What Integrates with Azure Container Registry?

Find out what Azure Container Registry integrations exist in 2025. Learn what software and services currently integrate with Azure Container Registry, and sort them by reviews, cost, features, and more. Below is a list of products that Azure Container Registry currently integrates with:

  • 1
    Cycloid Reviews
    See Software
    Learn More
    Whether you already have a platform team or are just at the beginning of your internal platform development, Cycloid is designed to complete your internal solution with high-quality building blocks focused on specific DevOps and hybrid cloud best practices. Self-service portal, cloud governance, RBAC, CI/CD pipelines, built-in FinOps, and GreenOps are all modules that you can pick and choose to complement your internal solution or begin your digital transformation. Like a piece of a puzzle, Git-based and lock-free Cycloid can fit into your organizational strategy and solve the burning issues at hand. We can be a pillar for your organizational transformation by empowering and upskilling your existing teams, as well as improving DevX, the developer experience. How? We offer an engineering platform dedicated to DevOps and hybrid cloud adoption, allowing you to optimize how DevOps and end-users use technologies and clouds while working in alignment on common projects.
  • 2
    Docker Reviews
    Docker streamlines tedious configuration processes and is utilized across the entire development lifecycle, facilitating swift, simple, and portable application creation on both desktop and cloud platforms. Its all-encompassing platform features user interfaces, command-line tools, application programming interfaces, and security measures designed to function cohesively throughout the application delivery process. Jumpstart your programming efforts by utilizing Docker images to craft your own distinct applications on both Windows and Mac systems. With Docker Compose, you can build multi-container applications effortlessly. Furthermore, it seamlessly integrates with tools you already use in your development workflow, such as VS Code, CircleCI, and GitHub. You can package your applications as portable container images, ensuring they operate uniformly across various environments, from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE, and beyond. Additionally, Docker provides access to trusted content, including official Docker images and those from verified publishers, ensuring quality and reliability in your application development journey. This versatility and integration make Docker an invaluable asset for developers aiming to enhance their productivity and efficiency.
  • 3
    Red Hat OpenShift Reviews
    Kubernetes serves as a powerful foundation for transformative ideas. It enables developers to innovate and deliver projects more rapidly through the premier hybrid cloud and enterprise container solution. Red Hat OpenShift simplifies the process with automated installations, updates, and comprehensive lifecycle management across the entire container ecosystem, encompassing the operating system, Kubernetes, cluster services, and applications on any cloud platform. This service allows teams to operate with speed, flexibility, assurance, and a variety of options. You can code in production mode wherever you prefer to create, enabling a return to meaningful work. Emphasizing security at all stages of the container framework and application lifecycle, Red Hat OpenShift provides robust, long-term enterprise support from a leading contributor to Kubernetes and open-source technology. It is capable of handling the most demanding workloads, including AI/ML, Java, data analytics, databases, and more. Furthermore, it streamlines deployment and lifecycle management through a wide array of technology partners, ensuring that your operational needs are met seamlessly. This integration of capabilities fosters an environment where innovation can thrive without compromise.
  • 4
    Microsoft Entra ID Reviews
    Microsoft Entra ID, previously known as Azure Active Directory, serves as a robust cloud-based identity and access management solution that integrates essential directory services, application access control, and sophisticated identity protection measures. Enhance your organization's security with this cloud identity solution, which effectively links employees, clients, and partners to their applications, devices, and valuable data. Utilize robust authentication methods and risk-adjusted access policies to secure resource access without sacrificing user experience. Ensure a quick and straightforward sign-in process throughout your multicloud infrastructure to boost user productivity, minimize password management time, and enhance overall efficiency. Centralize the management of all identities and access to applications, whether they reside in the cloud or on-premises, to gain better visibility and control over your organization’s resources. This comprehensive approach not only protects sensitive information but also fosters a seamless and efficient working environment for all users.
  • 5
    Azure Pipelines Reviews
    Streamline your builds and deployments using Pipelines, allowing you to focus more on creativity rather than technical details. Access cloud-hosted pipelines for various operating systems, including Linux, macOS, and Windows. Develop applications for web, desktop, and mobile platforms effortlessly. You can deploy your work to any cloud service or on-premises environment as needed. Support is available for building, testing, and deploying applications in languages such as Node.js, Python, Java, PHP, Ruby, C/C++, .NET, Android, and iOS. Execute tasks in parallel across Linux, macOS, and Windows systems seamlessly. It’s simple to build and push images to container registries like Docker Hub and Azure Container Registry, and you can deploy these containers to specific hosts or Kubernetes clusters. Additionally, you can explore a diverse array of community-created tasks for building, testing, and deploying, along with numerous extensions from platforms like Slack to SonarCloud. Ensure continuous delivery (CD) of your software to any cloud environment, including Azure, AWS, and GCP, while also visualizing deployment across multiple interdependent stages for better management. This approach not only enhances productivity but also fosters innovation within your development processes.
  • 6
    Azure App Service Reviews

