Alternatives to Mirantis Secure Registry

Compare Mirantis Secure Registry alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Mirantis Secure Registry in 2024. Compare features, ratings, user reviews, pricing, and more from Mirantis Secure Registry competitors and alternatives in order to make an informed decision for your business.

  • 1
    Google Cloud Platform
    Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
    Leader badge
    Compare vs. Mirantis Secure Registry View Software
    Visit Website
  • 2
    Container Registry
    A no frills Harbor based Container Registry Service for teams, individuals, and Software Vendor looking for ways to distribute software as container images.
    Starting Price: $49 per month
  • 3
    Docker

    Docker

    Docker

    Docker takes away repetitive, mundane configuration tasks and is used throughout the development lifecycle for fast, easy and portable application development, desktop and cloud. Docker’s comprehensive end-to-end platform includes UIs, CLIs, APIs and security that are engineered to work together across the entire application delivery lifecycle. Get a head start on your coding by leveraging Docker images to efficiently develop your own unique applications on Windows and Mac. Create your multi-container application using Docker Compose. Integrate with your favorite tools throughout your development pipeline, Docker works with all development tools you use including VS Code, CircleCI and GitHub. Package applications as portable container images to run in any environment consistently from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE and more. Leverage Docker Trusted Content, including Docker Official Images and images from Docker Verified Publishers.
  • 4
    Google Kubernetes Engine (GKE)
    Run advanced apps on a secured and managed Kubernetes service. GKE is an enterprise-grade platform for containerized applications, including stateful and stateless, AI and ML, Linux and Windows, complex and simple web apps, API, and backend services. Leverage industry-first features like four-way auto-scaling and no-stress management. Optimize GPU and TPU provisioning, use integrated developer tools, and get multi-cluster support from SREs. Start quickly with single-click clusters. Leverage a high-availability control plane including multi-zonal and regional clusters. Eliminate operational overhead with auto-repair, auto-upgrade, and release channels. Secure by default, including vulnerability scanning of container images and data encryption. Integrated Cloud Monitoring with infrastructure, application, and Kubernetes-specific views. Speed up app development without sacrificing security.
  • 5
    Google Cloud Container Registry
    With Container Registry your team can manage Docker images, perform vulnerability scans and decide who accesses what resources with precise access control; All in one place. Existing CI / CD integrations allow you to configure fully automated Docker pipelines for information without delay. Get access to private and secure Docker image storage on Google Cloud Platform in minutes. Control who can access, view or download images. Get consistent uptime on a protected infrastructure with Google security. Build and push images to the private registry automatically when you commit code to Cloud Source Repositories, GitHub, or Bitbucket. Easily configure CI / CD pipelines with Cloud Build integration or deploy directly to Google Kubernetes Engine, App Engine, Cloud Functions, or Firebase. Automatically build containers on code or tag changes to a repository. Search across previous builds from the UI or view build details like a trigger, source, steps, and logs.
  • 6
    Red Hat Quay
    Red Hat® Quay container image registry provides storage and enables you to build, distribute, and deploy containers. Gain more security over your image repositories with automation, authentication, and authorization systems. Quay is available with OpenShift or as a standalone component. Control access of the registry with multiple identity and authentication providers (including support for teams and organization mapping). Use a fine-grained permissions system to map to your organizational structure. Transport layer security encryption helps you transit between Quay.io and your servers automatically. Integrate with vulnerability detectors (like Clair) to automatically scan your container images. Notifications alert you to known vulnerabilities. Streamline your continuous integration/continuous delivery (CI/CD) pipeline with build triggers, git hooks, and robot accounts. Audit your CI pipeline by tracking API and UI actions.
  • 7
    IBM Cloud Container Registry
    Store and distribute container images in a fully managed private registry. Push private images to conveniently run them in the IBM Cloud® Kubernetes Service and other runtime environments. Images are checked for security issues so you can make informed decisions about your deployments. Install the IBM Cloud Container Registry CLI to use the command line to manage your name spaces and Docker images in the IBM Cloud® private registry. View information about potential vulnerabilities and the security of images in the IBM Cloud Container Registry public and private repositories with the IBM Cloud console. Check the security status of container images that are provided by IBM, third parties or that are added to your organization's registry namespace. Advanced capabilities for security compliance insight. Access controls and image signing capabilities. Pre-integration with Kubernetes Service.
  • 8
    Alibaba Cloud Container Registry
    Container Registry allows you to manage images throughout the image lifecycle. It provides secure image management, stable image build creation across global regions, and easy image permission management. This service simplifies the creation and maintenance of the image registry and supports image management in multiple regions. Combined with other cloud services such as container service, container registry provides an optimized solution for using Docker in the cloud. Provides an intranet URL of the image repository for each region. You can visit this URL to download images without using traffic. Builds services automatically, in regions outside China, and in stages. Allows you to easily scan the image security status and provides multi-dimensional vulnerability reports. Provides an easy Docker-based continuous integration and continuous delivery solution. Easy operations allow you to quickly start using the service at low management and maintenance costs.
    Starting Price: $113 per month
  • 9
    Harbor

