20 Integrations with VMware Tanzu

View a list of VMware Tanzu integrations and software that integrates with VMware Tanzu below. Compare the best VMware Tanzu integrations as well as features, ratings, user reviews, and pricing of software that integrates with VMware Tanzu. Here are the current VMware Tanzu integrations in 2024:

  • 1
    Google Cloud Platform
    Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
    Leader badge
    Starting Price: Free ($300 in free credits)
    View Software
    Visit Website
  • 2
    New Relic

    New Relic

    New Relic

    There are an estimated 25 million engineers in the world across dozens of distinct functions. As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for all metrics, events, logs, and traces; powerful full-stack analysis tools; and simple, transparent usage-based pricing with only 2 key metrics. New Relic has also curated one of the industry’s largest ecosystems of open source integrations, making it easy for every engineer to get started with observability and use New Relic alongside their other favorite applications.
    Leader badge
    Starting Price: Free
    View Software
    Visit Website
  • 3
    CloudCasa

    CloudCasa

    CloudCasa by Catalogic

    CloudCasa is a Kubernetes backup and recovery solution for multi-cluster and multi-cloud recovery, named a leader and outperformer by industry analysts. With CloudCasa, developers, DevOps, and Platform Engineering teams don’t need to be a storage or data protection expert to backup and restore your Kubernetes clusters, or to manage Velero. As a powerful and easy to use Kubernetes backup and Velero management service, start with CloudCasa for Velero, and upgrade as needed to CloudCasa Pro, to get advanced multi-cloud application recovery. Let CloudCasa do all the hard work of managing and protecting your cluster resources and persistent data from human error, security breaches, and service failures, providing the business continuity and compliance that your business requires. It's easy for a single cluster, and just as easy for large, complex, multi-cluster, multi-cloud, and hybrid cloud environments.
    Starting Price: $19 per node per month
  • 4
    Amazon Web Services (AWS)
    Whether you're looking for compute power, database storage, content delivery, or other functionality, AWS has the services to help you build sophisticated applications with increased flexibility, scalability and reliability. Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster. AWS has significantly more services, and more features within those services, than any other cloud provider–from infrastructure technologies like compute, storage, and databases–to emerging technologies, such as machine learning and artificial intelligence, data lakes and analytics, and Internet of Things. This makes it faster, easier, and more cost effective to move your existing applications to the cloud.
  • 5
    Microsoft Azure

    Microsoft Azure

    Microsoft

    Microsoft's Azure is a cloud computing platform that allows for rapid and secure application development, testing and management. Azure. Invent with purpose. Turn ideas into solutions with more than 100 services to build, deploy, and manage applications—in the cloud, on-premises, and at the edge—using the tools and frameworks of your choice. Continuous innovation from Microsoft supports your development today, and your product visions for tomorrow. With a commitment to open source, and support for all languages and frameworks, build how you want, and deploy where you want to. On-premises, in the cloud, and at the edge—we’ll meet you where you are. Integrate and manage your environments with services designed for hybrid cloud. Get security from the ground up, backed by a team of experts, and proactive compliance trusted by enterprises, governments, and startups. The cloud you can trust, with the numbers to prove it.
  • 6
    Cloudian

    Cloudian

    Cloudian

    Solve your capacity and cost challenges with Cloudian® S3-compatible object and file storage. Exabyte-scalable and cloud-compatible, Cloudian software-defined storage and appliances make it easy for enterprises and service providers to deliver storage at one site, or across multiple sites with a modular architecture that’s easy to manage and grow. Gain actionable insight. Cloudian HyperIQ™ provides real-time infrastructure monitoring and user behavior analytics. Track user data access to verify compliance and monitor service levels. Spot infrastructure issues before they become problems with configurable, real-time alerts. Customize HyperIQ to your environment over 100 available data panels. Protect your data from ransomware with Cloudian Object Lock, a hardened solution for data immutability. HyperStore® is hardened by the use of HyperStore Shell (HSH) and RootDisable, securing the solution at the system level, even disabling root access to make the solution impregnable.
    Starting Price: Pricing as low as 1/2 ¢ per gi
  • 7
    Kasten K10
    Backup and restore your applications to protect your data. Meet regulatory and corporate mandates for your business. Move between clouds and on-premises for load balancing and upgrades. Purpose-built for Kubernetes, Kasten K10 provides enterprise operations teams an easy-to-use, scalable, and secure system for backup/restore, disaster recovery, and mobility of Kubernetes applications. Automatically and seamlessly discovers complex Kubernetes applications and all related dependencies. Dynamic policies ensure complete protection for rapidly evolving applications. With simplicity at its forefront, an extremely easy-to-use dashboard, Kubernetes-native and REST APIs, and CLI support, managing stateful applications becomes effortless. Seamless integration into your environment due to deep integration with Kubernetes distributions, databases, cloud infrastructure, storage, CSI, authentication (OIDC, OAuth, etc.), monitoring, logging, and auditing.
  • 8
    OpenLegacy