    Azure App Service

    Microsoft

    $0.013 per hour
    Effortlessly create, launch, and expand web applications and APIs precisely how you want. Choose from a variety of frameworks including .NET, .NET Core, Node.js, Java, Python, or PHP, whether you're utilizing containers or operating on Windows or Linux platforms. Achieve strict enterprise-level standards for performance, security, and compliance through a reliable, fully managed service that processes more than 40 billion requests daily. This fully managed service ensures infrastructure upkeep, security updates, and scalability are handled seamlessly. It also features integrated CI/CD capabilities and supports deployments without downtime. With comprehensive security and compliance measures, including SOC and PCI certifications, you can deploy effortlessly across various environments such as public cloud, Azure Government, and on-premises settings. You have the flexibility to utilize your preferred code or container alongside your chosen framework. Enhance developer efficiency with deep integration into Visual Studio Code and Visual Studio, while also optimizing your CI/CD processes via Git, GitHub, GitHub Actions, Atlassian Bitbucket, Azure DevOps, Docker Hub, and Azure Container Registry. Furthermore, this platform allows for continuous updates and improvements, ensuring your applications remain cutting edge and responsive to user needs.
  • 7
    Harbor Reviews
    Harbor is an open-source container registry that focuses on security and compliance. It enhances the basic functionality of a Docker registry by adding features like: Vulnerability Scanning: Checks images for known security weaknesses before deployment. Role-Based Access Control: Manages who can access and modify images based on roles and permissions. Image Signing: Digitally signs images to ensure authenticity and prevent tampering. Replication: Enables syncing images between multiple Harbor instances for disaster recovery or distributed deployment. Harbor is not a silver bullet for all container security challenges, but it addresses a crucial aspect: protecting your images from vulnerabilities and ensuring they're used in a controlled manner. It's particularly beneficial for organizations with strict security and compliance requirements.
  • 8
    Calico Cloud Reviews

