Alternatives to Buoyant Cloud

Compare Buoyant Cloud alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Buoyant Cloud in 2024. Compare features, ratings, user reviews, pricing, and more from Buoyant Cloud competitors and alternatives in order to make an informed decision for your business.

  • 1
    Gloo Edge

    Gloo Edge

    solo.io

    Gloo Edge is an Envoy-based API gateway and ingress controller to facilitate and secure application traffic at the edge. An API gateway receives requests from clients (e.g. external clients like web and mobile applications or applications and services located on-premises, in the cloud or mixed in hybrid environments) and manages ingress to the appropriate services within its domain. The API gateway sits in the data plane and manages “North/South” traffic by providing services including security, reliability, filtering, transformations, and routing. Working collectively, the API gateway can provide higher-level services such as high availability, load balancing, failover, zero-trust security, tracing, and metrics gathering. Gloo Edge is a Kubernetes-native, next-generation API Gateway built on Envoy Proxy to manage, secure, and observe traffic at the edge.
  • 2
    Google Kubernetes Engine (GKE)
    Run advanced apps on a secured and managed Kubernetes service. GKE is an enterprise-grade platform for containerized applications, including stateful and stateless, AI and ML, Linux and Windows, complex and simple web apps, API, and backend services. Leverage industry-first features like four-way auto-scaling and no-stress management. Optimize GPU and TPU provisioning, use integrated developer tools, and get multi-cluster support from SREs. Start quickly with single-click clusters. Leverage a high-availability control plane including multi-zonal and regional clusters. Eliminate operational overhead with auto-repair, auto-upgrade, and release channels. Secure by default, including vulnerability scanning of container images and data encryption. Integrated Cloud Monitoring with infrastructure, application, and Kubernetes-specific views. Speed up app development without sacrificing security.
  • 3
    Google Cloud Traffic Director
    Toil-free traffic management for your service mesh. Service mesh is a powerful abstraction that's become increasingly popular to deliver microservices and modern applications. In a service mesh, the service mesh data plane, with service proxies like Envoy, moves the traffic around and the service mesh control plane provides policy, configuration, and intelligence to these service proxies. Traffic Director is GCP's fully managed traffic control plane for service mesh. With Traffic Director, you can easily deploy global load balancing across clusters and VM instances in multiple regions, offload health checking from service proxies, and configure sophisticated traffic control policies. Traffic Director uses open xDSv2 APIs to communicate with the service proxies in the data plane, which ensures that you are not locked into a proprietary interface.
  • 4
    Kuma

    Kuma

    Kuma

    The open-source control plane for service mesh, delivering security, observability, routing and more. Built on top of Envoy, Kuma is a modern control plane for Microservices & Service Mesh for both K8s and VMs, with support for multiple meshes in one cluster. Out of the box L4 + L7 policy architecture to enable zero trust security, observability, discovery, routing and traffic reliability in one click. Getting up and running with Kuma only requires three easy steps. Natively embedded with Envoy proxy, Kuma Delivers easy to use policies that can secure, observe, connect, route and enhance service connectivity for every application and services, databases included. Build modern service and application connectivity across every platform, cloud and architecture. Kuma supports modern Kubernetes environments and Virtual Machine workloads in the same cluster, with native multi-cloud and multi-cluster connectivity to support the entire organization.
  • 5
    Kong Mesh
    Enterprise service mesh based on Kuma for multi-cloud and multi-cluster on both Kubernetes and VMs. Deploy with a single command. Connect to other services automatically with built-in service discovery, including an Ingress resource and remote CPs. Support across any environment, including multi-cluster, multi-cloud and multi-platform on both Kubernetes and VMs. Accelerate initiatives like zero-trust and GDPR with native mesh policies, improving the speed and efficiency of every application team. Deploy a single control plane that can scale horizontally to many data planes, or support multiple clusters or even hybrid service meshes running on both Kubernetes and VMs combined. Simplify cross-zone communication using an Envoy-based ingress deployment on both Kubernetes and VMs, as well as the built-in DNS resolver for service-to-service communication. Built on top of Envoy with 50+ observability charts out of the box, you can collect metrics, traces, and logs of all L4-L7 traffic.
    Starting Price: $250 per month
  • 6
    Linkerd

