Business Software for Kubernetes - Page 12

Top Software that integrates with Kubernetes as of September 2024 - Page 12

  • 1
    IBM Cloud Data Shield
    IBM Cloud™ Data Shield enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes Service host, providing data-in-use protection. IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for MySQL, NGINX and Vault. Powered by the Fortanix Runtime Encryption platform and Intel SGX technology, these tools enable organizations with sensitive data to leverage cloud computing with more confidence. IBM Cloud Data Shield helps enable organizations with sensitive data to deploy and benefit from cloud computing. IBM Cloud Data Shield can run containerized applications in secure enclaves on the IBM Cloud Kubernetes Service.
  • 2
    Qualys Container Security
    Qualys CS features a vulnerability analysis plug-in for CI/CD tool Jenkins, and soon for other CI/CD tools including Bamboo, TeamCity, and CircleCI. You can download the plugins directly from within the container security module. With Qualys CS, security teams can participate in the DevOps process to gate vulnerable images entering the system, while developers get actionable data to remediate vulnerabilities. Configure policies for preventing vulnerable images from entering the repositories. Set policies based on criteria such as vulnerability severity, and specific QIDs. Review from within the plug-in a summary of the build with its vulnerabilities, information on patchable software and fixed versions, and image layers where it is present. Container infrastructure is immutable in nature, which means containers need to be identical to the images they are baked from.
  • 3
    BMC Helix Cloud Security
    Automated cloud security posture management. Designed for the cloud, in the cloud, BMC Helix Cloud Security takes the pain out of security and compliance for cloud resources and containers. Cloud security scoring and remediation for public cloud Iaas and PaaS services from AWS, Azure, and GCP. Automated remediation — no coding required. Container configuration security for Docker, Kubernetes, OpenShift, and GKE. Automated ticketing enrichment via ITSM integration. Ready-to-use CIS, PCI DSS, & GDPR policies, plus support for custom policies. Automated cloud server security management for AWS EC2 and MS Azure VMs. Your cloud footprint is constantly evolving, requiring a solution that accelerates agility without compromising security and compliance. BMC Helix Cloud Security is up to the challenge. Automated security checks and remediation for AWS, Azure, and GCP IaaS and PaaS services.
  • 4
    HashiCorp Vault

    HashiCorp Vault

    HashiCorp

    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 5
    Sophos Cloud Optix
    Asset and network traffic visibility for AWS, Azure, and Google Cloud. Risk-based prioritization of security issues with guided remediation. Optimize spend for multiple cloud services on a single screen. Get automatic identification and risk-profiling of security and compliance risks, with contextual alerts grouping affected resources, detailed remediation steps, and guided response. Track cloud services side by side on a single screen for improved visibility, receive independent recommendations to reduce spend, and identify indicators of compromise. Automate compliance assessments, save weeks of effort mapping Control IDs from overarching compliance tools to Cloud Optix, and produce audit-ready reports instantly. Seamlessly integrate security and compliance checks at any stage of the development pipeline to detect misconfigurations and embedded secrets, passwords, and keys.
  • 6
    Densify

    Densify

    Densify

    Densify provides Advanced Cloud & Container Resource Management Platform that leverages machine-learning to make cloud & container workloads self-aware of their precise resource requirements, and fully automates the resource management process. With Densify, CloudOps ensure apps continuously get the optimal resources they need at the lowest possible spend. No software downloads, no implementation, no training—just outcomes. A full service, “9.5/10, spectacular”, product —ZDnet. Optimization is impossible without meticulously-accurate analytics that produce actions your application owners will trust and allow. Policy and transparency that unify Finance, Engineering, Operations, and application owners to drive continuous cost optimization. Connects with your ecosystem to feed the processes and systems required to confidently optimize.
  • 7
    Portworx

    Portworx

    Pure Storage

    Run Kubernetes in production with the #1 Kubernetes platform for persistent storage, backup, DR, data security and capacity management. Easily protect, restore and migrate your Kubernetes applications in any cloud or data center. The Portworx Enterprise Storage Platform is your end-to-end storage and data management solution for all your Kubernetes projects, including container-based CaaS, DBaaS, SaaS, and Disaster Recovery initiatives. Your apps will benefit from container-granular storage, disaster recovery, data security, multi-cloud migrations and more. Easily solve the enterprise requirements needed to run data service on Kubernetes. Effortlessly offer a cloud-like DbaaS to your users without giving up control. Scale the backend data services powering your SaaS app without operational complexity. Add DR to any Kubernetes app with a single command. Easily backup and restore all your Kubernetes applications.
  • 8
    Starburst Enterprise