    Calico Cloud

    Tigera

    $0.05 per node hour
    A pay-as-you-go security and observability software-as-a-service (SaaS) solution designed for containers, Kubernetes, and cloud environments provides users with a real-time overview of service dependencies and interactions across multi-cluster, hybrid, and multi-cloud setups. This platform streamlines the onboarding process and allows for quick resolution of Kubernetes security and observability challenges within mere minutes. Calico Cloud represents a state-of-the-art SaaS offering that empowers organizations of various sizes to secure their cloud workloads and containers, identify potential threats, maintain ongoing compliance, and address service issues in real-time across diverse deployments. Built upon Calico Open Source, which is recognized as the leading container networking and security framework, Calico Cloud allows teams to leverage a managed service model instead of managing a complex platform, enhancing their capacity for rapid analysis and informed decision-making. Moreover, this innovative platform is tailored to adapt to evolving security needs, ensuring that users are always equipped with the latest tools and insights to safeguard their cloud infrastructure effectively.
  • 9
    Elastic Observability Reviews
    Leverage the most extensively utilized observability platform, founded on the reliable Elastic Stack (commonly referred to as the ELK Stack), to integrate disparate data sources, providing cohesive visibility and actionable insights. To truly monitor and extract insights from your distributed systems, it is essential to consolidate all your observability data within a single framework. Eliminate data silos by merging application, infrastructure, and user information into a holistic solution that facilitates comprehensive observability and alerting. By integrating limitless telemetry data collection with search-driven problem-solving capabilities, you can achieve superior operational and business outcomes. Unify your data silos by assimilating all telemetry data, including metrics, logs, and traces, from any source into a platform that is open, extensible, and scalable. Enhance the speed of problem resolution through automatic anomaly detection that leverages machine learning and sophisticated data analytics, ensuring you stay ahead in today's fast-paced environment. This integrated approach not only streamlines processes but also empowers teams to make informed decisions swiftly.
  • 10
    BentoML Reviews
    Deploy your machine learning model in the cloud within minutes using a consolidated packaging format that supports both online and offline operations across various platforms. Experience a performance boost with throughput that is 100 times greater than traditional flask-based model servers, achieved through our innovative micro-batching technique. Provide exceptional prediction services that align seamlessly with DevOps practices and integrate effortlessly with widely-used infrastructure tools. The unified deployment format ensures high-performance model serving while incorporating best practices for DevOps. This service utilizes the BERT model, which has been trained with the TensorFlow framework to effectively gauge the sentiment of movie reviews. Our BentoML workflow eliminates the need for DevOps expertise, automating everything from prediction service registration to deployment and endpoint monitoring, all set up effortlessly for your team. This creates a robust environment for managing substantial ML workloads in production. Ensure that all models, deployments, and updates are easily accessible and maintain control over access through SSO, RBAC, client authentication, and detailed auditing logs, thereby enhancing both security and transparency within your operations. With these features, your machine learning deployment process becomes more efficient and manageable than ever before.
  • 11
    gopaddle Reviews

    gopaddle

    gopaddle

    $45 per month
    Harness the capabilities of a no-code platform to create modern applications with ease. Design, deploy, manage, and expand cloud-native applications by taking full advantage of your team's existing skills. Transform your applications to seize new revenue streams and surpass customer expectations by swiftly modernizing both legacy and new projects. Position yourself ahead of the competition and drive transformative change. Utilize the platform's built-in DevOps features to streamline and automate the processes of software delivery and maintenance effectively. Enhance your 'cloud first' approach by incorporating support for multi-cloud and hybrid cloud environments. Prevent vendor lock-in and empower your teams with the freedom to choose their preferred cloud services and infrastructure. Minimize human error and reclaim valuable time for modernizing applications. Accelerate debugging and issue resolution with the platform's integrated developer tools, allowing for a more efficient development process. By embracing this innovative approach, organizations can foster a culture of agility and responsiveness to market demands.
  • 12
    Docker Scout Reviews

