747 Integrations with Kubernetes

View a list of Kubernetes integrations and software that integrates with Kubernetes below. Compare the best Kubernetes integrations as well as features, ratings, user reviews, and pricing of software that integrates with Kubernetes. Here are the current Kubernetes integrations in 2024:

  • 1
    Atomist

    Atomist

    Atomist

    Introducing our new automation platform, delivering pre-built automations called skills. Automate all your repetitive and nuanced tasks like replacing strings in projects, updating npm dependencies, running a code quality scan, or build your own skill to solve your unique requirements. Teams using Atomist have the flexibility to apply pre-built automations, called skills, across all their repositories, development activities, and operations events. The execution of a skill is triggered by an event-based action important to your team, like a commit, build, deployment, or the creation of an issue.
  • 2
    SOAtest

    SOAtest

    Parasoft

    Anchored in artificial intelligence (AI) and machine learning (ML), Parasoft SOAtest simplifies the complexity of functional testing across APIs, UIs, databases, and more. Change management systems continuously monitor quality, making the API and web service testing tool a perfect fit for Agile DevOps environments. Parasoft SOAtest delivers fully integrated API and web service testing tools that automate end-to-end functional API testing. Streamline automated testing with advanced functional test-creation capabilities for applications with multiple interfaces (REST & SOAP APIs, microservices, databases, and more). The tools reduce the risk of security breaches and performance outages by transforming functional testing artifacts into security and load equivalents. Such reuse, along with continuous monitoring of API for change, allows faster and more efficient testing.
  • 3
    IBM Cloud Data Shield
    IBM Cloud™ Data Shield enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes Service host, providing data-in-use protection. IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for MySQL, NGINX and Vault. Powered by the Fortanix Runtime Encryption platform and Intel SGX technology, these tools enable organizations with sensitive data to leverage cloud computing with more confidence. IBM Cloud Data Shield helps enable organizations with sensitive data to deploy and benefit from cloud computing. IBM Cloud Data Shield can run containerized applications in secure enclaves on the IBM Cloud Kubernetes Service.
  • 4
    Qualys Container Security
    Qualys CS features a vulnerability analysis plug-in for CI/CD tool Jenkins, and soon for other CI/CD tools including Bamboo, TeamCity, and CircleCI. You can download the plugins directly from within the container security module. With Qualys CS, security teams can participate in the DevOps process to gate vulnerable images entering the system, while developers get actionable data to remediate vulnerabilities. Configure policies for preventing vulnerable images from entering the repositories. Set policies based on criteria such as vulnerability severity, and specific QIDs. Review from within the plug-in a summary of the build with its vulnerabilities, information on patchable software and fixed versions, and image layers where it is present. Container infrastructure is immutable in nature, which means containers need to be identical to the images they are baked from.
  • 5
    BMC Helix Cloud Security
    Automated cloud security posture management. Designed for the cloud, in the cloud, BMC Helix Cloud Security takes the pain out of security and compliance for cloud resources and containers. Cloud security scoring and remediation for public cloud Iaas and PaaS services from AWS, Azure, and GCP. Automated remediation — no coding required. Container configuration security for Docker, Kubernetes, OpenShift, and GKE. Automated ticketing enrichment via ITSM integration. Ready-to-use CIS, PCI DSS, & GDPR policies, plus support for custom policies. Automated cloud server security management for AWS EC2 and MS Azure VMs. Your cloud footprint is constantly evolving, requiring a solution that accelerates agility without compromising security and compliance. BMC Helix Cloud Security is up to the challenge. Automated security checks and remediation for AWS, Azure, and GCP IaaS and PaaS services.
  • 6
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 7
    Sophos Cloud Optix
    Asset and network traffic visibility for AWS, Azure, and Google Cloud. Risk-based prioritization of security issues with guided remediation. Optimize spend for multiple cloud services on a single screen. Get automatic identification and risk-profiling of security and compliance risks, with contextual alerts grouping affected resources, detailed remediation steps, and guided response. Track cloud services side by side on a single screen for improved visibility, receive independent recommendations to reduce spend, and identify indicators of compromise. Automate compliance assessments, save weeks of effort mapping Control IDs from overarching compliance tools to Cloud Optix, and produce audit-ready reports instantly. Seamlessly integrate security and compliance checks at any stage of the development pipeline to detect misconfigurations and embedded secrets, passwords, and keys.
  • 8
    Densify