    Linkerd

    Buoyant

    Linkerd adds critical security, observability, and reliability features to your Kubernetes stack—no code change required. Linkerd is 100% Apache-licensed, with an incredibly fast-growing, active, and friendly community. Built in Rust, Linkerd's data plane proxies are incredibly small (<10 mb) and blazing fast (p99 < 1ms). No complex APIs or configuration. For most applications, Linkerd will “just work” out of the box. Linkerd's control plane installs into a single namespace, and services can be safely added to the mesh, one at a time. Get a comprehensive suite of diagnostic tools, including automatic service dependency maps and live traffic samples. Best-in-class observability allows you to monitor golden metrics—success rate, request volume, and latency—for every service.
  • 7
    F5 NGINX Gateway Fabric
    The always-free NGINX Service Mesh scales from open source projects to a fully supported, secure, and scalable enterprise‑grade solution. Take control of Kubernetes with NGINX Service Mesh, featuring a unified data plane for ingress and egress management in a single configuration. The real star of NGINX Service Mesh is the fully integrated, high-performance data plane. Leveraging the power of NGINX Plus to operate highly available and scalable containerized environments, our data plane brings a level of enterprise traffic management, performance, and scalability to the market that no other sidecars can offer. It provides the seamless and transparent load balancing, reverse proxy, traffic routing, identity, and encryption features needed for production-grade service mesh deployments. When paired with the NGINX Plus-based version of NGINX Ingress Controller, it provides a unified data plane that can be managed with a single configuration.
  • 8
    Tetrate

    Tetrate

    Tetrate

    Connect and manage applications across clusters, clouds, and data centers. Coordinate app connectivity across heterogeneous infrastructure from a single management plane. Integrate traditional workloads into your cloud-native application infrastructure. Create tenants within your business to define fine-grained access control and editing rights for teams on shared infrastructure. Audit the history of changes to services and shared resources from day zero. Automate traffic shifting across failure domains before your customers notice. TSB sits at the application edge, at cluster ingress, and between workloads in your Kubernetes and traditional compute clusters. Edge and ingress gateways route and load balance application traffic across clusters and clouds while the mesh controls connectivity between services. A single management plane configures connectivity, security, and observability for your entire application network.
  • 9
    Traefik Mesh

    Traefik Mesh

    Traefik Labs

    Traefik Mesh is a straight-forward, easy to configure, and non-invasive service mesh that allows visibility and management of the traffic flows inside any Kubernetes cluster. By improving monitoring, logging, and visibility, as well as implementing access controls. Allows administrators to increase the security of their clusters easily and quickly. By being able to monitor and trace how applications communicate in your Kubernetes cluster, administrators are able to optimize internal communications, and improve application performance. Reducing the time to learn, install, and configure makes it easier to implement, and to provide value for the time actually spent implementing. Administrators can focus on their business applications. Being open source means that there is no vendor lock-in, as Traefik Mesh is opt-in by design.
  • 10
    IBM Cloud Managed Istio
    Istio is an open technology that provides a way for developers to seamlessly connect, manage and secure networks of different microservices — regardless of platform, source or vendor. Istio is currently one of the fastest-growing open-source projects based on Github contributors, and its strength is its community. IBM is proud to be a founder and contributor of the Istio project and a leader of Istio Working Groups. Istio on IBM Cloud Kubernetes Service is offered as a managed add-on that integrates Istio directly with your Kubernetes cluster. A single click deploys a tuned, production-ready Istio instance on your IBM Cloud Kubernetes Service cluster. A single click runs Istio core components and tracing, monitoring and visualization tools. IBM Cloud updates all Istio components and manages the control-plane component's lifecycle.
  • 11
    Kiali

    Kiali

    Kiali

    Kiali is a management console for Istio service mesh. Kiali can be quickly installed as an Istio add-on or trusted as a part of your production environment. Using Kiali wizards to generate application and request routing configuration. Kiali provides Actions to create, update and delete Istio configuration, driven by wizards. Kiali offers a robust set of service actions, with accompanying wizards. Kiali provides a list and detailed views for your mesh components. Kiali provides filtered list views of all your service mesh definitions. Each view provides health, details, YAML definitions and links to help you visualize your mesh. Overview is the default Tab for any detail page. The overview tab provides detailed information, including health status, and a detailed mini-graph of the current traffic involving the component. The full set of tabs, as well as the detailed information, varies based on the component type.
  • 12
    Netmaker

    Netmaker

    Netmaker

    Netmaker is an open source tool based on the groundbreaking WireGuard protocol. Netmaker unifies distributed environments with ease, from multi-cloud to Kubernetes. Netmaker enhances Kubernetes clusters by providing flexible and secure networking for cross-environment scenarios. Netmaker uses WireGuard for modern, secure encryption. It is built with zero trust in mind, utilizes access control lists, and follows leading industry standards for secure networking. Netmaker enables you to create relays, gateways, full VPN meshes, and even zero trust networks. Netmaker is fully configurable to let you maximize the power of Wireguard.
  • 13
    KubeSphere

