Best IT Management Software for Puppet Enterprise - Page 2

Compare the Top IT Management Software that integrates with Puppet Enterprise as of November 2025 - Page 2

This a list of IT Management software that integrates with Puppet Enterprise. Use the filters on the left to add additional filters for products that have integrations with Puppet Enterprise. View the products that work with Puppet Enterprise in the table below.

  • 1
    Sweagle

    Sweagle

    Sweagle

    The easy way to control configuration data. Firstly, Sweagle makes it easy to manage all the configuration data from infra, applications and environments into a consolidated data model with full life cycle support. Secondly, Sweagle handles who sees what with intelligent role-based access controls and automatically encrypts secrets or sensitive data - so it never enters a release environment. Last, but not least, with zero effort on your part, you get continuous and automatic validation of configuration data from absolutely any environment, tool or team. It's a fact that no matter the industry, configuration data matters. Sweagle is super successful at bringing configuration data order to complex, global organizations like banking, insurance and telecommunications. Think about it... configuration data is everywhere. If you want to release more quickly, frequently and accurately, you have to manage, test and validate all that data.
  • 2
    Maestro

    Maestro

    MaestroDev

    DevOps Orchestration is the practice of composing any tasks across the SDLC and Operations functions, with any choice of tools and environments, and with the process logic centralized away from the individual tools themselves. The Maestro product includes plug-ins, pre-built tasks, and templates for continuous integration, test automation, release management, DevOps visibility, automated deployment, and continuous delivery. Whether your DevOps tools are on-premise or cloud services (or both!), Maestro effortlessly connects workflow tasks between your tools for Continuous Integration and Continuous Deployment. The workflow "CompositionTM" above shows a Git checkout, Jenkins build, Sonar code check, testing steps, and then custom notifications. Remove manual tasks from your custom release process, and create a precise, repeatable set of tasks that execute reliably, every time.
  • 3
    Compass

    Compass

    Cobalt Iron

    Forget the days of managing data protection events through multiple, disconnected backup products. With Compass, you can set policies, view operations, and track granular performance for all your workloads. Compass is secure by design and the only data backup solution endorsed by Sheltered Harbor for both on-prem and cloud. It's architected to eliminate vulnerabilities in the backup process that expose data to cyberattack. If disaster strikes, your backup is ready to help you recover immediately. Born in the cloud, the Compass Architecture is designed to take full advantage of progressive technologies such as analytics, SaaS, multi-cloud, and virtualization. The Commander is an easy-to-use web dashboard providing a simple and intuitive user experience, while the Analytics Engine delivers the flexibility and insight required for today’s enterprise data protection.
  • 4
    MicroStack

    MicroStack

    Canonical

    Install and run OpenStack on Linux in minutes. Made for developers and great for edge, IoT, and appliances. A full OpenStack in a single snap package. MicroStack is an upstream multi-node OpenStack deployment which can run directly on your workstation. Although made for developers, it is also suitable for edge, IoT and appliances. Grab MicroStack from the Snap Store and get your OpenStack running right away. Get a full OpenStack system running in minutes. Runs safely on your laptop with state of the art isolation. Pure upstream OpenStack delivered to your laptop. Includes all key OpenStack components: Keystone, Nova, Neutron, Glance, and Cinder. All the cool things you probably want to try on a small, standard OpenStack are all built-in. Use MicroStack in your CI/CD pipelines and get on with your day without headaches. MicroStack requires at least 8 GB RAM and a multi-core processor.
  • 5
    Mir Display Server
    Whether you want an information kiosk, digital signage display, in-car entertainment stack, or home automation interface, Mir on Ubuntu is your fastest path to deployment. Mir is a system-level component that can be used to unlock next-generation user experiences. It runs on a range of Linux powered devices including traditional desktops, IoT and embedded products. Mir is a replacement for the X window server system, commonly used on Linux desktop devices. It allows device makers and desktop users to have a well-defined, efficient, flexible, and secure platform for their graphical environment. Historically, graphical user interfaces Linux have been powered by the X windowing system. X has a long and successful history and it has served the purposes of both system level and application level UI well for more than 3 decades. However, users nowadays expect a more consistent, integrated and secure user experience than is possible to offer on top of the X windowing system.
  • 6
    Userify