    Densify

    Densify

    Densify provides Advanced Cloud & Container Resource Management Platform that leverages machine-learning to make cloud & container workloads self-aware of their precise resource requirements, and fully automates the resource management process. With Densify, CloudOps ensure apps continuously get the optimal resources they need at the lowest possible spend. No software downloads, no implementation, no training—just outcomes. A full service, “9.5/10, spectacular”, product —ZDnet. Optimization is impossible without meticulously-accurate analytics that produce actions your application owners will trust and allow. Policy and transparency that unify Finance, Engineering, Operations, and application owners to drive continuous cost optimization. Connects with your ecosystem to feed the processes and systems required to confidently optimize.
  • 9
    Portworx

    Portworx

    Pure Storage

    Run Kubernetes in production with the #1 Kubernetes platform for persistent storage, backup, DR, data security and capacity management. Easily protect, restore and migrate your Kubernetes applications in any cloud or data center. The Portworx Enterprise Storage Platform is your end-to-end storage and data management solution for all your Kubernetes projects, including container-based CaaS, DBaaS, SaaS, and Disaster Recovery initiatives. Your apps will benefit from container-granular storage, disaster recovery, data security, multi-cloud migrations and more. Easily solve the enterprise requirements needed to run data service on Kubernetes. Effortlessly offer a cloud-like DbaaS to your users without giving up control. Scale the backend data services powering your SaaS app without operational complexity. Add DR to any Kubernetes app with a single command. Easily backup and restore all your Kubernetes applications.
  • 10
    Starburst Enterprise

    Starburst Enterprise

    Starburst Data

    Starburst helps you make better decisions with fast access to all your data; Without the complexity of data movement and copies. Your company has more data than ever before, but your data teams are stuck waiting to analyze it. Starburst unlocks access to data where it lives, no data movement required, giving your teams fast & accurate access to more data for analysis. Starburst Enterprise is a fully supported, production-tested and enterprise-grade distribution of open source Trino (formerly Presto® SQL). It improves performance and security while making it easy to deploy, connect, and manage your Trino environment. Through connecting to any source of data – whether it’s located on-premise, in the cloud, or across a hybrid cloud environment – Starburst lets your team use the analytics tools they already know & love while accessing data that lives anywhere.
  • 11
    Cayley

    Cayley

    Cayley

    Cayley is an open-source database for Linked Data. It is inspired by the graph database behind Google's Knowledge Graph (formerly Freebase). Cayley is an open-source graph database designed for ease of use and storing complex data. Built-in query editor, visualizer and REPL. Cayley can use multiple query languages like Gizmo, a query language inspired by Gremlin, GraphQL-inspired query language, MQL a simplified version for Freebase fans. Cayley is modular, easy to connect to your favorite programming languages and back-end stores, production ready, well tested and used by various companies for their production workloads and fast with optimized specifically for usage in applications. Rough performance testing shows that, on 2014 consumer hardware and an average disk, 134m quads in LevelDB is no problem and a multi-hop intersection query- films starring X and Y - takes ~150ms. Cayley is configured by default to run in memory (That's what backend memstore means).
  • 12
    amazee.io

    amazee.io

    amazee.io

    amazee.io offers high-performance, flexible hosting solutions built for speed, security, and scalability. Whether you're running 500 decoupled Drupal sites, a single Laravel application, or a complex technology stack, Lagoon has the flexibility to accommodate any project thanks to containers. Our team of systems engineers is available to support your special requests and custom configurations. amazee.io takes security seriously, passing rigorous audits and offering a GDPR-compliant platform. Lagoon runs the latest technologies and is built to deliver the most performant development, deployment, and end-user experiences possible. We set up Lagoon to handle unplanned spikes in traffic and usage. Your server's resources will scale automatically when needed. Effortlessly create test environments for pull requests and branches. Full congruency across environments. Autoscales to handle fluctuating traffic.
    Starting Price: $199 per month
  • 13
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 14
    Lenses

    Lenses

    Lenses.io

    Enable everyone to discover and observe streaming data. Sharing, documenting and cataloging your data can increase productivity by up to 95%. Then from data, build apps for production use cases. Apply a data-centric security model to cover all the gaps of open source technology, and address data privacy. Provide secure and low-code data pipeline capabilities. Eliminate all darkness and offer unparalleled observability in data and apps. Unify your data mesh and data technologies and be confident with open source in production. Lenses is the highest rated product for real-time stream analytics according to independent third party reviews. With feedback from our community and thousands of engineering hours invested, we've built features that ensure you can focus on what drives value from your real time data. Deploy and run SQL-based real time applications over any Kafka Connect or Kubernetes infrastructure including AWS EKS.
    Starting Price: $49 per month
  • 15
    Macaw

