Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Mirantis Kubernetes Engine (formerly Docker Enterprise) gives you the power to build, run, and scale cloud native applications—the way that works for you. Increase developer efficiency and release frequency while reducing cost. Deploy Kubernetes and Swarm clusters out of the box and manage them via API, CLI, or web interface.
Kubernetes, Swarm, or both
Different apps—and different teams—have different container orchestration needs. Use Kubernetes, Swarm, or both depending on your specific requirements.
Simplified cluster management
Get up and running right out of the box—then manage clusters easily and apply updates with zero downtime using a simple web UI, CLI, or API.
Integrated role-based access control (RBAC)
Fine-grained security access control across your platform ensures effective separation of duties, and helps drive a security strategy built on the principle of least privilege.
Identity management
Easily integrate with your existing identity management solution and enable two-factor authentication to provide peace of mind that only authorized users are accessing your platform.
Mirantis Kubernetes Engine works with Mirantis Container Runtime and Mirantis Secure Registry to provide security compliance.
Description
Introducing a versatile networking solution that offers connectivity, security, and flexibility at a significantly reduced price. You can easily launch a VNS3 image through various public cloud marketplaces, including AWS, Azure, and GCP. Additionally, we provide a straightforward process for private image sharing, and we are more than happy to share a private image with your account. Furthermore, we can supply a VDI/VDK file that you can seamlessly import into your preferred environment, whether it be VMWare or a secured cloud setting. Our dedicated support team at Cohesive Networks can deliver a license within minutes, ensuring a smooth experience. Upgrading the license for your VNS3 controller is a simple task that can be accomplished through the VNS3 console or the API. An optional feature, the VNS3 Overlay Network, enhances your setup by providing end-to-end encryption, improved performance in most cloud environments, and enhanced IP address mobility across various regions and cloud providers. This overlay network is built on top of the existing networking layers, allowing it to remain functional independently from the underlying hardware and software, although it remains reliant on those native networking layers. In summary, this solution not only streamlines your networking needs but also empowers you with unparalleled flexibility and security.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
AWS Marketplace
Azure Marketplace
Cilium
Datadog
Kubernetes
Mirantis Secure Registry
Project Calico
Integrations
Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
AWS Marketplace
Azure Marketplace
Cilium
Datadog
Kubernetes
Mirantis Secure Registry
Project Calico
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$150 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Mirantis
Founded
1998
Country
United States
Website
www.mirantis.com/software/docker/docker-enterprise/
Vendor Details
Company Name
Cohesive Networks
Founded
2008
Country
United States
Website
www.cohesive.net/vns3/
Product Features
Product Features
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management