    Harbor

    Harbor

    CNCF Harbor is an open-source project that enhances container registry capabilities with a focus on security and compliance. It builds upon basic registry functionality by offering features such as vulnerability scanning to identify known security weaknesses in images, role-based access control for granular image access management, image signing to ensure authenticity and prevent tampering, and replication for efficient syncing of images across multiple other registries. Harbor strengthens the security of the image management process. It can be particularly beneficial for organizations that prioritize security and compliance in their containerized environments. However, users should be aware that setting up and maintaining Harbor can require additional effort and expertise compared to simpler container registries. 
  • 10
    Azure Container Registry
    Build, store, secure, scan, replicate, and manage container images and artifacts with a fully managed, geo-replicated instance of OCI distribution. Connect across environments, including Azure Kubernetes Service and Azure Red Hat OpenShift, and across Azure services like App Service, Machine Learning, and Batch. Geo-replication to efficiently manage a single registry across multiple regions. OCI artifact repository for adding helm charts, singularity support, and new OCI artifact-supported formats. Automated container building and patching including base image updates and task scheduling. Integrated security with Azure Active Directory (Azure AD) authentication, role-based access control, Docker content trust, and virtual network integration. Streamline building, testing, pushing, and deploying images to Azure with Azure Container Registry Tasks.
    Starting Price: $0.167 per day
  • 11
    Slim.AI

    Slim.AI

    Slim.AI

    Easily connect your own private registries and share images with your team. Explore the world’s largest public registries to find the right container image for your project. If you don’t know what’s in your containers, you can’t have software security. The Slim platform lifts the veil on container internals so you can analyze, optimize, and compare changes across multiple containers or versions. Use DockerSlim, our open-source project, to automatically optimize your container images. Remove bulky or dangerous packages, so you ship only what you need to produce. Find out how the Slim platform can help your team automatically improve software and supply chain security, tune containers for development, testing, and production, and ship secure container-based apps to the cloud. Accounts are free and there is no charge to use the platform at this time. We're container enthusiasts, not salespeople, so know that your privacy and security are the founding principles of our business.
  • 12
    Amazon Elastic Container Registry (ECR)
    Easily store, share, and deploy your container software anywhere. Push container images to Amazon ECR without installing or scaling infrastructure, and pull images using any management tool. Share and download images securely over Hypertext Transfer Protocol Secure (HTTPS) with automatic encryption and access controls. Access and distribute your images faster, reduce download times, and improve availability using a scalable, durable architecture. Amazon ECR is a fully managed container registry offering high-performance hosting, so you can reliably deploy application images and artifacts anywhere. Meet your organization’s image compliance security requirements using insights from common vulnerabilities and exposures (CVEs) and the Common Vulnerability Scoring System (CVSS). Publish containerized applications with a single command and easily integrate your self-managed environments.
  • 13
    Tencent Container Registry
    Tencent Container Registry (TCR) offers secure, dedicated, and high-performance container image hosting and distribution service. You can create dedicated instances in multiple regions across the globe and pull container images from the nearest region to reduce pulling time and bandwidth costs. To guarantee data security, TCR features granular permission management and access control. It also supports P2P accelerated distribution to break through the performance bottleneck due to concurrent pulling of large images by large-scale clusters, helping you quickly expand and update businesses. You can customize image synchronization rules and triggers, and use TCR flexibly with your existing CI/CD workflow to quickly implement container DevOps. TCR instance adopts containerized deployment. You can dynamically adjust the service capability based on actual usage to manage sudden surges in business traffic.
  • 14
    Oracle Cloud Container Registry
    Oracle Cloud Infrastructure Container Registry is an open standards-based, Oracle-managed Docker registry service for securely storing and sharing container images. Engineers can easily push and pull Docker images with the familiar Docker Command Line Interface (CLI) and API. To support container lifecycles, Registry works with Container Engine for Kubernetes, Identity and Access Management (IAM), Visual Builder Studio, and third-party developer and DevOps tools. Work with Docker images and container repositories using familiar Docker CLI commands and Docker HTTP API V2. Oracle takes care of operating and patching the service, so that developers can focus on building and deploying containerized applications. Built using object storage, Container Registry provides data durability and high service availability with automatic replication across fault domains. Oracle does not charge separately for the service. Users pay only for the associated storage and network resources they consume.
  • 15
    JFrog Container Registry
    The world’s most advanced, powerful, hybrid Docker and Helm registry. Power your world of Docker without limits. The JFrog Container Registry is the most comprehensive and advanced registry in the market today, supporting Docker containers and Helm Chart repositories for your Kubernetes deployments. Use it as your single access point to manage and organize your Docker images, while avoiding Docker Hub throttling or retention issues. JFrog provides reliable, consistent, and efficient access to remote Docker container registries with integration to your build ecosystem. Develop and deploy your way. Supports your current and future business model with on-prem / self-hosted, hybrid, and multi-cloud environments on your choice of AWS, Microsoft Azure, and Google Cloud. Built on JFrog Artifactory’s proven track record of power, stability, and resilience to easily manage and deploy your Docker images and provide your DevOps teams with full control over access and permissions.
    Starting Price: $98 per month
  • 16
    Portus

