Alternatives to Weave Net

Compare Weave Net alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Weave Net in 2024. Compare features, ratings, user reviews, pricing, and more from Weave Net competitors and alternatives in order to make an informed decision for your business.

  • 1
    Docker

    Docker

    Docker

    Docker takes away repetitive, mundane configuration tasks and is used throughout the development lifecycle for fast, easy and portable application development, desktop and cloud. Docker’s comprehensive end-to-end platform includes UIs, CLIs, APIs and security that are engineered to work together across the entire application delivery lifecycle. Get a head start on your coding by leveraging Docker images to efficiently develop your own unique applications on Windows and Mac. Create your multi-container application using Docker Compose. Integrate with your favorite tools throughout your development pipeline, Docker works with all development tools you use including VS Code, CircleCI and GitHub. Package applications as portable container images to run in any environment consistently from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE and more. Leverage Docker Trusted Content, including Docker Official Images and images from Docker Verified Publishers.
    Starting Price: $7 per month
  • 2
    Project Calico

    Project Calico

    Project Calico

    Calico is an open-source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports a broad range of platforms including Kubernetes, OpenShift, Mirantis Kubernetes Engine (MKE), OpenStack, and bare metal services. Whether you opt to use Calico's eBPF data plane or Linux’s standard networking pipeline, Calico delivers blazing-fast performance with true cloud-native scalability. Calico provides developers and cluster operators with a consistent experience and set of capabilities whether running in the public cloud or on-prem, on a single node, or across a multi-thousand-node cluster. Calico gives you a choice of data planes, including a pure Linux eBPF data plane, a standard Linux networking data plane, and a Windows HNS data plane. Whether you prefer the cutting-edge features of eBPF or the familiarity of the standard primitives that existing system administrators already know, Calico has you covered.
  • 3
    flannel

    flannel

    Red Hat

    flannel is a virtual networking layer designed specifically for containers. OpenShift Container Platform can use it for networking containers instead of the default software-defined networking (SDN) components. This is useful if running OpenShift Container Platform within a cloud provider platform that also relies on SDN, such as OpenStack, and you want to avoid encapsulating packets twice through both platforms. Each flanneld agent provides this infomation to a centralized etcd store so other agents on hosts can route packets to other containers within the flannel network. The following diagram illustrates the architecture and data flow from one container to another using a flannel network.
  • 4
    Calico Cloud
    Pay-as-you-go security and observability SaaS platform for containers, Kubernetes, and cloud. Get a live view of dependencies and how all the services are communicating with each other in a multi-cluster, hybrid and multi-cloud environment. Eliminate setup and onboarding steps and troubleshoot your Kubernetes security and observability issues within minutes. Calico Cloud is a next-generation security and observability SaaS platform for containers, Kubernetes, and cloud. It enables organizations of all sizes to protect their cloud workloads and containers, detect threats, achieve continuous compliance, and troubleshoot service issues in real-time across multi-cluster, multi-cloud, and hybrid deployments. Calico Cloud is built on Calico Open Source, the most widely adopted container networking and security solution. Instead of managing a platform for container and Kubernetes security and observability, teams consume it as a managed service for faster analysis, relevant actions, etc.
    Starting Price: $0.05 per node hour
  • 5
    VMware NSX

    VMware NSX

    Broadcom

    Full-Stack Network and Security Virtualization with VMware NSX. Enable your virtual cloud network to connect and protect applications across your data center, multi cloud, bare metal, and container infrastructure. VMware NSX Data Center delivers a complete L2-L7 networking and security virtualization platform — providing the ability to manage the entire network as a single entry from a single pane of glass. Bring one-click provisioning to your networking and security services — access powerful flexibility, agility, and scale — by running a complete L2-L7 stack in software, decoupled from underlying physical hardware. Manage consistent networking and security policies across private and public clouds, from a single pane of glass, regardless of where your application runs – VM, container, or bare metal. Deliver granular protection for your apps via micro-segmentation to the individual workload.
    Starting Price: $4,250
  • 6
    Contrail Networking

