What Integrates with VMware Tanzu?
Find out what VMware Tanzu integrations exist in 2025. Learn what software and services currently integrate with VMware Tanzu, and sort them by reviews, cost, features, and more. Below is a list of products that VMware Tanzu currently integrates with:
-
1
Google Cloud Platform
Google
Free ($300 in free credits) 55,297 RatingsGoogle Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging. -
2
New Relic
New Relic
Free 2,507 RatingsAround 25 million engineers work across dozens of distinct functions. Engineers are using New Relic as every company is becoming a software company to gather real-time insight and trending data on the performance of their software. This allows them to be more resilient and provide exceptional customer experiences. New Relic is the only platform that offers an all-in one solution. New Relic offers customers a secure cloud for all metrics and events, powerful full-stack analytics tools, and simple, transparent pricing based on usage. New Relic also has curated the largest open source ecosystem in the industry, making it simple for engineers to get started using observability. -
3
Cloudian®, S3-compatible object storage and file storage, solves your capacity and cost problems. Cloud-compatible and exabyte-scalable, Cloudian software defined storage and appliances make it easy to deliver storage to one site or across multiple sites. Get actionable insight. Cloudian HyperIQTM provides real-time infrastructure monitoring as well as user behavior analytics. To verify compliance and monitor service levels, track user data access. With configurable, real time alerts, you can spot infrastructure problems before they become serious. HyperIQ can be customized to fit your environment with over 100 data panels. Cloudian Object Lock is a hardened solution to data immutability. HyperStore®, which is secured at the system level by HyperStore Shell (HSH), and RootDisable, makes it impregnable.
-
4
Veeam Kasten
Veeam
1 RatingBackup and restore applications to protect data. Your business must meet regulatory and corporate mandates. Load balancing, upgrades and load balancing can be done between cloud and on-premises. Veeam Kasten is a system that was specifically designed for Kubernetes. It provides enterprise operations teams with an easy-to use, scalable and secure backup/restore solution, disaster recovery and mobility of Kubernetes apps. Discovers Kubernetes apps and their dependencies automatically and seamlessly. Dynamic policies provide complete protection for rapidly changing applications. Manage stateful applications is made easy with an intuitive dashboard, Kubernetes native and REST APIs and CLI support. Deep integration with Kubernetes, databases and cloud infrastructure. Storage, CSI, authentication, OIDC, OAuth etc. Monitoring, logging and auditing. -
5
AWS offers a wide range of services, including database storage, compute power, content delivery, and other functionality. This allows you to build complex applications with greater flexibility, scalability, and reliability. Amazon Web Services (AWS), the world's largest and most widely used cloud platform, offers over 175 fully featured services from more than 150 data centers worldwide. AWS is used by millions of customers, including the fastest-growing startups, large enterprises, and top government agencies, to reduce costs, be more agile, and innovate faster. AWS offers more services and features than any other cloud provider, including infrastructure technologies such as storage and databases, and emerging technologies such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things. It is now easier, cheaper, and faster to move your existing apps to the cloud.
-
6
Microsoft Azure
Microsoft
21 RatingsMicrosoft Azure is a cloud computing platform that allows you to quickly develop, test and manage applications. Azure. Invent with purpose. With more than 100 services, you can turn ideas into solutions. Microsoft continues to innovate to support your development today and your product visions tomorrow. Open source and support for all languages, frameworks and languages allow you to build what you want and deploy wherever you want. We can meet you at the edge, on-premises, or in the cloud. Services for hybrid cloud enable you to integrate and manage your environments. Secure your environment from the ground up with proactive compliance and support from experts. This is a trusted service for startups, governments, and enterprises. With the numbers to prove it, the cloud you can trust. -
7
OpenLegacy
OpenLegacy
$12K/monthly OpenLegacy’s Digital-Driven Integration software enables organizations with legacy systems to release new digital services faster and easier than ever before. It connects directly to virtually any core system, instantly generating digital services on the cloud. OpenLegacy helps industry-leading companies drastically reduce costs and resources while helping them become digital to the core. The OpenLegacy HUB is an all-in-one enterprise digital and cloud modernization platform, without disruption. -
8
CloudCasa
CloudCasa by Catalogic
$19 per node per monthYou can immediately benefit from a powerful, yet simple to use Kubernetes backup service and cloud database backup service. It will backup your multi-cloud, multicluster, applications, and provide granular and cluster-level recovery, including cross-account and cross-cluster recovery. CloudCasa makes backup management easy for even developers. It offers a generous free service plan, with no credit card required. It is a great alternative for Velero. CloudCasa can be used as a SaaS solution. This means that you don't need to set up backup infrastructure, manage complex backup installations, or worry about security. You can set it and forget about it, so you won't have to worry about it. We automate and take care of all the hard work, including checking your security posture. -
9
Calico Cloud
Tigera
