Alternatives to Amazon Elastic Container Registry (ECR)
Compare Amazon Elastic Container Registry (ECR) alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Amazon Elastic Container Registry (ECR) in 2024. Compare features, ratings, user reviews, pricing, and more from Amazon Elastic Container Registry (ECR) competitors and alternatives in order to make an informed decision for your business.
-
1
Google Cloud Platform
Google
Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging. -
2
Container Registry
8gears
A no frills Harbor based Container Registry Service for teams, individuals, and Software Vendor looking for ways to distribute software as container images.Starting Price: $49 per month -
3
Docker
Docker
Docker takes away repetitive, mundane configuration tasks and is used throughout the development lifecycle for fast, easy and portable application development, desktop and cloud. Docker’s comprehensive end-to-end platform includes UIs, CLIs, APIs and security that are engineered to work together across the entire application delivery lifecycle. Get a head start on your coding by leveraging Docker images to efficiently develop your own unique applications on Windows and Mac. Create your multi-container application using Docker Compose. Integrate with your favorite tools throughout your development pipeline, Docker works with all development tools you use including VS Code, CircleCI and GitHub. Package applications as portable container images to run in any environment consistently from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE and more. Leverage Docker Trusted Content, including Docker Official Images and images from Docker Verified Publishers.Starting Price: $7 per month -
4
Run advanced apps on a secured and managed Kubernetes service. GKE is an enterprise-grade platform for containerized applications, including stateful and stateless, AI and ML, Linux and Windows, complex and simple web apps, API, and backend services. Leverage industry-first features like four-way auto-scaling and no-stress management. Optimize GPU and TPU provisioning, use integrated developer tools, and get multi-cluster support from SREs. Start quickly with single-click clusters. Leverage a high-availability control plane including multi-zonal and regional clusters. Eliminate operational overhead with auto-repair, auto-upgrade, and release channels. Secure by default, including vulnerability scanning of container images and data encryption. Integrated Cloud Monitoring with infrastructure, application, and Kubernetes-specific views. Speed up app development without sacrificing security.
-
5
JFrog Container Registry
JFrog
The world’s most advanced, powerful, hybrid Docker and Helm registry. Power your world of Docker without limits. The JFrog Container Registry is the most comprehensive and advanced registry in the market today, supporting Docker containers and Helm Chart repositories for your Kubernetes deployments. Use it as your single access point to manage and organize your Docker images, while avoiding Docker Hub throttling or retention issues. JFrog provides reliable, consistent, and efficient access to remote Docker container registries with integration to your build ecosystem. Develop and deploy your way. Supports your current and future business model with on-prem / self-hosted, hybrid, and multi-cloud environments on your choice of AWS, Microsoft Azure, and Google Cloud. Built on JFrog Artifactory’s proven track record of power, stability, and resilience to easily manage and deploy your Docker images and provide your DevOps teams with full control over access and permissions.Starting Price: $98 per month -
6
Harbor
Harbor
CNCF Harbor is an open-source project that enhances container registry capabilities with a focus on security and compliance. It builds upon basic registry functionality by offering features such as vulnerability scanning to identify known security weaknesses in images, role-based access control for granular image access management, image signing to ensure authenticity and prevent tampering, and replication for efficient syncing of images across multiple other registries. Harbor strengthens the security of the image management process. It can be particularly beneficial for organizations that prioritize security and compliance in their containerized environments. However, users should be aware that setting up and maintaining Harbor can require additional effort and expertise compared to simpler container registries. -
7
Oracle Cloud Infrastructure Container Registry is an open standards-based, Oracle-managed Docker registry service for securely storing and sharing container images. Engineers can easily push and pull Docker images with the familiar Docker Command Line Interface (CLI) and API. To support container lifecycles, Registry works with Container Engine for Kubernetes, Identity and Access Management (IAM), Visual Builder Studio, and third-party developer and DevOps tools. Work with Docker images and container repositories using familiar Docker CLI commands and Docker HTTP API V2. Oracle takes care of operating and patching the service, so that developers can focus on building and deploying containerized applications. Built using object storage, Container Registry provides data durability and high service availability with automatic replication across fault domains. Oracle does not charge separately for the service. Users pay only for the associated storage and network resources they consume.
