17 Integrations with Tetrate

View a list of Tetrate integrations and software that integrates with Tetrate below. Compare the best Tetrate integrations as well as features, ratings, user reviews, and pricing of software that integrates with Tetrate. Here are the current Tetrate integrations in 2024:

  • 1
    Google Cloud Platform
    Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
    Leader badge
    Starting Price: Free ($300 in free credits)
    View Software
    Visit Website
  • 2
    Kubernetes

    Kubernetes

    Kubernetes

    Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community. Designed on the same principles that allows Google to run billions of containers a week, Kubernetes can scale without increasing your ops team. Whether testing locally or running a global enterprise, Kubernetes flexibility grows with you to deliver your applications consistently and easily no matter how complex your need is. Kubernetes is open source giving you the freedom to take advantage of on-premises, hybrid, or public cloud infrastructure, letting you effortlessly move workloads to where it matters to you.
    Starting Price: Free
  • 3
    Google Kubernetes Engine (GKE)
    Run advanced apps on a secured and managed Kubernetes service. GKE is an enterprise-grade platform for containerized applications, including stateful and stateless, AI and ML, Linux and Windows, complex and simple web apps, API, and backend services. Leverage industry-first features like four-way auto-scaling and no-stress management. Optimize GPU and TPU provisioning, use integrated developer tools, and get multi-cluster support from SREs. Start quickly with single-click clusters. Leverage a high-availability control plane including multi-zonal and regional clusters. Eliminate operational overhead with auto-repair, auto-upgrade, and release channels. Secure by default, including vulnerability scanning of container images and data encryption. Integrated Cloud Monitoring with infrastructure, application, and Kubernetes-specific views. Speed up app development without sacrificing security.
  • 4
    Amazon Web Services (AWS)
    Whether you're looking for compute power, database storage, content delivery, or other functionality, AWS has the services to help you build sophisticated applications with increased flexibility, scalability and reliability. Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster. AWS has significantly more services, and more features within those services, than any other cloud provider–from infrastructure technologies like compute, storage, and databases–to emerging technologies, such as machine learning and artificial intelligence, data lakes and analytics, and Internet of Things. This makes it faster, easier, and more cost effective to move your existing applications to the cloud.
  • 5
    Microsoft Azure
    Microsoft's Azure is a cloud computing platform that allows for rapid and secure application development, testing and management. Azure. Invent with purpose. Turn ideas into solutions with more than 100 services to build, deploy, and manage applications—in the cloud, on-premises, and at the edge—using the tools and frameworks of your choice. Continuous innovation from Microsoft supports your development today, and your product visions for tomorrow. With a commitment to open source, and support for all languages and frameworks, build how you want, and deploy where you want to. On-premises, in the cloud, and at the edge—we’ll meet you where you are. Integrate and manage your environments with services designed for hybrid cloud. Get security from the ground up, backed by a team of experts, and proactive compliance trusted by enterprises, governments, and startups. The cloud you can trust, with the numbers to prove it.
  • 6
    Istio

    Istio

    Istio

    Connect, secure, control, and observe services. Istio’s traffic routing rules let you easily control the flow of traffic and API calls between services. Istio simplifies configuration of service-level properties like circuit breakers, timeouts, and retries, and makes it easy to set up important tasks like A/B testing, canary rollouts, and staged rollouts with percentage-based traffic splits. It also provides out-of-box failure recovery features that help make your application more robust against failures of dependent services or the network. Istio Security provides a comprehensive security solution to solve these issues. This page gives an overview on how you can use Istio security features to secure your services, wherever you run them. In particular, Istio security mitigates both insider and external threats against your data, endpoints, communication, and platform. Istio generates detailed telemetry for all service communications within a mesh.
  • 7
    Weaveworks

    Weaveworks

    Weaveworks

    Continuous delivery for application teams and continuous control for platform teams. Automate Kubernetes with GitOps one pull request at a time. The multi cluster-control plane allows cluster operators to control and observe across any Kubernetes. Immediately detect drift and evaluate cluster health or even inform roll back actions as well as monitor continuous operations. Rapidly create, update and manage production ready application clusters with all of the add-ons needed for an agile cloud native platform with a single click. Reliability through automation. Minimize operations overhead with automated cluster lifecycle management: upgrades, security patches, and cluster extension updates. GitOps is an operating model for cloud native applications running on Kubernetes. The GitOps methodology enables continuous software delivery through automated pipelines. It focuses on a developer centric experience to deploy, monitor and manage workloads by using your version control system.
  • 8
    Cequence Security

    Cequence Security

    Cequence Security

    Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool.
  • 9
    Mirantis Cloud Platform
    MCP features full-stack enterprise support for Kubernetes and OpenStack and helps companies run optimized hybrid environments supporting traditional and distributed microservices-based applications in production at scale. MCP is offered through a flexible build-operate-transfer delivery model, providing fully managed services with the option to transfer ops to your own team. For Kubernetes, key components including Calico SDN, Ceph persistent storage, CoreDNS, MetalLB and more are pre-integrated for quick deployment on premises on bare metal or OpenStack. MCP features DriveTrain GitOps based lifecycle management using principles of infrastructure as code to provide flexible cloud infrastructure with easy updates & upgrades. The Model Designer UI simplifies cloud configuration. DriveTrain verification pipelines work with StackLight logging, monitoring and alerting to maximize availability as updates are introduced to ensure functionality and performance in production.
  • 10
    AVX ONE