    Macaw

    Macaw Software

    Macaw is an enterprise grade platform optimized for building and transforming applications for digital age. Macaw provides an unique approach to modernize traditional applications to utilize containers and microservices technologies. It also offers a turn-key approach for enterprises to design, develop, build, publish, run and operate microservices based application in a holistic manner irrespective of the underlying infrastructure and clouds. Macaw is meant for enterprises looking to accelerate their modernization journey with hybrid-cloud strategy and cloud native applications. Thanks to its many built-in foundational services ,turnkey operational capabilities and kubernetes integration. Macaw provides the necessary run time environment, services and tools to build, deploy and manage Microservices based application. It provides various built-in and readily usable core application services like database, security, messaging, load-balancing for accelerated development and turn-key ops.
  • 16
    Blue Hexagon

    Blue Hexagon

    Blue Hexagon

    We’ve designed our real-time deep learning platform to deliver speed of detection, efficacy and coverage that sets a new standard for cyber defense. We train our neural networks with global threat data that we’ve curated carefully via threat repositories, dark web, our deployments and from partners. Just like layers of neural networks can recognize your image in photos, our proprietary architecture of neural networks can identify threats in both payloads and headers. Every day, Blue Hexagon Labs validates the accuracy of our models with new threats in the wild. Our neural networks can identify a wide range of threats — file and fileless malware, exploits, C2 communications, malicious domains across Windows, Android, Linux platforms. Deep learning is a subset of machine learning that uses multi-layered artificial neural networks to learn data representation.
  • 17
    NoPass

    NoPass

    NoPass

    NoPass™ is a multi-factor authentication add on for remote users. In addition to the username and password, NoPass™ performs two additional factors of authentication – something you have and something you are. This utilizes smartphones and does not require the purchase of additional hardware authentication devices for each user. It also does not use SMS, which can also be costly and is vulnerable to being intercepted. With the increase in phishing and other identity attacks in our day and age, authentication that requires a username and password (like RADIUS) can be potentially at risk. Sophisticated social engineering schemes and clever tactics can fool even the savviest of users. In order to combat this, Identité™ has introduced its NoPass™ Employee MFA solution, a lightweight feature that enhances the overall security and is adaptable with the leading authentication protocols that are in the market.
    Starting Price: $2
  • 18
    Apiiro

    Apiiro

    Apiiro

    Complete risk visibility with every change, from design to code to cloud. Industry-first Code Risk Platform™ A 360° view of security & compliance risks across applications, infrastructure, developers’ knowledge & business impact. Data-driven decisions are better decisions. Understand your security & compliance risks with a real-time inventory of apps & infra code behavior, devs knowledge, 3rd-party security alerts & business impact. From design to code to cloud. Security architects don’t have time to review every change & investigate every alert. Make the most of their expertise by analyzing context across developers, code & cloud to identify risky material changes & automatically build an actionable workplan. No one likes manual risk questionnaires, security & compliance reviews - they’re tedious, inaccurate & not synced with the code. When the code is the design, we must do better - trigger contextual & automatic workflows.
  • 19
    Eco

    Eco

    Spot by NetApp

    Automated Optimization for AWS Savings Plans and Reserved Instances. Simplify the planning, purchasing and optimization of your cloud commitments portfolio. Eco automates reserved instance lifecycle management, creating a high-ROI, low-risk cloud commitment portfolio that matches your current and projected needs. By identifying and selling off unused capacity and buying appropriate short-term, third-party reservations on the AWS Marketplace, Eco delivers all the benefits of long-term pricing without financial lock-in. Ensure maximum ROI on cloud commitment purchases with analysis, modification and mapping of unused reserved instances and Savings Plans to resource demands. Automate purchasing strategies for reserved instances in the AWS Marketplace throughout their lifecycle to ensure workloads are always running at optimal pricing. Enable collaboration between Finance and DevOps teams with full visibility into compute consumption and automation of optimal reserved instances.
  • 20
    NetApp VDMS
    NetApp’s Virtual Desktop Managed Service (VDMS) provides turnkey virtual desktops as a managed service for your expanding enterprise. VDMS integrates a complete Desktop-as-a-Service (DaaS) solution with our world-class data services infrastructure all for a simple per-user monthly fee. Businesses find that providing virtual desktop infrastructure to a growing number of enterprise users can be complex and resource-intensive. DaaS solutions are an increasingly attractive tool to allow enterprises to support virtual desktops by leveraging a streamlined managed service model. Unfortunately, most DaaS offerings are often limited in scope, or built upon ‘lowest common denominator’ infrastructure that isn’t enterprise-class. Imagine a better approach to DaaS that integrates the virtual desktop with the industry’s leading cloud data services and management tools. That’s DaaS at scale. That’s NetApp Virtual Desktop Managed Service.
  • 21
    MayaData

