Related Products
|
||||||
About
The Kubernetes platform for big ideas. Empower developers to innovate and ship faster with the leading hybrid cloud, enterprise container platform. Red Hat OpenShift offers automated installation, upgrades, and lifecycle management throughout the container stack—the operating system, Kubernetes and cluster services, and applications—on any cloud. Red Hat OpenShift helps teams build with speed, agility, confidence, and choice. Code in production mode anywhere you choose to build. Get back to doing work that matters. Red Hat OpenShift is focused on security at every level of the container stack and throughout the application lifecycle. It includes long-term, enterprise support from one of the leading Kubernetes contributors and open source software companies. Support the most demanding workloads including AI/ML, Java, data analytics, databases, and more. Automate deployment and life-cycle management with our vast ecosystem of technology partners.
|
About
SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments.
With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured systems. As soon as an issue is detected, this powerful automation helps you and your team remediate it, keeping your infrastructure securely configured, compliant, and up-to-date.
The SecOps suite includes both Comply and Protect. Comply scans and remediates against CIS, DISA-STIG, NIST, PCI, HIPAA compliance standards. And Protect scans for vulnerabilities and patches and updates your operating systems.
|
About
Silk gives your cloud databases superpowers, so they reach performance levels you've never even dreamed of. Silk platform sits neatly between your cloud infrastructure and your database. Silk adds a smart, resilient yet invisible layer that transforms your database into a cloud powerhouse allowing it to optimize your data without any change to your DB or applications, making your cloud environment run 10x faster, and your entire stack more resilient to any infrastructure hiccups.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Organizations interested in an enterprise-grade and open source Kubernetes platform
|
Audience
ITOps, DevOps, NetOps, and SecOps
|
Audience
Companies looking to maximize performance and reduce data costs for mission-critical workloads running on public, private, or hybrid cloud infrastructure.
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
$50.00/month
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationRed Hat
Founded: 1993
United States
www.openshift.com
|
Company InformationSaltStack
Founded: 2012
Utah, United States
saltproject.io
|
Company InformationSilk
Founded: 2008
United States
www.silk.us
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
||||||
|
|
|
||||
|
|
|||||
Categories |
Categories |
Categories |
||||
Application Development Features
Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development
Container Management Features
Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization
Infrastructure-as-a-Service (IaaS) Features
Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring
|
Build Automation Features
Automated Testing
Build Cache
Build Management Tools
Build Metrics
Change Only Compiling
Debugging Tools
Dependency Management
IDE Compatibility
Parallel Testing
Plugin Library
Source Code Management
Version Conflict Resolution
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Compliance Features
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Configuration Management Features
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Center Management Features
Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance
DevOps Features
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
HIPAA Compliance Features
Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management
IT Management Features
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
PCI Compliance Features
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
Patch Management
PCI Assessment
Policy Management
Patch Management Features
Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning
Server Management Features
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring
|
Cloud Management Features
Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval
Cloud Storage Features
Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control
Database Features
Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization
Infrastructure-as-a-Service (IaaS) Features
Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring
|
||||
Integrations
Akamai Guardicore Segmentation
Azure Container Registry
Cado
Dash
IBM Power Virtual Server
IBM Wazi for Dev Spaces
Intel Tiber AI Studio
Kong Konnect
OpenLegacy
PerfectScale
|
Integrations
Akamai Guardicore Segmentation
Azure Container Registry
Cado
Dash
IBM Power Virtual Server
IBM Wazi for Dev Spaces
Intel Tiber AI Studio
Kong Konnect
OpenLegacy
PerfectScale
|
Integrations
Akamai Guardicore Segmentation
Azure Container Registry
Cado
Dash
IBM Power Virtual Server
IBM Wazi for Dev Spaces
Intel Tiber AI Studio
Kong Konnect
OpenLegacy
PerfectScale
|
||||
|
|
|