Business Software for NGINX - Page 4

Top Software that integrates with NGINX as of August 2025 - Page 4

NGINX Clear Filters
  • 1
    F5 NGINX App Protect
    A modern app‑security solution that works seamlessly in DevOps environments, helping you deliver secure apps from code to customer. Today’s application landscape has changed dramatically. Modern apps are microservices that run in containers, communicate via APIs, and deploy via automated CI/CD pipelines. DevOps teams need to integrate security controls authorized by the security team across distributed environments without slowing release velocity or performance. NGINX App Protect is a modern app‑security solution that works seamlessly in DevOps environments as a robust WAF or app‑level DoS defense, helping you deliver secure apps from code to customer. Seamlessly integrates strong security controls with NGINX Plus and NGINX Ingress Controller. Defends against many advanced threats and evasive attacks. Reduces complexity and tool sprawl while delivering modern apps. Create, secure, and operate adaptive applications that reduce costs, improve operations, and better protect users.
  • 2
    F5 NGINX Ingress Controller
    Streamline and simplify Kubernetes (north-south) network traffic management, delivering consistent, predictable performance at scale without slowing down your apps. Advanced app‑centric configuration – Use role‑based access control (RBAC) and self‑service to set up security guardrails (not gates), so your teams can manage their apps securely and with agility. Enable multi‑tenancy, reusability, simpler configs, and more. A native, type‑safe, and indented configuration style to simplify capabilities like circuit breaking, sophisticated routing, header manipulation, mTLS authentication, and WAF. Plus if you’re already using NGINX, NGINX Ingress resources make it easy to adapt existing configuration from your other environments.
  • 3
    Dash

    Dash

    Kapeli

    Dash gives your Mac instant offline access to 200+ API documentation sets. Dash is an API documentation browser and code snippet manager. Dash instantly searches offline documentation sets for 200+ APIs, 100+ cheat sheets, and more. You can even generate your own docsets or request docsets to be included. Dash comes with 200+ offline documentation sets. You can choose which documentation sets to download and Dash will take care of the rest, making sure they are kept up to date. You can also generate your own docsets, request docsets or download docsets from third-party sources. All documentation sets have been generated and are maintained with the utmost care. Dash integrates with package managers to generate documentation sets for anything you might need, as well as provide custom documentation sources of their own. Store snippets of code. Easily reuse snippets. Expand snippets in any app. Organize snippets with tags, syntax highlighting, and variable placeholders.
    Starting Price: Free
  • 4
    Portkey

    Portkey

    Portkey.ai

    Launch production-ready apps with the LMOps stack for monitoring, model management, and more. Replace your OpenAI or other provider APIs with the Portkey endpoint. Manage prompts, engines, parameters, and versions in Portkey. Switch, test, and upgrade models with confidence! View your app performance & user level aggregate metics to optimise usage and API costs Keep your user data secure from attacks and inadvertent exposure. Get proactive alerts when things go bad. A/B test your models in the real world and deploy the best performers. We built apps on top of LLM APIs for the past 2 and a half years and realised that while building a PoC took a weekend, taking it to production & managing it was a pain! We're building Portkey to help you succeed in deploying large language models APIs in your applications. Regardless of you trying Portkey, we're always happy to help!
    Starting Price: $49 per month
  • 5
    TeamStation

    TeamStation

    TeamStation

    We are an AI-automated turnkey IT workforce solution in a box that is indefinitely scalable and payments-enabled. We are democratizing how U.S. companies go nearshore without the high vendor costs and security risks. Use our system to predict talent costs to bring new business objectives to market and the amount of aligned talent across the LATAM region. AccessInstantly access a dedicated and influential senior recruitment staff team that understands the talent market and your business technologies. Your dedicated engineering managers validate and score technical capabilities among video-recorded specialized tests for best alignment. Automate your personalized onboarding process for all roles across multiple LATAM countries. We procure and prepare dedicated devices and ensure all staff have access to all the tools and documentation from day one to hit the ground running. Quickly address top performers and those who yearn to expand their capabilities.
    Starting Price: $25 per month
  • 6
    Codesphere