    Docker Scout

    Docker

    $5 per month
    Container images are made up of various layers and software packages that can be at risk of vulnerabilities, which may jeopardize the safety of both containers and applications. These security risks necessitate proactive measures, and Docker Scout serves as an effective tool to bolster the security of your software supply chain. By examining your images, Docker Scout creates a detailed inventory of the components, referred to as a Software Bill of Materials (SBOM). This SBOM is then compared against a constantly updated database of vulnerabilities to identify potential security flaws. Operating as an independent service, Docker Scout can be accessed through Docker Desktop, Docker Hub, the Docker CLI, and the Docker Scout Dashboard. Furthermore, it supports integrations with external systems, including container registries and CI platforms. Take the opportunity to uncover and analyze the structure of your images, ensuring that your artifacts conform to the best practices of the supply chain. By leveraging Docker Scout, you can maintain a robust defense against emerging threats in your software environment.
  • 13
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 14
    Uptycs Reviews
    Uptycs presents the first unified CNAPP and XDR platform that enables businesses to take control of their cybersecurity. Uptycs empowers security teams with real-time decision-making driven by structured telemetry and powerful analytics. The platform is designed to provide a unified view of cloud and endpoint telemetry from a common solution, and ultimately arm modern defenders with the insights they need across their cloud-native attack surfaces. Uptycs prioritizes responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates across modern attack surfaces—all from a single UI and data model. This includes the ability to tie together threat activity as it traverses on-prem and cloud boundaries, delivering a more cohesive enterprise-wide security posture. With Uptycs you get a wide range of functionality, including CNAPP, CWPP, CSPM, KSPM, CIEM, CDR, and XDR. Shift up with Uptycs.
  • 15
    Azure Machine Learning Reviews
    Streamline the entire machine learning lifecycle from start to finish. Equip developers and data scientists with an extensive array of efficient tools for swiftly building, training, and deploying machine learning models. Enhance the speed of market readiness and promote collaboration among teams through leading-edge MLOps—akin to DevOps but tailored for machine learning. Drive innovation within a secure, reliable platform that prioritizes responsible AI practices. Cater to users of all expertise levels with options for both code-centric and drag-and-drop interfaces, along with automated machine learning features. Implement comprehensive MLOps functionalities that seamlessly align with existing DevOps workflows, facilitating the management of the entire machine learning lifecycle. Emphasize responsible AI by providing insights into model interpretability and fairness, securing data through differential privacy and confidential computing, and maintaining control over the machine learning lifecycle with audit trails and datasheets. Additionally, ensure exceptional compatibility with top open-source frameworks and programming languages such as MLflow, Kubeflow, ONNX, PyTorch, TensorFlow, Python, and R, thus broadening accessibility and usability for diverse projects. By fostering an environment that promotes collaboration and innovation, teams can achieve remarkable advancements in their machine learning endeavors.
  • 16
    Beats Reviews

    Beats

    Elastic

    $16 per month
    Beats serves as a free and accessible platform designed specifically for single-purpose data shippers that transport data from numerous machines and systems to Logstash or Elasticsearch. These open-source data shippers are installed as agents on your servers, enabling the seamless transfer of operational data to Elasticsearch. Elastic offers Beats to facilitate the collection of data and event logs efficiently. Data can be directed to Elasticsearch or routed through Logstash, allowing for additional processing and enhancement before visualization in Kibana. If you're eager to start monitoring infrastructure metrics and centralizing log analytics swiftly, the Metrics app and Logs app in Kibana are excellent resources to explore. For comprehensive guidance, refer to Analyze metrics and Monitor logs. Filebeat simplifies the process of collecting data from various sources, including security devices, cloud environments, containers, and hosts, by providing a lightweight solution to forward and centralize logs and files. This flexibility ensures that you can maintain an organized and efficient data pipeline regardless of the complexity of your infrastructure.
  • 17
    K-PORT Reviews