    Starburst Enterprise

    Starburst Data

    Starburst helps you make better decisions with fast access to all your data; Without the complexity of data movement and copies. Your company has more data than ever before, but your data teams are stuck waiting to analyze it. Starburst unlocks access to data where it lives, no data movement required, giving your teams fast & accurate access to more data for analysis. Starburst Enterprise is a fully supported, production-tested and enterprise-grade distribution of open source Trino (formerly Presto® SQL). It improves performance and security while making it easy to deploy, connect, and manage your Trino environment. Through connecting to any source of data – whether it’s located on-premise, in the cloud, or across a hybrid cloud environment – Starburst lets your team use the analytics tools they already know & love while accessing data that lives anywhere.
  • 9
    Cayley

    Cayley

    Cayley

    Cayley is an open-source database for Linked Data. It is inspired by the graph database behind Google's Knowledge Graph (formerly Freebase). Cayley is an open-source graph database designed for ease of use and storing complex data. Built-in query editor, visualizer and REPL. Cayley can use multiple query languages like Gizmo, a query language inspired by Gremlin, GraphQL-inspired query language, MQL a simplified version for Freebase fans. Cayley is modular, easy to connect to your favorite programming languages and back-end stores, production ready, well tested and used by various companies for their production workloads and fast with optimized specifically for usage in applications. Rough performance testing shows that, on 2014 consumer hardware and an average disk, 134m quads in LevelDB is no problem and a multi-hop intersection query- films starring X and Y - takes ~150ms. Cayley is configured by default to run in memory (That's what backend memstore means).
  • 10
    amazee.io

    amazee.io

    amazee.io

    amazee.io offers high-performance, flexible hosting solutions built for speed, security, and scalability. Whether you're running 500 decoupled Drupal sites, a single Laravel application, or a complex technology stack, Lagoon has the flexibility to accommodate any project thanks to containers. Our team of systems engineers is available to support your special requests and custom configurations. amazee.io takes security seriously, passing rigorous audits and offering a GDPR-compliant platform. Lagoon runs the latest technologies and is built to deliver the most performant development, deployment, and end-user experiences possible. We set up Lagoon to handle unplanned spikes in traffic and usage. Your server's resources will scale automatically when needed. Effortlessly create test environments for pull requests and branches. Full congruency across environments. Autoscales to handle fluctuating traffic.
    Starting Price: $199 per month
  • 11
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 12
    Lenses

    Lenses

    Lenses.io

    Enable everyone to discover and observe streaming data. Sharing, documenting and cataloging your data can increase productivity by up to 95%. Then from data, build apps for production use cases. Apply a data-centric security model to cover all the gaps of open source technology, and address data privacy. Provide secure and low-code data pipeline capabilities. Eliminate all darkness and offer unparalleled observability in data and apps. Unify your data mesh and data technologies and be confident with open source in production. Lenses is the highest rated product for real-time stream analytics according to independent third party reviews. With feedback from our community and thousands of engineering hours invested, we've built features that ensure you can focus on what drives value from your real time data. Deploy and run SQL-based real time applications over any Kafka Connect or Kubernetes infrastructure including AWS EKS.
    Starting Price: $49 per month
  • 13
    Macaw

    Macaw

    Macaw Software

    Macaw is an enterprise grade platform optimized for building and transforming applications for digital age. Macaw provides an unique approach to modernize traditional applications to utilize containers and microservices technologies. It also offers a turn-key approach for enterprises to design, develop, build, publish, run and operate microservices based application in a holistic manner irrespective of the underlying infrastructure and clouds. Macaw is meant for enterprises looking to accelerate their modernization journey with hybrid-cloud strategy and cloud native applications. Thanks to its many built-in foundational services ,turnkey operational capabilities and kubernetes integration. Macaw provides the necessary run time environment, services and tools to build, deploy and manage Microservices based application. It provides various built-in and readily usable core application services like database, security, messaging, load-balancing for accelerated development and turn-key ops.
  • 14
    Blue Hexagon

