Alternatives to Harbor
Compare Harbor alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Harbor in 2024. Compare features, ratings, user reviews, pricing, and more from Harbor competitors and alternatives in order to make an informed decision for your business.
-
1
Google Cloud Platform
Google
Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging. -
2
Container Registry
8gears
A no frills Harbor based Container Registry Service for teams, individuals, and Software Vendor looking for ways to distribute software as container images.Starting Price: $49 per month -
3
Docker
Docker
Docker takes away repetitive, mundane configuration tasks and is used throughout the development lifecycle for fast, easy and portable application development, desktop and cloud. Docker’s comprehensive end-to-end platform includes UIs, CLIs, APIs and security that are engineered to work together across the entire application delivery lifecycle. Get a head start on your coding by leveraging Docker images to efficiently develop your own unique applications on Windows and Mac. Create your multi-container application using Docker Compose. Integrate with your favorite tools throughout your development pipeline, Docker works with all development tools you use including VS Code, CircleCI and GitHub. Package applications as portable container images to run in any environment consistently from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE and more. Leverage Docker Trusted Content, including Docker Official Images and images from Docker Verified Publishers.Starting Price: $7 per month -
4
Easily store, share, and deploy your container software anywhere. Push container images to Amazon ECR without installing or scaling infrastructure, and pull images using any management tool. Share and download images securely over Hypertext Transfer Protocol Secure (HTTPS) with automatic encryption and access controls. Access and distribute your images faster, reduce download times, and improve availability using a scalable, durable architecture. Amazon ECR is a fully managed container registry offering high-performance hosting, so you can reliably deploy application images and artifacts anywhere. Meet your organization’s image compliance security requirements using insights from common vulnerabilities and exposures (CVEs) and the Common Vulnerability Scoring System (CVSS). Publish containerized applications with a single command and easily integrate your self-managed environments.
-
5
Store and distribute container images in a fully managed private registry. Push private images to conveniently run them in the IBM Cloud® Kubernetes Service and other runtime environments. Images are checked for security issues so you can make informed decisions about your deployments. Install the IBM Cloud Container Registry CLI to use the command line to manage your name spaces and Docker images in the IBM Cloud® private registry. View information about potential vulnerabilities and the security of images in the IBM Cloud Container Registry public and private repositories with the IBM Cloud console. Check the security status of container images that are provided by IBM, third parties or that are added to your organization's registry namespace. Advanced capabilities for security compliance insight. Access controls and image signing capabilities. Pre-integration with Kubernetes Service.
-
6
Oracle Cloud Infrastructure Container Registry is an open standards-based, Oracle-managed Docker registry service for securely storing and sharing container images. Engineers can easily push and pull Docker images with the familiar Docker Command Line Interface (CLI) and API. To support container lifecycles, Registry works with Container Engine for Kubernetes, Identity and Access Management (IAM), Visual Builder Studio, and third-party developer and DevOps tools. Work with Docker images and container repositories using familiar Docker CLI commands and Docker HTTP API V2. Oracle takes care of operating and patching the service, so that developers can focus on building and deploying containerized applications. Built using object storage, Container Registry provides data durability and high service availability with automatic replication across fault domains. Oracle does not charge separately for the service. Users pay only for the associated storage and network resources they consume.