    Contrail Networking

    Juniper Networks

    Contrail Networking provides dynamic end-to-end networking policy and control for any cloud, any workload, and any deployment, from a single user interface. It translates abstract workflows into specific policies, simplifying the orchestration of virtual overlay connectivity across all environments. You can apply and control end-to-end policies across physical and virtual environments. Contrail Networking’s software-defined networking (SDN) capability, based on the open-source network virtualization project Tungsten Fabric, enables you to securely deploy your workloads in any environment. It offers continuous overlay connectivity to any workload, running on any compute technologies from traditional bare-metal servers, virtual machines, to containers. The unified operations and management tool, Contrail Command, is a simple-to-use interface.
  • 7
    Nuage Networks Virtualized Services Platform
    Transform your network and prepare for the era of end to end network automation with the Nuage Networks Virtualized Services Platform (VSP). With VSP you can provide SDN and SD-WAN network automation across networks and clouds of all sizes and architectures from data center private clouds to large enterprise WANs to the largest public clouds in the world. Offered through over 70 Managed Service Provider Partners worldwide, our open, secure and multi-cloud enabled wide area networking solution gives your business all the benefits of SD-WAN, plus the flexibility to choose the approach that best meets your digital transformation needs. The Nuage Networks Virtualized Services Platform (VSP) is the industry leading network automation platform enabling a complete range of SDN, SD-WAN, and cloud solutions. VSP provides advanced network automation across networks and clouds of all sizes and architectures, from datacenter private clouds to large enterprise wide area networks (WANs).
  • 8
    Cilium

    Cilium

    Cilium

    Cilium is open-source software for providing, securing and observing network connectivity between container workloads, cloud native, and fueled by the revolutionary Kernel technology eBPF. Kubernetes doesn't come with an implementation of Load Balancing. This is usually left as an exercise for your cloud provider or in private cloud environments an exercise for your networking team. Cilium can attract this traffic with BGP and accelerate leveraging XDP and eBPF. Together these technologies provide a very robust and secure implementation of load balancing. Cilium and eBPF operate at the kernel layer. With this level of context, we can make intelligent decisions about how to connect different workloads whether on the same node or between clusters. With eBPF and XDP Cilium enables significant improvements in latency and performance and eliminates the need for Kube-proxy entirely.
  • 9
    HashiCorp Consul
    A multi-cloud service networking platform to connect and secure services across any runtime platform and public or private cloud. Real-time health and location information of all services. Progressive delivery and zero trust security with less overhead. Receive peace of mind that all HCP connections are secured out of the box. Gain insight into service health and performance metrics with built-in visualization directly in the Consul UI or by exporting metrics to a third-party solution. Many modern applications have migrated towards decentralized architectures as opposed to traditional monolithic architectures. This is especially true with microservices. Since applications are composed of many inter-dependent services, there's a need to have a topological view of the services and their dependencies. Furthermore, there is a desire to have insight into health and performance metrics for the different services.
  • 10
    NGINX
    NGINX Open Source: The open source web server that powers more than 400 million websites. NGINX Plus is a software load balancer, web server, and content cache built on top of open source NGINX. Use NGINX Plus instead of your hardware load balancer and get the freedom to innovate without being constrained by infrastructure. Save more than 80% compared to hardware ADCs, without sacrificing performance or functionality. Deploy anywhere: public cloud, private cloud, bare metal, virtual machines, and containers. Save time by performing common tasks through the built‑in NGINX Plus API. From NetOps to DevOps, modern app teams need a self‑service, API‑driven platform that integrates easily into CI/CD workflows to accelerate app deployment – whether your app has a hybrid or microservices architecture – and makes app lifecycle management easier.
  • 11
    Converged Cloud Fabric
    Converged Cloud Fabric (CCF)™ is an automated fabric built with cloud networking design principles. CCF leverages VPC/VNet constructs on-prem to deliver a cloud Network-as-a-Service operational model. CCF automates networking for multiple private cloud platforms, enabling the network to operate at the speed of VMs and Containers. With built-in analytics and telemetry, CCF provides real-time contextual visibility across the fabric and one-click troubleshooting workflows. With CCF, NetOps, DevOps and CloudOps teams can effectively collaborate, and rapidly on-board applications and tenants. CCF enables mainstream and midsize organizations to leverage network as a strategic pillar of the digital transformation strategy. With CCF's self-service networking and contextual intelligence, NetOps team can focus on innovations such as new services and analytics, instead of time-consuming manual tasks.
  • 12
    Infoblox DDI
    Network landscapes are rapidly evolving, driven by trends in hybrid and multi-cloud migration, security, SDN, NFV, IPv6 adoption and the Internet of Things (IoT). Against this backdrop of soaring network complexity, all organizations today require specialized solutions that simplify and optimize what it takes to execute DNS, DHCP and IP address management, the critical network services collectively known as DDI that make all network interactions possible. Infoblox applications and appliances are uniquely able to support all your DDI demands—today and down the road. Need to centralize control of advanced DDI services on-site while seamlessly integrating with cloud and virtualization platforms? We’ve got you covered. Want to radically improve networking in remote and branch locations by managing DDI in the cloud? Check. Want to see all network assets across all infrastructure in one place? You got it. It’s DDI your way.
  • 13
    Traefik

