Alternatives to Edera

Compare Edera alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Edera in 2026. Compare features, ratings, user reviews, pricing, and more from Edera competitors and alternatives in order to make an informed decision for your business.

  • 1
    Wiz

    Wiz

    Wiz

    Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments. Find all lateral movement risks such as private keys used to access both development and production environments. Scan for vulnerable and unpatched operating systems, installed software, and code libraries in your workloads prioritized by risk. Get a complete and up-to-date inventory of all services and software in your cloud environments including the version and package. Identify all keys located on your workloads cross referenced with the privileges they have in your cloud environment. See which resources are publicly exposed to the internet based on a full analysis of your cloud network, even those behind multiple hops. Assess the configuration of cloud infrastructure, Kubernetes, and VM operating systems against your baselines and industry best practices.
    Compare vs. Edera View Software
    Visit Website
  • 2
    Fairwinds Insights

    Fairwinds Insights

    Fairwinds Ops

    Protect and optimize your mission-critical Kubernetes applications. Fairwinds Insights is a Kubernetes configuration validation platform that proactively monitors your Kubernetes and container configurations and recommends improvements. The software combines trusted open source tools, toolchain integrations, and SRE expertise based on hundreds of successful Kubernetes deployments. Balancing the velocity of engineering with the reactionary pace of security can result in messy Kubernetes configurations and unnecessary risk. Trial-and-error efforts to adjust CPU and memory settings eats into engineering time and can result in over-provisioning data center capacity or cloud compute. Traditional monitoring tools are critical, but don’t provide everything needed to proactively identify changes to maintain reliable Kubernetes workloads.
  • 3
    Sonrai Security

    Sonrai Security

    Sonraí Security

    Identity and Data Protection for AWS, Azure, Google Cloud, and Kubernetes. Sonrai’s public cloud security platform provides a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and 3rd party data stores. Uncover all identity and data relationships between administrators, roles, compute instances, serverless functions, and containers across multi-cloud accounts and 3rd-party data stores. Inside the platform, our critical resource monitor continuously monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevSecOps teams.
  • 4
    AWS Fargate
    AWS Fargate is a serverless compute engine for containers that works with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS). Fargate makes it easy for you to focus on building your applications. Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design. Fargate allocates the right amount of compute, eliminating the need to choose instances and scale cluster capacity. You only pay for the resources required to run your containers, so there is no over-provisioning and paying for additional servers. Fargate runs each task or pod in its own kernel providing the tasks and pods their own isolated compute environment. This enables your application to have workload isolation and improved security by design.
  • 5
    Amazon EKS
    Amazon Elastic Kubernetes Service (Amazon EKS) is a fully managed Kubernetes service. Customers such as Intel, Snap, Intuit, GoDaddy, and Autodesk trust EKS to run their most sensitive and mission-critical applications because of its security, reliability, and scalability. EKS is the best place to run Kubernetes for several reasons. First, you can choose to run your EKS clusters using AWS Fargate, which is serverless compute for containers. Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design. Second, EKS is deeply integrated with services such as Amazon CloudWatch, Auto Scaling Groups, AWS Identity and Access Management (IAM), and Amazon Virtual Private Cloud (VPC), providing you a seamless experience to monitor, scale, and load-balance your applications.
  • 6
    Red Hat OpenShift
    The Kubernetes platform for big ideas. Empower developers to innovate and ship faster with the leading hybrid cloud, enterprise container platform. Red Hat OpenShift offers automated installation, upgrades, and lifecycle management throughout the container stack—the operating system, Kubernetes and cluster services, and applications—on any cloud. Red Hat OpenShift helps teams build with speed, agility, confidence, and choice. Code in production mode anywhere you choose to build. Get back to doing work that matters. Red Hat OpenShift is focused on security at every level of the container stack and throughout the application lifecycle. It includes long-term, enterprise support from one of the leading Kubernetes contributors and open source software companies. Support the most demanding workloads including AI/ML, Java, data analytics, databases, and more. Automate deployment and life-cycle management with our vast ecosystem of technology partners.
    Starting Price: $50.00/month
  • 7
    Kubernetes