-
7
Red Hat Quay
Red Hat
Red Hat® Quay container image registry provides storage and enables you to build, distribute, and deploy containers. Gain more security over your image repositories with automation, authentication, and authorization systems. Quay is available with OpenShift or as a standalone component. Control access of the registry with multiple identity and authentication providers (including support for teams and organization mapping). Use a fine-grained permissions system to map to your organizational structure. Transport layer security encryption helps you transit between Quay.io and your servers automatically. Integrate with vulnerability detectors (like Clair) to automatically scan your container images. Notifications alert you to known vulnerabilities. Streamline your continuous integration/continuous delivery (CI/CD) pipeline with build triggers, git hooks, and robot accounts. Audit your CI pipeline by tracking API and UI actions. -
8
Tencent Container Registry
Tencent
Tencent Container Registry (TCR) offers secure, dedicated, and high-performance container image hosting and distribution service. You can create dedicated instances in multiple regions across the globe and pull container images from the nearest region to reduce pulling time and bandwidth costs. To guarantee data security, TCR features granular permission management and access control. It also supports P2P accelerated distribution to break through the performance bottleneck due to concurrent pulling of large images by large-scale clusters, helping you quickly expand and update businesses. You can customize image synchronization rules and triggers, and use TCR flexibly with your existing CI/CD workflow to quickly implement container DevOps. TCR instance adopts containerized deployment. You can dynamically adjust the service capability based on actual usage to manage sudden surges in business traffic. -
9
Mirantis Secure Registry
Mirantis
Mirantis Secure Registry (formerly Docker Trusted Registry) provides an enterprise grade container registry solution that can be easily integrated to provide the core of an effective secure software supply chain. Enterprise-grade security Centralize control for container images: Store, share, and manage images from a secure docker registry under your control, enabling developers to use and run only approved images. Protect and verify: Scan images against a continuously updated vulnerability database, and validate with cryptographic signing. Secure and accelerate CI/CD workflows: Automatically promote images from test to prod for a secure, efficient software pipeline—all while maintaining policy-based controls. -
10
Alibaba Cloud Container Registry
Alibaba Cloud
Container Registry allows you to manage images throughout the image lifecycle. It provides secure image management, stable image build creation across global regions, and easy image permission management. This service simplifies the creation and maintenance of the image registry and supports image management in multiple regions. Combined with other cloud services such as container service, container registry provides an optimized solution for using Docker in the cloud. Provides an intranet URL of the image repository for each region. You can visit this URL to download images without using traffic. Builds services automatically, in regions outside China, and in stages. Allows you to easily scan the image security status and provides multi-dimensional vulnerability reports. Provides an easy Docker-based continuous integration and continuous delivery solution. Easy operations allow you to quickly start using the service at low management and maintenance costs.Starting Price: $113 per month -
11
Azure Container Registry
Microsoft
Build, store, secure, scan, replicate, and manage container images and artifacts with a fully managed, geo-replicated instance of OCI distribution. Connect across environments, including Azure Kubernetes Service and Azure Red Hat OpenShift, and across Azure services like App Service, Machine Learning, and Batch. Geo-replication to efficiently manage a single registry across multiple regions. OCI artifact repository for adding helm charts, singularity support, and new OCI artifact-supported formats. Automated container building and patching including base image updates and task scheduling. Integrated security with Azure Active Directory (Azure AD) authentication, role-based access control, Docker content trust, and virtual network integration. Streamline building, testing, pushing, and deploying images to Azure with Azure Container Registry Tasks.Starting Price: $0.167 per day -
12
Yandex Container Registry
Yandex
Docker images are placed in fault-tolerant storage. Automatic replication is configured for all data, each replica changes when Docker images are edited, created, or deleted. The service provides containers for Linux and Windows OS. Use them however you want, running on your local machine or on a Yandex Compute Cloud VM. High-speed Docker image operations without expenses for external traffic, Docker image registries are hosted in the same data centers where your cloud infrastructure is deployed. Docker images are transmitted via HTTPS. You choose who can view, pull, push, or delete them. You use a Docker image and we take care of maintaining the infrastructure where your registry is running. You only pay for the space used by your Docker images. You can use the service via the management console, command line interface (CLI), API, or the standard Docker CLI, the service is compatible with the Docker registry HTTP API V2.Starting Price: $0.012240 per GB -
13
Slim.AI
Slim.AI
Easily connect your own private registries and share images with your team. Explore the world’s largest public registries to find the right container image for your project. If you don’t know what’s in your containers, you can’t have software security. The Slim platform lifts the veil on container internals so you can analyze, optimize, and compare changes across multiple containers or versions. Use DockerSlim, our open-source project, to automatically optimize your container images. Remove bulky or dangerous packages, so you ship only what you need to produce. Find out how the Slim platform can help your team automatically improve software and supply chain security, tune containers for development, testing, and production, and ship secure container-based apps to the cloud. Accounts are free and there is no charge to use the platform at this time. We're container enthusiasts, not salespeople, so know that your privacy and security are the founding principles of our business. -
14
With Container Registry your team can manage Docker images, perform vulnerability scans and decide who accesses what resources with precise access control; All in one place. Existing CI / CD integrations allow you to configure fully automated Docker pipelines for information without delay. Get access to private and secure Docker image storage on Google Cloud Platform in minutes. Control who can access, view or download images. Get consistent uptime on a protected infrastructure with Google security. Build and push images to the private registry automatically when you commit code to Cloud Source Repositories, GitHub, or Bitbucket. Easily configure CI / CD pipelines with Cloud Build integration or deploy directly to Google Kubernetes Engine, App Engine, Cloud Functions, or Firebase. Automatically build containers on code or tag changes to a repository. Search across previous builds from the UI or view build details like a trigger, source, steps, and logs.