    OpenLegacy

    OpenLegacy

    OpenLegacy enables organizations with legacy systems to release new digital services faster and more efficiently than ever before. It connects directly to even the most complex legacy systems, bypassing the need for extra layers of technology. Our product, OpenLegacy HUB is an all-in-one enterprise digital and cloud modernization platform, without disruption. With the OpenLegacy Hub, organizations can automatically generate digital services from any legacy source, deploy them to any cloud environment or framework, extend their functionality, add business logic, and manage these legacy assets in a reusable, discoverable, and easy-to-use way, all without any changes to the underlying legacy applications. 2022 New! OpenLegacy is available on AWS Marketplace.
    Starting Price: $12K/monthly
  • 9
    Calico Cloud
    Pay-as-you-go security and observability SaaS platform for containers, Kubernetes, and cloud. Get a live view of dependencies and how all the services are communicating with each other in a multi-cluster, hybrid and multi-cloud environment. Eliminate setup and onboarding steps and troubleshoot your Kubernetes security and observability issues within minutes. Calico Cloud is a next-generation security and observability SaaS platform for containers, Kubernetes, and cloud. It enables organizations of all sizes to protect their cloud workloads and containers, detect threats, achieve continuous compliance, and troubleshoot service issues in real-time across multi-cluster, multi-cloud, and hybrid deployments. Calico Cloud is built on Calico Open Source, the most widely adopted container networking and security solution. Instead of managing a platform for container and Kubernetes security and observability, teams consume it as a managed service for faster analysis, relevant actions, etc.
    Starting Price: $0.05 per node hour
  • 10
    Kubecost

    Kubecost

    Kubecost

    Kubecost provides real-time cost visibility and insights for teams using Kubernetes, helping you continuously reduce your cloud costs. Breakdown costs by any Kubernetes concepts, including deployment, service, namespace label, and more. View costs across multiple clusters in a single view or via a single API endpoint. Join Kubernetes costs with any external cloud services or infrastructure spend to have a complete picture. External costs can be shared and then attributed to any Kubernetes concept for a comprehensive view of spend. Receive dynamic recommendations for reducing spend without sacrificing performance. Prioritize key infrastructure or application changes for improving resource efficiency and reliability. Quickly catch cost overruns and infrastructure outage risks before they become a problem with real-time notifications. Preserve engineering workflows by integrating with tools like PagerDuty and Slack.
    Starting Price: $199 per month
  • 11
    MayaData

    MayaData

    MayaData

    OpenEBS with Kubera is the answer. OpenEBS is the most popular open source storage for Kubernetes - and the fastest. Kubera adds an easy to use GUI for OpenEBS Mayastor - and APIs, auto checks and configuration, active directory authentication, built-in performance benchmarking, and additional operators to assist in upgrades and other use cases. Kubera is freely available and is delivered by MayaData when providing 24/7 support for customers to reduce operational costs and complexity. Kubera Propel is a cloud-native declarative data plane written in Rust. It’s built on the open source OpenEBS Mayastor. Kubera Propel combines breakthrough technologies like NVMe, SPDK, and emerging new storage features in the Linux kernel. OpenEBS managed by Kubera Propel has been shown independent benchmarks to deliver extremely low latency performance for data bases and other workloads running on Kubernetes.
    Starting Price: $100 per node per month
  • 12
    Ozone

    Ozone

    Ozone

    Ozone platform helps enterprises to ship modern applications quickly, securely and reliably. Ozone removes the unwanted headache of managing too many DevOps tools and makes it super easy for anyone to deploy applications on Kubernetes clusters. Just integrate all your existing DevOps tools and automate your application delivery process end-to-end. Accelerate deployments with automated pipeline workflows and on demand infrastructure management with zero downtime. Prevent business losses by enforcing governance and compliance policy for app deployments at scale. Single pane of glass where engineering, DevOps and Security teams can collaborate on application releases in realtime.
  • 13
    CyberArk Cloud Entitlements Manager
    Establish cloud least privilege with minimal impact on your business. Proactively defend against internal and external threats so you can focus on what matters most. Quickly and easily apply cloud least privilege without disrupting productivity. Detect and remediate excessive cloud permissions to keep uncertainty at bay. From AWS to Azure and GCP, automatically identify and remove excessive cloud permissions. Secure your cloud environment and your business. Confidently adopt advanced services and securely expand your cloud presence. Gain cloud-agnostic insight from a centralized dashboard to detect and control all permissions to access resources across AWS, AWS Elastic Kubernetes Service, Azure, and GCP. Apply granularly, code-level IAM policy recommendations for human and machine identities without impacting ongoing operations. Proactively reduce risk and measure progress with dynamic, quantifiable exposure level scores for all identities and platforms.
  • 14
    Synopsys Seeker
    The industry’s first IAST solution with active verification and sensitive-data tracking for web-based applications. Automatically retests identified vulnerabilities and validates whether they are real and can be exploited. Is more accurate than traditional dynamic testing. Provides a real-time view of the top security vulnerabilities. Sensitive-data tracking shows you where your most critical information is stored without sufficient encryption, helping ensure compliance with key industry standards and regulations, including PCI DSS and GDPR. Seeker is easy to deploy and scale in your CI/CD development workflows. Native integrations, web APIs, and plugins provide seamless integration with the tools you use for on-premises, cloud-based, microservices-based, and container-based development. You’ll get accurate results out of the box, without extensive configuration, custom services, or tuning.
  • 15
    Cribl AppScope
    AppScope is a new approach to black-box instrumentation delivering ubiquitous, unified telemetry from any Linux executable by simply prepending scope to the command. Talk to any customer using Application Performance Management, and they’ll tell you how much they love their solution, but they wish they could extend it to more of their applications. Most have 10% or fewer of their apps instrumented for APM, and are supplementing what they can with basic metrics. Where does this leave the other 80%? Enter AppScope. No language-specific instrumentation. No application developers required. AppScope is language agnostic and completely userland; works with any application; scales from the CLI to production. Send AppScope data to any existing monitoring tool, time series database, or log tool. AppScope allows SREs and Ops teams to interrogate running applications to discover how they work and their behavior in any deployment context, from on-prem to cloud to containers.
  • 16
    Defensics