    Kubernetes

    Kubernetes

    Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community. Designed on the same principles that allows Google to run billions of containers a week, Kubernetes can scale without increasing your ops team. Whether testing locally or running a global enterprise, Kubernetes flexibility grows with you to deliver your applications consistently and easily no matter how complex your need is. Kubernetes is open source giving you the freedom to take advantage of on-premises, hybrid, or public cloud infrastructure, letting you effortlessly move workloads to where it matters to you.
  • 8
    Calico Cloud
    Pay-as-you-go security and observability SaaS platform for containers, Kubernetes, and cloud. Get a live view of dependencies and how all the services are communicating with each other in a multi-cluster, hybrid and multi-cloud environment. Eliminate setup and onboarding steps and troubleshoot your Kubernetes security and observability issues within minutes. Calico Cloud is a next-generation security and observability SaaS platform for containers, Kubernetes, and cloud. It enables organizations of all sizes to protect their cloud workloads and containers, detect threats, achieve continuous compliance, and troubleshoot service issues in real-time across multi-cluster, multi-cloud, and hybrid deployments. Calico Cloud is built on Calico Open Source, the most widely adopted container networking and security solution. Instead of managing a platform for container and Kubernetes security and observability, teams consume it as a managed service for faster analysis, relevant actions, etc.
    Starting Price: $0.05 per node hour
  • 9
    Calico Enterprise
    A self-managed, active security platform with full-stack observability for containers and Kubernetes. Calico Enterprise is the industry’s only active security platform with full-stack observability for containers and Kubernetes. Calico Enterprise extends the declarative nature of Kubernetes to specify security and observability as code. This ensures consistent enforcement of security policies and compliance, and provides observability for troubleshooting across multi-cluster, multi-cloud and hybrid deployments. Implement zero-trust workload access controls for traffic to and from individual pods to external endpoints on a per-pod basis, to protect your Kubernetes cluster. Author DNS policies that implement fine-grained access controls between a workload and the external services it needs to connect to, like Amazon RDS, ElastiCache, and more.
  • 10
    Tigera

    Tigera

    Tigera

    Kubernetes-native security and observability. Security and observability as code for cloud-native applications. Cloud-native security as code for hosts, VMs, containers, Kubernetes components, workloads, and services to secure north-south and east-west traffic, enable enterprise security controls, and ensure continuous compliance. Kubernetes-native observability as code to collect real-time telemetry, enriched with Kubernetes context, for a live topographical view of interactions between components from hosts to services. Rapid troubleshooting with machine-learning powered anomaly and performance hotspot detection. Single framework to centrally secure, observe, and troubleshoot multi-cluster, multi-cloud, and hybrid-cloud environments running Linux or Window containers. Update and deploy policies in seconds to enforce security and compliance or resolve issues.
  • 11
    Google Cloud Container Security
    Secure your container environment on GCP, GKE, or Anthos. Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale. As enterprises create more containerized workloads, security must be integrated at each stage of the build-and-deploy life cycle. Infrastructure security means that your container management platform provides the right security features. Kubernetes includes security features to protect your identities, secrets, and network, and Google Kubernetes Engine uses native GCP functionality—like Cloud IAM, Cloud Audit Logging, and Virtual Private Clouds—and GKE-specific features like application layer secrets encryption and workload identity to bring the best of Google security to your workloads. Securing the software supply chain means that container images are safe to deploy. This is how you make sure your container images are vulnerability free and that the images you build aren't modified.
  • 12
    KubeArmor

    KubeArmor

    AccuKnox

    KubeArmor is a cloud-native runtime security enforcement engine designed for Kubernetes workloads, containers, and virtual machines. It leverages eBPF and Linux Security Modules (LSMs) like AppArmor and SELinux to preemptively harden workloads and prevent attacks without modifying pods or containers. KubeArmor enforces real-time policy-based controls on process behavior, file access, networking, and resource usage. It simplifies complex security settings by providing Kubernetes-native policy management and detailed policy violation logging. Installation is straightforward via Helm charts, and it integrates seamlessly with multiple cloud marketplaces. KubeArmor’s proactive inline mitigation approach improves security beyond traditional post-attack responses.
    Starting Price: Free
  • 13
    Kubescape
    A Kubernetes open-source platform providing developers and DevOps an end-to-end security solution, including risk analysis, security compliance, RBAC visualizer, and image vulnerabilities scanning. Kubescape scans K8s clusters, Kubernetes manifest files (YAML files, and HELM charts), code repositories, container registries and images, detecting misconfigurations according to multiple frameworks (such as the NSA-CISA, MITRE ATT&CK®), finding software vulnerabilities, and showing RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline. It calculates risk scores instantly and shows risk trends over time. Kubescape has became one of the fastest-growing Kubernetes security compliance tools among developers due to its easy-to-use CLI interface, flexible output formats, and automated scanning capabilities, saving Kubernetes users and admins precious time, effort, and resources.
    Starting Price: $0/month
  • 14
    Azure Container Instances
    Develop apps fast without managing virtual machines or having to learn new tools—it's just your application, in a container, running in the cloud. By running your workloads in Azure Container Instances (ACI), you can focus on designing and building your applications instead of managing the infrastructure that runs them. Deploy containers to the cloud with unprecedented simplicity and speed—with a single command. Use ACI to provision additional compute for demanding workloads whenever you need. For example, with the Virtual Kubelet, use ACI to elastically burst from your Azure Kubernetes Service (AKS) cluster when traffic comes in spikes. Gain the security of virtual machines for your container workloads, while preserving the efficiency of lightweight containers. ACI provides hypervisor isolation for each container group to ensure containers run in isolation without sharing a kernel.
  • 15
    Portworx