    KubeSphere

    KubeSphere

    KubeSphere is a distributed operating system for cloud-native application management, using Kubernetes as its kernel. It provides a plug-and-play architecture, allowing third-party applications to be seamlessly integrated into its ecosystem. KubeSphere is also a multi-tenant enterprise-grade open-source Kubernetes container platform with full-stack automated IT operations and streamlined DevOps workflows. It provides developer-friendly wizard web UI, helping enterprises to build out a more robust and feature-rich Kubernetes platform, which includes the most common functionalities needed for enterprise Kubernetes strategies. A CNCF-certified Kubernetes platform, 100% open-source, built and improved by the community. Can be deployed on an existing Kubernetes cluster or Linux machines, supports the online and air-gapped installation. Deliver DevOps, service mesh, observability, application management, multi-tenancy, storage, and networking management in a unified platform.
  • 14
    greymatter.io

    greymatter.io

    greymatter.io

    Maximize your resources. Ensure optimal use of your clouds, platforms, and software. This is application and API network operations management redefined. The same governance rules, observability, auditing, and policy control for every application, API, and network across your multi-cloud, data center and edge environments, all in one place. Zero-trust micro-segmentation, omni-directional traffic splitting, infrastructure agnostic attestation, and traffic management to secure your resources. ​IT-informed decision-making is real. Application, API & network monitoring and control generate massive IT operations data. Use it in real time through AI. Logging, metrics, tracing, and audits through Grey Matter simplifies integration and standardizes aggregation for all IT Operations data. Fully leverage your mesh telemetry and securely and flexibly future-proof your hybrid infrastructure.
  • 15
    Gloo Mesh

    Gloo Mesh

    solo.io

    Today's Kubernetes environments need help in scaling, securing and observing modern cloud-native applications. Gloo Mesh, based on the industry's leading Istio service mesh, simplifies multi-cloud and multi-cluster management of service mesh for containers and virtual machines. Gloo Mesh helps platform engineering teams to reduce costs, reduce risks, and improve application agility. Gloo Mesh is a modular component of Gloo Platform. The service mesh allows for application-aware network tasks to be managed independently from the application, adding observability, security, and reliability to distributed applications. By introducing the service mesh to your applications, you can: Simplify the application layer Provide more insights into your traffic Increase the security of your application
  • 16
    Network Service Mesh

    Network Service Mesh

    Network Service Mesh

    A common flat vL3 domain allowing DBs running in multiple clusters/clouds/hybrid to communicate just with each other for DB replication. Workloads from multiple companies connecting to a single ‘collaborative’ Service Mesh for cross company interactions. Each workload has a single option of what connectivity domain to be connected to, and only workloads in a given runtime domain could be part of its connectivity domain. In short: Connectivity Domains are Strongly Coupled to Runtime Domains. A central tenant of Cloud Native is Loose Coupling. In a Loosely Coupled system, the ability for each workload to receive service from alternative providers is preserved. What Runtime Domain a workload is running in is a non-sequitur to its communications needs. Workloads that are part of the same App need Connectivity between each other no matter where they are running.
  • 17
    ARMO

    ARMO

    ARMO

    ARMO provides total security for in-house workloads and data. Our patent-pending technology prevents breaches and protects against security overhead regardless of your environment, cloud-native, hybrid, or legacy. ARMO protects every microservice and protects it uniquely. We do this by creating a cryptographic code DNA-based workload identity, analyzing each application’s unique code signature, to deliver an individualized and secure identity to every workload instance. To prevent hacking, we establish and maintain trusted security anchors in the protected software memory throughout the application execution lifecycle. Stealth coding-based technology blocks all attempts at reverse engineering of the protection code and ensures comprehensive protection of secrets and encryption keys while in-use. Our keys are never exposed and thus cannot be stolen.
  • 18
    ServiceStage

    ServiceStage

    Huawei Cloud

    Deploys your applications using containers, VMs, or serverless, and easily implements auto scaling, performance analysis, and fault diagnosis. Supports native Spring Cloud and Dubbo frameworks and Service Mesh, provides all-scenario capabilities, and supports mainstream languages such as Java, Go, PHP, Node.js, and Python. Supports cloud-native transformation of Huawei core services, meeting strict performance, usability, and security compliance requirements. Development frameworks, running environments, and common components are available for web, microservice, mobile, and AI applications. Full management of applications throughout the entire process, including deployment and upgrade. Monitoring, events, alarms, logs, and tracing diagnosis, and built-in AI capabilities, making O&M easy. Creates a flexibly customizable application delivery pipeline with only a few clicks.
    Starting Price: $0.03 per hour-instance
  • 19
    HashiCorp Consul
    A multi-cloud service networking platform to connect and secure services across any runtime platform and public or private cloud. Real-time health and location information of all services. Progressive delivery and zero trust security with less overhead. Receive peace of mind that all HCP connections are secured out of the box. Gain insight into service health and performance metrics with built-in visualization directly in the Consul UI or by exporting metrics to a third-party solution. Many modern applications have migrated towards decentralized architectures as opposed to traditional monolithic architectures. This is especially true with microservices. Since applications are composed of many inter-dependent services, there's a need to have a topological view of the services and their dependencies. Furthermore, there is a desire to have insight into health and performance metrics for the different services.
  • 20
    Calisti