    Portus

    Portus

    Portus implements the new authorization scheme defined by the latest version of the Docker registry. It allows for fine grained control over all of your images. You decide which users and teams are allowed to push or pull images. Map your company organization inside of Portus, define as many teams as you want and add and remove users from them. Portus provides an intuitive overview of the contents of your private registry. It also features a search capability to find images even faster. User privileges are constantly taken into account, even when browsing the contents of the repository or when performing searches. Keep everything under control. All the relevant events are automatically logged by Portus and are available for analysis by admin users. Non-admin users can also use this feature to keep up with relevant changes.
  • 17
    Dist

    Dist

    Dist

    Highly available and super fast artifact repositories and container registries that keep your developers, operations teams, and customers happy and productive. Dist is the simplest and most reliable way to securely distribute Docker container images and Maven artifacts across your team, systems, and customers. Our purpose-built edge network ensures optimal performance, wherever your team and customers are. Dist is fully managed in the cloud. We take care of operations, maintenance, and backups so you can focus on your business. Restrict access to repositories by users and groups. Each user can further compartmentalize their own access using access tokens. All artifacts, container images, and their associated metadata are encrypted at rest and in transit.
    Starting Price: $39 per month
  • 18
    Yandex Container Registry
    Docker images are placed in fault-tolerant storage. Automatic replication is configured for all data, each replica changes when Docker images are edited, created, or deleted. The service provides containers for Linux and Windows OS. Use them however you want, running on your local machine or on a Yandex Compute Cloud VM. High-speed Docker image operations without expenses for external traffic, Docker image registries are hosted in the same data centers where your cloud infrastructure is deployed. Docker images are transmitted via HTTPS. You choose who can view, pull, push, or delete them. You use a Docker image and we take care of maintaining the infrastructure where your registry is running. You only pay for the space used by your Docker images. You can use the service via the management console, command line interface (CLI), API, or the standard Docker CLI, the service is compatible with the Docker registry HTTP API V2.
    Starting Price: $0.012240 per GB
  • 19
    JFrog Platform
    Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.
    Starting Price: $98 per month
  • 20
    Nexus Repository Pro
    Manage binaries and build artifacts across your software supply chain. Single source of truth for all of your components, binaries, and build artifacts. Efficiently distribute parts and containers to developers. Deployed at more than 100,000 organizations globally. Store and distribute Maven/Java, npm, NuGet, Helm, Docker, P2, OBR, APT, GO, R, Conan components and more. Manage components from dev through delivery: binaries, containers, assemblies, and finished goods. Advanced support for the Java Virtual Machine (JVM) ecosystem, including Gradle, Ant, Maven, and Ivy. Compatible with popular tools like Eclipse, IntelliJ, Hudson, Jenkins, Puppet, Chef, Docker, and more. Deliver innovation 24x7x365 with high availability. A single source of truth for components used across your entire software development lifecycle including QA, staging, and operations. Easily integrate with existing user and access provisioning systems including LDAP, Atlassian Crowd, and more.
  • 21
    GitLab