    K-PORT

    Kontron AIS

    €8.60/device/month
    K-PORT automates the commissioning, service and maintenance of a company's solution on the field. K-PORT is a digital platform combining admin, container maintenance, remote maintenance, and a secure operating systems. We not only provide technology, but the expertise required to integrate OT with IT. The all-in one solution consists of hardware, connectivity and software. This allows the IoT to be driven by managing thousands of device connections worldwide.
  • 18
    Azure Kubernetes Service (AKS) Reviews
    The Azure Kubernetes Service (AKS), which is fully managed, simplifies the process of deploying and overseeing containerized applications. It provides serverless Kubernetes capabilities, a seamless CI/CD experience, and robust security and governance features suited for enterprises. By bringing together your development and operations teams on one platform, you can swiftly build, deliver, and expand applications with greater assurance. Additionally, it allows for elastic provisioning of extra resources without the hassle of managing the underlying infrastructure. You can implement event-driven autoscaling and triggers using KEDA. The development process is expedited through Azure Dev Spaces, which integrates with tools like Visual Studio Code, Azure DevOps, and Azure Monitor. Furthermore, it offers sophisticated identity and access management via Azure Active Directory, along with the ability to enforce dynamic rules across various clusters using Azure Policy. Notably, it is accessible in more regions than any competing cloud service provider, enabling wider reach for your applications. This comprehensive platform ensures that businesses can operate efficiently in a highly scalable environment.
  • 19
    Seeker Reviews
    Seeker® is an advanced interactive application security testing (IAST) tool that offers exceptional insights into the security status of your web applications. It detects trends in vulnerabilities relative to compliance benchmarks such as OWASP Top 10, PCI DSS, GDPR, CAPEC, and CWE/SANS Top 25. Moreover, Seeker allows security teams to monitor sensitive information, ensuring it is adequately protected and not inadvertently recorded in logs or databases without the necessary encryption. Its smooth integration with DevOps CI/CD workflows facilitates ongoing application security assessments and validations. Unlike many other IAST tools, Seeker not only uncovers security weaknesses but also confirms their potential for exploitation, equipping developers with a prioritized list of verified issues that need attention. Utilizing its patented techniques, Seeker efficiently processes a vast number of HTTP(S) requests, nearly eliminating false positives and fostering increased productivity while reducing business risks. In essence, Seeker stands out as a comprehensive solution that not only identifies but also mitigates security threats effectively.
  • 20
    Ozone Reviews
    Ozone platform allows enterprises to quickly and securely ship modern applications. Ozone eliminates the need to manage too many DevOps tools, making it easy to deploy applications on Kubernetes. Integrate all your existing DevOps tools to automate your application delivery process. Automated pipeline workflows make deployments faster and allow for on-demand infrastructure management. Enforce compliance policies and governance for app deployments at scale to prevent business losses. One pane of glass, where engineering, DevOps, and security teams can collaborate on app releases in realtime.
  • 21
    Microsoft Customer Lockbox Reviews
    Most tasks involving operations, support, and troubleshooting carried out by Microsoft staff and their sub-processors typically do not necessitate access to customer data. In those infrequent instances where such access becomes necessary, Customer Lockbox for Microsoft Azure offers a system through which customers can evaluate and either approve or deny requests for access to their data. This feature is particularly utilized when a Microsoft engineer requires access to customer data, either due to a support ticket initiated by the customer or a problem detected by Microsoft itself. Activity logs serve to document Customer Lockbox interactions, which can be accessed in the Azure portal by selecting Activity Logs, allowing for a review of auditing information linked to these requests. Users have the option to filter the logs to find specific actions. Furthermore, a new baseline control (3.13) has been introduced in the Azure Security Benchmark, addressing the relevance of Customer Lockbox. This enhancement enables customers to leverage the benchmark to assess the applicability of Customer Lockbox for their services effectively. By doing so, organizations can ensure they maintain a high standard of data security and compliance.
  • 22
    DROPS Reviews
    DROPS is a sophisticated release management solution crafted to enhance, secure, and consolidate the deployment of applications across diverse infrastructures, including data centers, hybrid setups, and multi-cloud environments. It accommodates a variety of platforms, integrates effortlessly with numerous CI/CD pipelines, and provides options for both agent-based and agentless functionalities. Featuring comprehensive release management, automated infrastructure setup, and round-the-clock availability, DROPS is designed to optimize deployment workflows while ensuring dependable and uniform delivery. This tool is versatile enough to handle both legacy systems and contemporary applications, meeting the varied requirements of enterprises. Users can choose between agent-based and agentless operations without the need for any agent installation or upkeep. DROPS is capable of adapting to your specific configuration, and if agents are necessary, they will be provisioned automatically. You can plan and manage your application deployment through a user-friendly web console without requiring any scripting skills, facilitating smooth collaboration among stakeholders and technical teams, thereby enhancing overall project efficiency. Thus, DROPS not only simplifies deployment but also fosters better communication and coordination throughout the development lifecycle.
  • Previous
  • You're on page 1
  • Next