-
15
Dist
Dist
Highly available and super fast artifact repositories and container registries that keep your developers, operations teams, and customers happy and productive. Dist is the simplest and most reliable way to securely distribute Docker container images and Maven artifacts across your team, systems, and customers. Our purpose-built edge network ensures optimal performance, wherever your team and customers are. Dist is fully managed in the cloud. We take care of operations, maintenance, and backups so you can focus on your business. Restrict access to repositories by users and groups. Each user can further compartmentalize their own access using access tokens. All artifacts, container images, and their associated metadata are encrypted at rest and in transit.Starting Price: $39 per month -
16
JFrog Container Registry
JFrog
The world’s most advanced, powerful, hybrid Docker and Helm registry. Power your world of Docker without limits. The JFrog Container Registry is the most comprehensive and advanced registry in the market today, supporting Docker containers and Helm Chart repositories for your Kubernetes deployments. Use it as your single access point to manage and organize your Docker images, while avoiding Docker Hub throttling or retention issues. JFrog provides reliable, consistent, and efficient access to remote Docker container registries with integration to your build ecosystem. Develop and deploy your way. Supports your current and future business model with on-prem / self-hosted, hybrid, and multi-cloud environments on your choice of AWS, Microsoft Azure, and Google Cloud. Built on JFrog Artifactory’s proven track record of power, stability, and resilience to easily manage and deploy your Docker images and provide your DevOps teams with full control over access and permissions.Starting Price: $98 per month -
17
JFrog Platform
JFrog
Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.Starting Price: $98 per month -
18
Portus
Portus
Portus implements the new authorization scheme defined by the latest version of the Docker registry. It allows for fine grained control over all of your images. You decide which users and teams are allowed to push or pull images. Map your company organization inside of Portus, define as many teams as you want and add and remove users from them. Portus provides an intuitive overview of the contents of your private registry. It also features a search capability to find images even faster. User privileges are constantly taken into account, even when browsing the contents of the repository or when performing searches. Keep everything under control. All the relevant events are automatically logged by Portus and are available for analysis by admin users. Non-admin users can also use this feature to keep up with relevant changes. -
19
Scaleway
Scaleway
The Cloud that makes sense. From high-performance cloud ecosystem to hyperscale green datacenters, Scaleway provides the foundation for digital success. Cloud platform designed for developers & growing companies. All you need to create, deploy and scale your infrastructure in the cloud. Compute, GPU, Bare Metal & Containers. Evolutive & Managed Storage. Network. IoT. The largest choice of dedicated servers to succeed in the most demanding projects. High-end dedicated servers Web Hosting. Domain Names Services. Take advantage of our cutting-edge expertise to host your hardware in our resilient, high-performance and secure data centers. Private Suite & Cage. Rack, 1/2 & 1/4 Rack. Scaleway data centers. Scaleway is driving 6 data centers in Europe and offers cloud solutions to customers in more that 160 countries around the world. Our Excellence team: Experts by your side 24/7 year round Discover how we help our customers to use, tune & optimize their platforms with skilled expert -
20
GitLab
GitLab
GitLab is a complete DevOps platform. With GitLab, you get a complete CI/CD toolchain out-of-the-box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate. GitLab helps teams accelerate software delivery from weeks to minutes, reduce development costs, and reduce the risk of application vulnerabilities while increasing developer productivity. Source code management enables coordination, sharing and collaboration across the entire software development team. Track and merge branches, audit changes and enable concurrent work, to accelerate software delivery. Review code, discuss changes, share knowledge, and identify defects in code among distributed teams via asynchronous review and commenting. Automate, track and report code reviews.Starting Price: $29 per user per month -
21
Nexus Repository Pro
Sonatype
Manage binaries and build artifacts across your software supply chain. Single source of truth for all of your components, binaries, and build artifacts. Efficiently distribute parts and containers to developers. Deployed at more than 100,000 organizations globally. Store and distribute Maven/Java, npm, NuGet, Helm, Docker, P2, OBR, APT, GO, R, Conan components and more. Manage components from dev through delivery: binaries, containers, assemblies, and finished goods. Advanced support for the Java Virtual Machine (JVM) ecosystem, including Gradle, Ant, Maven, and Ivy. Compatible with popular tools like Eclipse, IntelliJ, Hudson, Jenkins, Puppet, Chef, Docker, and more. Deliver innovation 24x7x365 with high availability. A single source of truth for components used across your entire software development lifecycle including QA, staging, and operations. Easily integrate with existing user and access provisioning systems including LDAP, Atlassian Crowd, and more. -
22
Oracle Container Cloud Service (also known as Oracle Cloud Infrastructure Container Service Classic) offers Development and Operations teams the benefits of easy and secure Docker containerization when building and deploying applications. Provides an easy-to-use interface to manage the Docker environment. Provides out-of-the-box examples of containerized services and application stacks that can be deployed in one click. Enables developers to easily connect to their private Docker registries (so they can ‘bring their own containers’). Enables developers to focus on building containerized application images and Continuous Integration/Continuous Delivery (CI/CD) pipelines, not on learning complex orchestration technologies.
