Business Software for Kubernetes - Page 13

Top Software that integrates with Kubernetes as of November 2024 - Page 13

  • 1
    Cayley

    Cayley

    Cayley

    Cayley is an open-source database for Linked Data. It is inspired by the graph database behind Google's Knowledge Graph (formerly Freebase). Cayley is an open-source graph database designed for ease of use and storing complex data. Built-in query editor, visualizer and REPL. Cayley can use multiple query languages like Gizmo, a query language inspired by Gremlin, GraphQL-inspired query language, MQL a simplified version for Freebase fans. Cayley is modular, easy to connect to your favorite programming languages and back-end stores, production ready, well tested and used by various companies for their production workloads and fast with optimized specifically for usage in applications. Rough performance testing shows that, on 2014 consumer hardware and an average disk, 134m quads in LevelDB is no problem and a multi-hop intersection query- films starring X and Y - takes ~150ms. Cayley is configured by default to run in memory (That's what backend memstore means).
  • 2
    amazee.io

    amazee.io

    amazee.io

    amazee.io offers high-performance, flexible hosting solutions built for speed, security, and scalability. Whether you're running 500 decoupled Drupal sites, a single Laravel application, or a complex technology stack, Lagoon has the flexibility to accommodate any project thanks to containers. Our team of systems engineers is available to support your special requests and custom configurations. amazee.io takes security seriously, passing rigorous audits and offering a GDPR-compliant platform. Lagoon runs the latest technologies and is built to deliver the most performant development, deployment, and end-user experiences possible. We set up Lagoon to handle unplanned spikes in traffic and usage. Your server's resources will scale automatically when needed. Effortlessly create test environments for pull requests and branches. Full congruency across environments. Autoscales to handle fluctuating traffic.
    Starting Price: $199 per month
  • 3
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 4
    Lenses

    Lenses

    Lenses.io

    Enable everyone to discover and observe streaming data. Sharing, documenting and cataloging your data can increase productivity by up to 95%. Then from data, build apps for production use cases. Apply a data-centric security model to cover all the gaps of open source technology, and address data privacy. Provide secure and low-code data pipeline capabilities. Eliminate all darkness and offer unparalleled observability in data and apps. Unify your data mesh and data technologies and be confident with open source in production. Lenses is the highest rated product for real-time stream analytics according to independent third party reviews. With feedback from our community and thousands of engineering hours invested, we've built features that ensure you can focus on what drives value from your real time data. Deploy and run SQL-based real time applications over any Kafka Connect or Kubernetes infrastructure including AWS EKS.
    Starting Price: $49 per month
  • 5
    Macaw

    Macaw

    Macaw Software

    Macaw is an enterprise grade platform optimized for building and transforming applications for digital age. Macaw provides an unique approach to modernize traditional applications to utilize containers and microservices technologies. It also offers a turn-key approach for enterprises to design, develop, build, publish, run and operate microservices based application in a holistic manner irrespective of the underlying infrastructure and clouds. Macaw is meant for enterprises looking to accelerate their modernization journey with hybrid-cloud strategy and cloud native applications. Thanks to its many built-in foundational services ,turnkey operational capabilities and kubernetes integration. Macaw provides the necessary run time environment, services and tools to build, deploy and manage Microservices based application. It provides various built-in and readily usable core application services like database, security, messaging, load-balancing for accelerated development and turn-key ops.
  • 6
    Blue Hexagon

    Blue Hexagon

    Blue Hexagon

    We’ve designed our real-time deep learning platform to deliver speed of detection, efficacy and coverage that sets a new standard for cyber defense. We train our neural networks with global threat data that we’ve curated carefully via threat repositories, dark web, our deployments and from partners. Just like layers of neural networks can recognize your image in photos, our proprietary architecture of neural networks can identify threats in both payloads and headers. Every day, Blue Hexagon Labs validates the accuracy of our models with new threats in the wild. Our neural networks can identify a wide range of threats — file and fileless malware, exploits, C2 communications, malicious domains across Windows, Android, Linux platforms. Deep learning is a subset of machine learning that uses multi-layered artificial neural networks to learn data representation.
  • 7
    NoPass