    Codesphere

    Codesphere

    Codesphere transforms deployment into a developer-centric self-service experience, reducing time-to-market and costs. The traditional separation between development and operation leads to a "throw it over the wall" mentality. Developers hand off code to ops without understanding how to deploy their code & keep it running. Codesphere takes care of cloud provisioning, allowing for developer-centered workflows. It eliminates the wall by enabling developers to manage their own infrastructure needs end-to-end. Deploy anything from simple frontends to multi-service production landscapes and LLMs, including zero config autoscaling, replicas, and managed services. Codesphere has a 99,9% uptime, making your production ready before your 1st deploy. We work with enterprise teams around the globe to get their software teams to the next level. Codesphere utilizes a rootless zero-trust architecture, limiting exposure to attacks.
    Starting Price: $1 per month
  • 7
    NXLog

    NXLog

    NXLog

    Achieve complete security observability with powerful insights from your log data. Improve your infrastructure visibility and enhance threat prevention with a versatile multi-platform tool. With support for over 100 operating system versions and more than 120 configurable modules, gain comprehensive insights and increased security. Cut the cost of your SIEM solution by reducing noisy and unnecessary log data. Filter events, truncate unused fields, and remove duplicates to increase the quality of your logs. Collect and aggregate logs from systems across the entire breadth of your organization with a single tool. Reduce complexity in managing security-related events and decrease detection and response times. Empower your organization to meet compliance requirements by centralizing some logs in an SIEM and archiving others in your long-term storage. NXLog Platform is an on-premises solution for centralized log management, with versatile processing.
  • 8
    SaaSitive

    SaaSitive

    SaaSitive

    SaaSitive offers a comprehensive, step-by-step tutorial guiding developers through the process of building and deploying a real Software as a Service (SaaS) application from scratch using React and Django. The tutorial covers essential aspects of web application development, including frontend implementation with React and Redux in TypeScript, and backend development with Django and the Django Rest Framework in Python. It provides detailed instructions on user authentication processes such as login, logout, registration, email verification, and account management. Additionally, the course demonstrates how to integrate payment vendors like Paddle to accept monthly subscriptions, utilize Celery for background tasks related to data gathering, and implement data visualization on both private and public dashboards. Advanced topics include anomaly detection using machine learning models, setting up email notifications with alarms and warnings, and ensuring secure deployment to the cloud.
    Starting Price: $199 one-time payment
  • 9
    SafeKit

    SafeKit

    Eviden

    Evidian SafeKit is a high-availability software solution designed to ensure the redundancy of critical applications on Windows and Linux platforms. It provides an all-in-one approach by integrating load balancing, synchronous real-time file replication, automatic application failover, and automated failback after a server failure, all within a single software product. This eliminates the need for additional hardware components such as network load balancers or shared disks, as well as the necessity for enterprise editions of operating systems and databases. SafeKit's software clustering facilitates the creation of mirror clusters with real-time data replication and failover, farm clusters with load balancing and failover, and advanced architectures like farm+mirror clusters and active-active clusters. Its shared-nothing architecture simplifies deployment, even in remote sites, by avoiding the complexities associated with shared disk clusters.
  • 10
    AWS Marketplace
    AWS Marketplace is a curated digital catalog that enables customers to discover, purchase, deploy, and manage third-party software, data products, AI agents, and services directly within the AWS ecosystem. It provides access to thousands of listings across categories like security, machine learning, business applications, and DevOps tools. With flexible pricing models such as pay-as-you-go, annual subscriptions, and free trials, AWS Marketplace simplifies procurement and billing by integrating costs into a single AWS invoice. It also supports rapid deployment with pre-configured software that can be launched on AWS infrastructure. This streamlined approach allows businesses to accelerate innovation, reduce time-to-market, and maintain better control over software usage and costs.
  • 11
    Nutanix Karbon Platform Services
    Karbon Platform Services (KPS) by Nutanix is a Kubernetes-based multicloud Platform-as-a-Service (PaaS) designed to accelerate the development and deployment of microservices-based applications across any cloud. It offers a rich set of managed services, including Kubernetes applications (Containers-as-a-Service), serverless functions (Functions-as-a-Service), global data pipelines, streaming data and message bus (Kafka-aaS, NATS-aaS), AI services (Tensorflow-aaS, Openvino-aaS), ingress controller and service mesh (nginx/traefik-aaS, Istio-aaS), application monitoring and alerting (Prometheus-aaS), and log forwarding. KPS provides simple, SaaS-based multicloud operations, allowing operators to benefit from simplified operations and uniform application, data, and security lifecycle management, regardless of the underlying cloud. Developers can write applications once and deploy them across any cloud through the SaaS-based application lifecycle manager.
  • 12
    HoverNotes