    GitLab

    GitLab

    GitLab is a complete DevOps platform. With GitLab, you get a complete CI/CD toolchain out-of-the-box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate. GitLab helps teams accelerate software delivery from weeks to minutes, reduce development costs, and reduce the risk of application vulnerabilities while increasing developer productivity. Source code management enables coordination, sharing and collaboration across the entire software development team. Track and merge branches, audit changes and enable concurrent work, to accelerate software delivery. Review code, discuss changes, share knowledge, and identify defects in code among distributed teams via asynchronous review and commenting. Automate, track and report code reviews.
    Leader badge
    Starting Price: $29 per user per month
  • 22
    Scaleway

    Scaleway

    Scaleway

    The Cloud that makes sense. From high-performance cloud ecosystem to hyperscale green datacenters, Scaleway provides the foundation for digital success. Cloud platform designed for developers & growing companies. All you need to create, deploy and scale your infrastructure in the cloud. Compute, GPU, Bare Metal & Containers. Evolutive & Managed Storage. Network. IoT. The largest choice of dedicated servers to succeed in the most demanding projects. High-end dedicated servers Web Hosting. Domain Names Services. Take advantage of our cutting-edge expertise to host your hardware in our resilient, high-performance and secure data centers. Private Suite & Cage. Rack, 1/2 & 1/4 Rack. Scaleway data centers. Scaleway is driving 6 data centers in Europe and offers cloud solutions to customers in more that 160 countries around the world. Our Excellence team: Experts by your side 24/7 year round Discover how we help our customers to use, tune & optimize their platforms with skilled expert
  • 23
    Oracle Container Cloud Service
    Oracle Container Cloud Service (also known as Oracle Cloud Infrastructure Container Service Classic) offers Development and Operations teams the benefits of easy and secure Docker containerization when building and deploying applications. Provides an easy-to-use interface to manage the Docker environment. Provides out-of-the-box examples of containerized services and application stacks that can be deployed in one click. Enables developers to easily connect to their private Docker registries (so they can ‘bring their own containers’). Enables developers to focus on building containerized application images and Continuous Integration/Continuous Delivery (CI/CD) pipelines, not on learning complex orchestration technologies.
  • 24
    Azure App Service
    Quickly build, deploy, and scale web apps and APIs on your terms. Work with .NET, .NET Core, Node.js, Java, Python or PHP, in containers or running on Windows or Linux. Meet rigorous, enterprise-grade performance, security and compliance requirements used a trusted, fully managed platform that handles over 40 billion requests per day. Fully managed platform with built-in infrastructure maintenance, security patching, and scaling. Built-in CI/CD integration and zero-downtime deployments. Rigorous security and compliance, including SOC and PCI, for seamless deployments across public cloud, Azure Government, and on-premises environments. Bring your code or container using the framework language of your choice. Increase developer productivity with tight integration of Visual Studio Code and Visual Studio. Streamline CI/CD with Git, GitHub, GitHub Actions, Atlassian Bitbucket, Azure DevOps, Docker Hub, and Azure Container Registry.
    Starting Price: $0.013 per hour
  • 25
    Kubescape
    A Kubernetes open-source platform providing developers and DevOps an end-to-end security solution, including risk analysis, security compliance, RBAC visualizer, and image vulnerabilities scanning. Kubescape scans K8s clusters, Kubernetes manifest files (YAML files, and HELM charts), code repositories, container registries and images, detecting misconfigurations according to multiple frameworks (such as the NSA-CISA, MITRE ATT&CK®), finding software vulnerabilities, and showing RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline. It calculates risk scores instantly and shows risk trends over time. Kubescape has became one of the fastest-growing Kubernetes security compliance tools among developers due to its easy-to-use CLI interface, flexible output formats, and automated scanning capabilities, saving Kubernetes users and admins precious time, effort, and resources.
  • 26
    Nexus Container
    Deploying containers successfully means balancing robust security practices, agile DevOps team needs, and compliance requirements. Nexus Container does it all — helping your development, security, and operations teams discover, continuously monitor, and fix container vulnerabilities during the entire container lifecycle. We continuously scan during build, monitor images in registries, and run automated tests for security compliance to ensure we catch vulnerabilities early in the container development cycle. If an issue is found, don’t worry, our admission controls and policy enforcement keep vulnerable images from deploying. Containers need advanced network protection for real-time security. Not only do we continuously monitor your containers to identify vulnerabilities and share available fixes once in-production, we’re the only solution that can enforce data loss protection and prevent zero-day malware and network attacks, tunneling, and breaches.
  • 27
    Mirantis Kubernetes Engine
    Mirantis Kubernetes Engine (formerly Docker Enterprise) provides simple, flexible, and scalable container orchestration and enterprise container management. Use Kubernetes, Swarm, or both, and experience the fastest time to production for modern applications across any environment. Enterprise container orchestration Avoid lock-in. Run Mirantis Kubernetes Engine on bare metal, or on private or public clouds—and on a range of popular Linux distributions. Reduce time-to-value. Hit the ground running with out-of-the-box dependencies including Calico for Kubernetes networking and NGINX for Ingress support. Leverage open source. Save money and maintain control by using a full stack of open source-based technologies that are production-proven, scalable, and extensible. Focus on apps—not infrastructure. Enable your IT team to focus on building business-differentiating applications when you couple Mirantis Kubernetes Engine with OpsCare Plus for a fully-managed K8s experience.
  • 28
    Azure Pipelines
    Automate your builds and deployments with Pipelines so you spend less time with the nuts and bolts and more time being creative. Get cloud-hosted pipelines for Linux, macOS, and Windows. Build web, desktop and mobile applications. Deploy to any cloud or on‑premises. Build, test, and deploy Node.js, Python, Java, PHP, Ruby, C/C++, .NET, Android, and iOS apps. Run in parallel on Linux, macOS, and Windows. Easily build and push images to container registries like Docker Hub and Azure Container Registry. Deploy containers to individual hosts or Kubernetes. Explore and implement a wide range of community-built build, test, and deployment tasks, along with hundreds of extensions from Slack to SonarCloud. Implement continuous delivery (CD) of your software to any cloud, including Azure, AWS, and GCP. Visualize deployment to any number of interdependent stages.
  • 29
    Clair

