What Integrates with HAProxy Enterprise?

Find out what HAProxy Enterprise integrations exist in 2024. Learn what software and services currently integrate with HAProxy Enterprise, and sort them by reviews, cost, features, and more. Below is a list of products that HAProxy Enterprise currently integrates with:

  • 1
    Xitoring Reviews

    Xitoring

    Xitoring

    $4.99 OR Lifetime free
    3 Ratings
    SaaS for server monitoring and uptime monitoring Stop using multiple monitoring apps for server monitoring and uptime monitoring. Get Xitoring and monitor many servers in a matter of minutes with one command on the CLI. Everything will be automatically configured! Xitoring, a new monitoring platform (SaaS), for servers, is an innovative platform. Our agent (Xitogent), brings data from your server to ensure that your server is running smoothly. This will prevent downtime and performance issues and increase customer satisfaction. Our global probing nodes monitor your servers constantly and notify you if there is a problem. We are constantly improving our software and adding amazing features to it in the future. Inaugurated in 2021 to revolutionize the Server Monitoring industry.
  • 2
    DataDome Reviews

    DataDome

    DataDome

    $1590 per month
    1 Rating
    The best SaaS bot protection solution to protect e-commerce and classifieds businesses. It can be deployed on any web infrastructure in minutes. Unmatched bot detection speed, accuracy. It runs on autopilot and is easy to customize. Your websites, mobile apps, and APIs are fully protected DataDome handles all unwanted traffic for your IT teams so they don't have. Bot attacks are no more! The bot detection software's most comprehensive dashboard allows you to monitor and optimize detection and response. DataDome works in any location, on any cloud. It is easy to install, and optimized for your architecture, in just minutes. Our bot detection software provides unified protection for complex architectures. It works with all major web technologies including multi-cloud and multi–CDN setups.
  • 3
    InfluxDB Reviews

    InfluxDB

    InfluxData

    $0
    InfluxDB is a purpose-built data platform designed to handle all time series data, from users, sensors, applications and infrastructure — seamlessly collecting, storing, visualizing, and turning insight into action. With a library of more than 250 open source Telegraf plugins, importing and monitoring data from any system is easy. InfluxDB empowers developers to build transformative IoT, monitoring and analytics services and applications. InfluxDB’s flexible architecture fits any implementation — whether in the cloud, at the edge or on-premises — and its versatility, accessibility and supporting tools (client libraries, APIs, etc.) make it easy for developers at any level to quickly build applications and services with time series data. Optimized for developer efficiency and productivity, the InfluxDB platform gives builders time to focus on the features and functionalities that give their internal projects value and their applications a competitive edge. To get started, InfluxData offers free training through InfluxDB University.
  • 4
    Telegraf Reviews

    Telegraf

    InfluxData

    $0
    Telegraf is an open-source server agent that helps you collect metrics from your sensors, stacks, and systems. Telegraf is a plugin-driven agent that collects and sends metrics and events from systems, databases, and IoT sensors. Telegraf is written in Go. It compiles to a single binary and has no external dependencies. It also requires very little memory. Telegraf can gather metrics from a wide variety of inputs and then write them into a wide range of outputs. It can be easily extended by being plugin-driven for both the collection and output data. It is written in Go and can be run on any system without external dependencies. It is easy to collect metrics from your endpoints with the 300+ plugins that have been created by data experts in the community.
  • 5
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 6
    Acra Reviews

    Acra

    Cossack Labs

    $10000 per year
    It's easy to prevent data leakage in your app. Acra encryption suite offers data protection in distributed apps, web and mobile applications with PostgreSQL MySQL, KV backends. Regulations (GDPR, HIPAA and PCI DSS) require encryption of sensitive and personal data. It can be tedious to integrate cryptography into distributed applications. This has limited security benefits and requires many architectural trade-offs. Acra is here for that. Acra is a tool that covers 9 data security measures. Acra is designed to protect data from leakage and provide protection throughout the entire data lifecycle. Acra is easy-to-integrate, requires no modifications to the existing code, provides reliable security, and reduces MTTD/MTTR. Acra is an integration library that can encrypt all records with AcraServer key.
  • 7
    Prometheus Reviews