    NoPass

    NoPass

    NoPass™ is a multi-factor authentication add on for remote users. In addition to the username and password, NoPass™ performs two additional factors of authentication – something you have and something you are. This utilizes smartphones and does not require the purchase of additional hardware authentication devices for each user. It also does not use SMS, which can also be costly and is vulnerable to being intercepted. With the increase in phishing and other identity attacks in our day and age, authentication that requires a username and password (like RADIUS) can be potentially at risk. Sophisticated social engineering schemes and clever tactics can fool even the savviest of users. In order to combat this, Identité™ has introduced its NoPass™ Employee MFA solution, a lightweight feature that enhances the overall security and is adaptable with the leading authentication protocols that are in the market.
    Starting Price: $2
  • 8
    Apiiro

    Apiiro

    Apiiro

    Complete risk visibility with every change, from design to code to cloud. Industry-first Code Risk Platform™ A 360° view of security & compliance risks across applications, infrastructure, developers’ knowledge & business impact. Data-driven decisions are better decisions. Understand your security & compliance risks with a real-time inventory of apps & infra code behavior, devs knowledge, 3rd-party security alerts & business impact. From design to code to cloud. Security architects don’t have time to review every change & investigate every alert. Make the most of their expertise by analyzing context across developers, code & cloud to identify risky material changes & automatically build an actionable workplan. No one likes manual risk questionnaires, security & compliance reviews - they’re tedious, inaccurate & not synced with the code. When the code is the design, we must do better - trigger contextual & automatic workflows.
  • 9
    Eco

    Eco

    Spot by NetApp

    Automated Optimization for AWS Savings Plans and Reserved Instances. Simplify the planning, purchasing and optimization of your cloud commitments portfolio. Eco automates reserved instance lifecycle management, creating a high-ROI, low-risk cloud commitment portfolio that matches your current and projected needs. By identifying and selling off unused capacity and buying appropriate short-term, third-party reservations on the AWS Marketplace, Eco delivers all the benefits of long-term pricing without financial lock-in. Ensure maximum ROI on cloud commitment purchases with analysis, modification and mapping of unused reserved instances and Savings Plans to resource demands. Automate purchasing strategies for reserved instances in the AWS Marketplace throughout their lifecycle to ensure workloads are always running at optimal pricing. Enable collaboration between Finance and DevOps teams with full visibility into compute consumption and automation of optimal reserved instances.
  • 10
    NetApp VDMS
    NetApp’s Virtual Desktop Managed Service (VDMS) provides turnkey virtual desktops as a managed service for your expanding enterprise. VDMS integrates a complete Desktop-as-a-Service (DaaS) solution with our world-class data services infrastructure all for a simple per-user monthly fee. Businesses find that providing virtual desktop infrastructure to a growing number of enterprise users can be complex and resource-intensive. DaaS solutions are an increasingly attractive tool to allow enterprises to support virtual desktops by leveraging a streamlined managed service model. Unfortunately, most DaaS offerings are often limited in scope, or built upon ‘lowest common denominator’ infrastructure that isn’t enterprise-class. Imagine a better approach to DaaS that integrates the virtual desktop with the industry’s leading cloud data services and management tools. That’s DaaS at scale. That’s NetApp Virtual Desktop Managed Service.
  • 11
    MayaData

    MayaData

    MayaData

    OpenEBS with Kubera is the answer. OpenEBS is the most popular open source storage for Kubernetes - and the fastest. Kubera adds an easy to use GUI for OpenEBS Mayastor - and APIs, auto checks and configuration, active directory authentication, built-in performance benchmarking, and additional operators to assist in upgrades and other use cases. Kubera is freely available and is delivered by MayaData when providing 24/7 support for customers to reduce operational costs and complexity. Kubera Propel is a cloud-native declarative data plane written in Rust. It’s built on the open source OpenEBS Mayastor. Kubera Propel combines breakthrough technologies like NVMe, SPDK, and emerging new storage features in the Linux kernel. OpenEBS managed by Kubera Propel has been shown independent benchmarks to deliver extremely low latency performance for data bases and other workloads running on Kubernetes.
    Starting Price: $100 per node per month
  • 12
    Activiti