    Clair

    Clair

    Clair is an open-source project for the static analysis of vulnerabilities in application containers (currently including OCI and docker). Clients use the Clair API to index their container images and can then match it against known vulnerabilities. Our goal is to enable a more transparent view of the security of the container-based infrastructure. Thus, the project was named Clair after the French term which translates to clear, bright, and transparent. Manifests are Clair's representation of a container image. Clair leverages the fact that OCI Manifests and Layers are content-addressed to reduce duplicated work.
  • 30
    Centurion

    Centurion

    New Relic

    A deployment tool for Docker. Takes containers from a Docker registry and runs them on a fleet of hosts with the correct environment variables, host volume mappings, and port mappings. Supports rolling deployments out of the box, and makes it easy to ship applications to Docker servers. We're using it in our production infrastructure. Centurion works in a two part deployment process where the build process ships a container to the registry, and Centurion ships containers from the registry to the Docker fleet. Registry support is handled by the Docker command line tools directly so you can use anything they currently support via the normal registry mechanism. If you haven't been using a registry, you should read up on how to do that before trying to deploy anything with Centurion. This code is developed in the open with input from the community through issues and PRs. There is an active maintainer team within New Relic.
  • 31
    Wallarm FAST
    Automate Security testing in CI/CD. Identify vulnerabilities in apps and APIs with dynamic security testing as fast as your DevOps runs. Automated continuous security enables high-velocity CI/CD. Integrated testing for every code build. Security is guardrails. Unified CI workflows for DevSecOps. Developer friendly. FAST automatically transforms existing functional tests into security tests in CI/CD. A FAST proxy (Docker container) is used to capture requests as baselines. It then creates and runs a multitude of security checks for every build. Use OWASP Top 10 defaults or specify your own testing policies, like types of parameters to test, payloads, or fuzzer settings. Report vulnerabilities and anomalies to the CI pipeline and ticketing system.
    Starting Price: $25,000 per year
  • 32
    Werf

    Werf

    Werf

    The CLI tool gluing Git, Docker, Helm & Kubernetes with any CI system to implement CI/CD and Giterminism. Establish and benefit from efficient, robust, and integrated CI/CD pipelines on top of proven technologies. With Werf, it’s easy to start, apply best practices, and avoid reinventing the wheel. Werf not only builds & deploys but also continuously syncs the current Kubernetes state with changes made in Git. Werf introduces Giterminism, use git as a single source of truth, and make the entire delivery pipeline deterministic and idempotent. Werf supports 2 ways to deploy an application. converge application from git commit into the Kubernetes, publish application from git commit into the container registry as a bundle, then deploy bundle into the Kubernetes. Werf just works out of the box with a minimal configuration. You don't even need to be a DevOps/SRE engineer to use werf. Many guides are provided to quickly deploy your app into Kubernetes.
  • 33
    Drone