    Portworx

    Pure Storage

    Run Kubernetes in production with the #1 Kubernetes platform for persistent storage, backup, DR, data security and capacity management. Easily protect, restore and migrate your Kubernetes applications in any cloud or data center. The Portworx Enterprise Storage Platform is your end-to-end storage and data management solution for all your Kubernetes projects, including container-based CaaS, DBaaS, SaaS, and Disaster Recovery initiatives. Your apps will benefit from container-granular storage, disaster recovery, data security, multi-cloud migrations and more. Easily solve the enterprise requirements needed to run data service on Kubernetes. Effortlessly offer a cloud-like DbaaS to your users without giving up control. Scale the backend data services powering your SaaS app without operational complexity. Add DR to any Kubernetes app with a single command. Easily backup and restore all your Kubernetes applications.
  • 16
    NeuVector
    NeuVector covers the entire CI/CD pipeline with complete vulnerability management and attack blocking in production with our patented container firewall. NeuVector has you covered with PCI-ready container security. Meet requirements with less time and less work. NeuVector protects your data and IP in public and private cloud environments. Continuously scan throughout the container lifecycle. Remove security roadblocks. Bake in security policies at the start. Comprehensive vulnerability management to establish your risk profile and the only patented container firewall for immediate protection from zero days, known, and unknown threats. Essential for PCI and other mandates, NeuVector creates a virtual wall to keep personal and private information securely isolated on your network. NeuVector is the only kubernetes-native container security platform that delivers complete container security.
    Starting Price: 1200/node/yr
  • 17
    Constellation

    Constellation

    Edgeless Systems

    Constellation is a CNCF-certified Kubernetes distribution that leverages confidential computing to encrypt and isolate entire clusters, protecting data at rest, in transit, and during processing, by running control and worker planes within hardware-enforced trusted execution environments. It ensures workload integrity through cryptographic certificates and supply-chain security mechanisms (SLSA Level 3, sigstore-based signing), passes Center for Internet Security Kubernetes benchmarks, and uses Cilium with WireGuard for granular eBPF traffic control and end-to-end encryption. Designed for high availability and autoscaling, Constellation delivers near-native performance on all major clouds and supports rapid setup via a simple CLI and kubeadm interface. It implements Kubernetes security updates within 24 hours, offers hardware-backed attestation and reproducible builds, and integrates seamlessly with existing DevOps tools through standard APIs.
    Starting Price: Free
  • 18
    Falco

    Falco

    Sysdig

    Falco is the open source standard for runtime security for hosts, containers, Kubernetes and the cloud. Get real-time visibility into unexpected behaviors, config changes, intrusions, and data theft. Secure containerized applications, no matter what scale, using the power of eBPF. Protect your applications in real time wherever they run, whether bare metal or VMs. Falco is Kubernetes-compatible, helping you instantly detect suspicious activity across the control plane. Detect intrusions in real time across your cloud, from AWS, GCP or Azure, to Okta, Github and beyond. Falco detects threats across containers, Kubernetes, hosts and cloud services. Falco provides streaming detection of unexpected behavior, configuration changes, and attacks. A multi-vendor and broadly supported standard that you can rely on.
    Starting Price: Free
  • 19
    StackRox