-
23
Kubescape
Armo
A Kubernetes open-source platform providing developers and DevOps an end-to-end security solution, including risk analysis, security compliance, RBAC visualizer, and image vulnerabilities scanning. Kubescape scans K8s clusters, Kubernetes manifest files (YAML files, and HELM charts), code repositories, container registries and images, detecting misconfigurations according to multiple frameworks (such as the NSA-CISA, MITRE ATT&CK®), finding software vulnerabilities, and showing RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline. It calculates risk scores instantly and shows risk trends over time. Kubescape has became one of the fastest-growing Kubernetes security compliance tools among developers due to its easy-to-use CLI interface, flexible output formats, and automated scanning capabilities, saving Kubernetes users and admins precious time, effort, and resources.Starting Price: $0/month -
24
Nexus Container
Sonatype
Deploying containers successfully means balancing robust security practices, agile DevOps team needs, and compliance requirements. Nexus Container does it all — helping your development, security, and operations teams discover, continuously monitor, and fix container vulnerabilities during the entire container lifecycle. We continuously scan during build, monitor images in registries, and run automated tests for security compliance to ensure we catch vulnerabilities early in the container development cycle. If an issue is found, don’t worry, our admission controls and policy enforcement keep vulnerable images from deploying. Containers need advanced network protection for real-time security. Not only do we continuously monitor your containers to identify vulnerabilities and share available fixes once in-production, we’re the only solution that can enforce data loss protection and prevent zero-day malware and network attacks, tunneling, and breaches. -
25
Azure Web App for Containers
Microsoft
It has never been easier to deploy container-based web apps. Just pull container images from Docker Hub or a private Azure Container Registry, and Web App for Containers will deploy the containerized app with your preferred dependencies to production in seconds. The platform automatically takes care of OS patching, capacity provisioning, and load balancing. Automatically scale vertically and horizontally based on application needs. Granular scaling rules are available to handle peaks in workload automatically while minimizing costs during off-peak times. Deploy data and host services across multiple locations with just few mouse clicks. -
26
StackRox
StackRox
Only StackRox provides comprehensive visibility into your cloud-native infrastructure, including all images, container registries, Kubernetes deployment configurations, container runtime behavior, and more. StackRox’s deep integration with Kubernetes delivers visibility focused on deployments, giving security and DevOps teams a comprehensive understanding of their cloud-native infrastructure, including images, containers, pods, namespaces, clusters, and their configurations. You get at-a-glance views of risk across your environment, compliance status, and active suspicious traffic. Each summary view enables you to drill into more detail. Using StackRox, you can easily identify and analyze container images in your environment with native integrations and support for nearly every image registry. -
27
Registry Life
ChemTable
The system registry is one of the most important components of the operating system. The stability of the system's operation depends upon it being in working order, and the speed of the applications you work with depends upon the volume of data contained in it. Registry Life helps correct errors in the registry and optimizes it. It's a compact, simple to use, and free solution for servicing your system registry. Registry Life offers a handy tool to clean and repair the registry. With this tool, you can run checks on the registry to detect more than ten different kinds of problems. At the same time, this tool deletes informational junk from the registry. Registry Life is a utility to defragment and compress the registry. The program optimizes the registry quickly and efficiently and displays results of this operation visually.Starting Price: Free -
28
Clair
Clair
Clair is an open-source project for the static analysis of vulnerabilities in application containers (currently including OCI and docker). Clients use the Clair API to index their container images and can then match it against known vulnerabilities. Our goal is to enable a more transparent view of the security of the container-based infrastructure. Thus, the project was named Clair after the French term which translates to clear, bright, and transparent. Manifests are Clair's representation of a container image. Clair leverages the fact that OCI Manifests and Layers are content-addressed to reduce duplicated work. -