    Traefik

    Traefik Labs

    What is Traefik Enterprise Edition? TraefikEE is a cloud-native load balancer and Kubernetes ingress controller that eases networking complexity for application teams. Built on top of open source Traefik, TraefikEE brings exclusive distributed and high-availability features combined with premium bundled support for production grade deployments. Split into proxies and controllers, TraefikEE supports clustered deployments to increase security, scalability and high availability. Deploy applications anywhere, on-premises or in the cloud, and natively integrate with top-notch infrastructure tooling. Save time and give better consistency while deploying, managing, and scaling applications by leveraging dynamic and automatic TraefikEE features. Improve the application development and delivery cycle by giving developers the visibility and ownership of their services.
  • 14
    Mavenir Webscale Platform
    5G technology is very different in nature when compared to previous generations of wireless networks. 5G can be viewed as a collection of end-to-end use cases rather than just a collection of technology. Use cases include, but are not limited to – remote healthcare, autonomous cars, industrial advanced robotics, smart utilities, smart agriculture and more. These use cases require a different network architecture comprised of various features. This allows the wireless service providers to have one network for all devices 2G to 5G. It is the common software across Mavenir products and services that enables agility and speed in the delivery of new applications, as well as the adoption of new technologies. It is unique because it brings the best practices from the hyper- scale cloud and IT industries for rapid design, development, testing and rollout.
  • 15
    Kentik

    Kentik

    Kentik

    Kentik delivers the insight and network analytics you need to run all of your networks. Old and new. The ones you own and the ones you don't. Monitor your traffic from your network to the cloud to the internet on one screen. We provide: - Network Performance Analytics - Hybrid and Multi-Cloud Analytics (GCP, AWS, Azure) - Internet and Edge Performance Monitoring - Infrastructure Visibility - DNS Security and DDoS Attack Defense - Data Center Analytics - Application Performance Monitoring - Capacity Planning - Container Networking - Service Provider Intelligence - Real Time Network Forensics - Network Costs Analytics All on One Platform for Visibility, Performance, and Security. Trusted by Pandora, Box, Cogent, Tata, Yelp, University of Washington, GTT and more! Free trial or demo!
  • 16
    Weaveworks

    Weaveworks

    Weaveworks

    Continuous delivery for application teams and continuous control for platform teams. Automate Kubernetes with GitOps one pull request at a time. The multi cluster-control plane allows cluster operators to control and observe across any Kubernetes. Immediately detect drift and evaluate cluster health or even inform roll back actions as well as monitor continuous operations. Rapidly create, update and manage production ready application clusters with all of the add-ons needed for an agile cloud native platform with a single click. Reliability through automation. Minimize operations overhead with automated cluster lifecycle management: upgrades, security patches, and cluster extension updates. GitOps is an operating model for cloud native applications running on Kubernetes. The GitOps methodology enables continuous software delivery through automated pipelines. It focuses on a developer centric experience to deploy, monitor and manage workloads by using your version control system.
  • 17
    Critical Stack

    Critical Stack

    Capital One

    Deploy applications quickly and confidently with Critical Stack, the open source container orchestration tool from Capital One. Critical Stack enforces the highest level of governance and security standards, enabling teams to efficiently scale containerized applications in the strictest environments. View your entire environment and deploy new services with a few simple clicks. Spend more time on development and decision making and less on maintenance. Dynamically adjust shared resources of your environment efficiently. Enforce container networking policies and controls that your teams can configure. Speed up development cycles and deployment of containerized applications. Guarantee containerized applications run according to your specifications. Deploy containerized applications confidently. Critical Stack enables application verification and powerful orchestration capabilities for your important workloads.
  • 18
    Istio

    Istio

    Istio

    Connect, secure, control, and observe services. Istio’s traffic routing rules let you easily control the flow of traffic and API calls between services. Istio simplifies configuration of service-level properties like circuit breakers, timeouts, and retries, and makes it easy to set up important tasks like A/B testing, canary rollouts, and staged rollouts with percentage-based traffic splits. It also provides out-of-box failure recovery features that help make your application more robust against failures of dependent services or the network. Istio Security provides a comprehensive security solution to solve these issues. This page gives an overview on how you can use Istio security features to secure your services, wherever you run them. In particular, Istio security mitigates both insider and external threats against your data, endpoints, communication, and platform. Istio generates detailed telemetry for all service communications within a mesh.
  • 19
    Open vSwitch

    Open vSwitch

    Open vSwitch

    Open vSwitch is a production quality, multilayer virtual switch licensed under the open source Apache 2.0 license. It is designed to enable massive network automation through programmatic extension, while still supporting standard management interfaces and protocols (e.g. NetFlow, sFlow, IPFIX, RSPAN, CLI, LACP, 802.1ag). In addition, it is designed to support distribution across multiple physical servers similar to VMware's vNetwork distributed vswitch or Cisco's Nexus 1000V. Open vSwitch is used in multiple products and runs in many large production environments (some very, very large). Each stable release is run through a regression suite of hundreds of system-level tests and thousands of unit tests. In addition to OVS, the Open vSwitch community maintains the OVN project. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups.
  • 20
    NVIDIA Onyx
    NVIDIA® Onyx® delivers a new level of flexibility and scalability to next-generation data centers. Onyx has tight turnkey integrations with popular hyperconverged and software-defined storage solutions. With its robust layer-3 protocol stack, built-in monitoring and visibility tools, and high-availability mechanisms, Onyx is an ideal network operating system for enterprise and cloud data centers. Run your custom containerized applications side by side with NVIDIA Onyx. Eliminate the need for one-off servers and seamlessly shrinkwrap solutions into the networking infrastructure. Strong integration with popular hyper-converged infrastructure and software-defined storage solutions. Classic network operating system with a traditional command-line interface (CLI) Single-line command to configure, monitor, and troubleshoot remote direct-memory access over converged Ethernet (RoCE) Support for containerized applications with complete access to the software development kit (SDK).
  • 21
    Submariner

    Submariner

    Submariner

    As Kubernetes gains adoption, teams are finding they must deploy and manage multiple clusters to facilitate features like geo-redundancy, scale, and fault isolation for their applications. With Submariner, your applications and services can span multiple cloud providers, data centers, and regions. The Broker must be deployed on a single Kubernetes cluster. This cluster’s API server must be reachable by all Kubernetes clusters connected by Submariner. It can be a dedicated cluster, or one of the connected clusters. Once Submariner is deployed on a cluster with the proper credentials to the Broker it will exchange Cluster and Endpoint objects with other clusters (via push/pull/watching), and start forming connections and routes to other clusters. Worker node IPs on all connected clusters must be outside of the Pod/Service CIDR ranges.
  • 22
    TIBCO Flogo Enterprise
    TIBCO Flogo® Enterprise software―the commercial, fully supported version of the open-source Project Flogo® framework—enables developers to easily build ultralight, event-driven microservices and functions using a browser-based flow designer. The apps can be seamlessly deployed to serverless environments, container platforms, and devices at the network edge. With Flogo® Enterprise software, you can build highly scalable functions, create engaging user experiences, and collect and analyze data on IoT devices. Visually implement event-driven microservices and functions within a browser-based interface that simplifies and accelerates development of event-driven applications. Incorporate out-of-the-box and custom-built event triggers and actions that respond to events, such as flows for application integration, streams for stream processing, and rules for contextual rule processing.
  • 23
    F5 NGINX Ingress Controller
    Streamline and simplify Kubernetes (north-south) network traffic management, delivering consistent, predictable performance at scale without slowing down your apps. Advanced app‑centric configuration – Use role‑based access control (RBAC) and self‑service to set up security guardrails (not gates), so your teams can manage their apps securely and with agility. Enable multi‑tenancy, reusability, simpler configs, and more. A native, type‑safe, and indented configuration style to simplify capabilities like circuit breaking, sophisticated routing, header manipulation, mTLS authentication, and WAF. Plus if you’re already using NGINX, NGINX Ingress resources make it easy to adapt existing configuration from your other environments.
  • 24
    F5 Aspen Mesh
    F5 Aspen Mesh empowers companies to drive more performance from their modern app environment by leveraging the power of their service mesh. As part of F5, Aspen Mesh is focused on delivering enterprise-class products that enhance companies’ modern app environments. Deliver new and differentiating features faster with microservices. Aspen Mesh lets you do that at scale, with confidence. Reduce the risk of downtime and improve your customers’ experience. If you’re scaling microservices to production on Kubernetes, Aspen Mesh will help you get the most out of your distributed systems. Aspen Mesh empowers companies to drive more performance from their modern app environment by leveraging the power of their service mesh. Alerts that decrease the risk of application failure or performance degradation based on data and machine learning models. Secure Ingress safely exposes enterprise apps to customers and the web.
  • 25
    Codefresh

    Codefresh

    Codefresh

    Founded in 2014, Codefresh combines CI/CD, Image Management, and on-demand staging environments to create a complete container delivery toolchain that brings developers and developer operations into a shared platform. Codefresh enables startups and enterprises alike to immediately benefit from microservices and container-based technologies. The company is based in Silicon Valley and Israel.
    Starting Price: $0/month
  • 26
    Tungsten Fabric

    Tungsten Fabric

    Tungsten Fabric

    Solve your tooling complexity and overload with the simplicity of only one networking and security tool. Save time and swivel-chair fatigue from context switches as you consolidate. TF is a plugin integration overachiever, never implementing the bare minimum. Here is a sample of what it can do that most other SDN plugins can’t. Networks have borders that need crossing. Speaking the same language of proven open protocol standards in the control and data plane is TF’s specialty, so that your domain is never an island. Open source keeps innovation flowing from many directions, and provides the flexibility to shape the outcomes you need, or turn to vendors you trust. Option of Namespace isolation and per-microservice micro-segmentation with choice of TF tenants, networks or security rules
  • 27
    HAProxy Enterprise

    HAProxy Enterprise

    HAProxy Technologies

    HAProxy Enterprise is the industry’s leading software load balancer. It powers modern application delivery at any scale and in any environment, providing the utmost performance, observability and security. Load balance by round robin, least connections, URI, IP address and several hashing methods. Make advanced decisions based on any TCP/IP information or HTTP attribute with full logical operator support. Send requests to specific application clusters based on URL, domain name, file extension, client IP address, health state of backends, number of active connections, SSL client certificate, and more. Extend and customize HAProxy with Lua scripts that have access to the request/response pipeline. Maintain users' sessions based on TCP/IP information or any property of the HTTP request (cookies, headers, URI, and more). The world’s fastest, and most widely used software load balancer.
  • 28
    Infoblox IPAM
    The unprecedented growth in devices is placing tremendous strain on traditional IP address management (IPAM) and Dynamic Host Configuration Protocol (DHCP) systems. Legacy solutions for these systems are not equipped to handle the enormous challenges of provisioning vast numbers of IP addresses effectively across diverse physical, virtual infrastructure, and private and public cloud environments. To make matters worse, traditional IPAM tools involve a high degree of manual effort, often conducted in isolation from DNS, DHCP, and other essential network management activities. With Infoblox IPAM and DHCP you can automate and centralize all aspects of IP address provisioning and reliable DHCP server management in conjuction with DNS. Our integrated platform enables you to confidently handle your most challenging IPAM and DHCP requirements in every type of network environment, data centers, and hybrid cloud environments.
    Starting Price: $10000 one-time payment
  • 29
    Weave GitOps Enterprise
    Weave GitOps Enterprise is a continuous operations product that makes it easy to deploy and manage Kubernetes clusters and applications at scale in any environment. The single management console automates trusted application delivery and secure infrastructure operations on premise, in the cloud, and at the edge. Managing a distributed fleet of Kubernetes clusters is a challenge that many organizations now face. Weave GitOps enables DevOps engineers to self-serve their cluster management requirements while staying within corporate standards. Weave GitOps provides a single dashboard for cluster management across multiple public cloud providers, in your data center or at the edge. Create new clusters or attach them to existing ones and observe cluster health status. Manage application lifecycle with GitOps and observe deployment status. Multi-tenant support with full roles-based access control (RBAC) that’s fully integrated with corporate IAM.
  • 30
    6connect

    6connect

    6connect

    Revolutionary network automation & provisioning for ISP's and enterprises around the world. Easy to deploy and integrate with, whether you use the 6connect cloud or deploy ProVision behind the firewall. Regain your sanity. Avoid the costly pitfalls of ad hoc solutions and manual network resource management. Global resource management, complete IPAM automation, easy management of DNS, DNSSEC, and DHCP. Flexible data model that seamlessly supports multi-tenant permissions, works with RADIUS, LDAP, 2FA, SAML2. Integrates, synchronizes and automates workflows over a dozen DNS platforms. Also makes migrations a snap! Easy DHCP configuration and scope management that integrates with other systems. From allocation to assignment, from CGN to IPv6, ProVision knows how to handle IPs. Carrier-grade API for easy integration across global system, fast, well documented and tested. Easy to use Peering workflows built-in – from email to BGP config pushes to reporting, it’s all there.
  • 31
    Junos Security Director

    Junos Security Director

    Juniper Networks

    Security Director is your portal to SASE, bridging your current security deployments with your future SASE rollout. Security Director enables organizations to manage security anywhere and everywhere, on-premise and in the cloud with unified policy management that follows users, devices, and applications wherever they go. Policies can be created once and applied everywhere. Customers can use both Security Director Cloud and on-premises instances simultaneously to securely transition to a SASE architecture. Security Director provides extensive security policy management and control through a centralized interface and enforces policies across physical, virtual, and containerized firewalls on-premises and across multiple clouds simultaneously. Quickly manage all phases of the security policy lifecycle for firewalls, including zero-touch provisioning and configuration, and gain insight into sources of risk across your network.
  • 32
    Xshield

    Xshield

    ColorTokens

    Gain comprehensive visibility into deployed assets and traffic via an intuitive user interface. Simplify creation of least-privilege micro-segmentation policies through centralized policy management, eliminating the need for subnets, hypervisors, and internal firewalls. Minimize exposure by automatically extending security controls to new cloud-native workloads and applications on creation. Implement a single solution across bare-metal servers, end-user computers, or cloud-hosted virtual machines, containers, or instances. Deploy across hybrid and multi-vendor heterogeneous networks, whether on-premises or in the cloud — without replacing any hardware or infrastructure. Avoid compliance violations by isolating and controlling all communications within and across segmented groups. Rich, contextual visibility into network flow from largest trend to workload service.
  • 33
    BT Diamond IP

    BT Diamond IP

    BT For Global Business

    Flexible, scalable, extensible IP address management products and managed services. Diamond IP is our IP address management (IPAM) solution which streamlines management of your entire IPv4 and IPv6 address lifecycle across your premises, branch remote, private and public cloud domains. We offer software, hardware and virtual appliance (private and public) products, as well as managed IPAM services. We facilitate multi-cloud IPAM with virtual appliances for AWS, Azure, Oracle VM, VMware, Hyper-V and others. And our cloud automation appliance dynamically automates the assignment and tracking of private and public cloud instance IP addresses and DNS names. Our DNS security products supplement your defense in depth security strategy at the DNS layer. We serve global multinational organizations around the world with our security, cloud and networking services. We can help your organization to move to the cloud; turn collaboration into part of your culture; improve your contact centres.
  • 34
    DBOS

    DBOS

    DBOS

    A simpler, more secure way to build fault-tolerant cloud applications, powered by the revolutionary cloud-native DBOS operating system. Based on 3 years of joint MIT-Stanford open source R&D, DBOS revolutionizes cloud-native architecture. DBOS is a cloud-native OS that builds on a relational database to radically simplify today's complex cloud application stacks. DBOS powers DBOS Cloud, a transactional serverless platform that provides fault-tolerance, observability, cyber-resilience, and easy cloud deployment to stateful TypeScript applications. OS services are implemented on top of a distributed DBMS. Built-in transactional, fault-tolerant state management that simplifies the stack, with no need for containers, cluster management, or workflow orchestration. Seamless scaling, high performance, and high availability. Metrics, logs, and traces are stored in SQL-accessible tables. Smaller cyber attack surface, cyberattack self-detection, and cyber-resilience.
  • 35
    Gloo Mesh

    Gloo Mesh

    solo.io

    Today's Kubernetes environments need help in scaling, securing and observing modern cloud-native applications. Gloo Mesh, based on the industry's leading Istio service mesh, simplifies multi-cloud and multi-cluster management of service mesh for containers and virtual machines. Gloo Mesh helps platform engineering teams to reduce costs, reduce risks, and improve application agility. Gloo Mesh is a modular component of Gloo Platform. The service mesh allows for application-aware network tasks to be managed independently from the application, adding observability, security, and reliability to distributed applications. By introducing the service mesh to your applications, you can: Simplify the application layer Provide more insights into your traffic Increase the security of your application
  • 36
    Anthos

    Anthos

    Google

    Anthos lets you build, deploy, and manage applications anywhere in a secure, consistent manner. You can modernize existing applications running on virtual machines while deploying cloud-native apps on containers in an increasingly hybrid and multi-cloud world. Our application platform provides a consistent development and operations experience across all your deployments while reducing operational overhead and improving developer productivity. Anthos GKE: Enterprise-grade container orchestration and management service for running Kubernetes clusters anywhere, in both cloud and on-premises environments. Anthos Config Management: Define, automate, and enforce policies across environments in order to meet your organization’s unique security and compliance requirements. Anthos Service Mesh: Anthos unburdens operations and development teams by empowering them to manage and secure traffic between services while monitoring, troubleshooting, and improving application performance.
  • 37
    Tencent Kubernetes Engine
    TKE is fully compatible with the entire range of Kubernetes capabilities and has been adapted to Tencent Cloud's fundamental IaaS capabilities such as CVM and CBS. In addition, Tencent Cloud’s Kubernetes-based cloud products such as CBS and CLB support one-click deployment to container clusters for a variety of open source applications, greatly improving deployment efficiency. Thanks to TKE, you can simplify the management of large-scale clusters and management and OPS of distributed applications without having to use cluster management software or design fault-tolerant cluster architecture. Simply launch TKE and specify the tasks you want to run, and then TKE will take care of all of the cluster management tasks, allowing you to focus on developing Dockerized applications.
  • 38
    GestióIP

    GestióIP

    GestióIP

    GestióIP is a automated, web based IPv4/IPv6 address management (IPAM) software. It features powerful network discovery and IP tracking functions and offers search and filter functions for both networks and host, permitting Internet Search Engine equivalent expressions. This lets you find the information that administrators frequently need easily and quickly. GestióIP IPAM is free software. GestióIP is also available as service in Cloud. GestióIP Cloud IPAM-as-a-Service is an alternative to the On-Premise installation of the software. It offers an easy way to implement an IP Address Management system and to at once enjoy the benefits of a cloud based software solution. GestióIP is free software. To satisfy business needs, the project offers additionally commercial features and services. The GestióIP project offers an additional PlugIn to backup and manage the configurations of network devices.
  • 39
    ManageEngine DDI Central
    ManageEngine DDI Central is designed to streamline network management for enterprises, offering a unified platform for DNS, DHCP, and IPAM. DDI Central as an overlay, discovers and integrates data across both on-premises as well as remote DNS-DHCP clusters. Enterprises gain holistic visibility and control of their network infrastructure, including remote branch offices. With smart automation features, real-time analytics, and advanced security protocols, DDI Central enhances operational efficiency, visibility, and network security, all from a single console. Features: Flexible internal and external DNS and DHCP cluster management Streamlined DNS server and zone management Automated DHCP scope management Targeted IP configurations with DHCP fingerprinting Secure dynamic DNS (DDNS) management DNS aging and scavenging DNS security management Domain traffic surveillance IP lease history insights IP-DNS correlations and IP-MAC identity mapping Built-in failover & auditing
    Starting Price: $799/year
  • 40
    VMware Avi Load Balancer
    Simplify application delivery with software-defined load balancers, web application firewall, and container ingress services for any application in any data center and cloud. Simplify administration with centralized policies and operational consistency across on-premises data centers, and hybrid and public clouds, including VMware Cloud (VMC on AWS, OCVS, AVS, GCVE), AWS, Azure, Google, and Oracle Cloud. Free infrastructure teams from manual tasks and enable DevOps teams with self-service. Application delivery automation toolkits include Python SDK, RESTful APIs, Ansible and Terraform integrations. Gain unprecedented insights, including network, end users and security, with real-time application performance monitoring, closed-loop analytics and deep machine learning.
  • 41
    TriggerMesh

    TriggerMesh

    TriggerMesh

    TriggerMesh believes developers will increasingly build applications as a mesh of cloud-native functions and services from multiple cloud providers and on-premises. We believe this architecture is the best way for agile businesses to deliver effortless digital experiences. TriggerMesh is the first product that leverages Kubernetes and Knative to provide application integration across clouds and on-premises. With TriggerMesh, you can automate enterprise workflows by connecting applications, cloud services, and serverless functions. Cloud-native applications are becoming more popular. As a result, the number of functions that are hosted across disparate cloud infrastructure is proliferating. TriggerMesh breaks down cloud silos to provide true cross-cloud portability and interoperability
  • 42
    Check Point Next Generation Firewalls (NGFW)

    Check Point Next Generation Firewalls (NGFW)

    Check Point Software Technologies

    Check Point gateways provide superior security beyond any Next Generation Firewall (NGFW). Best designed for Sandblast Network’s protection, these gateways are the best at preventing the fifth generation of cyber attacks with more than 60 innovative security services. Based on the Infinity Architecture, the new Quantum Security Gateway™ line up of 18 models can deliver up to 1.5 Tbps of threat prevention performance and can scale on demand. Delivers the highest-caliber threat prevention with award winning SandBlast Network Zero Day protection out of the box. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. R81 unified security management control across networks, clouds, and IoT increases efficiency cutting security operations up to 80%.
  • 43
    Kuma

    Kuma

    Kuma

    The open-source control plane for service mesh, delivering security, observability, routing and more. Built on top of Envoy, Kuma is a modern control plane for Microservices & Service Mesh for both K8s and VMs, with support for multiple meshes in one cluster. Out of the box L4 + L7 policy architecture to enable zero trust security, observability, discovery, routing and traffic reliability in one click. Getting up and running with Kuma only requires three easy steps. Natively embedded with Envoy proxy, Kuma Delivers easy to use policies that can secure, observe, connect, route and enhance service connectivity for every application and services, databases included. Build modern service and application connectivity across every platform, cloud and architecture. Kuma supports modern Kubernetes environments and Virtual Machine workloads in the same cluster, with native multi-cloud and multi-cluster connectivity to support the entire organization.
  • 44
    Oracle Cloud Container Registry
    Oracle Cloud Infrastructure Container Registry is an open standards-based, Oracle-managed Docker registry service for securely storing and sharing container images. Engineers can easily push and pull Docker images with the familiar Docker Command Line Interface (CLI) and API. To support container lifecycles, Registry works with Container Engine for Kubernetes, Identity and Access Management (IAM), Visual Builder Studio, and third-party developer and DevOps tools. Work with Docker images and container repositories using familiar Docker CLI commands and Docker HTTP API V2. Oracle takes care of operating and patching the service, so that developers can focus on building and deploying containerized applications. Built using object storage, Container Registry provides data durability and high service availability with automatic replication across fault domains. Oracle does not charge separately for the service. Users pay only for the associated storage and network resources they consume.
  • 45
    Azure Virtual Network Manager
    Significantly reduce your operational overhead with Azure Virtual Network Manager, a central management service for your virtual network resources. Easily manage your virtual network infrastructure while scaling your cloud-based workloads. Use the centralized solution to create and manage complex network topologies and network security rules globally across subscriptions. Apply security and connectivity configurations for all your virtual networks across regions and subscriptions. Manage the configurations for your entire environment from a single pane of glass. Create complex virtual network topologies such as hub and spoke and mesh in just a few clicks. Azure Virtual Network Manager automatically responds to the changes you've made and maintains the virtual network topology.
    Starting Price: $0.10 per hour
  • 46
    AWS PrivateLink

    AWS PrivateLink

    Amazon Web Services

    AWS PrivateLink provides private connectivity between VPCs, AWS services, and your on-premises networks, without exposing your traffic to the public internet. AWS PrivateLink makes it easy to connect services across different accounts and VPCs to significantly simplify your network architecture. Interface VPC endpoints, powered by AWS PrivateLink, connect you to services hosted by AWS Partners and supported solutions available in AWS Marketplace. By powering Gateway Load Balancer endpoints, AWS PrivateLink brings the same level of security and performance to your virtual network appliances or custom traffic inspection logic. You can connect services across different accounts and Amazon VPCs, with no need for firewall rules, path definitions, or route tables. There is no need to configure an Internet gateway, VPC peering connection, or manage VPC Classless Inter-Domain Routing (CIDRs).
  • 47
    Cisco HyperFlex
    It's never been easier to adopt hyperconverged infrastructure. Power more mission-critical apps. Flexible services for multicloud. Deploy HyperFlex anywhere with Cisco Intersight. Cisco HyperFlex offers a variety of flexible hyperconverged infrastructure configurations engineered on the Cisco UCS platform. Explore the latest M5 and edge nodes for your specific business needs. Simplify operations and boost performance of mission-critical applications such as SAP apps and Microsoft SQL. Cisco offers a variety of hybrid cloud and container management services to offer you choices. Power applications at the edge with flexible configuration options and multisite management. Hyperconverged infrastructure (HCI) combines compute, virtualization, storage, and networking in a single cluster. Starting with as few as three nodes, users can easily scale out to match computing and storage resource needs. Hyperconvergence brings cloudlike simplicity on-premises.
  • 48
    balenaOS

    balenaOS

    balena

    Containers will revolutionize connected devices, and balenaOS is the best way to run them. Made to survive harsh networking conditions and unexpected shutdowns. A minimal Linux with the services needed to run Docker reliably on an embedded device - nothing else. Based on Yocto Linux for easy porting to most capable device types across varied CPU architectures. Actively developed in the open; community participation warmly welcomed. In our quest to build balenaCloud, a platform that brings the tools of modern software development to the world of connected hardware, we started by porting Docker to ARM chips in 2013. We soon realised that we also needed an operating system optimized for the use case: a minimal OS ideal for running containers on embedded devices.
  • 49
    IBM Storage Protect Plus
    IBM Storage Protect Plus is IBM Storage software that provides recovery, replication, retention and reuse for VMs, databases, applications, file systems, SaaS workloads and containers. Data can be copied to cloud-based object storage and on-premises storage including IBM Storage Protect and physical tape. IBM Storage Protect Plus can be easily deployed as a virtual appliance or as a container application and the agentless architecture is easy to maintain. This modern data resilience solution unlocks the value of your data by improving the quality and speed of development, testing and analytics. Cost-effective data retention, data compliance and disaster recovery are achieved via data copy to both on-premises, cloud-based object storage and IBM Storage Protect, including support for physical tape.
    Starting Price: $60 per 10 managed VMs
  • 50
    HashiCorp Nomad
    A simple and flexible workload orchestrator to deploy and manage containers and non-containerized applications across on-prem and clouds at scale. Single 35MB binary that integrates into existing infrastructure. Easy to operate on-prem or in the cloud with minimal overhead. Orchestrate applications of any type - not just containers. First class support for Docker, Windows, Java, VMs, and more. Bring orchestration benefits to existing services. Achieve zero downtime deployments, improved resilience, higher resource utilization, and more without containerization. Single command for multi-region, multi-cloud federation. Deploy applications globally to any region using Nomad as a single unified control plane. One single unified workflow for deploying to bare metal or cloud environments. Enable multi-cloud applications with ease. Nomad integrates seamlessly with Terraform, Consul and Vault for provisioning, service networking, and secrets management.