    StackRox

    StackRox

    Only StackRox provides comprehensive visibility into your cloud-native infrastructure, including all images, container registries, Kubernetes deployment configurations, container runtime behavior, and more. StackRox’s deep integration with Kubernetes delivers visibility focused on deployments, giving security and DevOps teams a comprehensive understanding of their cloud-native infrastructure, including images, containers, pods, namespaces, clusters, and their configurations. You get at-a-glance views of risk across your environment, compliance status, and active suspicious traffic. Each summary view enables you to drill into more detail. Using StackRox, you can easily identify and analyze container images in your environment with native integrations and support for nearly every image registry.
  • 20
    Sonatype Container
    Sonatype Container provides comprehensive protection for containerized applications and Kubernetes deployments, ensuring that they remain secure throughout the software lifecycle. With real-time monitoring and continuous scanning, the platform helps detect vulnerabilities early during development, preventing security risks before they reach production. It uses advanced behavioral analysis to enforce security policies automatically, reducing manual work. Sonatype Container also supports integrations with cloud platforms and orchestration tools, allowing businesses to secure containers seamlessly across various environments, from build to runtime.
  • 21
    IBM Storage for Red Hat OpenShift
    IBM Storage for Red Hat OpenShift unifies traditional and container storage, enabling easier deployment of enterprise-class scale-out microservices architectures. Validated with Red Hat OpenShift, Kubernetes and IBM Cloud Pak. Delivering simplified deployment and management for an integrated experience. Enterprise data protection, automated scheduling, and data reuse support for Red Hat OpenShift and Kubernetes environments. Block, file and object data resources. Quickly deploy what you need when you need it. IBM Storage for Red Hat OpenShift provides the infrastructure foundation and storage orchestration necessary for building a robust, agile, on-premises hybrid cloud environment. IBM supports CSI for its block and file storage families to improve container utilization in Kubernetes environments.
  • 22
    Cilium

    Cilium

    Cilium

    Cilium is open-source software for providing, securing and observing network connectivity between container workloads, cloud native, and fueled by the revolutionary Kernel technology eBPF. Kubernetes doesn't come with an implementation of Load Balancing. This is usually left as an exercise for your cloud provider or in private cloud environments an exercise for your networking team. Cilium can attract this traffic with BGP and accelerate leveraging XDP and eBPF. Together these technologies provide a very robust and secure implementation of load balancing. Cilium and eBPF operate at the kernel layer. With this level of context, we can make intelligent decisions about how to connect different workloads whether on the same node or between clusters. With eBPF and XDP Cilium enables significant improvements in latency and performance and eliminates the need for Kube-proxy entirely.
  • 23
    Podman

    Podman

    Containers

    What is Podman? Podman is a daemonless container engine for developing, managing, and running OCI Containers on your Linux System. Containers can either be run as root or in rootless mode. Simply put: alias docker=podman. Manage pods, containers, and container images. Supporting docker swarm. We believe that Kubernetes is the defacto standard for composing Pods and for orchestrating containers, making Kubernetes YAML a defacto standard file format. Hence, Podman allows the creation and execution of Pods from a Kubernetes YAML file (see podman-play-kube). Podman can also generate Kubernetes YAML based on a container or Pod (see podman-generate-kube), which allows for an easy transition from a local development environment to a production Kubernetes cluster.
  • 24
    Container Service for Kubernetes (ACK)
    Container Service for Kubernetes (ACK) from Alibaba Cloud is a fully managed service. ACK is integrated with services such as virtualization, storage, network and security, providing user a high performance and scalable Kubernetes environments for containerized applications. Alibaba Cloud is a Kubernetes Certified Service Provider (KCSP) and ACK is certified by Certified Kubernetes Conformance Program which ensures consistent experience of Kubernetes and workload portability. Kubernetes Certified Service Provider (KCSP) and qualified by Certified Kubernetes Conformance Program. Ensures Kubernetes consistent experience, workload portability. Provides deep and rich enterprise-class cloud native abilities. Ensures end-to-end application security and provides fine-grained access control. Allows you to quickly create Kubernetes clusters. Provides container-based management of applications throughout the application lifecycle.
  • 25
    nono

    nono

    Always Further

    nono is an open source, kernel-enforced sandbox for AI coding agents and LLM workloads. Unlike policy-based guardrails that intercept and filter operations, nono uses OS security primitives — Landlock on Linux and Seatbelt on macOS — to make unauthorised operations structurally impossible at the syscall level. Wrap any AI agent — Claude Code, OpenCode, OpenClaw, or any CLI process — with a single command. nono applies default-deny filesystem access, blocks destructive commands (rm, dd, chmod, sudo), isolates credentials and API keys, and cascades all restrictions to child processes. No escape mechanism exists once restrictions are applied. Built-in profiles get you running in seconds. Secrets inject securely from the system keystore and are zeroised on exit. Audit logging, atomic rollbacks, and Sigstore-attested policy signing are on the roadmap. Apache 2.0. From the creator of Sigstore.
  • 26
    Sysdig Secure
    Cloud, container, and Kubernetes security that closes the loop from source to run. Find and prioritize vulnerabilities; detect and respond to threats and anomalies; and manage configurations, permissions, and compliance. See all activity across clouds, containers, and hosts. Use runtime intelligence to prioritize security alerts and remove guesswork. Shorten time to resolution using guided remediation through a simple pull request at the source. See any activity within any app or service by any user across clouds, containers, and hosts. Reduce vulnerability noise by up to 95% using runtime context with Risk Spotlight. Prioritize fixes that remediate the greatest number of security violations using ToDo. Map misconfigurations and excessive permissions in production to infrastructure as code (IaC) manifest. Save time with a guided remediation workflow that opens a pull request directly at the source.
  • 27
    Chkk