    Userify

    Userify

    Manage team SSH keys across clouds and continents using Ansible, Chef, Puppet, Salt, CloudFormation, Terraform, or custom scripts. Userify works smoothly across multiple, geographically isolated clouds and high-latency networks. Hardened. Curve 25519 and bcrypt. PCI-DSS and HIPAA Compliant. AICPA SOC-2 Type 1 certified. Deployed by more than 3,500 companies on every populated continent. Userify SSH Key logins are passwordless: More secure. More convenient. Userify is the only key manager designed to operate on the open Internet. How do you de-provision admins when they leave? With Userify, it's one click. Userify is AICPA SOC-2 Type 1 certified and has achieved PCI-DSS and HIPAA compliance. Userify helps you get compliant with PCI-DSS Requirement 8, even on cloud systems, protect PII, and ban ec2-user forever. Userify helps you get compliant with the HIPAA Security Rule and protect critical healthcare systems and PHI by limiting internal access and authority.
  • 7
    Cmd

    Cmd

    Cmd

    A powerful yet lightweight security platform that provides insightful observability, proactive controls, threat detection and response for your Linux infrastructure in the cloud or datacenter. Your cloud infrastructure is a massive multi-user environment. Don’t protect it with security solutions originally built for endpoints. Think beyond logging and analytics solutions that lack the necessary context and workflows for true infrastructure security. Cmd’s infrastructure detection and response platform is optimized for the needs of today’s agile security teams. View system activity in real time or search through retained data, aided by rich filters and triggers. Leverage our eBPF sensors, contextual data model and intuitive workflows to gain insight into user activity, running processes and access to sensitive resources. No advanced degree in Linux administration required. Create guardrails and controls around sensitive actions to complement traditional access management.
  • 8
    Pica8 PICOS
    The one-of-a-kind PICOS open NOS with tightly coupled control planes gives network operators surgical, non-disruptive control of their enterprise applications, deep and dynamic traffic monitoring, and even attack mitigation, all in real time. There’s no better way to implement zero-trust networking and software-defined perimeters than PICOS. Our flagship open network operating system installs on 1G- to 100G-interface open switches from a broad array of Tier 1 manufacturers. This fully featured license offers the most comprehensive support for enterprise features on the market. It includes the Debian Linux distribution, with an unmodified kernel for maximum DevOps programmability. Enterprise Edition also includes AmpCon, an Ansible-based automation framework that couples Zero-Touch Provisioning (ZTP) with the Open Network Install Environment (ONIE) to simplify installation and operation of open network switches across the enterprise.
  • 9
    Kovair DevOps

    Kovair DevOps

    Kovair Software

    Leverage Kovair’s VSMP DevOps solution with the CI/CD functionality to deploy applications to any platform at any scale. The pace of delivery in today’s software world has never been faster and more competitive. IT teams of organizations are always getting challenged with increasing demands both from the market as well as their own lines of Business. These demands have raised the need for implementation of Continuous Delivery (CD) and DevOps practices. Organizations need to implement solutions for achieving faster delivery in a more predictable, scalable and productive way by automating their delivery process with complete visibility to every stage of the release process in a collaborative manner. Implement end-to-end Continuous Delivery process breaking all silos by integrating all your existing tools.
  • 10
    Ozone

    Ozone

    Ozone

    Ozone platform helps enterprises to ship modern applications quickly, securely and reliably. Ozone removes the unwanted headache of managing too many DevOps tools and makes it super easy for anyone to deploy applications on Kubernetes clusters. Just integrate all your existing DevOps tools and automate your application delivery process end-to-end. Accelerate deployments with automated pipeline workflows and on demand infrastructure management with zero downtime. Prevent business losses by enforcing governance and compliance policy for app deployments at scale. Single pane of glass where engineering, DevOps and Security teams can collaborate on application releases in realtime.
  • 11
    HostAccess

    HostAccess

    Perforce

    HostAccess is PC terminal emulation software. It offers a suite of terminal emulation tools for Microsoft Windows users. This allows secure access to various platforms, including Linux, Unix, IBM, Windows, etc. The main usage of the HostAccess is to connect to PICK (multivalue) system, such as UniVerse, UniData, D3, ONware, etc., and use own package of programs written in PICK Basic. These programs provide APIs for data exchange and expansive GUI capabilities. Produce reports quickly and integrate data with Windows applications. Connect to multiple systems within one integrated environment. HostAccess offers all the key terminal emulation software features you need in a single page. So, whether you’re looking for asynchronous/synchronous connections, server-based administration, concurrent users, or multiple session access, HostAccess is an ideal solution for you.
  • 12
    Opsera

    Opsera

    Opsera

    You choose your tools, we take care of the rest. Put together the perfect CI/CD stack that fits your organization’s goals with zero vendor lock-in. ‍Eliminate manual scripts and stop building toolchain automation. Free your engineers to focus on your core business. Pipeline workflows follow a declarative model so you focus on what is required — not how it’s accomplished — including: software builds, security scans, unit testing, and deployments. With Blueprints, diagnose any failures from within Opsera using a console output of every step of your pipeline execution. Comprehensive software delivery analytics across your CI/CD process in a unified view — including Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. ‍Contextualized logs for faster resolution and improved auditing and compliance.
  • 13
    Bionic