29
CXi-Registry
CXi Software
A cloud-based SaaS subscription model provides a low-risk, cost-effective tool for fund managers and fund administrators to meet their registry and regulatory compliance needs, and enable enhanced investor engagement. The CXi-Registry SaaS solution provides full end to end processing for funds management registry operations, user-friendly dashboards and reporting, and all regulatory compliance reporting requirements. The system employs latest technology, providing a controlled and secure environment for all unit registry data. CXi provide professional services around the CXi-Registry SaaS solution. Professional services include registry operations and fund administration consulting, project management, software implementation consulting and technical services. CXi-Registry customer support provides an online ‘Service Desk’ system allowing users to easily ask questions, log issues and provide supporting documentation. -
30
Ostorlab
Ostorlab
Uncover your organization's vulnerabilities with ease using Ostorlab. It goes beyond subdomain enumeration, accessing mobile stores, public registries, crawling targets, and analytics to provide a comprehensive view of your external posture. With a few clicks, gain valuable insights to strengthen security and protect against potential threats. From insecure injection and outdated dependencies to hardcoded secrets and weak cryptography, Ostorlab automates security assessments and identifies privacy issues. Ostorlab empowers security and developer teams to analyze and remediate vulnerabilities efficiently. Experience hands-off security with Ostorlab's continuous scanning feature. Automatically trigger scans on new releases, saving you time and effort while ensuring continuous protection. Access intercepted traffic, file system, function invocation, and decompiled source code with ease using Ostorlab. See what attackers see and save hours of manual tooling and grouping of outputs.Starting Price: $365 per month -
31
Compass
Cobalt Iron
Forget the days of managing data protection events through multiple, disconnected backup products. With Compass, you can set policies, view operations, and track granular performance for all your workloads. Compass is secure by design and the only data backup solution endorsed by Sheltered Harbor for both on-prem and cloud. It's architected to eliminate vulnerabilities in the backup process that expose data to cyberattack. If disaster strikes, your backup is ready to help you recover immediately. Born in the cloud, the Compass Architecture is designed to take full advantage of progressive technologies such as analytics, SaaS, multi-cloud, and virtualization. The Commander is an easy-to-use web dashboard providing a simple and intuitive user experience, while the Analytics Engine delivers the flexibility and insight required for today’s enterprise data protection. -
32
Risk Harbor
Risk Harbor
Risk management marketplace for Web3. An algorithmic, transparent, and impartial protocol that removes the need for trusted intermediaries. Protect against smart contract risk and network vulnerabilities. Invest safely and earn risk-adjusted rewards by providing protection. Maximize capital efficiency with market-informed dynamic pricing. Purchase protection and secure your capital. Risk Harbor programmatically secures your assets against a wide spectrum of risks, exploits, and attacks. Get instant payouts with objective and transparent event assessments. Purchase protection and secure your capital. Invest capital with Risk Harbor and earn additional rewards on already productive assets. Leverage dynamic risk assessment data to allocate funds safely and efficiently. We’re securing an ever-expanding universe of financial applications and are always looking to integrate with new and existing solutions. -
33
Accredited.AM
Accredited.AM
The Accredited.AM website is provided by North Capital Investment Technology Inc. (“NCIT”). Verification services are provided by North Capital Private Securities Corporation (“NCPS”), a wholly-owned subsidiary of NCIT registered as a broker-dealer and member of FINRA and SIPC. Because NCPS is a registered broker-dealer, issuers and platforms can rely upon our verification letter for compliance with the verification requirement of rule 506(c), under the SEC’s safe harbor guidance. Accredited.AM is a free service for you to obtain verification of your accredited status as required by federal law to invest in private placements. Your verified status allows you to invest through a growing list of online platforms and financial institutions. We safeguard your privacy and confidential information. Once verified, you can invest through a wide variety of online platforms and financial institutions, without disclosing further confidential information about your income or assets.Starting Price: Free -