    Calisti

    Cisco

    Calisti enables security, observability, traffic management for microservices and cloud native applications, and allows admins to switch between live and historical views. Configuring Service Level Objectives (SLOs), burn rate, error budget and compliance monitoring, Calisti sends a GraphQL alert to automatically scale based on SLO burn rate. Calisti manages microservices running on containers and virtual machines, allowing for application migration from VMs to containers in a phased manner. Reducing management overhead by applying policies consistently and meeting application Service Level Objectives across both K8s and VMs. Istio has new releases every three months. Calisti includes our Istio Operator that automates lifecycle management, and even enables canary deployment of the platform itself.
  • 21
    Meshery

    Meshery

    Meshery

    Describe all of your cloud native infrastructure and manage as a pattern. Design your service mesh configuration and workload deployments. Apply intelligent canary strategies and performance profiles with service mesh pattern management. Assess your service mesh configuration against deployment and operational best practices with Meshery's configuration validator. Validate your service mesh's conformance to Service Mesh Interface (SMI) specifications. Dynamically load and manage your own WebAssembly filters in Envoy-based service meshes. Service mesh adapters provision, configure, and manage their respective service meshes.
  • 22
    AWS App Mesh

    AWS App Mesh

    Amazon Web Services

    AWS App Mesh is a service mesh that provides application-level networking to facilitate communication between your services across various types of computing infrastructure. App Mesh offers comprehensive visibility and high availability for your applications. Modern applications are generally made up of multiple services. Each service can be developed using various types of compute infrastructure, such as Amazon EC2, Amazon ECS, Amazon EKS, and AWS Fargate. As the number of services within an application grows, it becomes difficult to pinpoint the exact location of errors, redirect traffic after errors, and safely implement code changes. Previously, this required creating monitoring and control logic directly in your code and redeploying your services every time there were changes.
  • 23
    VMware Avi Load Balancer
    Simplify application delivery with software-defined load balancers, web application firewall, and container ingress services for any application in any data center and cloud. Simplify administration with centralized policies and operational consistency across on-premises data centers, and hybrid and public clouds, including VMware Cloud (VMC on AWS, OCVS, AVS, GCVE), AWS, Azure, Google, and Oracle Cloud. Free infrastructure teams from manual tasks and enable DevOps teams with self-service. Application delivery automation toolkits include Python SDK, RESTful APIs, Ansible and Terraform integrations. Gain unprecedented insights, including network, end users and security, with real-time application performance monitoring, closed-loop analytics and deep machine learning.
  • 24
    Anthos Service Mesh
    Designing your applications as microservices provides many benefits. However, your workloads can become complex and fragmented as they scale. Anthos Service Mesh is Google's implementation of the powerful Istio open source project, which allows you to manage, observe, and secure services without having to change your application code. Anthos Service Mesh simplifies service delivery, from managing mesh telemetry and traffic to protecting communications between services, significantly reducing the burden on development and operations teams. Anthos Service Mesh is Google's fully managed service mesh, allowing you to easily manage these complex environments and reap all the benefits they offer. As a fully managed offering, Anthos Service Mesh takes the guesswork and effort out of purchasing and managing your service mesh solution. Focus on building great apps and let us take care of the mesh.
  • 25
    F5 Aspen Mesh
    F5 Aspen Mesh empowers companies to drive more performance from their modern app environment by leveraging the power of their service mesh. As part of F5, Aspen Mesh is focused on delivering enterprise-class products that enhance companies’ modern app environments. Deliver new and differentiating features faster with microservices. Aspen Mesh lets you do that at scale, with confidence. Reduce the risk of downtime and improve your customers’ experience. If you’re scaling microservices to production on Kubernetes, Aspen Mesh will help you get the most out of your distributed systems. Aspen Mesh empowers companies to drive more performance from their modern app environment by leveraging the power of their service mesh. Alerts that decrease the risk of application failure or performance degradation based on data and machine learning models. Secure Ingress safely exposes enterprise apps to customers and the web.
  • 26
    Istio

    Istio

    Istio

    Connect, secure, control, and observe services. Istio’s traffic routing rules let you easily control the flow of traffic and API calls between services. Istio simplifies configuration of service-level properties like circuit breakers, timeouts, and retries, and makes it easy to set up important tasks like A/B testing, canary rollouts, and staged rollouts with percentage-based traffic splits. It also provides out-of-box failure recovery features that help make your application more robust against failures of dependent services or the network. Istio Security provides a comprehensive security solution to solve these issues. This page gives an overview on how you can use Istio security features to secure your services, wherever you run them. In particular, Istio security mitigates both insider and external threats against your data, endpoints, communication, and platform. Istio generates detailed telemetry for all service communications within a mesh.
  • 27
    Valence