    Activiti

    Activiti

    Helping businesses solve automation challenges in distributed, highly-scalable and cost effective infrastructures. Activiti is the leading lightweight, java-centric open-source BPMN engine supporting real-world process automation needs. Activiti Cloud is now the new generation of business automation platform offering a set of cloud native building blocks designed to run on distributed infrastructures. Inmutable, scalable & pain free Process & Decision Runtimes designed to integrate with your cloud native infrastructure. Scalable, storage independent and extensible audit service. Scalable, storage independent and extensible query service. Simplified system to system interactions that can scale in distributed environments. Distributed & Scalable application aggregation layer. Cloud ready secure WebSocket and subscription handling as part of GraphQL integration.
  • 13
    hackajob

    hackajob

    hackajob

    Source, assess and hire tech candidates from the UK’s most engaged talent pool. All of our candidates are technically pre-screened, allowing you to hire in just 17 days or less. hackajob was born out of the frustration with the traditional recruitment agency approach and the difficulty of hiring top engineers. Rather than allowing recruitment to be clouded by unconscious bias, hackajob reimagines the process by building it around the needs of technical talent and the framework required to engage with them. Thousands of companies such as Apple, Barclays and Argos depend on the hackajob platform to reduce the time to hire, engage with candidates and, most importantly, remove the bias from the recruitment process. At hackajob, we believe in maximising people's potential. It's why we've made it our mission to make the hiring process fairer, faster and based on skills rather than backgrounds, so people can get the job they deserve and earn what they're worth.
  • 14
    Pileus

    Pileus

    Pileus

    Onboarding has never been simpler. It can be completed in just minutes. Use Pileus to implement tagging policies to gain visibility and control over your resource inventory. Pileus exposes under and over utilized cloud resources and make it easy to make rapid decisions to meet your business goals. Discovers all your cloud assets and provides you with a single console to view and manage your inventory. With continuous monitoring and deep visibility, you gain the power to cut your cloud bill and eliminate unpredictable spending. Get the most relevant and impactful cost saving insights, customized to your needs. Pileus utilizes proprietary algorithms to enable our users to “dive deep” into Kubernetes and identify at the Node level where under-utilization is occurring. Get recommendations tailored for your environment, with precise steps to implement and take action that ensures you are using the optimal set of resources designed to meet your business goals and lower your monthly costs.
  • 15
    StackPulse

    StackPulse

    StackPulse

    StackPulse automates and orchestrates incident response and management, enabling a continuous approach to software services reliability. The StackPulse platform gives SREs, developers and on-callers the context and control necessary to analyze, respond to, and resolve incidents across the entire stack, at any scale. StackPulse transforms how engineering and operations teams operate software and infrastructure services. Our Platform makes it easy to get started collaborating with a suite of incident management tools, from automated war room creation, to data capture and auto-generated postmortems. The data captured during these incidents then generates recommendations for playbooks and triggers that result in significant reductions in MTTR or improvements in SLO adherence. StackPulse identifies risk based on specific patterns of your organization’s unique monitoring, infrastructure, and operational data, and then recommends automated playbooks tailored to your organization.
  • 16
    Cycode

    Cycode

    Cycode

    A platform for security, governance, and pipeline integrity for all your development tools & infrastructure. Harden your source control management systems (SCM), find secrets, leaks and prevent code tampering. Scan your CI/CD settings and Infrastructure-as-Code (IaC) for security misconfiguration. Identify drift between production systems IaC configurations and prevent source code tampering. Stop developers from inadvertently exposing proprietary code in public repositories, fingerprint code assets and proactively identify exposure on public sites. Inventory assets, enforce security policies, and easily demonstrate compliance across all your DevOps tools and infrastructure, both in the cloud and on-premises. Scan IaC for security misconfigurations and ensure compliance between defined IaC configurations and production infrastructure. Scan every commit or pull/merge request for hard-coded secrets and prevent them from reaching the master branch across all SCMs and programming languages.
  • 17
    Delinea Cloud Access Controller
    Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications.
  • 18
    NetApp HCI
    Scale compute and storage on-demand with NetApp® HCI, a hybrid cloud infrastructure that delivers predictable performance for your hybrid cloud on a highly flexible, ultra-efficient architecture. Let the innovation-palooza begin. With NetApp HCI, you can scale storage and compute on demand, together or independently, so you never pay for what you aren’t using. In fact, consolidating multiple workloads with NetApp HCI can reduce your TCO by up to 60%. NetApp HCI doesn’t just manage and run multiple applications with the predictable performance your enterprise and customers demand, it guarantees it. What’s more, resource contention is eliminated, storage performance is three times faster, and compute efficiency increases by 22%. And yes, integration into your data fabric is perfectly seamless. NetApp HCI is the first hybrid cloud infrastructure for everything that matters. It makes managing infrastructure easy.
  • 19
    6connect