-
8
With Container Registry your team can manage Docker images, perform vulnerability scans and decide who accesses what resources with precise access control; All in one place. Existing CI / CD integrations allow you to configure fully automated Docker pipelines for information without delay. Get access to private and secure Docker image storage on Google Cloud Platform in minutes. Control who can access, view or download images. Get consistent uptime on a protected infrastructure with Google security. Build and push images to the private registry automatically when you commit code to Cloud Source Repositories, GitHub, or Bitbucket. Easily configure CI / CD pipelines with Cloud Build integration or deploy directly to Google Kubernetes Engine, App Engine, Cloud Functions, or Firebase. Automatically build containers on code or tag changes to a repository. Search across previous builds from the UI or view build details like a trigger, source, steps, and logs.
-
9
Mirantis Secure Registry
Mirantis
Mirantis Secure Registry (formerly Docker Trusted Registry) provides an enterprise grade container registry solution that can be easily integrated to provide the core of an effective secure software supply chain. Enterprise-grade security Centralize control for container images: Store, share, and manage images from a secure docker registry under your control, enabling developers to use and run only approved images. Protect and verify: Scan images against a continuously updated vulnerability database, and validate with cryptographic signing. Secure and accelerate CI/CD workflows: Automatically promote images from test to prod for a secure, efficient software pipeline—all while maintaining policy-based controls. -
10
Alibaba Cloud Container Registry
Alibaba Cloud
Container Registry allows you to manage images throughout the image lifecycle. It provides secure image management, stable image build creation across global regions, and easy image permission management. This service simplifies the creation and maintenance of the image registry and supports image management in multiple regions. Combined with other cloud services such as container service, container registry provides an optimized solution for using Docker in the cloud. Provides an intranet URL of the image repository for each region. You can visit this URL to download images without using traffic. Builds services automatically, in regions outside China, and in stages. Allows you to easily scan the image security status and provides multi-dimensional vulnerability reports. Provides an easy Docker-based continuous integration and continuous delivery solution. Easy operations allow you to quickly start using the service at low management and maintenance costs.Starting Price: $113 per month -
11
Tencent Container Registry
Tencent
Tencent Container Registry (TCR) offers secure, dedicated, and high-performance container image hosting and distribution service. You can create dedicated instances in multiple regions across the globe and pull container images from the nearest region to reduce pulling time and bandwidth costs. To guarantee data security, TCR features granular permission management and access control. It also supports P2P accelerated distribution to break through the performance bottleneck due to concurrent pulling of large images by large-scale clusters, helping you quickly expand and update businesses. You can customize image synchronization rules and triggers, and use TCR flexibly with your existing CI/CD workflow to quickly implement container DevOps. TCR instance adopts containerized deployment. You can dynamically adjust the service capability based on actual usage to manage sudden surges in business traffic. -
12
Yandex Container Registry
Yandex
Docker images are placed in fault-tolerant storage. Automatic replication is configured for all data, each replica changes when Docker images are edited, created, or deleted. The service provides containers for Linux and Windows OS. Use them however you want, running on your local machine or on a Yandex Compute Cloud VM. High-speed Docker image operations without expenses for external traffic, Docker image registries are hosted in the same data centers where your cloud infrastructure is deployed. Docker images are transmitted via HTTPS. You choose who can view, pull, push, or delete them. You use a Docker image and we take care of maintaining the infrastructure where your registry is running. You only pay for the space used by your Docker images. You can use the service via the management console, command line interface (CLI), API, or the standard Docker CLI, the service is compatible with the Docker registry HTTP API V2.Starting Price: $0.012240 per GB -
13
Store and distribute container images in a fully managed private registry. Push private images to conveniently run them in the IBM Cloud® Kubernetes Service and other runtime environments. Images are checked for security issues so you can make informed decisions about your deployments. Install the IBM Cloud Container Registry CLI to use the command line to manage your name spaces and Docker images in the IBM Cloud® private registry. View information about potential vulnerabilities and the security of images in the IBM Cloud Container Registry public and private repositories with the IBM Cloud console. Check the security status of container images that are provided by IBM, third parties or that are added to your organization's registry namespace. Advanced capabilities for security compliance insight. Access controls and image signing capabilities. Pre-integration with Kubernetes Service.