    MayaData

    MayaData

    OpenEBS with Kubera is the answer. OpenEBS is the most popular open source storage for Kubernetes - and the fastest. Kubera adds an easy to use GUI for OpenEBS Mayastor - and APIs, auto checks and configuration, active directory authentication, built-in performance benchmarking, and additional operators to assist in upgrades and other use cases. Kubera is freely available and is delivered by MayaData when providing 24/7 support for customers to reduce operational costs and complexity. Kubera Propel is a cloud-native declarative data plane written in Rust. It’s built on the open source OpenEBS Mayastor. Kubera Propel combines breakthrough technologies like NVMe, SPDK, and emerging new storage features in the Linux kernel. OpenEBS managed by Kubera Propel has been shown independent benchmarks to deliver extremely low latency performance for data bases and other workloads running on Kubernetes.
    Starting Price: $100 per node per month
  • 22
    Activiti

    Activiti

    Activiti

    Helping businesses solve automation challenges in distributed, highly-scalable and cost effective infrastructures. Activiti is the leading lightweight, java-centric open-source BPMN engine supporting real-world process automation needs. Activiti Cloud is now the new generation of business automation platform offering a set of cloud native building blocks designed to run on distributed infrastructures. Inmutable, scalable & pain free Process & Decision Runtimes designed to integrate with your cloud native infrastructure. Scalable, storage independent and extensible audit service. Scalable, storage independent and extensible query service. Simplified system to system interactions that can scale in distributed environments. Distributed & Scalable application aggregation layer. Cloud ready secure WebSocket and subscription handling as part of GraphQL integration.
  • 23
    hackajob

    hackajob

    hackajob

    Source, assess and hire tech candidates from the UK’s most engaged talent pool. All of our candidates are technically pre-screened, allowing you to hire in just 17 days or less. hackajob was born out of the frustration with the traditional recruitment agency approach and the difficulty of hiring top engineers. Rather than allowing recruitment to be clouded by unconscious bias, hackajob reimagines the process by building it around the needs of technical talent and the framework required to engage with them. Thousands of companies such as Apple, Barclays and Argos depend on the hackajob platform to reduce the time to hire, engage with candidates and, most importantly, remove the bias from the recruitment process. At hackajob, we believe in maximising people's potential. It's why we've made it our mission to make the hiring process fairer, faster and based on skills rather than backgrounds, so people can get the job they deserve and earn what they're worth.
  • 24
    Pileus

    Pileus

    Pileus

    Onboarding has never been simpler. It can be completed in just minutes. Use Pileus to implement tagging policies to gain visibility and control over your resource inventory. Pileus exposes under and over utilized cloud resources and make it easy to make rapid decisions to meet your business goals. Discovers all your cloud assets and provides you with a single console to view and manage your inventory. With continuous monitoring and deep visibility, you gain the power to cut your cloud bill and eliminate unpredictable spending. Get the most relevant and impactful cost saving insights, customized to your needs. Pileus utilizes proprietary algorithms to enable our users to “dive deep” into Kubernetes and identify at the Node level where under-utilization is occurring. Get recommendations tailored for your environment, with precise steps to implement and take action that ensures you are using the optimal set of resources designed to meet your business goals and lower your monthly costs.
  • 25
    StackPulse

    StackPulse

    StackPulse

    StackPulse automates and orchestrates incident response and management, enabling a continuous approach to software services reliability. The StackPulse platform gives SREs, developers and on-callers the context and control necessary to analyze, respond to, and resolve incidents across the entire stack, at any scale. StackPulse transforms how engineering and operations teams operate software and infrastructure services. Our Platform makes it easy to get started collaborating with a suite of incident management tools, from automated war room creation, to data capture and auto-generated postmortems. The data captured during these incidents then generates recommendations for playbooks and triggers that result in significant reductions in MTTR or improvements in SLO adherence. StackPulse identifies risk based on specific patterns of your organization’s unique monitoring, infrastructure, and operational data, and then recommends automated playbooks tailored to your organization.
  • 26
    Cycode

