What Integrates with VMware Tanzu?

Find out what VMware Tanzu integrations exist in 2025. Learn what software and services currently integrate with VMware Tanzu, and sort them by reviews, cost, features, and more. Below is a list of products that VMware Tanzu currently integrates with:

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    55,697 Ratings
    See Software
    Learn More
    Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
  • 2
    New Relic Reviews
    Top Pick
    See Software
    Learn More
    Around 25 million engineers work across dozens of distinct functions. Engineers are using New Relic as every company is becoming a software company to gather real-time insight and trending data on the performance of their software. This allows them to be more resilient and provide exceptional customer experiences. New Relic is the only platform that offers an all-in one solution. New Relic offers customers a secure cloud for all metrics and events, powerful full-stack analytics tools, and simple, transparent pricing based on usage. New Relic also has curated the largest open source ecosystem in the industry, making it simple for engineers to get started using observability.
  • 3
    Microsoft Azure Reviews
    Top Pick
    Microsoft Azure serves as a versatile cloud computing platform that facilitates swift and secure development, testing, and management of applications. With Azure, you can innovate purposefully, transforming your concepts into actionable solutions through access to over 100 services that enable you to build, deploy, and manage applications in various environments—be it in the cloud, on-premises, or at the edge—utilizing your preferred tools and frameworks. The continuous advancements from Microsoft empower your current development needs while also aligning with your future product aspirations. Committed to open-source principles and accommodating all programming languages and frameworks, Azure allows you the freedom to build in your desired manner and deploy wherever it suits you best. Whether you're operating on-premises, in the cloud, or at the edge, Azure is ready to adapt to your current setup. Additionally, it offers services tailored for hybrid cloud environments, enabling seamless integration and management. Security is a foundational aspect, reinforced by a team of experts and proactive compliance measures that are trusted by enterprises, governments, and startups alike. Ultimately, Azure represents a reliable cloud solution, backed by impressive performance metrics that validate its trustworthiness. This platform not only meets your needs today but also equips you for the evolving challenges of tomorrow.
  • 4
    Amazon Web Services (AWS) Reviews
    Top Pick
    If you're in need of computing power, database solutions, content distribution, or various other functionalities, AWS offers a wide array of services designed to assist you in developing advanced applications with enhanced flexibility, scalability, and reliability. Amazon Web Services (AWS) stands as the most extensive and widely utilized cloud platform globally, boasting over 175 fully functional services spread across data centers worldwide. A diverse range of customers, from rapidly expanding startups to major corporations and prominent government bodies, are leveraging AWS to reduce expenses, enhance agility, and accelerate innovation. AWS provides a larger selection of services, along with more features within those services, compared to any other cloud provider—covering everything from fundamental infrastructure technologies like computing, storage, and databases to cutting-edge innovations such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things. This breadth of offerings facilitates a quicker, simpler, and more cost-effective transition of your current applications to the cloud, ensuring that you can stay ahead in a competitive landscape while taking advantage of the latest technological advancements.
  • 5
    Cloudian Reviews

    Cloudian

    Cloudian

    Pricing as low as 1/2 ¢ per gi
    1 Rating
    Cloudian®, S3-compatible object storage and file storage, solves your capacity and cost problems. Cloud-compatible and exabyte-scalable, Cloudian software defined storage and appliances make it easy to deliver storage to one site or across multiple sites. Get actionable insight. Cloudian HyperIQTM provides real-time infrastructure monitoring as well as user behavior analytics. To verify compliance and monitor service levels, track user data access. With configurable, real time alerts, you can spot infrastructure problems before they become serious. HyperIQ can be customized to fit your environment with over 100 data panels. Cloudian Object Lock is a hardened solution to data immutability. HyperStore®, which is secured at the system level by HyperStore Shell (HSH), and RootDisable, makes it impregnable.
  • 6
    Veeam Kasten for Kubernetes Reviews
    Trusted by the world’s largest organizations, Veeam Kasten delivers secure, Kubernetes-native data protection and application mobility for the most complete set of distributions and platforms at enterprise scale. We give operations and application teams the confidence to withstand the unexpected and deliver faster, all without complex scripting, unsupported tools, and legacy solutions.
  • 7
    OpenLegacy Reviews

    OpenLegacy

    OpenLegacy

    $12K/monthly
    OpenLegacy’s Digital-Driven Integration software enables organizations with legacy systems to release new digital services faster and easier than ever before. It connects directly to virtually any core system, instantly generating digital services on the cloud. OpenLegacy helps industry-leading companies drastically reduce costs and resources while helping them become digital to the core. The OpenLegacy HUB is an all-in-one enterprise digital and cloud modernization platform, without disruption.
  • 8
    CloudCasa Reviews