    Valence

    Valence Security

    Today, organizations automate business processes by integrating hundreds of applications via direct APIs, SaaS marketplaces and third-party apps, and hyperautomation platforms, forming a SaaS to SaaS supply chain. ‍ The supply chain enables exchange of data and privileges via an expanding network of indiscriminate and shadow connectivity. This leads to an increasing risk surface of supply chain attacks, misconfigurations and data exposure. Bring SaaS to SaaS connectivity out of the shadows and map your risk surface. Identify and alert on risky changes, new integrations and anomalous data flows. Extend zero trust principles to your SaaS to SaaS supply chain with governance and policy enforcement. Delivers quick, continuous and non-intrusive SaaS to SaaS supply chain risk surface management. Streamlines collaboration between business application teams and enterprise IT security teams.
  • 28
    Cisco Service Mesh Manager
    The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language. With the accelerating demand for digital transformation, businesses are increasingly adopting cloud-native architectures. Microservice-based applications are created with software functionality spread across multiple services that are independently deployable, easier to maintain and test, and can be more rapidly updated.
  • 29
    Envoy

    Envoy

    Envoy Proxy

    As on the ground microservice practitioners quickly realize, the majority of operational problems that arise when moving to a distributed architecture are ultimately grounded in two areas: networking and observability. It is simply an orders of magnitude larger problem to network and debug a set of intertwined distributed services versus a single monolithic application. Envoy is a self contained, high performance server with a small memory footprint. It runs alongside any application language or framework. Envoy supports advanced load balancing features including automatic retries, circuit breaking, global rate limiting, request shadowing, zone local load balancing, etc. Envoy provides robust APIs for dynamically managing its configuration.
  • 30
    Weaveworks

    Weaveworks

    Weaveworks

    Continuous delivery for application teams and continuous control for platform teams. Automate Kubernetes with GitOps one pull request at a time. The multi cluster-control plane allows cluster operators to control and observe across any Kubernetes. Immediately detect drift and evaluate cluster health or even inform roll back actions as well as monitor continuous operations. Rapidly create, update and manage production ready application clusters with all of the add-ons needed for an agile cloud native platform with a single click. Reliability through automation. Minimize operations overhead with automated cluster lifecycle management: upgrades, security patches, and cluster extension updates. GitOps is an operating model for cloud native applications running on Kubernetes. The GitOps methodology enables continuous software delivery through automated pipelines. It focuses on a developer centric experience to deploy, monitor and manage workloads by using your version control system.
  • 31
    Apache ServiceComb
    Open-source, full-stack microservice solution. With out-of-the-box, high performance, compatible with popular ecology, and multi-language support. Service contract guarantee based on OpenAPI. One-click scaffolding, out of the box, speeds up the building of microservice applications. The ecological extension supports multiple development languages such as Java/Golang/PHP/NodeJS. Apache ServiceComb is an open-source solution for microservices. It consists of multiple components that can be flexibly adapted to different scenarios through the combination of components. This guide can help you get started quickly with Apache ServiceComb, which is the best place to start trying for first-time users. To decouple the programming and communication models, so that a programming model can be combined with any communication models as needed. Application developers only need to focus on APIs during development and can flexibly switch communication models during deployment.
  • 32
    Lumeus

    Lumeus

    Lumeus

    Automate anomaly detection to meet SLAs. Monitor the entire network. Optimize digital experiences. Modernize network security leveraging your existing infrastructure through an agentless, AI-assisted approach. Enforce access by least privilege. Create identity-based boundaries. Extend to applications, devices, and infrastructure. Instant notifications of escalations. Review all session activity and details from cohesive logs. Enable device fingerprinting and gain network topology insights. Seamlessly connect to your existing infrastructure. Unify connectivity and control from campus to cloud. Organizations can use Lumeus to monitor and detect escalations using AI; segment traffic to prevent lateral movement; and secure user access by extending MFA and zero trust to network infrastructure all with one unified management plane. Lumeus has a cloud management portal that connects to your infrastructure via API.
  • 33
    VisionCivilPlus
    Offers four methods for calculating volumes: by comparing surfaces, comparing planes, cross sections and solids. Generates surfaces by simplifying the Point Cloud and keeping only the important points that will reflect the surface behaviors. Place, move, and rotate building footprints inside a parcel with ease while respecting the chosen constraints. Allows to automatically create parcels from survey points or from existing drafts. Helps create, edit, and triangulate surfaces by allowing to select points and breaklines. Personalize profiles, cross sections and easily generate graphics for surfaces within the CAD. Quickly visualize terrain from different angles and export your survey to DTM. Import large LiDAR Point Clouds data and easily analyze them. Integrate your .xml and .dwg files into your favorite CAD and share them. Use an external database to facilitate data sharing. Edit surfaces by adding breaklines and holes, work with 2D and 3D profile alignments.
    Starting Price: $325 per month
  • 34
    Gradient Cybersecurity Mesh
    Gradient Cybersecurity Mesh stitches together hardware-based roots of trust with nation-state hardened software to eliminate the threat of credential-based cyberattacks and creates a frictionless user experience without requiring any changes to your existing infrastructure. By anchoring credentials to machines using hardware roots of trust, attackers are no longer able to steal credentials and then use them from another device to impersonate an identity. Leveraging Gradient’s secure enclave, your credentials and access control policy operations have nation-state level protection ensuring they can never be compromised. Credentials issued by GCM can be rotated in as little as ten minutes, ensuring short lived sessions that are seamlessly renewed to prevent compromize and ensure compliance with least access principles.
  • 35
    UNITI