    Cycode

    Cycode

    A platform for security, governance, and pipeline integrity for all your development tools & infrastructure. Harden your source control management systems (SCM), find secrets, leaks and prevent code tampering. Scan your CI/CD settings and Infrastructure-as-Code (IaC) for security misconfiguration. Identify drift between production systems IaC configurations and prevent source code tampering. Stop developers from inadvertently exposing proprietary code in public repositories, fingerprint code assets and proactively identify exposure on public sites. Inventory assets, enforce security policies, and easily demonstrate compliance across all your DevOps tools and infrastructure, both in the cloud and on-premises. Scan IaC for security misconfigurations and ensure compliance between defined IaC configurations and production infrastructure. Scan every commit or pull/merge request for hard-coded secrets and prevent them from reaching the master branch across all SCMs and programming languages.
  • 27
    Delinea Cloud Access Controller
    Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications.
  • 28
    NetApp HCI
    Scale compute and storage on-demand with NetApp® HCI, a hybrid cloud infrastructure that delivers predictable performance for your hybrid cloud on a highly flexible, ultra-efficient architecture. Let the innovation-palooza begin. With NetApp HCI, you can scale storage and compute on demand, together or independently, so you never pay for what you aren’t using. In fact, consolidating multiple workloads with NetApp HCI can reduce your TCO by up to 60%. NetApp HCI doesn’t just manage and run multiple applications with the predictable performance your enterprise and customers demand, it guarantees it. What’s more, resource contention is eliminated, storage performance is three times faster, and compute efficiency increases by 22%. And yes, integration into your data fabric is perfectly seamless. NetApp HCI is the first hybrid cloud infrastructure for everything that matters. It makes managing infrastructure easy.
  • 29
    6connect

    6connect

    6connect

    Revolutionary network automation & provisioning for ISP's and enterprises around the world. Easy to deploy and integrate with, whether you use the 6connect cloud or deploy ProVision behind the firewall. Regain your sanity. Avoid the costly pitfalls of ad hoc solutions and manual network resource management. Global resource management, complete IPAM automation, easy management of DNS, DNSSEC, and DHCP. Flexible data model that seamlessly supports multi-tenant permissions, works with RADIUS, LDAP, 2FA, SAML2. Integrates, synchronizes and automates workflows over a dozen DNS platforms. Also makes migrations a snap! Easy DHCP configuration and scope management that integrates with other systems. From allocation to assignment, from CGN to IPv6, ProVision knows how to handle IPs. Carrier-grade API for easy integration across global system, fast, well documented and tested. Easy to use Peering workflows built-in – from email to BGP config pushes to reporting, it’s all there.
  • 30
    OfficeScan

    OfficeScan

    Trend Micro

    The threat landscape used to be black and white, you kept the bad stuff out and the good stuff in. Now it’s harder to tell the good from the bad, and traditional signature-based antivirus approaches alone are a weak defense against ransomware and unknown threats, which often slip through. Next-generation technologies help with some threats but not others, and adding multiple anti-malware tools on a single endpoint results in too many products that don’t work together. To complicate matters your users are increasingly accessing corporate resources from a variety of locations and devices, and even services in the cloud. You need endpoint security that is smart, optimized, and connected, from a proven vendor you can trust. Trend Micro™ OfficeScan™ infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint.
  • 31
    Trend Micro ServerProtect
    Enterprise servers can be a vulnerable, centralized point of information exchange. Even from inside the network, users or applications without adequate protection can unintentionally upload infected files to the server, which can spread to other systems that access these files. Additionally, large organizations may have hundreds or thousands of individual server machines that require monitoring, configuration, and maintenance. More importantly, today’s sophisticated attacks can target multiple points on the network and leave unseen trails of damage and the potential for re-infection. Trend Micro™ ServerProtect™ delivers the industry’s most reliable virus, spyware and rootkit protection while simplifying and automating security operations on servers. ServerProtect scans and detects malware in real time and incorporates cleanup capabilities to help remove malicious code and repair system damage.
  • 32
    ScanMail