    Drone

    Harness

    Configuration as a code. Pipelines are configured with a simple, easy‑to‑read file that you commit to your git repository. Each pipeline step is executed inside an isolated Docker container that is automatically downloaded at runtime. Any source code manager. Drone integrates seamlessly with multiple source code management systems, including GitHub, GitHubEnterprise, Bitbucket, and GitLab. Any platform. Drone.io natively supports multiple operating systems and architectures, including Linux x64, ARM, ARM64 and Windows x64. Any language. Drone works with any language, database or service that runs inside a Docker container. Choose from thousands of public Docker images or provide your own. Create and share plugins. Drone uses containers to drop pre‑configured steps into your pipeline. Choose from hundreds of existing plugins, or create your own. Drone makes advanced customization easy. Implement custom access controls, approval workflows, secret management, yaml syntax extensions& more.
  • 34
    Anchore

    Anchore

    Anchore

    DevSecOps at full speed with deep inspection of container images and policy-based compliance. In an environment where application development must be fast and flexible, containers are the future. Adoption is accelerating, but with it comes risk. Anchore makes it possible to manage, secure, and troubleshoot containers continuously, without sacrificing speed. It delivers a process that allows container development and deployment to be secure from the start, by ensuring that the contents of your containers match the standards that you define. The tools are transparent to developers, visible to production, accessible to security, and all designed for the fluid nature of containers. Anchore sets a trusted standard for containers. It empowers you to certify your containers, making them predictable and protectable. So you can deploy containers with confidence. Protect against risks using a complete container image security solution.
  • 35
    APX VCS Registry
    The APX VCS Registry is a trusted and secure platform for issuing, tracking and retiring Verified Carbon Units (VCUs). The Registry supports the VCS Association’s objectives to provide credibility to the voluntary markets, as well as to enhance business, consumer, and government confidence. The APX VCS Registry allows project developers to initiate the project registration process, upload documents and request issuance of VCUs through our online portal. Once VCUs are issued, they can be transferred immediately to any APX VCS Registry Account Holder or to another VCS-accredited registry.
  • 36
    PassagePoint
    Improve your company image and streamline the visitor registration process with PassagePoint, an on-premise security platform designed to enhance the safety and security of your facility. PassagePoint’s extensive customization capabilities and add-ons are specifically designed for school districts, global corporations, multi-tenant buildings and hospitals with unique security requirements worldwide. PassagePoint’s enhanced feature set can be added as required; web pre-registration, Single Sign-On and our Control Center module to centrally manage multiple locations with unique policies and settings. This scalable architecture enables integration with external systems, such as physical access control, HL7 interface, Denied Party Screening Services and the National Sex Offender Registry to provide an additional layer of security required for enterprise-level systems. STOPware offers a wide range of hardware components supported to speed up the visitor check-in process.
  • 37
    Azure Web App for Containers
    It has never been easier to deploy container-based web apps. Just pull container images from Docker Hub or a private Azure Container Registry, and Web App for Containers will deploy the containerized app with your preferred dependencies to production in seconds. The platform automatically takes care of OS patching, capacity provisioning, and load balancing. Automatically scale vertically and horizontally based on application needs. Granular scaling rules are available to handle peaks in workload automatically while minimizing costs during off-peak times. Deploy data and host services across multiple locations with just few mouse clicks.
  • 38
    Qualys Container Security
    Qualys CS features a vulnerability analysis plug-in for CI/CD tool Jenkins, and soon for other CI/CD tools including Bamboo, TeamCity, and CircleCI. You can download the plugins directly from within the container security module. With Qualys CS, security teams can participate in the DevOps process to gate vulnerable images entering the system, while developers get actionable data to remediate vulnerabilities. Configure policies for preventing vulnerable images from entering the repositories. Set policies based on criteria such as vulnerability severity, and specific QIDs. Review from within the plug-in a summary of the build with its vulnerabilities, information on patchable software and fixed versions, and image layers where it is present. Container infrastructure is immutable in nature, which means containers need to be identical to the images they are baked from.
  • 39
    UI.Vision RPA