    Chkk

    Chkk

    Prioritize your top business-critical risks with clear and actionable insights. Continuously harden your Kubernetes availability. Learn from others and avoid repeating their mistakes. Eliminate risks before they cause incidents. Stay up to date with visibility across all your infrastructure layers. Catalog containers, clusters, add-ons, and dependencies. Consolidate insights across clouds, on-prem, and more. Get alerted about all EOL and incompatible versions. Never use spreadsheets or custom scripts again. Chkk’s mission is to enable developers to proactively prevent incidents from happening by learning from others and not repeating known mistakes. Chkk's collective learning technology mines and curates known errors, failures, and disruptions that the Kubernetes community (comprising users/operators, cloud providers, and vendors) has encountered, ensuring that past mistakes are not repeated.
  • 28
    Sangfor Kubernetes Engine
    Sangfor Kubernetes Engine (SKE) is a container management platform built on upstream Kubernetes, fully integrated into Sangfor HCI and managed by Sangfor Cloud Platform, that provides a unified environment for running and managing both containers and virtual machines with simplicity, reliability, and security. Ideal for deploying new containerized applications, transitioning to microservices architectures, or consolidating existing VM workloads, SKE offers centralized account, permission, monitoring, and alert management across all workloads. Users can automate the creation of production‑ready Kubernetes clusters in as little as 15 minutes, eliminating manual OS installation and configuration, and leverage a rich set of out‑of‑the‑box components for rapid application deployment, visualized monitoring, diverse log types, and built‑in high‑performance load balancing.
  • 29
    Oracle Container Engine for Kubernetes
    Container Engine for Kubernetes (OKE) is an Oracle-managed container orchestration service that can reduce the time and cost to build modern cloud native applications. Unlike most other vendors, Oracle Cloud Infrastructure provides Container Engine for Kubernetes as a free service that runs on higher-performance, lower-cost compute shapes. DevOps engineers can use unmodified, open source Kubernetes for application workload portability and to simplify operations with automatic updates and patching. Deploy Kubernetes clusters including the underlying virtual cloud networks, internet gateways, and NAT gateways with a single click. Automate Kubernetes operations with web-based REST API and CLI for all actions including Kubernetes cluster creation, scaling, and operations. Oracle Container Engine for Kubernetes does not charge for cluster management. Easily and quickly upgrade container clusters, with zero downtime, to keep them up to date with the latest stable version of Kubernetes.
  • 30
    VMware Tanzu Kubernetes Grid
    Power your modern applications with VMware Tanzu Kubernetes Grid. Run the same K8s across data center, public cloud and edge for a consistent, secure experience for all development teams. Keep your workloads properly isolated and secure. Get a complete, easy-to-upgrade Kubernetes runtime with preintegrated and validated components. Deploy and scale all clusters without downtime. Apply security fixes fast. Run your containerized applications on a certified Kubernetes distribution, bolstered by the global Kubernetes community. Use your existing data center tools and workflows to give developers secure, self-serve access to conformant Kubernetes clusters in your VMware private cloud, and extend the same consistent Kubernetes runtime across your public cloud and edge environments. Simplify operations of large-scale, multicluster Kubernetes environments, and keep your workloads properly isolated. Automate lifecycle management to reduce your risk and shift your focus to more strategic work.
  • 31
    Illumio

    Illumio

    Illumio

    Stop ransomware. Isolate cyberattacks. Segment across any cloud, data center, or endpoint in minutes. Accelerate your Zero Trust journey and protect your organization with automated security enforcement, intelligent visibility, and unprecedented scale. Illumio Core stops attacks and ransomware from spreading with intelligent visibility and micro-segmentation. Get a map of workload communications, quickly build policy, and automate enforcement with micro-segmentation that is easy to deploy across any application, cloud, container, data center, and endpoint. Illumio Edge extends Zero Trust to the edge to contain malware and ransomware to a single laptop instead of thousands. Turn laptops into Zero Trust endpoints, contain an infection to a single machine, and give endpoint security tools like EDR more time to detect and responds to threats.
  • 32
    Rancher