34
PicScout
PicScout
The PicScout Platform is the industry-leading registry of owner-identified images. The registry is fast-approaching 300 million identified images from more than 200 major content providers and 20,000 photographers. The PicScout Platform is beneficial to both content owners and users. It enables content owners to make their content more visible and accessible to content users, and in turn, lets content users visually search and identify images with ease and efficiency, for proper licensing. To search the registry, please use the free Search By Image tool below. PicScout’s Visual API is designed to help you better understand and analyze image content. Our pioneering image recognition technology is based on deep learning research, and offers a wide range of capabilities. These include visual search that identifies the same or similar images. Our user-friendly REST API is flexible, scalable and affordable. -
35
AppHarbor
AppHarbor
AppHarbor is a fully hosted .NET Platform as a Service. AppHarbor can deploy and scale any standard .NET application to the cloud. AppHarbor is used by thousands of developers and businesses to host anything from personal blogs to high traffic web applications. AppHarbor lets you instantly deploy and scale .NET applications using your favorite versioning tool. Installing add-ons is just as easy. You push .NET and Windows code to AppHarbor using Git, Mercurial, Subversion or Team Foundation Server with the complimentary Git service or through integrations offered in collaboration with Bitbucket, CodePlex and GitHub. When AppHarbor receives your code it will be built by a build server. If the code compiles all unit tests contained in the compiled assemblies will be run. The result and progress of the build and unit test status can be monitored on the application dashboard. AppHarbor will call any service hooks that you add to notify you of the build result.Starting Price: $49 per month -
36
Flux
Flux CD
Flux is a set of continuous and progressive delivery solutions for Kubernetes that are open and extensible. The latest version of Flux brings many new features, making it more flexible and versatile. Flux is a CNCF Incubating project. Flux and Flagger deploy apps with canaries, feature flags, and A/B rollouts. Flux can also manage any Kubernetes resource. Infrastructure and workload dependency management are built-in. Flux enables application deployment (CD) and (with the help of Flagger) progressive delivery (PD) through automatic reconciliation. Flux can even push back to Git for you with automated container image updates to Git (image scanning and patching). Flux works with your Git providers (GitHub, GitLab, Bitbucket, can even use s3-compatible buckets as a source), all major container registries, and all CI workflow providers. Kustomize, Helm, RBAC, and policy-driven validation (OPA, Kyverno, admission controllers) so it simply falls into place. -
37
AWS Service Catalog
Amazon
AWS Service Catalog allows organizations to create and manage catalogs of IT services that are approved for use on AWS. These IT services can include everything from virtual machine images, servers, software, and databases to complete multi-tier application architectures. AWS Service Catalog allows you to centrally manage deployed IT services and your applications, resources, and metadata. This helps you achieve consistent governance and meet your compliance requirements while enabling users to quickly deploy only the approved IT services they need. With AWS Service Catalog AppRegistry, organizations can understand the application context of their AWS resources. You can define and manage your applications and their metadata, to keep track of cost, performance, security, compliance and operational status at the application level. AWS Service Catalog AppRegistry provides a single repository for collecting and managing your application resources on AWS. -
38
Secure your container environment on GCP, GKE, or Anthos. Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale. As enterprises create more containerized workloads, security must be integrated at each stage of the build-and-deploy life cycle. Infrastructure security means that your container management platform provides the right security features. Kubernetes includes security features to protect your identities, secrets, and network, and Google Kubernetes Engine uses native GCP functionality—like Cloud IAM, Cloud Audit Logging, and Virtual Private Clouds—and GKE-specific features like application layer secrets encryption and workload identity to bring the best of Google security to your workloads. Securing the software supply chain means that container images are safe to deploy. This is how you make sure your container images are vulnerability free and that the images you build aren't modified.