    Bionic

    Bionic

    Bionic uses an agentless approach to collect all of your application artifacts and provides a deeper level of application visibility that your CSPM tool cannot. Bionic continuously collects your application artifacts and creates an inventory of all of your applications, services, message brokers, and databases. Bionic integrates as a step in CI/CD pipelines and detects critical risks in the application layer and code, so teams can validate security posture in production. Bionic analyzes your code, performing checks for critical CVEs, and provides deeper insights into the blast radius of potential attacks surfaces. Bionic prioritizes code vulnerabilities based on the context of the overall application architecture. Create customized policies to prioritize architecture risk based on your company's security standards.
  • 14
    HPE OneView

    HPE OneView

    Hewlett Packard Enterprise

    Integrated IT infrastructure management software that automates IT operations, HPE OneView simplifies infrastructure lifecycle management across computing, storage, and networking. Use automation as the foundation of your modern data center when you transform servers, storage, and networking into a software-defined infrastructure. HPE OneView takes a software-defined approach to manage IT infrastructure with efficient workflow automation, a modern dashboard, and a comprehensive partner ecosystem. Software-defined intelligence enables automated provisioning with repeatable templates that ensure high reliability, consistency, and control, leading to lower operating expenses. Easily provision and manage physical infrastructure using HPE OneView’s software-defined templates and APIs to define and automate infrastructure configuration and lifecycle operations. IT Infrastructure automation streamlines IT operations and improves staff productivity.
  • 15
    OpsMx Enterprise for Spinnaker
    OES is highly available and scalable for increasing deployment workloads, and extensible to integrate with multiple SDLC tool chains. OES offers easy-to-define custom stages to parallely deploy into any number of targets and save time. Action such as rollback or roll forward or stopping of all the parallel deployments is easy and can be done with a click. Automate repeated activities in your SDLC process by the ability to create as many child pipelines and invoke them in the parent pipeline. OES is modular and can act as a central CD tool for many enterprises because it uses an API-based architecture. Developers across the team can easily integrate external services with Spinnaker services for deployment orchestration.
  • 16
    DROPS

    DROPS

    DROPS

    DROPS is a release management tool designed to simplify, secure, and centralize the deployment of applications across data centers, hybrid, and multi-cloud infrastructures. It supports a wide range of platforms, integrates seamlessly with various CI/CD pipelines, and offers both agent-based and agentless operations. With features like full-stack release management, automated infrastructure provisioning, and 24/7 availability, DROPS aims to streamline deployment processes and ensure consistent, reliable delivery. The tool is flexible enough to manage both legacy and modern applications, catering to diverse enterprise needs. Select agent-based or agentless operation. No need for agent installation and management. DROPS adapts to your configuration and if agents are needed, they are provisioned automatically. Plan and organize your application deployment from the web console with no scripting needed. Ease collaboration between stakeholders and technical teams.
  • 17
    Cutover

    Cutover

    Cutover

    The Cutover platform enables enterprises to simplify complexity, streamline work, and increase visibility. Cutover’s AI-powered automated runbooks connect teams, technology, and systems, increasing efficiency and reducing risk in IT disaster and cyber recovery, cloud migration, release management, and technology implementation. As a centralized system of execution, Cutover differentiates itself with scalable and proven dynamic, automated runbook technology that transforms enterprise IT operations with a new way of working. Cutover enables the creation of a template library of comprehensive, executable, and auditable runbooks covering the entire IT infrastructure. Cutover is trusted by world-leading institutions, including the three largest US banks and three of the world’s five largest investment banks.
  • 18
    Canonical Juju
    Better operators for enterprise apps with a full application graph and declarative integration for both Kubernetes and legacy estate. Juju operator integration allows us to keep each operator as simple as possible, then compose them to create rich application graph topologies that support complex scenarios with a simple, consistent experience and much less YAML. The UNIX philosophy of ‘doing one thing well’ applies to large-scale operations code too, and the benefits of clarity and reuse are exactly the same. Small is beautiful. Juju allows you to adopt the operator pattern for your entire estate, including legacy apps. Model-driven operations dramatically reduce maintenance and operations costs for traditional workloads without re-platforming to K8s. Once charmed, legacy apps become multi-cloud ready, too. The Juju Operator Lifecycle Manager (OLM) uniquely supports both container and machine-based apps, with seamless integration between them.