    HoverNotes

    HoverNotes

    HoverNotes is a Chrome extension that transforms video tutorials from platforms like YouTube, Udemy, Coursera, and Bilibili into distraction-free, AI-generated Markdown notes stored directly in your Obsidian (or any local) vault. It watches the video in real time, capturing key concepts, code snippets, equations, diagrams, and timestamped screenshots, surpassing transcript-only tools by understanding visual content. It presents a split-view learning environment, removing ads and recommendations while letting users edit notes as they generate, ensuring improved retention and accuracy. With full local-first storage and Obsidian integration, it gives users complete control over their knowledge. The free plan includes basic features with 20 minutes of AI processing, while paid tiers unlock hours of AI note-taking, advanced summaries, priority support, and unlimited use.
  • 13
    Societeinfo

    Societeinfo

    Societeinfo

    Societeinfo’s Web Data module gives access to France’s most comprehensive web-to-SIREN repository, scraping and indexing millions of websites and social profiles linked to over 1.3 million SIREN numbers and updated daily with full GDPR compliance. Users can retrieve URLs, site descriptions, primary keywords, technology stacks (CMS, servers, ecommerce platforms, analytics, and marketing tools), social media accounts, and key metrics (follower counts, domain age, Alexa rank) across LinkedIn, Facebook, and Twitter. Intelligent filters enable precise segmentation by technology, web performance indicators, social presence, and geolocation, while natural-language and API-driven search, autocomplete, and high-volume services streamline prospecting workflows. Results can be enriched directly in CRMs via automated mapping, embedded modules, or exports to CSV. Customizable dashboards and real-time monitoring empower sales, marketing, and CRM teams to identify, qualify, and target prospects.
    Starting Price: €39 per month
  • 14
    Netacea Bot Management
    At Netacea we understand bot behaviour better than anyone else, thanks to a pioneering server-side approach to detection and mitigation. Our approach guarantees quick and easy implementation of our technology and enables us to support a wide range of integrations. This ensures comprehensive coverage against malicious bots across your website, mobile apps and APIs, without detriment to your website infrastructure, reliance on hardware or disruptive code changes. We quickly distinguish automated bots from humans to prioritize genuine users, with our team of experts and revolutionary, machine learning powered Intent Analytics™ engine at the heart of the solution. Netacea works hand-in-hand with your in-house security functions from implementation, through to providing accurate detection and empowering you with actionable threat intelligence.
  • 15
    wolfSSL

    wolfSSL

    wolfSSL

    wolfSSL is an open source internet security company who's primary product is the wolfSSL embedded SSL Library. Its primary users are programmers building security functionality into their applications and devices. wolfSSL employs the dual licensing model, like MySQL, so it is available under commercial license terms for our commercial users and open source for the open source community. Support and consulting are also available from wolfSSL. wolfSSL is the most popular SSL/TLS security option for the IoT. We secure devices against the IoT's most prevalent threat vector, which is the MITM (man in the middle) attack. wolfSSL is also popular for use in heavy load server side or cloud environments, where cryptography performance is vital. Government applications also consume wolfSSL embedded SSL, as it is FIPS 140-2 enabled. Over 2 Billion applications and devices are secured with wolfSSL products.
  • 16
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 17
    MaxPatrol

    MaxPatrol

    Positive Technologies

    MaxPatrol is made for managing vulnerabilities and compliance on corporate information systems. Penetration testing, system checks, and compliance monitoring are at the core of MaxPatrol. Together, these mechanisms give an objective picture of the security stance across IT infrastructure as well as granular insight at the department, host, and application level, precisely the information needed to quickly detect vulnerabilities and prevent attacks. MaxPatrol makes it a cinch to keep an up-to-date inventory of IT assets. View information about network resources (network addresses, OS, available network applications and services), identify hardware and software in use, and monitor the state of updates. Best of all, it sees changes to your IT infrastructure. MaxPatrol doesn't blink as new accounts and hosts appear, or as hardware and software are updated. Information about the state of infrastructure security is quietly collected and processed.
  • 18
    Solus