    UNITI

    Thread

    Everything from field inspection, annotation, and review, to sharing quantitative asset health information with operational teams, is anchored to the individual asset. Every asset is indexed by UNITI, providing an anchor for all data types including digital scans of physical documents, word-of-mouth knowledge sharing, and all digital-first files. UNITI eliminates the complexity of information management. Sharing tools within UNITI allows review requests and repair flags to escalate from inspection teams to supervisors and operation managers where work orders can be initiated. Now, for the first time, experienced technicians and specialists can capture historical knowledge enabling the memorialization of expertise for training and information sharing. Store all data in one place including automatically ingested imagery, manual uploads, digitized field notes, and more. Know that your data is correctly organized and anchored to each asset and eliminate disparate sources of information.
  • 36
    SUSE Rancher
    SUSE Rancher addresses the needs of DevOps teams deploying applications with Kubernetes and IT operations delivering enterprise-critical services. SUSE Rancher supports any CNCF-certified Kubernetes distribution. For on-premises workloads, we offer the RKE. We support all the public cloud distributions, including EKS, AKS, and GKE. At the edge, we offer K3s. SUSE Rancher provides simple, consistent cluster operations, including provisioning, version management, visibility and diagnostics, monitoring and alerting, and centralized audit. SUSE Rancher lets you automate processes and applies a consistent set of user access and security policies for all your clusters, no matter where they’re running. SUSE Rancher provides a rich catalogue of services for building, deploying, and scaling containerized applications, including app packaging, CI/CD, logging, monitoring, and service mesh.
  • 37
    Crossplane

    Crossplane

    Crossplane

    Crossplane is an open-source Kubernetes add-on that enables platform teams to assemble infrastructure from multiple vendors, and expose higher-level self-service APIs for application teams to consume, without having to write any code. Provision and manage cloud infrastructure and services using kubectl. Crossplane extends your Kubernetes cluster, providing you with CRDs for any infrastructure or managed service. Compose these granular resources into higher-level abstractions that can be versioned, managed, deployed, and consumed using your favorite tools and existing processes you've already integrated with your clusters. We built Crossplane to help organizations build their clouds like the cloud vendors build theirs, with a control plane. Crossplane is a CNCF project which extends the Kubernetes API to manage and compose infrastructure. Operators can encapsulate policies, permissions, and other guardrails behind a custom API line generated by Crossplane.
  • 38
    Project Calico

    Project Calico

    Project Calico

    Calico is an open-source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports a broad range of platforms including Kubernetes, OpenShift, Mirantis Kubernetes Engine (MKE), OpenStack, and bare metal services. Whether you opt to use Calico's eBPF data plane or Linux’s standard networking pipeline, Calico delivers blazing-fast performance with true cloud-native scalability. Calico provides developers and cluster operators with a consistent experience and set of capabilities whether running in the public cloud or on-prem, on a single node, or across a multi-thousand-node cluster. Calico gives you a choice of data planes, including a pure Linux eBPF data plane, a standard Linux networking data plane, and a Windows HNS data plane. Whether you prefer the cutting-edge features of eBPF or the familiarity of the standard primitives that existing system administrators already know, Calico has you covered.
  • 39
    VisionCivil Pro
    Get the most efficient civil engineering tool. Quickly visualize terrain from different angles and export your survey to DTM. Import large LiDAR Point Clouds data and easily analyze them. Integrate your .xml and .dwg files into your favorite CAD and share them. Use an external database to facilitate data sharing. Edit surfaces by adding break lines and holes, work with 2D and 3D profile alignments, as well as handling LiDAR Point Clouds. Offers four methods for calculating volumes: by comparing surfaces, comparing planes, cross sections and solids. Generates surfaces by simplifying the Point Cloud and keeping only the important points that will reflect the surface behaviors. Place, move, and rotate building footprints inside a parcel with ease while respecting the chosen constraints. Allows to automatically create parcels from survey points or from existing drafts. Helps create, edit, and triangulate surfaces by allowing to select points and break lines.
  • 40
    FamiSpy