-
39
Drive SnapShot
Tom Ehlert Software
Disk Image Backup for Windows. The Backup process will back up all your data into a single file, containing all data, including system data and registry, for total security, should your computer ever crash. There is no restart (to DOS) necessary. The new Snapshot technology ensures that all data are consistent, and reflect the PC's data at the start of backup. There are no difficulties with opened files. This enables a very fast and easy way to back up servers and other computers, that must run 24 hours a day. Drive Snapshot creates a virtual drive, containing all your drive's data. You may use, compare, or restore these files directly from the Disk Image file. This works with any program of your choice, including (of course) the Windows Explorer.Starting Price: $44.37 one-time payment -
40
APX VCS Registry
APX
The APX VCS Registry is a trusted and secure platform for issuing, tracking and retiring Verified Carbon Units (VCUs). The Registry supports the VCS Association’s objectives to provide credibility to the voluntary markets, as well as to enhance business, consumer, and government confidence. The APX VCS Registry allows project developers to initiate the project registration process, upload documents and request issuance of VCUs through our online portal. Once VCUs are issued, they can be transferred immediately to any APX VCS Registry Account Holder or to another VCS-accredited registry. -
41
npm
npm
We're npm, Inc., the company behind Node package manager, the npm Registry, and npm CLI. We offer those to the community for free, but our day job is building and selling useful tools for developers like you. Get started today for free, or step up to npm Pro to enjoy a premium JavaScript development experience, with features like private packages. Bring the best of open source to you, your team, and your company. Relied upon by more than 11 million developers worldwide, npm is committed to making JavaScript development elegant, productive, and safe. The free npm Registry has become the center of JavaScript code sharing, and with more than one million packages, the largest software registry in the world. Our other tools and services take the Registry, and the work you do around it, to the next level. At npm, Inc., we're proud to dedicate teams of full-time employees to operating the npm Registry, enhancing the CLI, improving JavaScript security, and other projects.Starting Price: $7 per month -
42
Calamu Protect
Calamu Protect
Calamu Protect automatically fragments data across multiple separate storage locations while at rest, in an environment called a data harbor, which instantly nullifies the impact of a data breach or ransomware attack. Protects against data theft and extortion. Fragmented data is worthless to cyber attackers. Automatically self-heals from cyber attacks. Data remains available as if nothing happened. Meets data privacy regulations. Geo-fragmented storage enables compliance with international laws and standards. Calamu Drive works seamlessly with existing employee data and document workflows using Windows File Explorer or macOS Finder. It’s transparent to users that files are being protected in a virtual data harbor, safe from ransomware and evolving threats. Calamu Connectors provide nearly unlimited access to a data harbor, whether you’re protecting data in an Amazon S3 bucket, on local servers, or database snapshots. -
43
RegSofts Free Window Registry Repair
RegSofts
Almost all Windows users gradually experiences the downfall in their PC's performance. Much of it can be attributed to Windows Registry Errors. By using Free Window Registry Repair regularly and repairing your registry your system should not only be more stable but it will also help Windows run faster. For your convenience it automatically backup any repairs made so that you always can restore Windows registry to the original state. The registry is a heart and soul of any Windows system. It contains information that controls how your system appears and how it behaves. Almost all Windows users gradually experiences the downfall in their PC's performance. Much of it can be attributed to Windows Registry Errors. For your convenience and for insuring maximum protection. Free Window Registry Repair automatically backup any repairs made. So you always can restore Windows registry to the original state using restore button.Starting Price: Free -
44
Collection Harbor
Collection Harbor
Collection management software for museums and private collectors has been stuck in the last century for too long. At Collection Harbor, we listened to museum professionals to build an intuitive web-based CMS that lets you manage your collection efficiently and affordably from any computer. Collection Harbor runs in the cloud, allowing you to securely access and manage your collection from any computer. No more onerous system requirements, expensive onsite installation processes, or manual updates to worry about! Collection Harbor provides unparalleled ease in all aspects of collection management, allowing you to focus your time where it matters. Easy to use reports feature allows user to curate data when making lists, and to print lists using external software. Fast and powerful search feature that allows quick and accurate searching of collection. -
45
Tenable Enclave Security
Tenable
