Filters

Categories

Delivery methods

Pricing terms

Ratings

  • only
  • & up
  • & up
  • & up
  • & up

Vendor

Viewing 16 products

Most relevant
Most recent
A-Z
Z-A
Security
Kong Enterprise RHM logo
Kong Enterprise

By Kong Inc.

A Service Connectivity Platform that enables organizations to transition to microservices and manage the full lifecycle of services and APIs.

(13)

Portshift Container Protection - RHM logo
Portshift Containers Protection Platform

By Portshift

A cloud-native (agentless) solution, protecting workloads deployed in Openshift clusters from vulnerabilities, hardening configuration, "zero trust networking" compliance and threats mitigation offering

(1)

Zettaset Encryption for Kubernetes Containers - RHM logo
XCrypt for OpenShift

By Zettaset

XCrypt for OpenShift is a software-only solution built to transparently protect data in OpenShift environments without impacting performance.

Not rated

Sysdig Monitor logo
Sysdig Secure DevOps Platform

By Sysdig Inc

Converge security and compliance with performance and capacity monitoring for containers, Kubernetes, and OpenShift to create a secure DevOps workflow.

(9)

Anaconda Team Edition logo
Anaconda Team Edition

By Anaconda

An enterprise-ready clearinghouse for build artifacts along with their metadata, that enables automation and stores in a way to assure governance and security are built-in by default.

(28)

Red Hat Single Sign-On logo
Red Hat Single Sign-On

By Red Hat

Based on the Keycloak project, Red Hat Single Sign-On enhances security by enabling you to secure your web applications with Web single sign-on (SSO) capabilities based on popular standards such as SAML 2.0, OpenID Connect and OAuth 2.0.

(1)

Atomic Workload Protection logo
Atomic Enterprise OSSEC

By Atomicorp

Adds manageability, security, and compliance features to OSSEC, the world's most popular open source server intrusion detection system.

Not rated

Aqua Security logo
Aqua Cloud Native Security Platform

By Aqua Security

Provides a full-stack security solution for enterprises to secure workloads on-prem or in the cloud for containerized, serverless and VM-based applications from your CI/CD pipeline in development to your production runtime environment.

(1)

Red Hat Runtimes logo
Red Hat Runtimes

By Red Hat

Accelerate application development and delivery to gain a competitive edge and deliver innovative solutions. Red Hat Runtimes provides comprehensive frameworks, runtimes and programming languages, for developers, architects and IT leaders.

(1)

Anchore Enterprise logo
Anchore Enterprise

By Anchore, Inc

Provides deep container image inspection to generate vulnerability analysis, software bill of materials and policy enforcement.

(1)

Tremolo Security logo
OpenUnison

By Tremolo Security, Inc

Authenticate users and authorize access to your clusters and applications using a simple and automated approach. OpenUnison supports SAML2, OpenID Connect, LDAP and deploys with your existing pipeline infrastructure using GitOps.

Not rated

SecureCloud logo
Tufin SecureCloud

By Tufin

A cloud-based security policy automation service for organizations needing to gain visibility and control of the security posture of their hybrid cloud environments – without compromising business speed or agility.

Not rated

NeuVector Operator logo
NeuVector Full Lifecycle Container Security

By NeuVector

Offers the only cloud-native Kubernetes security platform delivering uncompromising end-to-end protection from DevOps vulnerability protection to automated run-time security, and featuring a true Layer 7 container firewall.

Not rated

Red Hat Advanced Cluster Management logo
Red Hat Advanced Cluster Management for Kubernetes

By Red Hat

Red Hat Advanced Cluster Management for Kubernetes provides end to end management visibility and control to manage your cluster and application lifecycle, along with security and compliance of your entire Kubernetes fleet.

Not rated

Cyber Armor logo
ARMO

By ARMO

Secure your cloud workload in minutes, and empower DevOps to automatically deploy secured environments. Create an inherently resilient environment where only valid workloads can run, communicate, and access data.

Not rated

Armory logo
Armory

By Armory

Armory provides an enterprise distribution of Spinnaker.

Not rated