    Solus

    Solus

    Solus is an operating system that is designed for home computing. Every tweak enables us to deliver a cohesive computing experience. Solus provides a multitude of experiences that enable you to get the most out of your hardware. From our flagship Budgie experience for modern devices to the more traditional MATE experience for lower-end devices, Solus aims to provide the best experience for your device. Solus ships with a variety of software out of the box so you can get going without a lot of setup fuss. Easily manage all your documents, music, photos, videos, and more with Files. We ship with Mozilla Firefox, a fast and secure web browser. Pop some popcorn and sit down to your favorite digital content via GNOME MPV. Play and manage your music and podcasts, as well as tune into online radio with Rhythmbox. No more hunting around for apps! Install and manage them right from our Software Center.
  • 19
    Circonus IRONdb
    Circonus IRONdb makes it easy to handle and store unlimited volumes of telemetry data, easily handling billions of metric streams. Circonus IRONdb enables users to identify areas of opportunity and challenge in real time, providing forensic, predictive, and automated analytics capabilities that no other product can match. Rely on machine learning to automatically set a “new normal” as your data and operations dynamically change. Circonus IRONdb integrates with Grafana, which has native support for our analytics query language. We are also compatible with other visualization apps, such as Graphite-web. Circonus IRONdb keeps your data safe by storing multiple copies of your data in a cluster of IRONdb nodes. System administrators typically manage clustering, often spending significant time maintaining it and keeping it working. Circonus IRONdb allows operators to set and forget their cluster, and stop wasting resources manually managing their time series data store.
  • 20
    KickWeb Server
    Easy and automatic installation, everything is pre-configured, low memory consumption, low CPU usage, capable of serving requests simultaneously, not need of root access though you can use root as well, and completely free of charge along with no advertisement. This is the best Android web server. Internal memory should not be less than 50MB! Lighttpd 1.4.34, PHP 5.5.9, MySQL 5.1.62,, MSMTP 1.4.31, phpMyAdmin 4.1.10, and Nginx 1.5.11. One thing you should remember is starting server before entering configurations.
  • 21
    Instainer

    Instainer

    Instainer

    Instainer is a Docker container hosting service which allows run instantly any Docker container on the cloud with Heroku-style Git deployment. When we started migration to Docker in our company, we felt that something was still missing. Docker brought amazing capabilities to our DevOps team, but still there wasn't any service to click and run any Docker containers instantly. We developed Instainer for engineers who want to run Docker containers on the cloud instantly. Your feedbacks & thoughts are really welcome. Instainer provides Heroku-style Git deployment for your containers. After running your container; Instainer automatically creates Git repository for you and pushes your container’s data into this repository. You can easily clone and change your data using Git. The WordPress rich content management system can utilize plugins, widgets, and themes.
  • 22
    CrowdSec

    CrowdSec

    CrowdSec

    CrowdSec is a free, open-source and collaborative IPS to analyze behaviors, respond to attacks & share signals across the community, outnumbering cybercriminals all together. Set up your own intrusion detection system. Apply behavior scenarios to identify cyber threats. Share and benefit from a crowdsourced and curated cyber threat intelligence system. Define the type of remediation you want to apply and where. Leverage the community’s IP blocklist and automate your security. CrowdSec is designed to run seamlessly on virtual machines, bare-metal servers, containers or to be called directly from your code with our API. Our strength comes from our cybersecurity community that is burning cybercriminals’ anonymity. By sharing IP addresses that aggressed you, you help us curate and redistribute a qualified IP blocklist to protect everyone. CrowdSec is 60x faster than tools like Fail2ban and can parse massive amounts of logs in no time.
  • 23
    BlueOnyx

    BlueOnyx

    BlueOnyx Shop

    BlueOnyx is a Linux distribution (based on CentOS and/or Scientific Linux) that aims at delivering a turnkey server appliance for web hosting. It comes with a web-based GUI interface that allows you (and your email, FTP and web hosting clients!) to manage most aspects of the server, its sites and accounts through a browser-based interface. It is open-source software, released under a Sun-modified BSD license. BlueOnyx is a modernized fork of BlueQuartz and has been developed by Solarspeed. A lot of improvements and enhancements went into BlueOnyx over the years and we are committed to developing it further. BlueOnyx includes reseller management, support for Java Servlet Pages, built-in email statistics, Imapsync email migrations, SSH key/cert management, phpMyAdmin for you and your web hosting clients and provisions to automatically create MySQL databases and users for each virtual site.
  • 24
    Flockport