$0.05 per node hourSecure and observability SaaS platform that charges per-use for containers, Kubernetes and the cloud. Live view of dependencies and how services communicate with each other in multi-cluster, hybrid, and multi-cloud environments. You can eliminate the setup and onboarding steps, and you can troubleshoot any Kubernetes security or observability issues in minutes. Calico Cloud is a next generation security and observability SaaS platform that supports containers, Kubernetes and cloud. It allows organizations of all sizes and budgets to protect their cloud workloads, containers, detect threats, maintain compliance, and troubleshoot issues in real time across multi-cluster, hybrid, and multi-cloud deployments. Calico Cloud is built upon Calico Open Source, which is the most widely used container networking and security solution. Instead of managing a platform that provides Kubernetes security or observability, teams can use it as a managed service to speed up analysis, relevant actions, and so on. -
10
Sedai
Sedai
$10 per monthSedai intelligently finds resources, analyzes traffic patterns and learns metric performance. This allows you to manage your production environments continuously without any manual thresholds or human intervention. Sedai's Discovery engine uses an agentless approach to automatically identify everything in your production environments. It intelligently prioritizes your monitoring information. All your cloud accounts are on the same platform. All of your cloud resources can be viewed in one place. Connect your APM tools. Sedai will identify and select the most important metrics. Machine learning intelligently sets thresholds. Sedai is able to see all the changes in your environment. You can view updates and changes and control how the platform manages resources. Sedai's Decision engine makes use of ML to analyze and comprehend data at large scale to simplify the chaos. -
11
Kubecost
Kubecost
$199 per monthKubecost gives you real-time cloud cost visibility and insight for Kubernetes teams. This will help you to reduce your cloud costs. You can see the breakdown of costs for any Kubernetes concept, including deployment, service and namespace label. You can view costs across multiple clusters from one view or via an API endpoint. To get a complete picture, join Kubernetes infrastructure costs and any external cloud services costs. For a complete view of spend, external costs can be shared and then attributed any Kubernetes idea. Get dynamic recommendations to reduce spend without sacrificing performance. Prioritize application or infrastructure changes to improve resource efficiency and reliability. Real-time notifications allow you to quickly spot infrastructure outages and cost overruns before they become a problem. Integrating with tools such as PagerDuty or Slack will preserve engineering workflows. -
12
Seeker
Black Duck
Seeker® is an interactive application security testing (IAST) solution that delivers deep visibility into the security posture of web applications. It identifies and analyzes vulnerabilities against industry standards such as OWASP Top 10, PCI DSS, GDPR, CAPEC, and CWE/SANS Top 25, ensuring compliance and robust protection. Seeker tracks sensitive data usage, verifying it is handled securely and not stored improperly in logs or databases without encryption. Seamlessly integrating into DevOps CI/CD workflows, it enables continuous security testing without disrupting development processes. Unlike traditional IAST solutions, Seeker not only identifies vulnerabilities but also verifies their exploitability, providing developers with a prioritized list of actionable issues. By leveraging patented methods, it processes large volumes of HTTP(S) requests with precision, reducing false positives to near zero. Additionally, Seeker enhances team collaboration with detailed reporting and remediation guidance, ensuring security is addressed effectively across the software development lifecycle. -
13
MayaData
MayaData
$100 per node per monthOpenEBS is the solution. OpenEBS is the most used open source storage solution for Kubernetes. It's also the fastest. Kubera provides an easy-to-use GUI for OpenEBS Mayastor, as well as APIs, configuration and active directory authentication, performance benchmarking, and additional operators to assist with upgrades and other uses. Kubera is free and available from MayaData. MayaData provides 24/7 support to customers to help reduce operational costs and complexity. Kubera Propel, a cloud-native declarative information plane written in Rust, is called Kubera Propel. It is based on the open-source OpenEBS Mayastor. Kubera Propel incorporates breakthrough technologies such as NVMe and SPDK with new storage features in Linux kernel. Independent benchmarks have shown that OpenEBS managed through Kubera Propel delivers extremely low latency performance in data bases and other workloads using Kubernetes. -
14
Ozone
Ozone
Ozone platform allows enterprises to quickly and securely ship modern applications. Ozone eliminates the need to manage too many DevOps tools, making it easy to deploy applications on Kubernetes. Integrate all your existing DevOps tools to automate your application delivery process. Automated pipeline workflows make deployments faster and allow for on-demand infrastructure management. Enforce compliance policies and governance for app deployments at scale to prevent business losses. One pane of glass, where engineering, DevOps, and security teams can collaborate on app releases in realtime. -
15
CyberArk Cloud Entitlements Manager
CyberArk