    ScanMail

    Trend Micro

    More than 90 percent of targeted attacks begin with a spear phishing email, which means your mail server security is more important than ever. Unfortunately, most mail server security solutions, including the limited set of built-in protections in Microsoft® Exchange™ 2013 and 2016, rely on pattern file updates, which only detect traditional malware. They don’t include specific protections to detect malicious URLs or document exploits commonly used in targeted attacks or advanced persistent threats (APTs). ScanMail™ Suite for Microsoft® Exchange™ stops highly targeted email attacks and spear phishing by using document exploit detection, enhanced web reputation, and sandboxing as part of a custom APT defense, protection you don’t get with other solutions. In addition, only ScanMail blocks traditional malware with email, file, and web reputation technology and correlated global threat intelligence from Trend Micro™ Smart Protection Network™ cloud-based security.
  • 33
    Trend Micro PortalProtect
    Many organizations use Microsoft SharePoint to connect with employees, partners, and customers for real-time collaboration. SharePoint capabilities enable businesses to move beyond simple content repositories, helping employees build team sites, create intranet and extranet portals, utilize wikis and blogs, and create social communities. These dynamic collaboration environments help improve your productivity, but they also increase your security risks, especially when opened to external parties. Trend Micro PortalProtect secures your collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators are often unaware of. Its web reputation technology blocks malicious links from entering your web portals, while its powerful content filtering scans both files and web components of SharePoint.
  • 34
    Diamanti

    Diamanti

    Diamanti

    The prevailing assumption is that containers are ideal only for stateless applications. However, many organizations are seeing the value of containerizing databases for many of the same reasons that they containerize their web applications, the ability to release more frequently, the ease of moving from development to staging to production, and the portability to run the same workload on any infrastructure. In fact, databases have emerged as a top use case for container adoption in a recent Diamanti survey. Cloud Native infrastructure inherently enables stateful applications to take advantage of elasticity and flexibility. However, catastrophic events like hardware failures, power failures, natural disasters or other unexpected events can cause loss of data for an extended period of time. This makes recovery tricky for stateful applications. One of the important requirements for cloud native storage is to seamlessly recover from such catastrophic events.
  • 35
    NetThunder

    NetThunder

    NetThunder

    NetThunder is deployed in one of two ways, either as an appliance, or as a system of connected appliances, we call that The Storm™. This allows NetThunder to provide computing solutions for a large variety of situations and is future-proof. A single appliance can easily be converted into The Storm™. The NetThunder platform allows you to scale at will. Unlike most hypercoverged infrastructure, NetThunder offers specialized modules the controller will autoconfigure for your environment - optimizing to maximum performance. Configuring multiple networks and a SAN is as simple as red-wire to red-wire. Our subscription pricing model means no huge upfront buy-in cost. NetThunder is deployed either as an appliance or a system of connected appliances we call The Storm™. This allows NetThunder to provide computing and storage solutions for a large variety of use cases.
    Starting Price: $50 per month
  • 36
    Iterative

    Iterative

    Iterative

    AI teams face challenges that require new technologies. We build these technologies. Existing data warehouses and data lakes do not fit unstructured datasets like text, images, and videos. AI hand in hand with software development. Built with data scientists, ML engineers, and data engineers in mind. Don’t reinvent the wheel! Fast and cost‑efficient path to production. Your data is always stored by you. Your models are trained on your machines. Existing data warehouses and data lakes do not fit unstructured datasets like text, images, and videos. AI teams face challenges that require new technologies. We build these technologies. Studio is an extension of GitHub, GitLab or BitBucket. Sign up for the online SaaS version or contact us to get on-premise installation
  • 37
    cnvrg.io

    cnvrg.io

    cnvrg.io

    Scale your machine learning development from research to production with an end-to-end solution that gives your data science team all the tools they need in one place. As the leading data science platform for MLOps and model management, cnvrg.io is a pioneer in building cutting-edge machine learning development solutions so you can build high-impact machine learning models in half the time. Bridge science and engineering teams in a clear and collaborative machine learning management environment. Communicate and reproduce results with interactive workspaces, dashboards, dataset organization, experiment tracking and visualization, a model repository and more. Focus less on technical complexity and more on building high impact ML models. Cnvrg.io container-based infrastructure helps simplify engineering heavy tasks like tracking, monitoring, configuration, compute resource management, serving infrastructure, feature extraction, and model deployment.
  • 38
    Cyscale

    Cyscale

    Cyscale

    Map, secure, and monitor your cloud assets across platforms in under 5 minutes. Optimize operations and costs with an agentless CSPM solution that uses our Security Knowledge Graph™ to ensure scalable, consistent protection and governance. Specialists across industries rely on Cyscale to apply their expertise where it makes the biggest difference. We help you see through infrastructure layers and scale your efforts to organization-wide impact. Bridge multiple environments with Cyscale and visualise your cloud inventory in full. Discover unused, forgotten cloud resources and eliminate them to get smaller invoices from cloud providers and optimize costs for the whole organization. See accurate correlations across all cloud accounts and assets as soon as you sign up and act on alerts to avoid fines for data breaches.
  • 39
    Caveonix