    Rancher

    Rancher Labs

    From datacenter to cloud to edge, Rancher lets you deliver Kubernetes-as-a-Service. Rancher is a complete software stack for teams adopting containers. It addresses the operational and security challenges of managing multiple Kubernetes clusters, while providing DevOps teams with integrated tools for running containerized workloads. From datacenter to cloud to edge, Rancher's open source software lets you run Kubernetes everywhere. Compare Rancher with other leading Kubernetes management platforms in how they deliver. You don’t need to figure Kubernetes out all on your own. Rancher is open source software, with an enormous community of users. Rancher Labs builds software that helps enterprises deliver Kubernetes-as-a-Service across any infrastructure. When running Kubernetes workloads in mission-critical environments, our community knows that they can turn to us for world-class support.
  • 33
    KubeSphere

    KubeSphere

    KubeSphere

    KubeSphere is a distributed operating system for cloud-native application management, using Kubernetes as its kernel. It provides a plug-and-play architecture, allowing third-party applications to be seamlessly integrated into its ecosystem. KubeSphere is also a multi-tenant enterprise-grade open-source Kubernetes container platform with full-stack automated IT operations and streamlined DevOps workflows. It provides developer-friendly wizard web UI, helping enterprises to build out a more robust and feature-rich Kubernetes platform, which includes the most common functionalities needed for enterprise Kubernetes strategies. A CNCF-certified Kubernetes platform, 100% open-source, built and improved by the community. Can be deployed on an existing Kubernetes cluster or Linux machines, supports the online and air-gapped installation. Deliver DevOps, service mesh, observability, application management, multi-tenancy, storage, and networking management in a unified platform.
  • 34
    Kata Containers

    Kata Containers

    Kata Containers

    Kata Containers is Apache 2 licensed software consisting of two main components: the Kata agent, and the Kata Containerd shim v2 runtime. It also packages a Linux kernel and versions of QEMU, Cloud Hypervisor and Firecracker hypervisors. Kata Containers are as light and fast as containers and integrate with the container management layers—including popular orchestration tools such as Docker and Kubernetes (k8s)—while also delivering the security advantages of VMs. Kata Containers supports Linux (host and guest) for now. On the host side, we have installation instructions for several popular distributions. We also have out-of-the-box support for Clear Linux, Fedora, and CentOS 7 rootfs images through the OSBuilder which can also be used to roll your own guest images.
  • 35
    RapidFort

    RapidFort

    RapidFort

    Automatically eliminate unused software components and deploy smaller, faster, more secure workloads. RapidFort drastically reduces vulnerability and patch management queues so that developers can focus on building. By eliminating unused container components, RapidFort enhances production workload security and saves developers from unnecessarily patching and maintaining unused code. RapidFort profiles containers to understand what components are needed to run. Run your containers as normal in any environment, dev, test, or prod. Use any container deployment, including Kubernetes, Docker Compose, Amazon EKS, and AWS Fargate. RapidFort then identifies which packages you must keep, enabling you to remove unused packages. Typical improvements are in the 60% to 90% range. RapidFort also provides the option to build and customize remediation profiles, allowing you to pick and choose what to retain or remove.
    Starting Price: $5,000 per month
  • 36
    Araali Networks

    Araali Networks

    Araali Networks

    The first identity-based, cloud-native solution to neutralize network exposure in Kubernetes, access to data, services, and backdoors. Auto-discover and neutralize your Kubernetes exposure in real-time. Prioritizes your mitigation and bring properly configured eBPF-based controls to manage your exposure and keep your sensitive data secure. Shared responsibility makes you liable to securely configure your infrastructure to minimize exposure. Default open egress leads to data loss. For cloud-first organizations who want to secure their customers’ data and demonstrate compliance, Araali Networks provides proactive protection that is easy to manage. The self-configuring, preventive controls are especially beneficial to lean security teams. Data will have minimal possible exposure and be invisible to intruders. API and services will have minimal possible exposure and be invisible to threats. Data will not leave your premise to unapproved external destinations.
  • 37
    MayaData

    MayaData

    MayaData

    OpenEBS with Kubera is the answer. OpenEBS is the most popular open source storage for Kubernetes - and the fastest. Kubera adds an easy to use GUI for OpenEBS Mayastor - and APIs, auto checks and configuration, active directory authentication, built-in performance benchmarking, and additional operators to assist in upgrades and other use cases. Kubera is freely available and is delivered by MayaData when providing 24/7 support for customers to reduce operational costs and complexity. Kubera Propel is a cloud-native declarative data plane written in Rust. It’s built on the open source OpenEBS Mayastor. Kubera Propel combines breakthrough technologies like NVMe, SPDK, and emerging new storage features in the Linux kernel. OpenEBS managed by Kubera Propel has been shown independent benchmarks to deliver extremely low latency performance for data bases and other workloads running on Kubernetes.
    Starting Price: $100 per node per month
  • 38
    CAST AI

