway supports hybrid or multi-cloud infrastructure, and includes a Kubernetes-native ingress solution and support for declarative configuration management. Kong Gateway is part of the Konnect managed connectivity platform. Konnect delivers connectivity functionality such as API Portals and AI-based anomaly detection, while providing the flexibility of running high performance connectivity runtimes. Use one of the many plugins developed by Kong or our community to add the functionality you need. Build your own plugin with our built in, well-documented plugin development kit. Configure Gateway natively using an API, web UI, or with declarative configuration to manage updates via your CI/CD pipelines.
    Starting Price: Free
  • 10
    Uffizzi

    Uffizzi

    Uffizzi

    Uffizzi helps teams build internal developer platforms in minutes, not months, by providing out-of-the-box Kubernetes multi-tenancy, cluster virtualization and customizable templating. Standardize your workflows, while giving every developer access to self-service, ephemeral environments for development, testing, PRs, staging and more. Runs on your infrastructure or ours.
    Starting Price: $9/seat/month
  • 11
    Amplication

    Amplication

    Amplication

    ​Amplication is an open source backend development platform that streamlines the creation, maintenance, and scaling of backend services, embedding organizational best practices and standards. It enables developers to rapidly generate production-ready Node.js applications by defining data models, roles, and permissions, resulting in the automatic generation of REST and GraphQL APIs, authentication, role-based authorization, logging, and an admin UI. Amplication supports customization through private plugins, allowing integration of internal tools, workflows, and coding conventions. It also offers a service catalog for comprehensive visibility and governance, facilitating proactive maintenance and standardization across development teams. ​
    Starting Price: Free
  • 12
    JFrog Platform
    Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.
    Starting Price: $98 per month
  • 13
    RepoFlow

    RepoFlow

    RepoFlow

    RepoFlow makes package management effortless and efficient. Designed to simplify your development workflow, RepoFlow provides a seamless experience for managing, discovering, and utilizing your software packages. Whether you’re a solo developer or part of a large team, RepoFlow has the tools you need to work smarter and faster. Why RepoFlow? • Simple and Intuitive RepoFlow is designed with developers in mind, offering a clean, straightforward interface. Quickly find the packages you need, view their details, and access ReadMe files without jumping through hoops. • Lightning-Fast Search Handle thousands of packages effortlessly with a powerful search that surfaces the exact package you're looking for, with the ability to filter by repository, version, or other metadata. • Rich Package Insights View ReadMe files, setup instructions, and other package details in just a few clicks. RepoFlow ensures all relevant information is easily accessible, saving you time.
    Starting Price: $79/month
  • 14
    Coverity Static Analysis
    Coverity Static Analysis is a comprehensive code scanning solution that enables developers and security teams to deliver high-quality software in compliance with security, functional safety, and industry standards. It effectively uncovers complex defects across extensive codebases, identifying and resolving code quality and security issues that span multiple files and libraries. Coverity supports compliance with a wide range of standards, including OWASP Top 10, CWE Top 25, MISRA, and CERT C/C++/Java, providing built-in reports to track and prioritize issues. With the Code Sight™ IDE plugin, developers receive real-time results, including CWE information and remediation guidance, directly within their development environment, facilitating the integration of security into the software development life cycle without compromising developer velocity.
  • 15
    Sonatype Nexus Repository
    Sonatype Nexus Repository is a robust binary repository manager designed to store, manage, and distribute open-source components, dependencies, and artifacts across the software development lifecycle (SDLC). It supports over 20 formats, including Maven, npm, PyPI, and Docker, allowing for seamless integration with build tools and CI/CD pipelines. With advanced features like high availability, disaster recovery, and scalability across cloud platforms, Nexus Repository ensures secure and efficient management of your software artifacts. The platform enhances collaboration, automates workflows, and improves visibility into your software supply chain, helping teams manage dependencies and improve software quality.
  • 16
    Werf

    Werf

    Werf

    The CLI tool gluing Git, Docker, Helm & Kubernetes with any CI system to implement CI/CD and Giterminism. Establish and benefit from efficient, robust, and integrated CI/CD pipelines on top of proven technologies. With Werf, it’s easy to start, apply best practices, and avoid reinventing the wheel. Werf not only builds & deploys but also continuously syncs the current Kubernetes state with changes made in Git. Werf introduces Giterminism, use git as a single source of truth, and make the entire delivery pipeline deterministic and idempotent. Werf supports 2 ways to deploy an application. converge application from git commit into the Kubernetes, publish application from git commit into the container registry as a bundle, then deploy bundle into the Kubernetes. Werf just works out of the box with a minimal configuration. You don't even need to be a DevOps/SRE engineer to use werf. Many guides are provided to quickly deploy your app into Kubernetes.
  • 17
    Flux