    CloudCasa

    CloudCasa by Catalogic

    $19 per node per month
    You can immediately benefit from a powerful, yet simple to use Kubernetes backup service and cloud database backup service. It will backup your multi-cloud, multicluster, applications, and provide granular and cluster-level recovery, including cross-account and cross-cluster recovery. CloudCasa makes backup management easy for even developers. It offers a generous free service plan, with no credit card required. It is a great alternative for Velero. CloudCasa can be used as a SaaS solution. This means that you don't need to set up backup infrastructure, manage complex backup installations, or worry about security. You can set it and forget about it, so you won't have to worry about it. We automate and take care of all the hard work, including checking your security posture.
  • 9
    StormForge Reviews
    StormForge drives immediate benefits for organization through its continuous Kubernetes workload rightsizing capabilities — leading to cost savings of 40-60% along with performance and reliability improvements across the entire estate. As a vertical rightsizing solution, Optimize Live is autonomous, tunable, and works seamlessly with the HPA at enterprise scale. Optimize Live addresses both over- and under-provisioned workloads by analyzing usage data with advanced ML algorithms to recommend optimal resource requests and limits. Recommendations can be deployed automatically on a flexible schedule, accounting for changes in traffic patterns or application resource requirements, ensuring that workloads are always right-sized, and freeing developers from the toil and cognitive load of infrastructure sizing.
  • 10
    Kubecost Reviews

    Kubecost

    Kubecost

    $199 per month
    Kubecost offers immediate visibility and insights into costs for teams utilizing Kubernetes, enabling ongoing reductions in cloud expenses. You can analyze costs associated with various Kubernetes elements, such as deployments, services, and namespace labels. Monitor expenses from multiple clusters in one consolidated view or through a unified API endpoint. Additionally, link Kubernetes expenditures with any external cloud services or infrastructure costs to gain a holistic understanding of your spending. Costs from external sources can be allocated to specific Kubernetes components, providing a thorough overview of financial outlays. Receive actionable suggestions for cost savings that do not compromise performance, allowing you to refine infrastructure or application modifications for enhanced resource efficiency and reliability. With real-time alerts, you can swiftly identify potential cost overruns and risks of infrastructure failures before they escalate into larger issues. Maintain seamless engineering workflows by integrating Kubecost with collaboration tools like PagerDuty and Slack, ensuring that your teams stay informed and responsive. Ultimately, this comprehensive approach empowers organizations to optimize their Kubernetes spending effectively.
  • 11
    Calico Cloud Reviews

    Calico Cloud

    Tigera

    $0.05 per node hour
    A pay-as-you-go security and observability software-as-a-service (SaaS) solution designed for containers, Kubernetes, and cloud environments provides users with a real-time overview of service dependencies and interactions across multi-cluster, hybrid, and multi-cloud setups. This platform streamlines the onboarding process and allows for quick resolution of Kubernetes security and observability challenges within mere minutes. Calico Cloud represents a state-of-the-art SaaS offering that empowers organizations of various sizes to secure their cloud workloads and containers, identify potential threats, maintain ongoing compliance, and address service issues in real-time across diverse deployments. Built upon Calico Open Source, which is recognized as the leading container networking and security framework, Calico Cloud allows teams to leverage a managed service model instead of managing a complex platform, enhancing their capacity for rapid analysis and informed decision-making. Moreover, this innovative platform is tailored to adapt to evolving security needs, ensuring that users are always equipped with the latest tools and insights to safeguard their cloud infrastructure effectively.
  • 12
    Sedai Reviews

    Sedai

    Sedai

    $10 per month
    Sedai intelligently finds resources, analyzes traffic patterns and learns metric performance. This allows you to manage your production environments continuously without any manual thresholds or human intervention. Sedai's Discovery engine uses an agentless approach to automatically identify everything in your production environments. It intelligently prioritizes your monitoring information. All your cloud accounts are on the same platform. All of your cloud resources can be viewed in one place. Connect your APM tools. Sedai will identify and select the most important metrics. Machine learning intelligently sets thresholds. Sedai is able to see all the changes in your environment. You can view updates and changes and control how the platform manages resources. Sedai's Decision engine makes use of ML to analyze and comprehend data at large scale to simplify the chaos.
  • 13
    MayaData Reviews

    MayaData

    MayaData

    $100 per node per month
    Using OpenEBS in conjunction with Kubera is the optimal solution for storage needs in Kubernetes environments. OpenEBS stands out as the leading open source storage option for Kubernetes, recognized for its speed and efficiency. Kubera enhances OpenEBS Mayastor by providing a user-friendly graphical interface, along with APIs, automatic checks, configuration options, Active Directory authentication, built-in performance benchmarks, and additional operators to streamline upgrades and various other scenarios. Available at no cost, Kubera is offered by MayaData, which also provides round-the-clock support to help customers minimize operational expenses and simplify management. Kubera Propel, a cloud-native declarative data plane crafted in Rust, is built upon the foundational OpenEBS Mayastor technology. This innovative platform integrates cutting-edge technologies such as NVMe, SPDK, and new storage capabilities emerging within the Linux kernel. Independent benchmarks have demonstrated that OpenEBS, when governed by Kubera Propel, achieves remarkably low latency performance for databases and various workloads on Kubernetes, making it an excellent choice for developers and organizations alike. This combination not only enhances performance but also addresses the increasing demand for efficient and reliable storage solutions in modern computing environments.
  • 14
    NetScaler Reviews