    Defensics

    Synopsys

    Defensics is a comprehensive, versatile, automated black box fuzzer that enables organizations to efficiently and effectively discover and remediate security weaknesses in software. Identify defects and zero-day vulnerabilities in services and protocols​. The generational fuzzer takes an intelligent, targeted approach to negative testing. Advanced file and protocol template fuzzers enable users to build their own test cases. The SDK allows expert users to use the Defensics framework to develop their own test cases. Defensics is a black box fuzzer, meaning it doesn’t require source code to run. With Defensics, users can secure their cyber supply chain to ensure the interoperability, robustness, quality, and security of software and devices before introducing them into IT or lab environments. Properly executed fuzzing techniques can provide a low-cost, efficient means of finding vulnerabilities, covering more code paths and value iterations than a manual analysis can perform.
  • 17
    ThreatStryker

    ThreatStryker

    Deepfence

    Runtime attack analysis, threat assessment, and targeted protection for your infrastructure and applications. Stay ahead of attackers and neutralize zero-day attacks. Observe attack behavior. ThreatStryker observes, correlates, learns and acts to protect your applications and keep you one step ahead of attackers. Deepfence ThreatStryker discovers all running containers, processes, and online hosts, and presents a live and interactive color-coded view of the topology. It audits containers and hosts to detect vulnerable components and interrogates configuration to identify file system, process, and network-related misconfigurations. ThreatStryker assesses compliance using industry and community standard benchmarks. ThreatStryker performs deep inspection of network traffic, system, and application behavior, and accumulates suspicious events over time. Events are classified and correlated against known vulnerabilities and suspicious patterns of behavior.
  • 18
    ThreatMapper

    ThreatMapper

    Deepfence

    Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories. ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. What you cannot see, you cannot secure. ThreatMapper auto-discovers your production infrastructure. It identifies and interrogates cloud instances, Kubernetes nodes, and serverless resources, discovering the applications and containers and mapping their topology in real-time. Use ThreatMapper to discover and visualize the external and internal attack surface for your applications and infrastructure. Exploiting known vulnerabilities in common dependencies is one of the easiest ways for bad actors to gain a foothold within your infrastructure. ThreatMapper scans hosts, containers, and applications for known vulnerable dependencies, taking threat feeds from over 50 different sources.
  • 19
    Argon

    Argon

    ArgonSec

    The first unified security solution protecting the integrity of your software throughout the entire DevOps CI CD pipeline. Track all events and actions across your software supply chain with unparalleled clarity, get actionable information and make decisions faster. Bolster your security posture by enforcing security best practices at all stages of the software delivery process with real-time alerts and auto-remediation. Ensure source code integrity with automated validity checks on each release, so you can be sure the code you committed is the source code deployed. Argon continuously monitors your DevOps infrastructure to identify security risks, code leaks, misconfigurations, and anomalies, and provide insights about the posture of your CI CD pipeline.
  • 20
    Rafay

    Rafay

    Rafay

    Delight developers and operations teams with the self-service and automation they need, with the right mix of standardization and control that the business requires. Centrally specify and manage configurations (in Git) for clusters encompassing security policy and software add-ons such as service mesh, ingress controllers, monitoring, logging, and backup and restore solutions. Blueprints and add-on lifecycle management can easily be applied to greenfield and brownfield clusters centrally. Blueprints can also be shared across multiple teams for centralized governance of add-ons deployed across the fleet. For environments requiring agile development cycles, users can go from a Git push to an updated application on managed clusters in seconds — 100+ times a day. This is particularly suited for developer environments where updates are very frequent.
  • Previous
  • You're on page 1
  • Next