Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Infrastructure as Code has evolved to allow for the creation, deployment, and management of cloud infrastructure using well-known programming languages and tools. With a unified workflow across multiple cloud platforms, you can utilize the same language and tools no matter where your resources are hosted. Collaboration between developers and operators is streamlined, fostering a harmonious engineering environment. Continuous delivery becomes simple, as you can deploy from the command line or integrate with your preferred CI/CD systems, while also having the ability to review all changes prior to implementation. Navigating through complexity is made easier with enhanced visibility across all environments, allowing for more effective management. You can maintain security and audit trails by tracking who made changes, when alterations occurred, and the reasons behind them, all while enforcing deployment policies through your chosen identity provider. Secrets management is simplified with built-in encrypted configurations to keep sensitive information secure. Define your infrastructure in various familiar programming languages such as JavaScript, TypeScript, Python, Go, or any .NET language like C#, F#, and VB. Utilize your preferred development tools, IDEs, and testing frameworks to enhance productivity. Furthermore, you can codify and share best practices and policies, fostering a culture of reuse and efficiency within your team. This approach not only increases operational effectiveness but also empowers teams to innovate continuously.
Description
Utilize encryption keys to safeguard your secrets, personal details, and sensitive information stored in the cloud. You can create and remove keys, configure access policies, and execute key rotation through the management console, CLI, or API. Yandex KMS supports both symmetric and asymmetric cryptographic methods. With the REST or RPC API, you can encrypt and decrypt small data sets, including secrets and local encryption keys, in addition to signing data through electronic signature protocols. You have control over who can access the encrypted information, while Yandex KMS guarantees the security and durability of the keys. Additionally, Hardware Security Modules (HSMs) are provided for enhanced security. For small data encryption, you can use the SDKs available in Java or Go, while larger data sets can be encrypted using popular libraries like the AWS Encryption SDK and Google Tink. The service integrates seamlessly with Yandex Lockbox, allowing you to encrypt secrets with your own keys. Furthermore, encryption keys can also be employed to secure secrets and data within the Managed Service for Kubernetes, providing robust protection across various platforms. This comprehensive approach ensures that your sensitive information remains secure from unauthorized access.
API Access
Has API
API Access
Has API
Integrations
Kubernetes
AWS Cloud Control API
Akamai Cloud
Amazon Web Services (AWS)
Authress
Cluster.dev
Compliance Warden
GitHub
GitLab
Google Cloud Platform
Integrations
Kubernetes
AWS Cloud Control API
Akamai Cloud
Amazon Web Services (AWS)
Authress
Cluster.dev
Compliance Warden
GitHub
GitLab
Google Cloud Platform
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$0.0230 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Pulumi
Founded
2006
Country
United States
Website
www.pulumi.com
Vendor Details
Company Name
Yandex
Founded
1997
Country
Russia
Website
cloud.yandex.com/en/services/kms
Product Features
Application Development
Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development
Continuous Delivery
Application Lifecycle Management
Application Release Automation
Build Automation
Build Log
Change Management
Configuration Management
Continuous Deployment
Continuous Integration
Feature Toggles / Feature Flags
Quality Management
Testing Management
Infrastructure-as-a-Service (IaaS)
Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring