Filter

Security

Product categories

Topics

    Industries

      Delivery methods

      Certifications

      Capabilities level

      Pricing terms

      Ratings

      • only
      • & up
      • & up
      • & up
      • & up

      Vendor

      Source

        Security

        Viewing 16 products

        1
        Security
        SecureCloud logo
        Tufin SecureCloud

        By Tufin

        A cloud-based security policy automation service for organizations needing to gain visibility and control of the security posture of their hybrid cloud environments – without compromising business speed or agility.

        Not rated

        Tremolo Security logo
        OpenUnison

        By Tremolo Security, Inc

        Authenticate users and authorize access to your clusters and applications using a simple and automated approach. OpenUnison supports SAML2, OpenID Connect, LDAP and deploys with your existing pipeline infrastructure using GitOps.

        Not rated

        Aqua Security logo
        Aqua Cloud Native Security Platform

        By Aqua Security

        Provides a full-stack security solution for enterprises to secure workloads on-prem or in the cloud for containerized, serverless and VM-based applications from your CI/CD pipeline in development to your production runtime environment.

        (1)

        Atomic Workload Protection logo
        Atomic Enterprise OSSEC

        By Atomicorp

        Adds manageability, security, and compliance features to OSSEC, the world's most popular open source server intrusion detection system.

        (1)

        Anchore Enterprise logo
        Anchore Enterprise

        By Anchore, Inc

        Provides deep container image inspection to generate vulnerability analysis, software bill of materials and policy enforcement.

        (1)

        Sysdig Monitor logo
        Sysdig Secure DevOps Platform

        By Sysdig

        Confidently secure containers, Kubernetes, OpenShift and cloud. Scan images, flag misconfigurations, detect threats, validate compliance, and monitor performance. Built on an open-source security stack, Sysdig is radically simple to run and scale.

        (28)

        Snyk Container logo
        Snyk Container

        By Snyk

        Container and Kubernetes security designed to help developers find and fix vulnerabilities in cloud native applications.

        (24)

        Red Hat Runtimes logo
        Red Hat Runtimes

        By Red Hat

        Accelerate application development and delivery to gain a competitive edge and deliver innovative solutions. Red Hat Runtimes provides comprehensive frameworks, runtimes and programming languages, for developers, architects and IT leaders.

        (5)

        Kong Enterprise RHM logo
        Kong Konnect Enterprise

        By Kong Inc.

        A Service Connectivity Platform that enables organizations to transition to microservices and manage the full lifecycle of services and APIs.

        (16)

        Zettaset Encryption for Kubernetes Containers - RHM logo
        XCrypt for OpenShift

        By Zettaset

        XCrypt for OpenShift is a software-only solution built to transparently protect data in OpenShift environments without impacting performance.

        Not rated

        Anaconda Team Edition logo
        Anaconda Team Edition

        By Anaconda

        An enterprise-ready clearinghouse for build artifacts along with their metadata, that enables automation and stores in a way to assure governance and security are built-in by default.

        (37)

        NeuVector Operator logo
        NeuVector Full Lifecycle Container Security

        By NeuVector

        Offers the only cloud-native Kubernetes security platform delivering uncompromising end-to-end protection from DevOps vulnerability protection to automated run-time security, and featuring a true Layer 7 container firewall.

        Not rated

        IBM - DataPower logo
        IBM DataPower Virtual Gateway

        By IBM

        A purpose-built security and integration gateway for mobile, web, API, SOA, B2B and cloud workloads

        (22)

        Red Hat Single Sign-On logo
        Red Hat Single Sign-On

        By Red Hat

        Based on the Keycloak project, Red Hat Single Sign-On enhances security by enabling you to secure your web applications with Web single sign-on (SSO) capabilities based on popular standards such as SAML 2.0, OpenID Connect and OAuth 2.0.

        (5)

        Cyber Armor logo
        ARMO

        By ARMO

        Secure your cloud workload in minutes, and empower DevOps to automatically deploy secured environments. Create an inherently resilient environment where only valid workloads can run, communicate, and access data.

        Not rated

        Red Hat 3scale API Management logo
        Red Hat 3scale API Management

        By Red Hat

        Red Hat 3scale API Management is an award winning platform that gives you the control, visibility and flexibility you need to create and deploy an API program.

        Not rated