    FamiSpy

    FamiSpy

    FamiSpy is widely used by parents around the globe to monitor their children's mobile phones. It's also a valuable tool for employers to ensure their employees are staying on task. Worried that your child might be spending too much time on the phone? They could be texting someone they shouldn’t. FamiSpy lets you dig deeper into this by allowing you to view the messages and the people they’re communicating with. It can be challenging to keep an eye on your child 24/7, especially when they’re at school or out and about. FamiSpy tracks their location, so you always know where they are. The app also provides contact information and additional data for each person in their phonebook. With the phonebook monitoring feature, you can see the display picture, email address, and physical address of contacts. Plus, FamiSpy operates in hidden stealth mode, ensuring that your child is unaware of its presence.
    Starting Price: $16.67/month/user
  • 41
    Styra

    Styra

    Styra

    The fastest and easiest way to operationalize Open Policy Agent across Kubernetes, Microservices or Custom APIs, whether you're a developer, an admin, or a bit of both. Need to limit which folks can access your pipeline, based on who is currently on call? Simple. Want to define which microservices can access PCI data? We got you. Have to prove compliance with regulations across your clusters? No sweat. Built on open-source, and declarative by design, Styra Declarative Authorization Service gives you a turnkey OPA control plane to mitigate risk, reduce human error, and accelerate development. A built-in library of policies. Built on our OPA project let you implement and customize authorization policy-as-code. Pre-running lets you monitor and validate policy changes before committing, to mitigate risk before deployment. Declarative model defines desired state to prevent security drift and eliminate errors, before they can occur.
    Starting Price: $70 per month
  • 42
    AccuKnox

    AccuKnox

    AccuKnox

    AccuKnox provides a zero trust Cloud Native Application Security (CNAPP) platform. AccuKnox is built in partnership with SRI (Stanford Research Institute) and is anchored on seminal inventions in the areas of container security, anomaly detection, and data provenance. AccuKnox can be deployed in public and private cloud environments. AccuKnox runtime Security helps you discover the application Behavior of the workloads running in a public cloud, private cloud, or on-prem in VM/BareMetal or local Kubernetes orchestrated cluster or unorchestrated pure-containerized cluster. If any ransomware attacker tries to compromise the security of the pod and gets access to the vault pod, they can do a command injection and encrypt the secrets stored in the volume mount points. Then the organizations have to pay millions of dollars to get back their secrets decrypted.
    Starting Price: $2,500 per month
  • 43
    PipeCD

    PipeCD

    PipeCD

    A unified continuous delivery solution for multiple application kinds on multi-cloud that empowers engineers to deploy faster with more confidence. A GitOps tool that enables doing deployment operations by pull request on Git. Deployment pipeline UI shows clarify what is happening. Separate logs viewer for each individual deployment. Real-time visualization of application state. Deployment notifications to slack, and webhook endpoints. Insights show the delivery performance. Automated deployment analysis based on metrics, logs, and emitted requests. Automatically roll back to the previous state as soon as analysis or a pipeline stage fails. Automatically detect configuration drift to notify and render the changes. Automatically trigger a new deployment when a defined event has occurred (e.g. container image pushed, helm chart published, etc). Support single sign-on and role-based access control. Credentials are not exposed outside the cluster and not saved in the control plane.
  • 44
    Meshmixer

    Meshmixer

    Autodesk

    Meshmixer is state-of-the-art software for working with triangle meshes. Do you need to clean up a 3D scan, do some 3D printing, or design an object that fits something else? Meshmixer can help. Think of it as a sort of "Swiss Army Knife" for 3D meshes. Drag-and-Drop Mesh Mixing. 3D Sculpting and Surface Stamping. Robust Convert-to-Solid for 3D printing. 3D Patterns & Lattices. Hollowing (with escape holes!). Branching Support Structures for 3D printing. Automatic Print Bed Orientation Optimization, Layout & Packing. Advanced selection tools including brushing, surface-lasso, and constraints. Remeshing and Mesh Simplification/Reducing. Mesh Smoothing and Free-Form Deformations. Hole Filling, Bridging, Boundary Zippering, and Auto-Repair. Plane Cuts, Mirroring, and Booleans. Extrusions, Offset Surfaces, and Project-to-Target-Surface. Interior Tubes & Channels. Precise 3D Positioning with Pivots. Automatic Alignment of Surfaces. 3D Measurements. Stability & Thickness Analysis.
  • 45
    AlertSite