-
14
Azure Container Registry
Microsoft
Build, store, secure, scan, replicate, and manage container images and artifacts with a fully managed, geo-replicated instance of OCI distribution. Connect across environments, including Azure Kubernetes Service and Azure Red Hat OpenShift, and across Azure services like App Service, Machine Learning, and Batch. Geo-replication to efficiently manage a single registry across multiple regions. OCI artifact repository for adding helm charts, singularity support, and new OCI artifact-supported formats. Automated container building and patching including base image updates and task scheduling. Integrated security with Azure Active Directory (Azure AD) authentication, role-based access control, Docker content trust, and virtual network integration. Streamline building, testing, pushing, and deploying images to Azure with Azure Container Registry Tasks.Starting Price: $0.167 per day -
15
Red Hat Quay
Red Hat
Red Hat® Quay container image registry provides storage and enables you to build, distribute, and deploy containers. Gain more security over your image repositories with automation, authentication, and authorization systems. Quay is available with OpenShift or as a standalone component. Control access of the registry with multiple identity and authentication providers (including support for teams and organization mapping). Use a fine-grained permissions system to map to your organizational structure. Transport layer security encryption helps you transit between Quay.io and your servers automatically. Integrate with vulnerability detectors (like Clair) to automatically scan your container images. Notifications alert you to known vulnerabilities. Streamline your continuous integration/continuous delivery (CI/CD) pipeline with build triggers, git hooks, and robot accounts. Audit your CI pipeline by tracking API and UI actions. -
16
Slim.AI
Slim.AI
Easily connect your own private registries and share images with your team. Explore the world’s largest public registries to find the right container image for your project. If you don’t know what’s in your containers, you can’t have software security. The Slim platform lifts the veil on container internals so you can analyze, optimize, and compare changes across multiple containers or versions. Use DockerSlim, our open-source project, to automatically optimize your container images. Remove bulky or dangerous packages, so you ship only what you need to produce. Find out how the Slim platform can help your team automatically improve software and supply chain security, tune containers for development, testing, and production, and ship secure container-based apps to the cloud. Accounts are free and there is no charge to use the platform at this time. We're container enthusiasts, not salespeople, so know that your privacy and security are the founding principles of our business. -
17
Dist
Dist
Highly available and super fast artifact repositories and container registries that keep your developers, operations teams, and customers happy and productive. Dist is the simplest and most reliable way to securely distribute Docker container images and Maven artifacts across your team, systems, and customers. Our purpose-built edge network ensures optimal performance, wherever your team and customers are. Dist is fully managed in the cloud. We take care of operations, maintenance, and backups so you can focus on your business. Restrict access to repositories by users and groups. Each user can further compartmentalize their own access using access tokens. All artifacts, container images, and their associated metadata are encrypted at rest and in transit.Starting Price: $39 per month -
18
Nexus Repository Pro
Sonatype
Manage binaries and build artifacts across your software supply chain. Single source of truth for all of your components, binaries, and build artifacts. Efficiently distribute parts and containers to developers. Deployed at more than 100,000 organizations globally. Store and distribute Maven/Java, npm, NuGet, Helm, Docker, P2, OBR, APT, GO, R, Conan components and more. Manage components from dev through delivery: binaries, containers, assemblies, and finished goods. Advanced support for the Java Virtual Machine (JVM) ecosystem, including Gradle, Ant, Maven, and Ivy. Compatible with popular tools like Eclipse, IntelliJ, Hudson, Jenkins, Puppet, Chef, Docker, and more. Deliver innovation 24x7x365 with high availability. A single source of truth for components used across your entire software development lifecycle including QA, staging, and operations. Easily integrate with existing user and access provisioning systems including LDAP, Atlassian Crowd, and more. -
19
Scaleway
Scaleway
The Cloud that makes sense. From high-performance cloud ecosystem to hyperscale green datacenters, Scaleway provides the foundation for digital success. Cloud platform designed for developers & growing companies. All you need to create, deploy and scale your infrastructure in the cloud. Compute, GPU, Bare Metal & Containers. Evolutive & Managed Storage. Network. IoT. The largest choice of dedicated servers to succeed in the most demanding projects. High-end dedicated servers Web Hosting. Domain Names Services. Take advantage of our cutting-edge expertise to host your hardware in our resilient, high-performance and secure data centers. Private Suite & Cage. Rack, 1/2 & 1/4 Rack. Scaleway data centers. Scaleway is driving 6 data centers in Europe and offers cloud solutions to customers in more that 160 countries around the world. Our Excellence team: Experts by your side 24/7 year round Discover how we help our customers to use, tune & optimize their platforms with skilled expert -