    Blue Hexagon

    Blue Hexagon

    We’ve designed our real-time deep learning platform to deliver speed of detection, efficacy and coverage that sets a new standard for cyber defense. We train our neural networks with global threat data that we’ve curated carefully via threat repositories, dark web, our deployments and from partners. Just like layers of neural networks can recognize your image in photos, our proprietary architecture of neural networks can identify threats in both payloads and headers. Every day, Blue Hexagon Labs validates the accuracy of our models with new threats in the wild. Our neural networks can identify a wide range of threats — file and fileless malware, exploits, C2 communications, malicious domains across Windows, Android, Linux platforms. Deep learning is a subset of machine learning that uses multi-layered artificial neural networks to learn data representation.
  • 15
    NoPass

    NoPass

    NoPass

    NoPass™ is a multi-factor authentication add on for remote users. In addition to the username and password, NoPass™ performs two additional factors of authentication – something you have and something you are. This utilizes smartphones and does not require the purchase of additional hardware authentication devices for each user. It also does not use SMS, which can also be costly and is vulnerable to being intercepted. With the increase in phishing and other identity attacks in our day and age, authentication that requires a username and password (like RADIUS) can be potentially at risk. Sophisticated social engineering schemes and clever tactics can fool even the savviest of users. In order to combat this, Identité™ has introduced its NoPass™ Employee MFA solution, a lightweight feature that enhances the overall security and is adaptable with the leading authentication protocols that are in the market.
    Starting Price: $2
  • 16
    Apiiro

    Apiiro

    Apiiro

    Complete risk visibility with every change, from design to code to cloud. Industry-first Code Risk Platform™ A 360° view of security & compliance risks across applications, infrastructure, developers’ knowledge & business impact. Data-driven decisions are better decisions. Understand your security & compliance risks with a real-time inventory of apps & infra code behavior, devs knowledge, 3rd-party security alerts & business impact. From design to code to cloud. Security architects don’t have time to review every change & investigate every alert. Make the most of their expertise by analyzing context across developers, code & cloud to identify risky material changes & automatically build an actionable workplan. No one likes manual risk questionnaires, security & compliance reviews - they’re tedious, inaccurate & not synced with the code. When the code is the design, we must do better - trigger contextual & automatic workflows.
  • 17
    Veeam ONE

    Veeam ONE

    Veeam

    With insights for Veeam® Backup & Replication™ and Veeam Agents, as well as VMware vSphere, Microsoft Hyper-V and Nutanix AHV, Veeam ONE™ delivers deep, intelligent monitoring, reporting and automation through interactive tools and intelligent learning, identifying and resolving real customer problems before they begin. Veeam Availability Suite™ attaches the monitoring capabilities of Veeam ONE to the powerful data protection features of Veeam Backup & Replication in one Enterprise bundle to meet both your protection and analytics needs. Veeam Backup & Replication provides centralized data protection and management for cloud, virtual and physical workloads. Veeam’s core capabilities, backup and recovery, along with replication and failover, combine to form the cornerstone of Veeam’s flagship products. Proactively mitigate potential threats to your environment before they develop into real problems.
  • 18
    Eco

    Eco

    Spot by NetApp

    Automated Optimization for AWS Savings Plans and Reserved Instances. Simplify the planning, purchasing and optimization of your cloud commitments portfolio. Eco automates reserved instance lifecycle management, creating a high-ROI, low-risk cloud commitment portfolio that matches your current and projected needs. By identifying and selling off unused capacity and buying appropriate short-term, third-party reservations on the AWS Marketplace, Eco delivers all the benefits of long-term pricing without financial lock-in. Ensure maximum ROI on cloud commitment purchases with analysis, modification and mapping of unused reserved instances and Savings Plans to resource demands. Automate purchasing strategies for reserved instances in the AWS Marketplace throughout their lifecycle to ensure workloads are always running at optimal pricing. Enable collaboration between Finance and DevOps teams with full visibility into compute consumption and automation of optimal reserved instances.
  • 19
    NetApp VDMS