    Flux

    Flux CD

    Flux is a set of continuous and progressive delivery solutions for Kubernetes that are open and extensible. The latest version of Flux brings many new features, making it more flexible and versatile. Flux is a CNCF Incubating project. Flux and Flagger deploy apps with canaries, feature flags, and A/B rollouts. Flux can also manage any Kubernetes resource. Infrastructure and workload dependency management are built-in. Flux enables application deployment (CD) and (with the help of Flagger) progressive delivery (PD) through automatic reconciliation. Flux can even push back to Git for you with automated container image updates to Git (image scanning and patching). Flux works with your Git providers (GitHub, GitLab, Bitbucket, can even use s3-compatible buckets as a source), all major container registries, and all CI workflow providers. Kustomize, Helm, RBAC, and policy-driven validation (OPA, Kyverno, admission controllers) so it simply falls into place.
  • 18
    kpt

    kpt

    kpt

    kpt is a package-centric toolchain that enables a WYSIWYG configuration authoring, automation, and delivery experience, which simplifies managing Kubernetes platforms and KRM-driven infrastructure at scale by manipulating declarative configuration as data, separated from the code that transforms it. Most Kubernetes users either manage their resources using conventional imperative graphical user interfaces, command-line tools (kubectl), and automation (e.g., operators) that operate directly against Kubernetes APIs, or declarative configuration tools, such as Helm, Terraform, cdk8s, or one of the dozens of other tools. At a small scale, this is largely driven by preference and familiarity. As companies expand the number of Kubernetes development and production clusters they use, creating and enforcing consistent configurations and security policies across a growing environment becomes difficult.
  • 19
    Kuma

    Kuma

    Kuma

    The open-source control plane for service mesh, delivering security, observability, routing and more. Built on top of Envoy, Kuma is a modern control plane for Microservices & Service Mesh for both K8s and VMs, with support for multiple meshes in one cluster. Out of the box L4 + L7 policy architecture to enable zero trust security, observability, discovery, routing and traffic reliability in one click. Getting up and running with Kuma only requires three easy steps. Natively embedded with Envoy proxy, Kuma Delivers easy to use policies that can secure, observe, connect, route and enhance service connectivity for every application and services, databases included. Build modern service and application connectivity across every platform, cloud and architecture. Kuma supports modern Kubernetes environments and Virtual Machine workloads in the same cluster, with native multi-cloud and multi-cluster connectivity to support the entire organization.
  • 20
    Meshery

    Meshery

    Meshery

    Describe all of your cloud native infrastructure and manage as a pattern. Design your service mesh configuration and workload deployments. Apply intelligent canary strategies and performance profiles with service mesh pattern management. Assess your service mesh configuration against deployment and operational best practices with Meshery's configuration validator. Validate your service mesh's conformance to Service Mesh Interface (SMI) specifications. Dynamically load and manage your own WebAssembly filters in Envoy-based service meshes. Service mesh adapters provision, configure, and manage their respective service meshes.
  • 21
    Apache APISIX

    Apache APISIX

    Apache APISIX

    Apache APISIX provides rich traffic management features like Load Balancing, Dynamic Upstream, Canary Release, Circuit Breaking, Authentication, Observability, etc. Apache APISIX provides open source API Gateway to help you manage microservices, delivering the ultimate performance, security, and scalable platform for all your APIs and microservices. Apache APISIX is the first open-source API Gateway that includes a built-in low-code Dashboard, which offers a powerful and flexible UI for developers to use. The Apache APISIX Dashboard is designed to make it as easy as possible for users to operate Apache APISIX through a frontend interface. It’s open-source and ever evolving, feel free to contribute. The Apache APISIX dashboard is flexible to User demand, providing option to create custom modules through code matching your requirements, alongside the existing no-code toolchain.
  • 22
    UBOS

    UBOS

    UBOS

    Everything you need to transform your ideas into AI apps in minutes. Anyone can create next-generation AI-powered apps in 10 minutes, from professional developers to business users, using our no-code/low-code platform. Seamlessly integrate APIs like ChatGPT, Dalle-2, and Codex from Open AI, and even use custom ML models. Build custom admin client and CRUD functionalities to effectively manage sales, inventory, contracts, and more. Create dynamic dashboards that transform data into actionable insights and fuel innovation for your business. Easily create a chatbot to improve customer support and create a true omnichannel experience with multiple integrations. An all-in-one cloud platform combines low-code/no-code tools with edge technologies to make your web application scalable, secure, and easy to manage. Transform your software development process with our no-code/low-code platform, perfect for both business users and professional developers alike.
  • 23
    SiteWhere

    SiteWhere

    SiteWhere

    SiteWhere infrastructure and microservices are deployed on Kubernetes, allowing for deployment on-premise or almost any cloud provider. Highly-available configurations of Apache Kafka, Zookeeper, and Hashicorp Consul provide infrastructure. Each microservice scales independently and integrates automatically. Complete multitenant IoT ecosystem including device management, event ingestion, big data event storage, REST APIs, data integration, and much more. Distributed architecture built with Java microservices running on Docker infrastructure with Apache Kafka processing pipeline. SiteWhere CE will always be open source and free for private as well as commercial use. The SiteWhere team offers free basic support and a steady stream of new features.
  • 24
    Offensive 360

    Offensive 360

    Offensive 360

    We’ve spent years researching and developing an all-in-one product that is affordable for any organization, offering the best quality ever seen in the SAST industry. We’ve spent years in research to create an all-in-one product that is affordable to any organization with the best quality ever in the industry. O’360 conducts an in-depth source code examination, identifying flaws in the open-source components used in your project. In addition, it offers malware analysis, licensing analysis, and IaC, all enabled by our “brain” technology. Offensive 360 is developed by cybersecurity researchers, not by investors. It is unlimited, as we don’t charge you based on lines of code, projects, or users. Moreover, O360 identifies vulnerabilities that most SAST tools in the market would never find.
  • Previous
  • You're on page 1
  • Next