20
GitLab
GitLab
GitLab is a complete DevOps platform. With GitLab, you get a complete CI/CD toolchain out-of-the-box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate. GitLab helps teams accelerate software delivery from weeks to minutes, reduce development costs, and reduce the risk of application vulnerabilities while increasing developer productivity. Source code management enables coordination, sharing and collaboration across the entire software development team. Track and merge branches, audit changes and enable concurrent work, to accelerate software delivery. Review code, discuss changes, share knowledge, and identify defects in code among distributed teams via asynchronous review and commenting. Automate, track and report code reviews.Starting Price: $29 per user per month -
21
Portus
Portus
Portus implements the new authorization scheme defined by the latest version of the Docker registry. It allows for fine grained control over all of your images. You decide which users and teams are allowed to push or pull images. Map your company organization inside of Portus, define as many teams as you want and add and remove users from them. Portus provides an intuitive overview of the contents of your private registry. It also features a search capability to find images even faster. User privileges are constantly taken into account, even when browsing the contents of the repository or when performing searches. Keep everything under control. All the relevant events are automatically logged by Portus and are available for analysis by admin users. Non-admin users can also use this feature to keep up with relevant changes. -
22
JFrog Platform
JFrog
Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.Starting Price: $98 per month -
23
Oracle Container Cloud Service (also known as Oracle Cloud Infrastructure Container Service Classic) offers Development and Operations teams the benefits of easy and secure Docker containerization when building and deploying applications. Provides an easy-to-use interface to manage the Docker environment. Provides out-of-the-box examples of containerized services and application stacks that can be deployed in one click. Enables developers to easily connect to their private Docker registries (so they can ‘bring their own containers’). Enables developers to focus on building containerized application images and Continuous Integration/Continuous Delivery (CI/CD) pipelines, not on learning complex orchestration technologies.
-
24
Nexus Container
Sonatype
Deploying containers successfully means balancing robust security practices, agile DevOps team needs, and compliance requirements. Nexus Container does it all — helping your development, security, and operations teams discover, continuously monitor, and fix container vulnerabilities during the entire container lifecycle. We continuously scan during build, monitor images in registries, and run automated tests for security compliance to ensure we catch vulnerabilities early in the container development cycle. If an issue is found, don’t worry, our admission controls and policy enforcement keep vulnerable images from deploying. Containers need advanced network protection for real-time security. Not only do we continuously monitor your containers to identify vulnerabilities and share available fixes once in-production, we’re the only solution that can enforce data loss protection and prevent zero-day malware and network attacks, tunneling, and breaches. -
25
Azure Web App for Containers
Microsoft
It has never been easier to deploy container-based web apps. Just pull container images from Docker Hub or a private Azure Container Registry, and Web App for Containers will deploy the containerized app with your preferred dependencies to production in seconds. The platform automatically takes care of OS patching, capacity provisioning, and load balancing. Automatically scale vertically and horizontally based on application needs. Granular scaling rules are available to handle peaks in workload automatically while minimizing costs during off-peak times. Deploy data and host services across multiple locations with just few mouse clicks. -
26
Secure your container environment on GCP, GKE, or Anthos. Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale. As enterprises create more containerized workloads, security must be integrated at each stage of the build-and-deploy life cycle. Infrastructure security means that your container management platform provides the right security features. Kubernetes includes security features to protect your identities, secrets, and network, and Google Kubernetes Engine uses native GCP functionality—like Cloud IAM, Cloud Audit Logging, and Virtual Private Clouds—and GKE-specific features like application layer secrets encryption and workload identity to bring the best of Google security to your workloads. Securing the software supply chain means that container images are safe to deploy. This is how you make sure your container images are vulnerability free and that the images you build aren't modified.