    AVX ONE

    AppViewX

    AVX ONE is the most advanced SaaS certificate lifecycle management (CLM) platform for enterprise PKI, IAM, security, DevOps, cloud, platform and application teams. With visibility, automation and control of certificates and keys, AVX ONE enables crypto-agility to rapidly respond to cryptographic changes, mitigate threats, prevent outages and prepare for Post-Quantum Cryptography. In one unified platform, AppViewX provides instant value via enterprise-wide CLM, Kubernetes and container TLS automation, scalable PKI-as-a-Service, easy Microsoft PKI modernization, secure code signing, IoT identity security, SSH management, and Post-Quantum Cryptography (PQC) readiness with AI and ML risk reduction capabilities in complex hybrid, multi-cloud and edge environments.
  • 11
    Amazon EKS
    Amazon Elastic Kubernetes Service (Amazon EKS) is a fully managed Kubernetes service. Customers such as Intel, Snap, Intuit, GoDaddy, and Autodesk trust EKS to run their most sensitive and mission-critical applications because of its security, reliability, and scalability. EKS is the best place to run Kubernetes for several reasons. First, you can choose to run your EKS clusters using AWS Fargate, which is serverless compute for containers. Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design. Second, EKS is deeply integrated with services such as Amazon CloudWatch, Auto Scaling Groups, AWS Identity and Access Management (IAM), and Amazon Virtual Private Cloud (VPC), providing you a seamless experience to monitor, scale, and load-balance your applications.
  • 12
    Envoy

    Envoy

    Envoy Proxy

    As on the ground microservice practitioners quickly realize, the majority of operational problems that arise when moving to a distributed architecture are ultimately grounded in two areas: networking and observability. It is simply an orders of magnitude larger problem to network and debug a set of intertwined distributed services versus a single monolithic application. Envoy is a self contained, high performance server with a small memory footprint. It runs alongside any application language or framework. Envoy supports advanced load balancing features including automatic retries, circuit breaking, global rate limiting, request shadowing, zone local load balancing, etc. Envoy provides robust APIs for dynamically managing its configuration.
  • 13
    Azure Kubernetes Service (AKS)
    The fully managed Azure Kubernetes Service (AKS) makes deploying and managing containerized applications easy. It offers serverless Kubernetes, an integrated continuous integration and continuous delivery (CI/CD) experience, and enterprise-grade security and governance. Unite your development and operations teams on a single platform to rapidly build, deliver, and scale applications with confidence. Elastic provisioning of additional capacity without the need to manage the infrastructure. Add event-driven autoscaling and triggers through KEDA. Faster end-to-end development experience with Azure Dev Spaces including integration with Visual Studio Code Kubernetes tools, Azure DevOps, and Azure Monitor. Advanced identity and access management using Azure Active Directory, and dynamic rules enforcement across multiple clusters with Azure Policy. Available in more regions than any other cloud providers.
  • 14
    Venafi

    Venafi

    Venafi

    Protect All Your Machine Identities. Are you protecting the TLS keys and certificates, SSH keys, code signing keys, and user certificates being used across your extended enterprise? Find out how you can secure this avalanche of new and constantly changing machine identities. Stay ahead of outages and accelerate DevOps security. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence and automation to protect machine identities throughout your organization. Plus, you can extend your protection through an ecosystem of hundreds of out-of-the-box integrated third-party applications and certificate authorities (CAs). Discover and provision certificates and keys using multiple methods. Apply and enforce security best practices for certificates. Integrate workflow management processes with management of certificate lifecycles. Combine certificate automation with orchestration of keys generated by Hardware Security Modules (HSMs).
  • 15
    Jetstack Preflight
    Jetstack Preflight helps you better understand your Kubernetes environments by constantly scanning for mis-configurations that may be opening security holes, causing costly excess resource usage or making your cluster harder to maintain. Preflight checks your environment against hundreds of policy rules, all developed by our Kubernetes experts and based on years of working with customers’ production workloads. Data from your environment is continually checked against policy rules and the results are summarised in clear reports that highlight the areas most in need of your attention. You don’t always know exactly what is running in your Kubernetes clusters, either because developers may have deployed things that you don’t know about, or because configuration changes have left applications running that everyone thinks have been removed.
  • 16
    Keyfactor Control
    You know the drill. Tight budgets, hardware constraints, and complex supply chains make it nearly impossible to consider all factors necessary to embed strong security into your devices. But when safety, security, and trust are at stake – it has to happen. Keyfactor Control is an end-to-end IoT Identity Platform that enables manufacturers to build high-assurance identity at every step of the device lifecycle – from product design through end-of-life. Embed PKI-based digital identity and integrity into every device at scale – from design and manufacturing throughout the product lifecycle. Build secure identity into device design and development easily, cost-effectively, and at scale. Reduce the cost of device maintenance with secure over-the-air updates and remote management. Protect devices against fraud and tampering, and avoid preventable security and warranty recalls.
  • 17
    Amazon EKS Anywhere
    Amazon EKS Anywhere is a new deployment option for Amazon EKS that enables you to easily create and operate Kubernetes clusters on-premises, including on your own virtual machines (VMs) and bare metal servers. EKS Anywhere provides an installable software package for creating and operating Kubernetes clusters on-premises and automation tooling for cluster lifecycle support. EKS Anywhere brings a consistent AWS management experience to your data center, building on the strengths of Amazon EKS Distro (the same Kubernetes that powers EKS on AWS.) EKS Anywhere saves you the complexity of buying or building your own management tooling to create EKS Distro clusters, configure the operating environment, update software, and handle backup and recovery. EKS Anywhere enables you to automate cluster management, reduce support costs, and eliminate the redundant effort of using multiple open source or 3rd party tools for operating Kubernetes clusters. EKS Anywhere is fully supported by AWS.
  • Previous
  • You're on page 1
  • Next