    NetApp VDMS

    NetApp

    NetApp’s Virtual Desktop Managed Service (VDMS) provides turnkey virtual desktops as a managed service for your expanding enterprise. VDMS integrates a complete Desktop-as-a-Service (DaaS) solution with our world-class data services infrastructure all for a simple per-user monthly fee. Businesses find that providing virtual desktop infrastructure to a growing number of enterprise users can be complex and resource-intensive. DaaS solutions are an increasingly attractive tool to allow enterprises to support virtual desktops by leveraging a streamlined managed service model. Unfortunately, most DaaS offerings are often limited in scope, or built upon ‘lowest common denominator’ infrastructure that isn’t enterprise-class. Imagine a better approach to DaaS that integrates the virtual desktop with the industry’s leading cloud data services and management tools. That’s DaaS at scale. That’s NetApp Virtual Desktop Managed Service.
  • 20
    MayaData

    MayaData

    MayaData

    OpenEBS with Kubera is the answer. OpenEBS is the most popular open source storage for Kubernetes - and the fastest. Kubera adds an easy to use GUI for OpenEBS Mayastor - and APIs, auto checks and configuration, active directory authentication, built-in performance benchmarking, and additional operators to assist in upgrades and other use cases. Kubera is freely available and is delivered by MayaData when providing 24/7 support for customers to reduce operational costs and complexity. Kubera Propel is a cloud-native declarative data plane written in Rust. It’s built on the open source OpenEBS Mayastor. Kubera Propel combines breakthrough technologies like NVMe, SPDK, and emerging new storage features in the Linux kernel. OpenEBS managed by Kubera Propel has been shown independent benchmarks to deliver extremely low latency performance for data bases and other workloads running on Kubernetes.
    Starting Price: $100 per node per month
  • 21
    Activiti

    Activiti

    Activiti

    Helping businesses solve automation challenges in distributed, highly-scalable and cost effective infrastructures. Activiti is the leading lightweight, java-centric open-source BPMN engine supporting real-world process automation needs. Activiti Cloud is now the new generation of business automation platform offering a set of cloud native building blocks designed to run on distributed infrastructures. Inmutable, scalable & pain free Process & Decision Runtimes designed to integrate with your cloud native infrastructure. Scalable, storage independent and extensible audit service. Scalable, storage independent and extensible query service. Simplified system to system interactions that can scale in distributed environments. Distributed & Scalable application aggregation layer. Cloud ready secure WebSocket and subscription handling as part of GraphQL integration.
  • 22
    hackajob

    hackajob

    hackajob

    Source, assess and hire tech candidates from the UK’s most engaged talent pool. All of our candidates are technically pre-screened, allowing you to hire in just 17 days or less. hackajob was born out of the frustration with the traditional recruitment agency approach and the difficulty of hiring top engineers. Rather than allowing recruitment to be clouded by unconscious bias, hackajob reimagines the process by building it around the needs of technical talent and the framework required to engage with them. Thousands of companies such as Apple, Barclays and Argos depend on the hackajob platform to reduce the time to hire, engage with candidates and, most importantly, remove the bias from the recruitment process. At hackajob, we believe in maximising people's potential. It's why we've made it our mission to make the hiring process fairer, faster and based on skills rather than backgrounds, so people can get the job they deserve and earn what they're worth.
  • 23
    Pileus

    Pileus

    Pileus

    Onboarding has never been simpler. It can be completed in just minutes. Use Pileus to implement tagging policies to gain visibility and control over your resource inventory. Pileus exposes under and over utilized cloud resources and make it easy to make rapid decisions to meet your business goals. Discovers all your cloud assets and provides you with a single console to view and manage your inventory. With continuous monitoring and deep visibility, you gain the power to cut your cloud bill and eliminate unpredictable spending. Get the most relevant and impactful cost saving insights, customized to your needs. Pileus utilizes proprietary algorithms to enable our users to “dive deep” into Kubernetes and identify at the Node level where under-utilization is occurring. Get recommendations tailored for your environment, with precise steps to implement and take action that ensures you are using the optimal set of resources designed to meet your business goals and lower your monthly costs.
  • 24
    StackPulse

    StackPulse

    StackPulse

    StackPulse automates and orchestrates incident response and management, enabling a continuous approach to software services reliability. The StackPulse platform gives SREs, developers and on-callers the context and control necessary to analyze, respond to, and resolve incidents across the entire stack, at any scale. StackPulse transforms how engineering and operations teams operate software and infrastructure services. Our Platform makes it easy to get started collaborating with a suite of incident management tools, from automated war room creation, to data capture and auto-generated postmortems. The data captured during these incidents then generates recommendations for playbooks and triggers that result in significant reductions in MTTR or improvements in SLO adherence. StackPulse identifies risk based on specific patterns of your organization’s unique monitoring, infrastructure, and operational data, and then recommends automated playbooks tailored to your organization.
  • 25
    Cycode