    Caveonix

    Caveonix

    Traditional enterprise security and compliance solutions tend to be unscalable within hybrid and multi-cloud environments. As other “cloud-native” solutions frequently leave existing data centers behind, it can be difficult for teams to secure their enterprise’s hybrid computing operating environments. From infrastructure and services to applications and workloads, your teams can confidently protect all your cloud environments. Created by industry veterans that know digital risk and compliance inside and out, Caveonix RiskForesight is a platform trusted by our customers and partners that provides proactive workload protection. Detect, Predict and Act on threats that occur in your technology stack and hybrid cloud environments. Automate your digital risk and compliance processes, and proactively protect your hybrid and multi-cloud environments. Implement cloud security posture management and cloud workload protection, as defined by Gartner's standards.
  • 40
    Anchore

    Anchore

    Anchore

    DevSecOps at full speed with deep inspection of container images and policy-based compliance. In an environment where application development must be fast and flexible, containers are the future. Adoption is accelerating, but with it comes risk. Anchore makes it possible to manage, secure, and troubleshoot containers continuously, without sacrificing speed. It delivers a process that allows container development and deployment to be secure from the start, by ensuring that the contents of your containers match the standards that you define. The tools are transparent to developers, visible to production, accessible to security, and all designed for the fluid nature of containers. Anchore sets a trusted standard for containers. It empowers you to certify your containers, making them predictable and protectable. So you can deploy containers with confidence. Protect against risks using a complete container image security solution.
  • 41
    Beats

    Beats

    Elastic

    Beats is a free and open platform for single-purpose data shippers. They send data from hundreds or thousands of machines and systems to Logstash or Elasticsearch. Beats are open source data shippers that you install as agents on your servers to send operational data to Elasticsearch. Elastic provides Beats for capturing data and event logs. Beats can send data directly to Elasticsearch or via Logstash, where you can further process and enhance the data, before visualizing it in Kibana. Want to get up and running quickly with infrastructure metrics monitoring and centralized log analytics? Try out the Metrics app and the Logs app in Kibana. For more details, see Analyze metrics and Monitor logs. Whether you’re collecting from security devices, cloud, containers, hosts, or OT, Filebeat helps you keep the simple things simple by offering a lightweight way to forward and centralize logs and files.
    Starting Price: $16 per month
  • 42
    Ozone

    Ozone

    Ozone

    Ozone platform helps enterprises to ship modern applications quickly, securely and reliably. Ozone removes the unwanted headache of managing too many DevOps tools and makes it super easy for anyone to deploy applications on Kubernetes clusters. Just integrate all your existing DevOps tools and automate your application delivery process end-to-end. Accelerate deployments with automated pipeline workflows and on demand infrastructure management with zero downtime. Prevent business losses by enforcing governance and compliance policy for app deployments at scale. Single pane of glass where engineering, DevOps and Security teams can collaborate on application releases in realtime.
  • 43
    Oracle Hybrid Cloud
    Hybrid cloud and edge computing are transforming and expanding usage of the cloud. Requirements for data sovereignty, security, latency, and field deployability have prevented adoption of public cloud for many mission-critical applications. Oracle Cloud’s hybrid and edge offerings address customer requirements for specialized deployment, disconnected and intermittently-connected operation, low latency and high performance, as well as data locality and security. All products require tradeoffs, but to date, cloud offerings have been unnecessarily constrained. An approach focusing on large hyperscale cloud regions providing a large number of services required great expense to build, with very limited locations. Smaller scale provided greater flexibility of location, but often required tethering to the public cloud to operate. Customers with the "wrong" mix of needs around data sovereignty, low-latency, broad use cases, or level of control were left on the sidelines.
  • 44
    TrilioVault
    TrilioVault adheres to the characteristics required by cloud environments and is flexible, fault tolerant, and forever scalable. It offers seamless self-service, multi-tenant, policy-based comprehensive backup and recovery of workloads running in OpenStack. The solution captures environmental points-in-time (application, OS, compute, network, configurations, security groups, data and metadata of an environment) as full or incremental snapshots. These snapshots can be held in a variety of storage environments including NFS, Swift and 3rd party arrays. With TrilioVault’s single-click recovery, organizations not only improve Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO), but also can have the confidence of migrating legacy applications and workloads into production environments with no fear of data loss. IT departments can fully deploy OpenStack solutions and provide business assurance through enhanced data retention, protection and integrity.
  • 45
    Storidge