Cloud least privilege can be established with minimal impact on your company. Protect your business from external and internal threats and allow you to focus on the important things. Cloud least privilege can be applied quickly and easily without affecting productivity. To reduce uncertainty, detect and correct excessive cloud permissions. You can automatically remove excessive cloud permissions from AWS, Azure, and GCP. Protect your cloud environment and your company. Securely expand your cloud presence by confidently adopting advanced services. A centralized dashboard provides cloud-agnostic insight to monitor and control permissions across AWS, AWS Elastic Kubernetes Service Azure, GCP, and Azure. You can apply code-level IAM policies for machine and human identities to your operations without affecting ongoing operations. You can reduce risk and track progress by using dynamic, quantifiable exposure levels scores for all identities. -
16
NetScaler
Cloud Software Group
It can be difficult to deliver applications at scale. NetScaler simplifies the process. On-premise is the way to go. Cloud is the future. Hybrid is good. NetScaler will work the same on any platform. NetScaler uses a software-based architectural design, which means that it will behave the same regardless of the ADC form factor. NetScaler can help you deliver applications to hundreds or millions of users, whether they are consumers, employees, or both. NetScaler has become the platform of choice by the world's biggest companies for application delivery and security. NetScaler is used by thousands of organizations around the world, including more than 90 percent Fortune 500 companies, for high-performance app delivery, comprehensive API and application security, and end to end observability. -
17
Cribl AppScope
Cribl
AppScope, a new approach in black-box instrumentation, delivers ubiquitous, unified Telemetry from any Linux executable. It does this by simply prepending scope on the command. Any customer who uses Application Performance Management will tell you how much they love the solution but wish they could expand it to more applications. Most customers have only 10% of their apps set up for APM and supplement what they can with basic metrics. What about the remaining 80%? Enter AppScope. No language-specific instrumentation. No application developers required. AppScope works with all applications, from the CLI to production. It is language-independent and completely usable. AppScope data can be sent to any existing monitoring tool or time series database. AppScope allows Ops teams and SREs to query running applications in order to determine how they behave in any deployment context. This includes on-prem, cloud, containers and cloud. -
18
ThreatStryker
Deepfence
Runtime threat assessment, runtime attack analysis, and targeted protection of your infrastructure and applications. Zero-day attacks can be stopped by staying ahead of attackers. Observe attack behavior. ThreatStryker monitors, correlates, learns, and acts to protect your applications. Deepfence ThreatStryker displays a live, interactive, color-coded view on the topology and all processes and containers running. It inspects hosts and containers to find vulnerable components. It also interrogates configuration to identify file system, processes, and network-related misconfigurations. ThreatStryker uses industry and community standards to assess compliance. ThreatStryker conducts a deep inspection of network traffic, system behavior, and application behavior and accumulates suspicious events over time. The events are classified and correlated with known vulnerabilities and suspicious patterns. -
19
ThreatMapper
Deepfence
Open source, multi-cloud platform to scan, map, and rank vulnerabilities in containers, images hosts, repositories, and running containers. ThreatMapper detects threats to your applications in production across clouds, Kubernetes and serverless. You cannot secure what you can't see. ThreatMapper automatically discovers your production infrastructure. It can identify and interrogate cloud instances, Kubernetes nodes and serverless resources. This allows you to discover the applications and containers, and map their topology in real time. ThreatMapper allows you to visualize and discover the external and internal attack surfaces for your applications and infrastructure. Bad actors can gain access to your infrastructure by exploiting vulnerabilities in common dependencies. ThreatMapper scans hosts and containers for known vulnerable dependencies. It also takes threat feeds from more than 50 sources. -
20
Argon
ArgonSec
The first unified security solution that protects the integrity of your software across the entire DevOps CICD pipeline. You can track all events and actions in your software supply chain with unprecedented clarity. Get actionable information faster and make better decisions. You can improve your security posture by enforcing security best practice at every stage of the software delivery process. This includes real-time alerts, auto-remediation, and ensuring that you have access to all relevant information. Automated validity checks ensure that source code integrity is maintained for each release. This will allow you to be certain that the source code you have committed has been deployed. Argon continuously monitors your DevOps infrastructure for security risks, code leaks and misconfigurations. It also provides insights into the state of your CI CD pipeline. -
21
Rafay
Rafay
Developers and operations teams will be delighted by the self-service and automation that they require. This is achieved with the right combination of standardization, control, and control that the business demands. Centrally manage configurations (in Git), for clusters that include security policy and software addons like service mesh, ingress controllers and monitoring. Blueprints and addon lifecycle management are easily applied to both brownfield and greenfield clusters. Blueprints can be shared among multiple teams to facilitate central governance of add-ons distributed across the fleet. Users can move from a Git push to an updated app on managed clusters in just seconds, 100+ times per day, for environments that require agile development cycles. This is especially useful for environments that require frequent updates.
- Previous
- You're on page 1
- Next