Identify, understand, and close cyber weaknesses across your modern infrastructure. Built for highly secure environments. Tenable Enclave Security, a unified cyber risk solution, delivers innovative cybersecurity capabilities to highly secure environments while addressing strict data residency and security requirements. Discover and assess IT assets and containers. Bring cyber risk to light and expose where you’re vulnerable. Analyze cyber risk across asset types and pathways. Identify the true exposures threatening your organization. Understand vulnerability severity and asset criticality. Prioritize remediation of high-impact weaknesses. Expose and close critical vulnerabilities in highly secure environments. Ensure compliance with the most stringent cloud security and data residency requirements. Tenable Enclave security can operate in classified and air-gapped environments. -
46
TweakNow RegCleaner
TweakNow
The Registry is a heart and soul of any Windows system. It contains information that controls how your Windows appears and how it behaves. Most applications today use registry to store configuration and other important data. When you install application, new registry entries created. These entries should be deleted automatically when you uninstall the application. Unfortunately, it does not always work that way. Sometimes you find that several applications fail to remove their own registry entries. These entries will become obsolete. After a long period, after installing and uninstalling a lot number of applications, your Windows registry may contain a large number of obsolete entries. These will significantly increase the registry size and thus will slow down your computer, because Windows will need more time to load, search, and read data from registry.Starting Price: Free -
47
Kops.dev
Kops.dev
Ease of provisioning, management, and observability of infrastructure across multiple cloud platforms with Kops.dev. Seamlessly deploy and manage infrastructure across AWS, Google Cloud, and Azure, all from a single platform. Built-in monitoring and visibility with integrated tools like Prometheus, Grafana, and FluentBit, ensuring real-time insights and log management. Native support for distributed tracing, enabling detailed tracking and optimization of application performance across microservices. Automatically sets up container registries, handles permissions, and manages credentials for deploying images within your cluster. Manages service settings by handling YAML configurations automatically and requiring only essential input from you. Simplifies database setup, including creating data stores, managing firewalls, and securely attaching credentials to service pods. Automatically configures host attachments and manages TLS certificates to securely expose your services. -
48
Bitdefender Advanced Threat Intelligence
Bitdefender
Fueled by the Bitdefender Global Protective Network (GPN), Bitdefender Advanced Threat Intelligence collects data from sensors across the globe. Our Cyber-Threat Intelligence Labs correlate hundreds of thousands of Indicators of Compromise and turn data into actionable, real-time insights. By delivering our top-rated security data and expertise directly to businesses and Security Operations Centers, Advanced Threat Intelligence bolsters security operations success with one of the industry’s broadest and deepest bases of real-time knowledge. Improve threat-hunting and forensic capabilities with contextual, actionable threat indicators on IPs, URLs, domains and files known to harbor malware, phishing, spam, fraud and other threats. Decrease time to value by seamlessly integrating our platform-agnostic Advanced Threat Intelligence services into your security architecture, including SIEM, TIP and SOAR. -
49
Azure Pipelines
Microsoft
Automate your builds and deployments with Pipelines so you spend less time with the nuts and bolts and more time being creative. Get cloud-hosted pipelines for Linux, macOS, and Windows. Build web, desktop and mobile applications. Deploy to any cloud or on‑premises. Build, test, and deploy Node.js, Python, Java, PHP, Ruby, C/C++, .NET, Android, and iOS apps. Run in parallel on Linux, macOS, and Windows. Easily build and push images to container registries like Docker Hub and Azure Container Registry. Deploy containers to individual hosts or Kubernetes. Explore and implement a wide range of community-built build, test, and deployment tasks, along with hundreds of extensions from Slack to SonarCloud. Implement continuous delivery (CD) of your software to any cloud, including Azure, AWS, and GCP. Visualize deployment to any number of interdependent stages. -
50
INFINITT Cardiology Suite
INFINITT North America, Inc.
INFINITT Cardiology Suite integrates all your cardiovascular data into one solution, streamlining image management, analysis, reporting and submission to data registries. In addition, INFINITT has been certified by the American College of Cardiology (ACC), demonstrating that INFINITT Cardiology Suite-v. 1.0.8.1 meets NCDR requirements for version 5 of the CathPCI Registry®. INFINITT Cardiology Suite INFINITT Cardiology Suite is a web-based PACS and reporting system for cardiology and vascular imaging, EKG and nuclear medicine. It can be used as a stand-alone system or become fully integrated with INFINITT PACS, consolidating data for the EHR. Report templates are customizable and compatible with Dragon Dictation. Basic and advanced measurements and calculations for echocardiography, non-invasive vascular, EKG, nuclear medicine and cardiac catheterization images. Sophisticated report creation with auto-population of measurements and interpretations. Eliminates transcription costs