-
27
Amazon Inspector
Amazon
Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity. These findings can be reviewed directly or as part of detailed assessment reports which are available via the Amazon Inspector console or API. Amazon Inspector security assessments help you check for unintended network accessibility of your Amazon EC2 instances and for vulnerabilities on those EC2 instances. Amazon Inspector assessments are offered to you as pre-defined rules packages mapped to common security best practices and vulnerability definitions. Accelerate MTTR by using over 50 sources for vulnerability intelligence to help identify zero-day vulnerabilities quickly. -
28
KubeVirt
KubeVirt
KubeVirt technology addresses the needs of development teams that have adopted or want to adopt Kubernetes but possess existing Virtual Machine-based workloads that cannot be easily containerized. More specifically, the technology provides a unified development platform where developers can build, modify, and deploy applications residing in both application containers as well as virtual machines in a common, shared environment. The benefits are broad and significant. Teams with a reliance on existing virtual machine-based workloads are empowered to rapidly containerize applications. With virtualized workloads placed directly in development workflows, teams can decompose them over time while still leveraging the remaining virtualized components as is comfortably desired. Combine existing virtualized workloads with new container workloads on the one platform. Support development of new microservice applications in containers that interact with existing virtualized applications. -
29
Qualys Container Security
Qualys
Qualys CS features a vulnerability analysis plug-in for CI/CD tool Jenkins, and soon for other CI/CD tools including Bamboo, TeamCity, and CircleCI. You can download the plugins directly from within the container security module. With Qualys CS, security teams can participate in the DevOps process to gate vulnerable images entering the system, while developers get actionable data to remediate vulnerabilities. Configure policies for preventing vulnerable images from entering the repositories. Set policies based on criteria such as vulnerability severity, and specific QIDs. Review from within the plug-in a summary of the build with its vulnerabilities, information on patchable software and fixed versions, and image layers where it is present. Container infrastructure is immutable in nature, which means containers need to be identical to the images they are baked from. -
30
Organizations are adopting containerized environments to speed app development. But these apps still need services, such as routing, SSL offload, scale, and security. F5 Container Ingress Services makes it easy to deliver advanced application services to your container deployments, enabling Ingress control HTTP routing, load balancing, and application delivery performance, as well as robust security services. Container Ingress Services easily integrates BIG-IP solutions with native container environments, such as Kubernetes, and PaaS container orchestration and management systems, such as RedHat OpenShift. Scale apps to meet container workloads and enable security services to protect container data. Container Ingress Services enables self-service app performance and security services within your orchestration by integrating BIG-IP platforms with your container environment.
-
31
Clair
Clair
Clair is an open-source project for the static analysis of vulnerabilities in application containers (currently including OCI and docker). Clients use the Clair API to index their container images and can then match it against known vulnerabilities. Our goal is to enable a more transparent view of the security of the container-based infrastructure. Thus, the project was named Clair after the French term which translates to clear, bright, and transparent. Manifests are Clair's representation of a container image. Clair leverages the fact that OCI Manifests and Layers are content-addressed to reduce duplicated work. -
32
balenaEngine
balena
An engine purpose-built for embedded and IoT use cases, based on Moby Project technology from Docker. 3.5x smaller than Docker CE, packaged as a single binary. Available for a wide variety of chipset architectures, supporting everything from tiny IoT devices to large industrial gateways. Bandwidth-efficient updates with binary diffs, 10-70x smaller than pulling layers in common scenarios. Extract layers as they arrive to prevent excessive writing to disk, protecting your storage from eventual corruption. Atomic and durable image pulls defend against partial container pulls in the event of power failure. Prevents page cache thrashing during image pull, so your application runs undisturbed in low-memory situations. balenaEngine is a new container engine purpose-built for embedded and IoT use cases and compatible with Docker containers. Based on Moby Project technology from Docker, balenaEngine supports container deltas for 10-70x more efficient bandwidth usage. -
33
ThreatMapper
Deepfence
Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories. ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. What you cannot see, you cannot secure. ThreatMapper auto-discovers your production infrastructure. It identifies and interrogates cloud instances, Kubernetes nodes, and serverless resources, discovering the applications and containers and mapping their topology in real-time. Use ThreatMapper to discover and visualize the external and internal attack surface for your applications and infrastructure. Exploiting known vulnerabilities in common dependencies is one of the easiest ways for bad actors to gain a foothold within your infrastructure. ThreatMapper scans hosts, containers, and applications for known vulnerable dependencies, taking threat feeds from over 50 different sources. -
34
Critical Stack
Capital One
Deploy applications quickly and confidently with Critical Stack, the open source container orchestration tool from Capital One. Critical Stack enforces the highest level of governance and security standards, enabling teams to efficiently scale containerized applications in the strictest environments. View your entire environment and deploy new services with a few simple clicks. Spend more time on development and decision making and less on maintenance. Dynamically adjust shared resources of your environment efficiently. Enforce container networking policies and controls that your teams can configure. Speed up development cycles and deployment of containerized applications. Guarantee containerized applications run according to your specifications. Deploy containerized applications confidently. Critical Stack enables application verification and powerful orchestration capabilities for your important workloads. -
35
FuzzDB
FuzzDB
FuzzDB was created to increase the likelihood of finding application security vulnerabilities through dynamic application security testing. It's the first and most comprehensive open dictionary of fault injection patterns, predictable resource locations, and regex for matching server responses. FuzzDB contains comprehensive lists of attack payload primitives for fault injection testing. These patterns, categorized by the attack and where appropriate platform type, are known to cause issues like OS command injection, directory listings, directory traversals, source exposure, file upload bypass, authentication bypass, XSS, HTTP header crlf injections, SQL injection, NoSQL injection, and more. For example, FuzzDB catalogs 56 patterns that can potentially be interpreted as a null byte and contains lists of commonly used methods and name-value pairs that trigger debug modes.Starting Price: Free -
36
An enhanced version of PostgreSQL that is continuously synchronized with PostgreSQL's with enhancements for Security, DBA and Developer features and Oracle database compatibility. Manage deployment, high availability and automated failover from Kubernetes. Deploy anywhere with lightweight, immutable Postgres containers. Automate with failover, switchover, backup, recovery, and rolling updates. Operator and images are portable to any cloud so you can avoid lock-in. Overcome containerization and Kubernetes challenges with our experts. Oracle compatibility means you can leave your legacy database without starting over. Migrate database and client applications faster with fewer rewrite problems. Improve the end-user experience by tuning and boosting performance. Deploy on-premises, in the cloud, or both. In a world where downtime means revenue loss, High Availability is key for business continuity.Starting Price: $1000.00/one-time
-
37
Azure Pipelines
Microsoft
Automate your builds and deployments with Pipelines so you spend less time with the nuts and bolts and more time being creative. Get cloud-hosted pipelines for Linux, macOS, and Windows. Build web, desktop and mobile applications. Deploy to any cloud or on‑premises. Build, test, and deploy Node.js, Python, Java, PHP, Ruby, C/C++, .NET, Android, and iOS apps. Run in parallel on Linux, macOS, and Windows. Easily build and push images to container registries like Docker Hub and Azure Container Registry. Deploy containers to individual hosts or Kubernetes. Explore and implement a wide range of community-built build, test, and deployment tasks, along with hundreds of extensions from Slack to SonarCloud. Implement continuous delivery (CD) of your software to any cloud, including Azure, AWS, and GCP. Visualize deployment to any number of interdependent stages. -
38
Alkemist
RunSafe
Alkemist:Code, our patented product is a built-in, virtually unbreakable threat immunization code that’s integrated literally at the source, the “build” stage of your pipeline! Prevent attackers from taking control of your software. Stop existing vulnerabilities from spreading across multiple devices. Alkemist actively prevents common techniques attackers typically use to gain control. Supports Linux, Windows, and RTOS-based applications and firmware running on Intel, ARM, and PPC chipsets. Alkemist:Repo allows you to download pre-hardened open-source packages where security protections are already applied. Alkemist:Repo is easy to deploy. Download pre-hardened open source packages from RunSafe’s repository. Protect open-source software and dramatically reduce your attack surface. Every open-source package contains software vulnerabilities, leaving you exposed to cyber-attacks and often consuming resources for scanning, testing, and patching. -
39
ProGet
inedo