    6connect

    6connect

    Revolutionary network automation & provisioning for ISP's and enterprises around the world. Easy to deploy and integrate with, whether you use the 6connect cloud or deploy ProVision behind the firewall. Regain your sanity. Avoid the costly pitfalls of ad hoc solutions and manual network resource management. Global resource management, complete IPAM automation, easy management of DNS, DNSSEC, and DHCP. Flexible data model that seamlessly supports multi-tenant permissions, works with RADIUS, LDAP, 2FA, SAML2. Integrates, synchronizes and automates workflows over a dozen DNS platforms. Also makes migrations a snap! Easy DHCP configuration and scope management that integrates with other systems. From allocation to assignment, from CGN to IPv6, ProVision knows how to handle IPs. Carrier-grade API for easy integration across global system, fast, well documented and tested. Easy to use Peering workflows built-in – from email to BGP config pushes to reporting, it’s all there.
  • 20
    OfficeScan

    OfficeScan

    Trend Micro

    The threat landscape used to be black and white, you kept the bad stuff out and the good stuff in. Now it’s harder to tell the good from the bad, and traditional signature-based antivirus approaches alone are a weak defense against ransomware and unknown threats, which often slip through. Next-generation technologies help with some threats but not others, and adding multiple anti-malware tools on a single endpoint results in too many products that don’t work together. To complicate matters your users are increasingly accessing corporate resources from a variety of locations and devices, and even services in the cloud. You need endpoint security that is smart, optimized, and connected, from a proven vendor you can trust. Trend Micro™ OfficeScan™ infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint.
  • 21
    Trend Micro ServerProtect
    Enterprise servers can be a vulnerable, centralized point of information exchange. Even from inside the network, users or applications without adequate protection can unintentionally upload infected files to the server, which can spread to other systems that access these files. Additionally, large organizations may have hundreds or thousands of individual server machines that require monitoring, configuration, and maintenance. More importantly, today’s sophisticated attacks can target multiple points on the network and leave unseen trails of damage and the potential for re-infection. Trend Micro™ ServerProtect™ delivers the industry’s most reliable virus, spyware and rootkit protection while simplifying and automating security operations on servers. ServerProtect scans and detects malware in real time and incorporates cleanup capabilities to help remove malicious code and repair system damage.
  • 22
    ScanMail

    ScanMail

    Trend Micro

    More than 90 percent of targeted attacks begin with a spear phishing email, which means your mail server security is more important than ever. Unfortunately, most mail server security solutions, including the limited set of built-in protections in Microsoft® Exchange™ 2013 and 2016, rely on pattern file updates, which only detect traditional malware. They don’t include specific protections to detect malicious URLs or document exploits commonly used in targeted attacks or advanced persistent threats (APTs). ScanMail™ Suite for Microsoft® Exchange™ stops highly targeted email attacks and spear phishing by using document exploit detection, enhanced web reputation, and sandboxing as part of a custom APT defense, protection you don’t get with other solutions. In addition, only ScanMail blocks traditional malware with email, file, and web reputation technology and correlated global threat intelligence from Trend Micro™ Smart Protection Network™ cloud-based security.
  • 23
    Trend Micro PortalProtect
    Many organizations use Microsoft SharePoint to connect with employees, partners, and customers for real-time collaboration. SharePoint capabilities enable businesses to move beyond simple content repositories, helping employees build team sites, create intranet and extranet portals, utilize wikis and blogs, and create social communities. These dynamic collaboration environments help improve your productivity, but they also increase your security risks, especially when opened to external parties. Trend Micro PortalProtect secures your collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators are often unaware of. Its web reputation technology blocks malicious links from entering your web portals, while its powerful content filtering scans both files and web components of SharePoint.
  • 24
    Diamanti

    Diamanti

    Diamanti

    The prevailing assumption is that containers are ideal only for stateless applications. However, many organizations are seeing the value of containerizing databases for many of the same reasons that they containerize their web applications, the ability to release more frequently, the ease of moving from development to staging to production, and the portability to run the same workload on any infrastructure. In fact, databases have emerged as a top use case for container adoption in a recent Diamanti survey. Cloud Native infrastructure inherently enables stateful applications to take advantage of elasticity and flexibility. However, catastrophic events like hardware failures, power failures, natural disasters or other unexpected events can cause loss of data for an extended period of time. This makes recovery tricky for stateful applications. One of the important requirements for cloud native storage is to seamlessly recover from such catastrophic events.
  • 25
    NetThunder