    Storidge

    Storidge

    Storidge was built on the idea that operating storage for enterprise applications should be really simple. We take a fundamentally different approach to Kubernetes storage and Docker volumes. By automating storage operations for orchestration systems, such as Kubernetes and Docker Swarm, it saves you time and money by eliminating the need for expensive expertise to setup, and operate storage infrastructure. This enables developers to focus their best energies on writing applications and creating value, and operators on delivering the value faster to market. Add persistent storage to your single node test cluster in seconds. Deploy storage infrastructure as code, and minimize operator decisions while maximizing operational workflow. Automated updates, provisioning, recovery, and high availability. Keep your critical databases and apps running with auto failover and automatic data recovery.
  • 46
    JetBrains Projector
    Run JetBrains IDEs and Swing apps remotely over the network. Swing is a graphical widget toolkit for Java. Current JetBrains IDEs use Swing to draw the UI. The same is true for other IntelliJ-based apps, like Android Studio. Projector is a self-hosted technology that runs IntelliJ-based IDEs and Swing-based apps on the server, allowing you access to them from anywhere using browsers and native apps. IntelliJ IDEA Community Edition running in Safari web browser on macOS. Run code near the runtime or database to reduce roundtrips. High-security zones and corporate environments. Thin clients and cheap hardware like Android tablets. Turn off your computer, while your app continues to work on the server. Run the IDE in a GNU/Linux environment on Windows machines or even on exotic operating systems like ChromeOS. VM or Docker images with debug sources and a pre-configured IDE. Remote debugging on server-side (devtest, devprod).
  • 47
    Rocky Linux

    Rocky Linux

    Ctrl IQ, Inc.

    CIQ empowers people to do amazing things by providing innovative and stable software infrastructure solutions for all computing needs. From the base operating system, through containers, orchestration, provisioning, computing, and cloud applications, CIQ works with every part of the technology stack to drive solutions for customers and communities with stable, scalable, secure production environments. CIQ is the founding support and services partner of Rocky Linux, and the creator of the next generation federated computing stack. - Rocky Linux, open, Secure Enterprise Linux - Apptainer, application Containers for High Performance Computing - Warewulf, cluster Management and Operating System Provisioning - HPC2.0, the Next Generation of High Performance Computing, a Cloud Native Federated Computing Platform - Traditional HPC, turnkey computing stack for traditional HPC
  • 48
    Bytemark

    Bytemark

    Bytemark

    Kubernetes (K8s) is a container orchestration tool. It automates the management of containerised workloads, so development teams are free to develop products and services - shipping updates that give you the edge. Get to grips with the key benefits of Kubernetes, what it actually is, and how it works - without all the jargon. Learn about the added business value 4 industry-leading companies saw after adopting Kubernetes. Whatever your current setup, we can help you take the next step towards digital transformation. Database & software specialists using their expertise to solve people’s problems. We’ve always quoted our cloud hosting costs on list prices and we offer a price match on our Kubernetes service.
    Starting Price: $8.10 per month
  • 49
    Adacor

    Adacor

    Adacor

    Corporations and medium-sized companies implement their IT projects effectively with managed cloud services. With many years of experience and based in Germany, we support you on your successful path to the cloud. We work on the basis of the EU GDPR: Thanks to individual AVV and security audits, we master your data protection requirements. Our cloud services have a modular structure. We support you in the implementation of your cloud strategy, the choice of the suitable platform as well as in the operation of your cloud infrastructures and the optimal use of your IT teams. Depending on your needs, our IT specialists take on complete subject areas or areas of responsibility according to your wishes. At Adacor you get modern cloud solutions - across all industries. For special industries such as automotive, banking & fintechs, energy & utilities as well as digital agencies, we offer you a comprehensive package of individual solutions.
  • 50
    Circonus IRONdb
    Circonus IRONdb makes it easy to handle and store unlimited volumes of telemetry data, easily handling billions of metric streams. Circonus IRONdb enables users to identify areas of opportunity and challenge in real time, providing forensic, predictive, and automated analytics capabilities that no other product can match. Rely on machine learning to automatically set a “new normal” as your data and operations dynamically change. Circonus IRONdb integrates with Grafana, which has native support for our analytics query language. We are also compatible with other visualization apps, such as Graphite-web. Circonus IRONdb keeps your data safe by storing multiple copies of your data in a cluster of IRONdb nodes. System administrators typically manage clustering, often spending significant time maintaining it and keeping it working. Circonus IRONdb allows operators to set and forget their cluster, and stop wasting resources manually managing their time series data store.