Scan for vulnerabilities and control who can access different feeds and actions, all within minutes of download and fast install. ProGet is self-managed and is available in a powerful free version that can be upgraded as needed. ProGet helps you package applications and components so you can ensure your software is built only once, and then deployed consistently across environments. This means everyone can be certain that what goes to production is exactly what was built and tested. Third-party packages (such as NuGet, npm, PowerShell, and Chocolatey) and Docker containers are also supported, allowing you to enforce quality standards, monitor for open-source licenses, and scan for vulnerabilities across all packages, much earlier in the development cycle. With high availability, load-balancing, and multi-site replication, ProGet can centralize your organization’s software applications and components to provide uniform access to developers and servers.Starting Price: $9,995 per year -
40
NVIDIA GPU-Optimized AMI
Amazon
The NVIDIA GPU-Optimized AMI is a virtual machine image for accelerating your GPU accelerated Machine Learning, Deep Learning, Data Science and HPC workloads. Using this AMI, you can spin up a GPU-accelerated EC2 VM instance in minutes with a pre-installed Ubuntu OS, GPU driver, Docker and NVIDIA container toolkit. This AMI provides easy access to NVIDIA's NGC Catalog, a hub for GPU-optimized software, for pulling & running performance-tuned, tested, and NVIDIA certified docker containers. The NGC catalog provides free access to containerized AI, Data Science, and HPC applications, pre-trained models, AI SDKs and other resources to enable data scientists, developers, and researchers to focus on building and deploying solutions. This GPU-optimized AMI is free with an option to purchase enterprise support offered through NVIDIA AI Enterprise. For how to get support for this AMI, scroll down to 'Support Information'Starting Price: $3.06 per hour -
41
StackRox
StackRox
Only StackRox provides comprehensive visibility into your cloud-native infrastructure, including all images, container registries, Kubernetes deployment configurations, container runtime behavior, and more. StackRox’s deep integration with Kubernetes delivers visibility focused on deployments, giving security and DevOps teams a comprehensive understanding of their cloud-native infrastructure, including images, containers, pods, namespaces, clusters, and their configurations. You get at-a-glance views of risk across your environment, compliance status, and active suspicious traffic. Each summary view enables you to drill into more detail. Using StackRox, you can easily identify and analyze container images in your environment with native integrations and support for nearly every image registry. -
42
OpenText ZENworks Mobile Workspace
OpenText
OpenText™ ZENworks Mobile Workspace is a secure mobile access management solution. It balances mobile security and usability so you can take advantage of BYOD cost benefits and users can remain productive with access to what they need, anywhere. Secure, containerized accounts for mobile. Enable your workforce to conveniently access corporate accounts in a secure container on their mobile device. Keep corporate data safe and mobile users happy. Centrally manage mobile device corporate workspaces. Keystore and encryption remove potential vulnerabilities to secure data without controlling the entire device. Provide offsite access to company intranet resources and web apps without exposing them directly to the internet. Keep corporate data safe in secure containers. Control shared data with policy-enforced threat detection. Remote workspace wipes to prevent data theft on lost devices. Isolate and encrypt important data. -
43
Azure Logic Apps
Microsoft
Built on a containerized runtime that increases scale and portability while automating business-critical workflows anywhere. Modernize your BizTalk Server applications by moving them to Logic Apps using the BizTalk migration tool. Connect logic apps to your virtual networks to seamlessly and securely integrate cloud-based and on-premises solutions. Containerize your workflows to deploy and run your applications anywhere—in the cloud, on premises, or the infrastructure of your choice. Apply CI/CD best practices to your workflows and take advantage of built-in tools for seamless and secure deployments. Deploy and run logic applications in Azure, any container, and on premises. Enable private endpoints, simplified virtual network access, and deployment slots. Develop, debug, and test on Windows, MacOS, and Linux using Visual Studio Code. Deploy multiple workflows to a single logic app, simplifying automated deployments and CI/CD pipelines.Starting Price: $0.000025 -
44
AWS Deep Learning Containers
Amazon
Deep Learning Containers are Docker images that are preinstalled and tested with the latest versions of popular deep learning frameworks. Deep Learning Containers lets you deploy custom ML environments quickly without building and optimizing your environments from scratch. Deploy deep learning environments in minutes using prepackaged and fully tested Docker images. Build custom ML workflows for training, validation, and deployment through integration with Amazon SageMaker, Amazon EKS, and Amazon ECS. -
45
Anchore
Anchore