    UI.Vision RPA

    UI.Vision

    Easy automation for busy people. The UI Vision free RPA software (formerly Kantu) automates web and desktop apps on Windows, Mac, and Linux. UI.Vision RPA is a free open-source browser extension that can be extended with local apps for desktop UI automation. The UI Vision core is open-source and guarantees enterprise-grade security. Your data never leaves your machine. Join 100,000+ users and automate workflows on your desktop and in the browser. The visual UI testing commands of UI Vision help web designers and developers to verify and validate the layout of websites and canvas elements. UI Vision can read and recognize images and text inside canvas elements, images, and videos. UI Vision can resize the browser's window in order to emulate various resolutions. This is particularly useful to test layouts on different browser resolutions and to validate visually perfect mobile, web, and native apps.
  • 40
    Codenotary

    Codenotary

    Codenotary

    We bring trust and integrity into the software life cycle by providing end-to-end cryptographically verifiable tracking and provenance for all artifacts, actions, and dependencies, at scale. Based on open source immudb, our highspeed, immutable store. Ultra-fast and simple integration with all your existing languages and CI/CD. Codenotary Cloud enables any company, developer, automation engineer, DevOps engineer to secure all stages of a CI/CD pipeline. With Codenotary Cloud® you can easily build immutable, tamper-proof solutions and comply with auditor requirements and regulations and laws. Codenotary Trustcenter enables any company, developer, automation engineer, DevOps engineer to secure all stages of a CI/CD pipeline. Attestation (Notarization & Authentication) of every step in your pipeline including vulnerability scanner results and evidence in a tamper-proof and immutable service enables you to reach Level 3 & 4 of the SLSA (Supply-chain Levels for Software Artifacts).
  • 41
    RegSofts Free Window Registry Repair
    Almost all Windows users gradually experiences the downfall in their PC's performance. Much of it can be attributed to Windows Registry Errors. By using Free Window Registry Repair regularly and repairing your registry your system should not only be more stable but it will also help Windows run faster. For your convenience it automatically backup any repairs made so that you always can restore Windows registry to the original state. The registry is a heart and soul of any Windows system. It contains information that controls how your system appears and how it behaves. Almost all Windows users gradually experiences the downfall in their PC's performance. Much of it can be attributed to Windows Registry Errors. For your convenience and for insuring maximum protection. Free Window Registry Repair automatically backup any repairs made. So you always can restore Windows registry to the original state using restore button.
  • 42
    ShuttleOps

    ShuttleOps

    ShuttleOps

    DevOps teams now have a single platform to build, deploy and manage applications, so they can get fixes, features, and updates to customers quickly and securely. One platform. Ample integrations. Rapid scalability. ShuttleOps is a no-code continuous delivery platform that makes it quick and simple to build, deploy and manage complex distributed applications. Using a simple drag and drop interface, ShuttleOps allows teams and organizations to quickly adopt and scale their DevOps practices. ShuttleOps supports Chef Habitat, Docker Container registries and custom build configurations. That means out-of-the box YAML free deployments, Persistent Volume Claims, Ingress rules, and log management. Define custom workflows with built-in collaboration including acknowledgement and approval gates, as well as real-time notifications to Slack, email and our in-app notification centre.
  • 43
    Blacksmith

    Blacksmith

    Blacksmith

    Speed up your GitHub Actions with a one-line code change, by running them on high-performance gaming CPUs instead of GitHub's older server hardware. We run GitHub Actions on high-performance gaming CPUs that are optimized to run CI workloads faster. Our cache is colocated with VMs, delivering 4x faster reads and writes for your CI workloads. Build your Docker images faster, leveraging powerful machines with cached Docker layers, located close to your container registry. Use Blacksmith for out-of-the-box analytics for your GitHub Action pipelines, at no additional cost. Get unprecedented visibility into your costs and runtime trends for your CI suite. Ensure your workflows are caching effectively by monitoring cache hits. Delete unused cache entries right from your dashboard. Blacksmith runs jobs in isolated virtual machines directly on bare metal. Single-use GitHub access tokens per job execution.
    Starting Price: $0.004 per GHz per hour
  • 44
    StackRox