    AlertSite

    SmartBear

    AlertSite is the 'Early Warning System' you can trust to monitor your websites, web apps, and APIs from all over the world and within your private networks. You shouldn't be burdened by the fear and the consequence of whether an alert is real or false. AlertSite monitors your UI and API layer for availability, performance, and functionality without the alert fatigue of other monitoring tools. Creating Web and API monitors in AlertSite is intuitive and effortless. Codelessly add new web monitors with DejaClick, our point-and-click web recorder, and API Monitors in just a few clicks using an API Endpoint URL or OpenAPI Specification file. Or, reuse test cases like Selenium Scripts or SoapUI tests to create new monitors. Don't let false alerts and erroneous data cloud your visibility into application health.
  • 46
    Azure Private 5G Core
    Azure Private 5G Core offers simple, scalable, and secure deployment of private 5G core networks on an Azure Arc–managed edge platform within the Azure private multi-access edge compute (MEC) solution. Deploy and connect in minutes for a wide variety of indoor and outdoor use cases and centrally manage private 5G networks across multiple sites. The 5G core is fully self-contained at the edge, and includes User Plane, Control Plane, Subscriber, and Policy functions deployed on Azure private MEC. High availability and disconnected functions ensure that the 5G network remains operational even in the event of network disruptions or outages, providing enterprises with critical reliability and uptime. Centralized orchestration and automated deployment of 5G core software, including multi-slice/data network name (DNN), advanced policy and quality of service (QoS) management, and advanced monitoring of system health locally and in the cloud.
    Starting Price: $1,400 per month
  • 47
    VideoDubber

    VideoDubber

    VideoDubber

    VideoDubber is the world’s first online service that automates the manual labor needed for dubbing, using patent-pending technologies. Its automated cloud platform enables broadcasters & content creators to add dubbing and voice-over in over 40 languages to their videos, with a click of a button. Listen to the dialog in the following news item (courtesy of SkyNews) to hear a variety of languages that were automatically dubbed. Since our voices are neutral (like a great news anchor person), they can dub a variety of content genres, like news shows, documentaries, talk shows, education (biographies, history, etc.), training, life style (e.g. cooking shows, travel, health, yoga, and so many more). We work hard to make our service in line with the broadcasting industry standards, while keeping it as simple as possible, so every Web user will feel comfortable using it.
    Starting Price: $4.99 per minute
  • 48
    Teckro

    Teckro

    Teckro

    Teckro clinical trial software connects all study stakeholders to critical information. Every time. Everywhere. We find answers every day from our smartphones. Why shouldn’t the same be true for clinical trials? Critical, up-to-date study information always at hand when and where research staff and CRAs need it. Study answers are just a tap away on any mobile device, giving research staff a direct line to crucial details. And when updates or amendments are needed, site staff and monitors can be alerted in real-time. Cloud-based clinical trial software, Teckro is up and running quickly with nothing to install. It’s simple, easy and intuitive. Teckro is securely hosted and compliant with major industry regulations, including FDA 21 CFR Part 11. Only the right, approved version of study documents, means no more worrying about version management.
  • 49
    SURE Aerial
    nFrames SURE software delivers an efficient solution of dense image surface reconstruction for mapping, surveying, geo-information and research organizations. The SURE software delivers derivation of precise point clouds, DSMs, True Orthophotos and textured Meshes from small, medium and large frame images. This advanced solution is designed for applications including countrywide mapping, monitoring projects that use manned aircraft and UAVs, cadaster, infrastructure planning, and 3D modeling. SURE Aerial is specifically designed for aerial image datasets captured with large frame nadir cameras, oblique cameras and hybrid systems with additional LiDAR sensors. Without limitation in image resolution, it empowers the production of 3D Meshes, True Orthophotos, Point Clouds and Digital Surface Models on common workstation hardware and in cluster environments. Simple to setup and operate, SURE Aerial is compliant with mapping industry standards and accessible for web streaming technologies.
  • 50
    Oracle Container Engine for Kubernetes
    Container Engine for Kubernetes (OKE) is an Oracle-managed container orchestration service that can reduce the time and cost to build modern cloud native applications. Unlike most other vendors, Oracle Cloud Infrastructure provides Container Engine for Kubernetes as a free service that runs on higher-performance, lower-cost compute shapes. DevOps engineers can use unmodified, open source Kubernetes for application workload portability and to simplify operations with automatic updates and patching. Deploy Kubernetes clusters including the underlying virtual cloud networks, internet gateways, and NAT gateways with a single click. Automate Kubernetes operations with web-based REST API and CLI for all actions including Kubernetes cluster creation, scaling, and operations. Oracle Container Engine for Kubernetes does not charge for cluster management. Easily and quickly upgrade container clusters, with zero downtime, to keep them up to date with the latest stable version of Kubernetes.