    NetThunder

    NetThunder

    NetThunder is deployed in one of two ways, either as an appliance, or as a system of connected appliances, we call that The Storm™. This allows NetThunder to provide computing solutions for a large variety of situations and is future-proof. A single appliance can easily be converted into The Storm™. The NetThunder platform allows you to scale at will. Unlike most hypercoverged infrastructure, NetThunder offers specialized modules the controller will autoconfigure for your environment - optimizing to maximum performance. Configuring multiple networks and a SAN is as simple as red-wire to red-wire. Our subscription pricing model means no huge upfront buy-in cost. NetThunder is deployed either as an appliance or a system of connected appliances we call The Storm™. This allows NetThunder to provide computing and storage solutions for a large variety of use cases.
    Starting Price: $50 per month
  • 26
    Iterative

    Iterative

    Iterative

    AI teams face challenges that require new technologies. We build these technologies. Existing data warehouses and data lakes do not fit unstructured datasets like text, images, and videos. AI hand in hand with software development. Built with data scientists, ML engineers, and data engineers in mind. Don’t reinvent the wheel! Fast and cost‑efficient path to production. Your data is always stored by you. Your models are trained on your machines. Existing data warehouses and data lakes do not fit unstructured datasets like text, images, and videos. AI teams face challenges that require new technologies. We build these technologies. Studio is an extension of GitHub, GitLab or BitBucket. Sign up for the online SaaS version or contact us to get on-premise installation
  • 27
    cnvrg.io

    cnvrg.io

    cnvrg.io

    Scale your machine learning development from research to production with an end-to-end solution that gives your data science team all the tools they need in one place. As the leading data science platform for MLOps and model management, cnvrg.io is a pioneer in building cutting-edge machine learning development solutions so you can build high-impact machine learning models in half the time. Bridge science and engineering teams in a clear and collaborative machine learning management environment. Communicate and reproduce results with interactive workspaces, dashboards, dataset organization, experiment tracking and visualization, a model repository and more. Focus less on technical complexity and more on building high impact ML models. Cnvrg.io container-based infrastructure helps simplify engineering heavy tasks like tracking, monitoring, configuration, compute resource management, serving infrastructure, feature extraction, and model deployment.
  • 28
    Cyscale

    Cyscale

    Cyscale

    Map, secure, and monitor your cloud assets across platforms in under 5 minutes. Optimize operations and costs with an agentless CSPM solution that uses our Security Knowledge Graph™ to ensure scalable, consistent protection and governance. Specialists across industries rely on Cyscale to apply their expertise where it makes the biggest difference. We help you see through infrastructure layers and scale your efforts to organization-wide impact. Bridge multiple environments with Cyscale and visualise your cloud inventory in full. Discover unused, forgotten cloud resources and eliminate them to get smaller invoices from cloud providers and optimize costs for the whole organization. See accurate correlations across all cloud accounts and assets as soon as you sign up and act on alerts to avoid fines for data breaches.
  • 29
    Caveonix

    Caveonix

    Caveonix

    Traditional enterprise security and compliance solutions tend to be unscalable within hybrid and multi-cloud environments. As other “cloud-native” solutions frequently leave existing data centers behind, it can be difficult for teams to secure their enterprise’s hybrid computing operating environments. From infrastructure and services to applications and workloads, your teams can confidently protect all your cloud environments. Created by industry veterans that know digital risk and compliance inside and out, Caveonix RiskForesight is a platform trusted by our customers and partners that provides proactive workload protection. Detect, Predict and Act on threats that occur in your technology stack and hybrid cloud environments. Automate your digital risk and compliance processes, and proactively protect your hybrid and multi-cloud environments. Implement cloud security posture management and cloud workload protection, as defined by Gartner's standards.
  • 30
    Anchore

    Anchore

    Anchore

    DevSecOps at full speed with deep inspection of container images and policy-based compliance. In an environment where application development must be fast and flexible, containers are the future. Adoption is accelerating, but with it comes risk. Anchore makes it possible to manage, secure, and troubleshoot containers continuously, without sacrificing speed. It delivers a process that allows container development and deployment to be secure from the start, by ensuring that the contents of your containers match the standards that you define. The tools are transparent to developers, visible to production, accessible to security, and all designed for the fluid nature of containers. Anchore sets a trusted standard for containers. It empowers you to certify your containers, making them predictable and protectable. So you can deploy containers with confidence. Protect against risks using a complete container image security solution.