    StackRox

    StackRox

    Only StackRox provides comprehensive visibility into your cloud-native infrastructure, including all images, container registries, Kubernetes deployment configurations, container runtime behavior, and more. StackRox’s deep integration with Kubernetes delivers visibility focused on deployments, giving security and DevOps teams a comprehensive understanding of their cloud-native infrastructure, including images, containers, pods, namespaces, clusters, and their configurations. You get at-a-glance views of risk across your environment, compliance status, and active suspicious traffic. Each summary view enables you to drill into more detail. Using StackRox, you can easily identify and analyze container images in your environment with native integrations and support for nearly every image registry.
  • 45
    TweakNow RegCleaner
    The Registry is a heart and soul of any Windows system. It contains information that controls how your Windows appears and how it behaves. Most applications today use registry to store configuration and other important data. When you install application, new registry entries created. These entries should be deleted automatically when you uninstall the application. Unfortunately, it does not always work that way. Sometimes you find that several applications fail to remove their own registry entries. These entries will become obsolete. After a long period, after installing and uninstalling a lot number of applications, your Windows registry may contain a large number of obsolete entries. These will significantly increase the registry size and thus will slow down your computer, because Windows will need more time to load, search, and read data from registry.
  • 46
    BoostSecurity

    BoostSecurity

    BoostSecurity

    BoostSecurity® enables early detection and remediation of security vulnerabilities at DevOps velocity while ensuring the continuous integrity of the software supply chain at every step from keyboard to production. Get visibility into the security vulnerabilities in code, cloud and CI/CD pipeline misconfigurations in your software supply chain in minutes. Fix security vulnerabilities in code, cloud and CI/CD pipeline misconfigurations as you code, in pull requests, before they sneak into production. Create & govern policies consistently and continuously across code, cloud and CI/CD organizationally to prevent classes of vulnerabilities from re-occurring. Consolidate tool and dashboard sprawl through a single control plane for trusted visibility into the risks of your software supply chain. Build and amplify trust between developers & security for scalable DevSecOps through high fidelity, zero friction SaaS automation.
  • 47
    Flux

    Flux

    Flux CD

    Flux is a set of continuous and progressive delivery solutions for Kubernetes that are open and extensible. The latest version of Flux brings many new features, making it more flexible and versatile. Flux is a CNCF Incubating project. Flux and Flagger deploy apps with canaries, feature flags, and A/B rollouts. Flux can also manage any Kubernetes resource. Infrastructure and workload dependency management are built-in. Flux enables application deployment (CD) and (with the help of Flagger) progressive delivery (PD) through automatic reconciliation. Flux can even push back to Git for you with automated container image updates to Git (image scanning and patching). Flux works with your Git providers (GitHub, GitLab, Bitbucket, can even use s3-compatible buckets as a source), all major container registries, and all CI workflow providers. Kustomize, Helm, RBAC, and policy-driven validation (OPA, Kyverno, admission controllers) so it simply falls into place.
  • 48
    Kyverno

    Kyverno

    Kyverno

    Kyverno is a policy engine designed for Kubernetes. With Kyverno, policies are managed as Kubernetes resources and no new language is required to write policies. This allows using familiar tools such as kubectl, Git, and Kustomize to manage policies. Kyverno policies can validate, mutate, and generate Kubernetes resources plus ensure OCI image supply chain security. The Kyverno CLI can be used to test policies and validate resources as part of a CI/CD pipeline. Kyverno allows cluster administrators to manage environment specific configurations independently of workload configurations and enforce configuration best practices for their clusters. Kyverno can be used to scan existing workloads for best practices, or can be used to enforce best practices by blocking or mutating API requests. Block non-conformant resources using admission controls, or report policy violations.
  • 49
    Gitea

    Gitea

    CommitGo, Inc.

    Git with a cup of tea! Painless self-hosted all-in-one software development service, including Git hosting, code review, team collaboration, package registry and CI/CD. Its backend is written in the Go language. It is published under the MIT license. Gitea runs anywhere Go can compile for Windows, macOS, Linux, ARM, etc. Choose the one you love! Simply run the binary for your platform, ship it with Docker, or get it packaged. Gitea has low minimal requirements and can run on an inexpensive Raspberry Pi. Save your machine energy! Join us by contributing to make this project even better. Don’t be shy to be a contributor!
    Starting Price: $19/month/user
  • 50
    CXi-Registry

    CXi-Registry

    CXi Software

    A cloud-based SaaS subscription model provides a low-risk, cost-effective tool for fund managers and fund administrators to meet their registry and regulatory compliance needs, and enable enhanced investor engagement. The CXi-Registry SaaS solution provides full end to end processing for funds management registry operations, user-friendly dashboards and reporting, and all regulatory compliance reporting requirements. The system employs latest technology, providing a controlled and secure environment for all unit registry data. CXi provide professional services around the CXi-Registry SaaS solution. Professional services include registry operations and fund administration consulting, project management, software implementation consulting and technical services. CXi-Registry customer support provides an online ‘Service Desk’ system allowing users to easily ask questions, log issues and provide supporting documentation.