    CAST AI

    CAST AI

    CAST AI is an automated Kubernetes cost monitoring, optimization and security platform for your EKS, AKS and GKE clusters. The company’s platform goes beyond monitoring clusters and making recommendations; it utilizes advanced machine learning algorithms to analyze and automatically optimize clusters, saving customers 50% or more on their cloud spend, and improving performance and reliability to boost DevOps and engineering productivity.
    Starting Price: $200 per month
  • 39
    IBM Cloud Data Shield
    IBM Cloud™ Data Shield enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes Service host, providing data-in-use protection. IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for MySQL, NGINX and Vault. Powered by the Fortanix Runtime Encryption platform and Intel SGX technology, these tools enable organizations with sensitive data to leverage cloud computing with more confidence. IBM Cloud Data Shield helps enable organizations with sensitive data to deploy and benefit from cloud computing. IBM Cloud Data Shield can run containerized applications in secure enclaves on the IBM Cloud Kubernetes Service.
  • 40
    Falcon Cloud Workload Protection
    Falcon Cloud Workload Protection provides complete visibility into workload and container events and instance metadata enabling faster and more accurate detection, response, threat hunting and investigation, to ensure that nothing goes unseen in your cloud environment. Falcon Cloud Workload Protection secures your entire cloud-native stack, on any cloud, across all workloads, containers and Kubernetes applications. Automate security and detect and stop suspicious activity, zero-day attacks, risky behavior to stay ahead of threats and reduce the attack surface. Falcon Cloud Workload Protection key integrations support continuous integration/continuous delivery (CI/CD) workflows allowing you to secure workloads at the speed of DevOps without sacrificing performance
  • 41
    F5 BIG-IP Container Ingress Services
    Organizations are adopting containerized environments to speed app development. But these apps still need services, such as routing, SSL offload, scale, and security. F5 Container Ingress Services makes it easy to deliver advanced application services to your container deployments, enabling Ingress control HTTP routing, load balancing, and application delivery performance, as well as robust security services. Container Ingress Services easily integrates BIG-IP solutions with native container environments, such as Kubernetes, and PaaS container orchestration and management systems, such as RedHat OpenShift. Scale apps to meet container workloads and enable security services to protect container data. Container Ingress Services enables self-service app performance and security services within your orchestration by integrating BIG-IP platforms with your container environment.
  • 42
    Fortress

    Fortress

    Fortress Labs

    Fortress offers fully-isolated, secure-by-design availability environments that run “shadow” VMs of your industrial applications in order to provide unparalleled availability and resilience. The Integrity Environment offers a robust, agent-less snapshotting mechanism, which dynamically captures client-specific control system configurations, coupled with malware scanning and encryption/decryption engines that ensure the integrity and confidentiality of system backups. The execution environment contains specialized tools for actually running secondary copies of industrial control system applications within purpose-built, hardened virtual machines, “hydrated” by configuration data from the integrity environment. All components of the Fortress platform are kept on specialized infrastructure that is logically and physically separated from the client’s primary network. Whereas traditional high-availability systems are vulnerable to malicious lateral attacks.
  • 43
    OpenEBS

    OpenEBS

    OpenEBS

    OpenEBS builds on Kubernetes to enable Stateful applications to easily access Dynamic Local PVs or Replicated PVs. By using the Container Attached Storage pattern users report lower costs, easier management, and more control for their teams. OpenEBS is a 100% Open Source CNCF project made by MayaData & the community. Prominent users include Arista, Optoro, Orange, Comcast and the CNCF itself. Automated provisioning and storage replication across pods is challenging. OpenEBS makes complex cross-cloud stateful application storage easy. Unlike CSI plugins or Linux kernel dependent software, OpenEBS runs entirely in userspace, making deployment and maintenance a snap. The largest, most active Kubernetes storage project with the biggest user base and community, OpenEBS is built by K8s SREs, and experts just like you, tailored to their needs. OpenEBS orchestrates storage for any Kubernetes stack.
  • 44
    ARMO