    Cycode

    Cycode

    A platform for security, governance, and pipeline integrity for all your development tools & infrastructure. Harden your source control management systems (SCM), find secrets, leaks and prevent code tampering. Scan your CI/CD settings and Infrastructure-as-Code (IaC) for security misconfiguration. Identify drift between production systems IaC configurations and prevent source code tampering. Stop developers from inadvertently exposing proprietary code in public repositories, fingerprint code assets and proactively identify exposure on public sites. Inventory assets, enforce security policies, and easily demonstrate compliance across all your DevOps tools and infrastructure, both in the cloud and on-premises. Scan IaC for security misconfigurations and ensure compliance between defined IaC configurations and production infrastructure. Scan every commit or pull/merge request for hard-coded secrets and prevent them from reaching the master branch across all SCMs and programming languages.
  • 26
    Delinea Cloud Access Controller
    Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications.
  • 27
    NetApp HCI

    NetApp HCI

    NetApp

    Scale compute and storage on-demand with NetApp® HCI, a hybrid cloud infrastructure that delivers predictable performance for your hybrid cloud on a highly flexible, ultra-efficient architecture. Let the innovation-palooza begin. With NetApp HCI, you can scale storage and compute on demand, together or independently, so you never pay for what you aren’t using. In fact, consolidating multiple workloads with NetApp HCI can reduce your TCO by up to 60%. NetApp HCI doesn’t just manage and run multiple applications with the predictable performance your enterprise and customers demand, it guarantees it. What’s more, resource contention is eliminated, storage performance is three times faster, and compute efficiency increases by 22%. And yes, integration into your data fabric is perfectly seamless. NetApp HCI is the first hybrid cloud infrastructure for everything that matters. It makes managing infrastructure easy.
  • 28
    6connect

    6connect

    6connect

    Revolutionary network automation & provisioning for ISP's and enterprises around the world. Easy to deploy and integrate with, whether you use the 6connect cloud or deploy ProVision behind the firewall. Regain your sanity. Avoid the costly pitfalls of ad hoc solutions and manual network resource management. Global resource management, complete IPAM automation, easy management of DNS, DNSSEC, and DHCP. Flexible data model that seamlessly supports multi-tenant permissions, works with RADIUS, LDAP, 2FA, SAML2. Integrates, synchronizes and automates workflows over a dozen DNS platforms. Also makes migrations a snap! Easy DHCP configuration and scope management that integrates with other systems. From allocation to assignment, from CGN to IPv6, ProVision knows how to handle IPs. Carrier-grade API for easy integration across global system, fast, well documented and tested. Easy to use Peering workflows built-in – from email to BGP config pushes to reporting, it’s all there.
  • 29
    OfficeScan

    OfficeScan

    Trend Micro

    The threat landscape used to be black and white, you kept the bad stuff out and the good stuff in. Now it’s harder to tell the good from the bad, and traditional signature-based antivirus approaches alone are a weak defense against ransomware and unknown threats, which often slip through. Next-generation technologies help with some threats but not others, and adding multiple anti-malware tools on a single endpoint results in too many products that don’t work together. To complicate matters your users are increasingly accessing corporate resources from a variety of locations and devices, and even services in the cloud. You need endpoint security that is smart, optimized, and connected, from a proven vendor you can trust. Trend Micro™ OfficeScan™ infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint.
  • 30
    Trend Micro ServerProtect
    Enterprise servers can be a vulnerable, centralized point of information exchange. Even from inside the network, users or applications without adequate protection can unintentionally upload infected files to the server, which can spread to other systems that access these files. Additionally, large organizations may have hundreds or thousands of individual server machines that require monitoring, configuration, and maintenance. More importantly, today’s sophisticated attacks can target multiple points on the network and leave unseen trails of damage and the potential for re-infection. Trend Micro™ ServerProtect™ delivers the industry’s most reliable virus, spyware and rootkit protection while simplifying and automating security operations on servers. ServerProtect scans and detects malware in real time and incorporates cleanup capabilities to help remove malicious code and repair system damage.