    Flockport

    Flockport

    One-click migration from your existing VM workloads. Get instant mobility of your applications across on-prem and clouds. Why settle for one-way cloud migration when you can have continuous mobility. Migrate from on-prem to the cloud, across clouds, or back. Embrace the cloud your way. Business continuity needs application mobility and a multi-cloud approach. Leave behind long drawn out and expensive VM migration projects. Instashift gives you single-click automation. No need to adopt complex approaches. Migrate your VMs complete with applications, databases, and states. Benefit from continuous mobility for your instashifted applications. Move to the cloud or back to on-prem in a click. Need to move thousands of VMs. Instashift gives you an automated solution that works seamlessly. A new innovation platform for sovereign and emerging cloud providers to deliver the same capabilities and flexibility users have come to expect from the public cloud.
  • 25
    Flux

    Flux

    Flux CD

    Flux is a set of continuous and progressive delivery solutions for Kubernetes that are open and extensible. The latest version of Flux brings many new features, making it more flexible and versatile. Flux is a CNCF Incubating project. Flux and Flagger deploy apps with canaries, feature flags, and A/B rollouts. Flux can also manage any Kubernetes resource. Infrastructure and workload dependency management are built-in. Flux enables application deployment (CD) and (with the help of Flagger) progressive delivery (PD) through automatic reconciliation. Flux can even push back to Git for you with automated container image updates to Git (image scanning and patching). Flux works with your Git providers (GitHub, GitLab, Bitbucket, can even use s3-compatible buckets as a source), all major container registries, and all CI workflow providers. Kustomize, Helm, RBAC, and policy-driven validation (OPA, Kyverno, admission controllers) so it simply falls into place.
  • 26
    LibreNMS

    LibreNMS

    LibreNMS

    Welcome to LibreNMS, a fully featured network monitoring system that provides a wealth of features and device support. Automatically discover your entire network using CDP, FDP, LLDP, OSPF, BGP, SNMP, and ARP. The highly flexible alerting system, notify via email, IRC, Slack, and more. A full API to manage, graph and retrieve data from your install. Generate bandwidth bills for ports on your network based on usage or transfer. Stay up to date automatically with bug fixes, new features, and more. Horizontal scaling to grow with your network. Native iPhone App is available which provides core functionality. Native Android App is available which provides core functionality. Extensive device support, mobile-friendly web UI, Unix agent. An online demo is available for you to try before installing. Support for both Apache and Nginx web servers. Automatic discovery and customizable alerting.
  • 27
    Enso

    Enso

    Enso Security

    Enso is transforming application security by empowering organizations to build, manage and scale their AppSec programs. Its Application Security Posture Management (ASPM) platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build a simplified, agile and scalable application security program without interfering with development. Enso has been recognized with numerous awards including the 2022 Excellence Awards, Globee Awards, and Forbes Top 20 Cybersecurity Startups to Watch.
  • 28
    Meshery

    Meshery

    Meshery

    Describe all of your cloud native infrastructure and manage as a pattern. Design your service mesh configuration and workload deployments. Apply intelligent canary strategies and performance profiles with service mesh pattern management. Assess your service mesh configuration against deployment and operational best practices with Meshery's configuration validator. Validate your service mesh's conformance to Service Mesh Interface (SMI) specifications. Dynamically load and manage your own WebAssembly filters in Envoy-based service meshes. Service mesh adapters provision, configure, and manage their respective service meshes.
  • 29
    Theom

    Theom

    Theom

    Theom is a cloud data security product that discovers and protects all data in cloud stores, APIs, and message queues. Like a bodyguard who closely follows and protects a high-value asset, Theom ensures controls follow the data regardless of how it is stored or accessed. Theom identifies PII, PHI, financial information, and trade secrets using agentless scanning and NLP classifiers, which support custom taxonomies. Theom discovers dark data, data that are never accessed, and shadow data, data whose security posture is different from the primary copy. Theom pinpoints confidential data, e.g., developer keys, in APIs and message queues. Theom estimates the financial value of data to help prioritize risks. Theom maps the relationships between data, access identities, and security attributes to uncover the risks to data. Theom shows how high-value data is accessed by identities (users and roles). Security attributes including user location, atypical access patterns, etc.
  • 30
    LogMan.io

    LogMan.io

    TeskaLabs

    TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. LogMan.io ensures regulatory compliance with legislation covering cyber security and GDPR. Logman.io can grow with your needs. It can be easily upgraded to TeskaLabs SIEM. You can promptly get a central essential overview of the entire IT infrastructure, a full-scale tool for threat modeling, risk management, and vulnerability scanning.