    ARMO

    ARMO

    ARMO pioneers a new approach to Cloud Security with an open source powered, behavioral driven, Cloud Runtime Security Platform. ARMOs CADR (Cloud App Detection & Response) solution addresses a major unsolved pain point for organizations running on cloud-native architectures: how to continuously protect dynamic workloads during runtime without overwhelming teams with alerts or interrupting operations. ARMO CADR continuously reduces the cloud attack surface using real-time runtime insights, while actively detecting and responding to threats with true risk context. It includes 2 major products that are tightly integrated together and are part of one platform solution - * Kubernetes-First, runtime driven, Cloud Security Posture mgmt (CSPM) - identifying risks, prioritizing them and offering remediation without breaking applications in production * Real-Time Threat Detection & Response - detecting and responding to active threats across the entire cloud and applications stack
  • 45
    Mirantis Kubernetes Engine
    Mirantis Kubernetes Engine (formerly Docker Enterprise) provides simple, flexible, and scalable container orchestration and enterprise container management. Use Kubernetes, Swarm, or both, and experience the fastest time to production for modern applications across any environment. Enterprise container orchestration Avoid lock-in. Run Mirantis Kubernetes Engine on bare metal, or on private or public clouds—and on a range of popular Linux distributions. Reduce time-to-value. Hit the ground running with out-of-the-box dependencies including Calico for Kubernetes networking and NGINX for Ingress support. Leverage open source. Save money and maintain control by using a full stack of open source-based technologies that are production-proven, scalable, and extensible. Focus on apps—not infrastructure. Enable your IT team to focus on building business-differentiating applications when you couple Mirantis Kubernetes Engine with OpsCare Plus for a fully-managed K8s experience.
  • 46
    IBM Cloud Kubernetes Service
    IBM Cloud® Kubernetes Service is a certified, managed Kubernetes solution, built for creating a cluster of compute hosts to deploy and manage containerized apps on IBM Cloud®. It provides intelligent scheduling, self-healing, horizontal scaling and securely manages the resources that you need to quickly deploy, update and scale applications. IBM Cloud Kubernetes Service manages the master, freeing you from having to manage the host OS, container runtime and Kubernetes version-update process.
    Starting Price: $0.11 per hour
  • 47
    Gefyra

    Gefyra

    Blueshoe

    Building and pushing containers to test them in Kubernetes is repetitive and time-consuming. Writing and debugging code that depends on services in Kubernetes is daunting. Especially if they are not reachable during development. Gefyra is an Open Source project that runs local code in any Kubernetes cluster without the build and push cycle. It overlays containers in the cluster making code changes immediately available. Gefyra enables you to: - Run containers and talk to internal services on an external Kubernetes cluster - Operate feature-branches in a production-like Kubernetes environment with all adjacent services - Overlay Kubernetes cluster-internal services with you local container. - Leverage development clusters for multiple developers at the same time. - Write code in the IDE you already love - Leverage all the neat development features, such as debugger, code-hot-reloading, overriding - Run high-level integration tests against all dependent services
    Starting Price: free
  • 48
    Symantec Data Center Security
    Complete server protection, monitoring, and workload micro-segmentation for private cloud and physical on-premises data center environments. Security hardening and monitoring for private cloud and physical data centers with support for Docker containers. Agentless Docker container protection with full application control and integrated management. Block zero-day exploits with application whitelisting, granular intrusion prevention, and real-time file integrity monitoring (RT-FIM). Secure OpenStack deployments with full hardening of Keystone identity service module. Data center security: monitoring. Continuous security monitoring of private cloud and physical on-premises data center environments. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services.
  • 49
    KubeMQ

    KubeMQ

    KubeMQ

    Innovative and modern message queue and message broker in a lightweight container developed to run in Kubernetes, certified in the CNCF landscape and connect natively to the cloud-native ecosystem. A message broker and message queue ideal for developers. Provides all messaging patterns, scalable, highly available, and secure. Connect microservices instantly using a rich set of connectors without writing any code. Easy-to-use SDKs and elimination of predefined topics, channels, brokers, and routes. Build & Deploy allows configurations of KubeMQ components to be built with a few clicks and deployed with kubectl command line. Innovative and modern message queue and message broker in a lightweight container developed to run in Kubernetes, certified in the CNCF landscape, and connect natively to the cloud-native ecosystem. Simple deployment in Kubernetes in less than 1 minute. Developer friendly by simple to use SDKs and elimination of the many developers and DevOps-centered challenges.
  • 50
    Oracle Cloud Infrastructure Compute
    Oracle Cloud Infrastructure provides fast, flexible, and affordable compute capacity to fit any workload need from performant bare metal servers and VMs to lightweight containers. OCI Compute provides uniquely flexible VM and bare metal instances for optimal price-performance. Select exactly the number of cores and the memory your applications need. Delivering high performance for enterprise workloads. Simplify application development with serverless computing. Your choice of technologies includes Kubernetes and containers. NVIDIA GPUs for machine learning, scientific visualization, and other graphics processing. Capabilities such as RDMA, high-performance storage, and network traffic isolation. Oracle Cloud Infrastructure consistently delivers better price performance than other cloud providers. Virtual machine-based (VM) shapes offer customizable core and memory combinations. Customers can optimize costs by choosing a specific number of cores.
    Starting Price: $0.007 per hour