    Prometheus

    Prometheus

    Free
    Open-source monitoring solutions are able to power your alerting and metrics. Prometheus stores all data in time series. These are streams of timestamped value belonging to the same metric with the same labeled dimensions. Prometheus can also generate temporary derived times series as a result of queries. Prometheus offers a functional query language called PromQL, which allows the user to select and aggregate time series data real-time. The expression result can be displayed as a graph or tabular data in Prometheus’s expression browser. External systems can also consume the HTTP API. Prometheus can be configured using command-line flags or a configuration file. The command-line flags can be used to configure immutable system parameters such as storage locations and the amount of data to be kept on disk and in memory. . Download: https://sourceforge.net/projects/prometheus.mirror/
  • 8
    Nixstats Reviews

    Nixstats

    Nixstats

    $9.95 per month
    It takes only one line to install the monitoring agent onto all your servers. It takes only minutes to get started. You can keep track of the usage of your servers infrastructure to prevent downtime and performance issues. There are over 40 plugins that can be installed straight out of the box, including CPU, Process, Network and NGiNX. Server logs are vital to diagnose and prevent problems on your server infrastructure. Use the live tail feature or our advanced log search. Are you sure you have a clean IP space? You can ensure that your e mail does not get lost in the spam folder. Our control panel is customizable and simple to use, ensuring a better user experience. We can monitor HTTP(S), TCP, and ICMP (ping), endpoints. Be the first to know if your web endpoints are down.
  • 9
    Elastic Observability Reviews

    Elastic Observability

    Elastic

    $16 per month
    The most widely used observability platform, built on the ELK Stack, is the best choice. It converges silos and delivers unified visibility and actionable insight. All your observability data must be in one stack to effectively monitor and gain insight across distributed systems. Unify all data from the application, infrastructure, user, and other sources to reduce silos and improve alerting and observability. Unified solution that combines unlimited telemetry data collection with search-powered problem resolution for optimal operational and business outcomes. Converge data silos with the ingesting of all your telemetry data from any source, in an open, extensible and scalable platform. Automated anomaly detection powered with machine learning and rich data analysis can speed up problem resolution.
  • 10
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 11
    Kasada Reviews
    Kasada's unmatched understanding of human minds has led to a radical approach in combating automated cyberthreats. Kasada's platform overcomes the shortcomings in traditional bot management, providing immediate and lasting protection for web, API, and mobile channels. Its invisible and dynamic defenses offer a seamless user-experience, eliminating the need for annoying, ineffective CAPTCHAs. Our team takes care of the bots, so that clients can focus on growing their business and not on defending it. Kasada has offices in New York, Sydney, Melbourne, Boston, San Francisco and London.
  • 12
    wolfSSL Reviews
    wolfSSL, an open-source internet security company, is best known for its embedded SSL Library. Its primary users include programmers who integrate security functionality into their devices and applications. wolfSSL uses the dual licensing model like MySQL. It is available under commercial license terms to our commercial users and open source to the open source community. wolfSSL also offers consulting and support. wolfSSL is the most widely used SSL/TLS security option in the IoT. We protect devices from the most common threat vector in the IoT, the MITM (man-in-the middle) attack. wolfSSL is popular for heavy load server-side or cloud environments where cryptography performance are critical. FIPS 140-2-enabled, wolfSSL embedded SSL is also used by government applications. Over 2 billion devices and applications are protected with wolfSSL products.
  • 13
    Flockport Reviews
    One-click migration of existing VM workloads. Instant mobility of your applications across cloud and on-prem environments. Continuous mobility is possible. You can migrate from on-prem to cloud, across clouds, and back. You can embrace the cloud in your own way. Application mobility is essential for business continuity. This requires a multi-cloud approach. Don't waste time on lengthy and costly VM migration projects. Instashift allows you to automate in a single click. There is no need to use complicated approaches. You can migrate your VMs with all applications, databases, states. Continuous mobility for your instashifted apps. In a few clicks, you can move to the cloud or back on-prem. You need to move thousands of VMs. Instashift provides an automated solution that works seamlessly. A new innovation platform for emerging and sovereign cloud providers that delivers the same capabilities and flexibility as the public cloud.
  • Previous
  • You're on page 1
  • Next