DevSecOps at full speed with deep inspection of container images and policy-based compliance. In an environment where application development must be fast and flexible, containers are the future. Adoption is accelerating, but with it comes risk. Anchore makes it possible to manage, secure, and troubleshoot containers continuously, without sacrificing speed. It delivers a process that allows container development and deployment to be secure from the start, by ensuring that the contents of your containers match the standards that you define. The tools are transparent to developers, visible to production, accessible to security, and all designed for the fluid nature of containers. Anchore sets a trusted standard for containers. It empowers you to certify your containers, making them predictable and protectable. So you can deploy containers with confidence. Protect against risks using a complete container image security solution. -
46
Centurion
New Relic
A deployment tool for Docker. Takes containers from a Docker registry and runs them on a fleet of hosts with the correct environment variables, host volume mappings, and port mappings. Supports rolling deployments out of the box, and makes it easy to ship applications to Docker servers. We're using it in our production infrastructure. Centurion works in a two part deployment process where the build process ships a container to the registry, and Centurion ships containers from the registry to the Docker fleet. Registry support is handled by the Docker command line tools directly so you can use anything they currently support via the normal registry mechanism. If you haven't been using a registry, you should read up on how to do that before trying to deploy anything with Centurion. This code is developed in the open with input from the community through issues and PRs. There is an active maintainer team within New Relic. -
47
Kubescape
Armo
A Kubernetes open-source platform providing developers and DevOps an end-to-end security solution, including risk analysis, security compliance, RBAC visualizer, and image vulnerabilities scanning. Kubescape scans K8s clusters, Kubernetes manifest files (YAML files, and HELM charts), code repositories, container registries and images, detecting misconfigurations according to multiple frameworks (such as the NSA-CISA, MITRE ATT&CK®), finding software vulnerabilities, and showing RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline. It calculates risk scores instantly and shows risk trends over time. Kubescape has became one of the fastest-growing Kubernetes security compliance tools among developers due to its easy-to-use CLI interface, flexible output formats, and automated scanning capabilities, saving Kubernetes users and admins precious time, effort, and resources.Starting Price: $0/month -
48
RiskSense
RiskSense
Know what actions to take in seconds. Accelerate remediation activities for the most important vulnerability exposure points across your attack surface, infrastructure, applications, and development frameworks. Full-stack visibility of application risk exposure from development to production. Unify all application scan data (SAST, DAST, OSS, and Container) to locate code exposures and prioritize remediation. The easiest tool to explore authoritative vulnerability threat intelligence. Access research from the highest fidelity of sources and industry-leading exploit writers. Make fact-based decisions using continuous updates to vulnerability risk and impact. Actionable Vulnerability Security Research and Information to help you stay informed about the changing risks and exposure that vulnerabilities pose to all organizations. Clarity in minutes without needing to learn security details. -
49
HashiCorp Waypoint
HashiCorp
Waypoint uses a single configuration file and common workflow to manage and observe deployments across platforms such as Kubernetes, Nomad, EC2, Google Cloud Run, and more. Waypoint builds applications for any language or framework. You can use Buildpacks for automatically building common frameworks or custom Dockerfiles or other build tools for more fine-grained control. The build step is where your application and assets are compiled, validated, and an artifact is created. This artifact can be published to a remote registry or simply passed to the deploy step. Waypoint deploys artifacts created by the build step to a variety of platforms, from Kubernetes to EC2 to static site hosts. It configures your target platform and prepares the new application version to be publicly accessible. Deployments are accessible via a preview URL prior to release. Waypoint releases your staged deployments and makes them accessible to the public. -
50
Azure Container Instances
Microsoft
Develop apps fast without managing virtual machines or having to learn new tools—it's just your application, in a container, running in the cloud. By running your workloads in Azure Container Instances (ACI), you can focus on designing and building your applications instead of managing the infrastructure that runs them. Deploy containers to the cloud with unprecedented simplicity and speed—with a single command. Use ACI to provision additional compute for demanding workloads whenever you need. For example, with the Virtual Kubelet, use ACI to elastically burst from your Azure Kubernetes Service (AKS) cluster when traffic comes in spikes. Gain the security of virtual machines for your container workloads, while preserving the efficiency of lightweight containers. ACI provides hypervisor isolation for each container group to ensure containers run in isolation without sharing a kernel.