    NetScaler

    Cloud Software Group

    Managing application delivery at scale can be challenging, but NetScaler simplifies the process. Whether you are firmly on-premises, fully in the cloud, or operating in a hybrid environment, NetScaler provides consistent functionality across all platforms. Its architecture is built on a single code base, ensuring that regardless of whether you opt for hardware, virtual machines, bare metal, or containers, the performance remains uniform. No matter if your audience consists of hundreds of millions of consumers or hundreds of thousands of employees, NetScaler guarantees reliable and secure application delivery. Renowned as the preferred application delivery and security solution for the largest enterprises globally, NetScaler is trusted by thousands of organizations, including over 90 percent of the Fortune 500, to deliver high-performance application services, robust application and API security, and comprehensive visibility across all operations. This widespread trust underscores NetScaler's vital role in today's digital landscape.
  • 15
    Seeker Reviews
    Seeker® is an advanced interactive application security testing (IAST) tool that offers exceptional insights into the security status of your web applications. It detects trends in vulnerabilities relative to compliance benchmarks such as OWASP Top 10, PCI DSS, GDPR, CAPEC, and CWE/SANS Top 25. Moreover, Seeker allows security teams to monitor sensitive information, ensuring it is adequately protected and not inadvertently recorded in logs or databases without the necessary encryption. Its smooth integration with DevOps CI/CD workflows facilitates ongoing application security assessments and validations. Unlike many other IAST tools, Seeker not only uncovers security weaknesses but also confirms their potential for exploitation, equipping developers with a prioritized list of verified issues that need attention. Utilizing its patented techniques, Seeker efficiently processes a vast number of HTTP(S) requests, nearly eliminating false positives and fostering increased productivity while reducing business risks. In essence, Seeker stands out as a comprehensive solution that not only identifies but also mitigates security threats effectively.
  • 16
    Ozone Reviews
    Ozone platform allows enterprises to quickly and securely ship modern applications. Ozone eliminates the need to manage too many DevOps tools, making it easy to deploy applications on Kubernetes. Integrate all your existing DevOps tools to automate your application delivery process. Automated pipeline workflows make deployments faster and allow for on-demand infrastructure management. Enforce compliance policies and governance for app deployments at scale to prevent business losses. One pane of glass, where engineering, DevOps, and security teams can collaborate on app releases in realtime.
  • 17
    CyberArk Cloud Entitlements Manager Reviews
    Implement a cloud least privilege strategy that minimizes disruption to your business operations. Safeguard your organization from internal and external threats, allowing you to prioritize what truly matters. Efficiently enforce cloud least privilege practices without hindering productivity. Identify and rectify excessive cloud permissions to eliminate uncertainty. Across platforms like AWS, Azure, and GCP, automatically detect and eliminate unnecessary permissions. Protect your cloud environment while strengthening your business resilience. Embrace innovative services with confidence as you securely grow your cloud footprint. Utilize a unified dashboard to gain cloud-agnostic visibility and manage access permissions across AWS, AWS Elastic Kubernetes Service, Azure, and GCP. Execute precise, code-level IAM policy recommendations for both human and machine identities without disrupting existing operations. Actively mitigate risks and track your progress through dynamic exposure level scores that are quantifiable for all identities and platforms. By adopting these measures, you can ensure a secure cloud environment that supports your business growth effectively.
  • 18
    Argon Reviews
    Introducing a comprehensive security solution designed to safeguard the integrity of your software at every phase of the DevOps CI/CD pipeline. With this solution, you can monitor all events and actions within your software supply chain with exceptional transparency, enabling quicker decision-making with actionable insights. Enhance your security measures by implementing best practices consistently across the software delivery lifecycle, benefitting from real-time alerts and automated remediation processes. Maintain the integrity of your source code through automated validity checks for each release, ensuring that the code you commit is exactly what gets deployed. Furthermore, Argon provides ongoing monitoring of your DevOps infrastructure, effectively detecting security vulnerabilities, code leaks, misconfigurations, and unusual activities, while also delivering valuable insights regarding the security posture of your CI/CD pipeline. By utilizing this solution, you not only protect your software but also streamline your development processes for greater efficiency and reliability.
  • 19
    Rafay Reviews
    Empower both developers and operations teams with the self-service capabilities and automation they crave, while maintaining an optimal balance of standardization and governance that the organization necessitates. Manage and define configurations centrally using Git for clusters that include security policies and software enhancements like service mesh, ingress controllers, monitoring, logging, and backup and recovery solutions. The management of blueprints and the lifecycle of add-ons can be seamlessly implemented for both new and existing clusters from a central point. Additionally, blueprints can be shared among various teams, ensuring centralized oversight of the add-ons utilized throughout the organization. In dynamic environments that demand rapid development cycles, users can transition from a Git push to an updated application on managed clusters in mere seconds, achieving this over 100 times daily. This approach is especially advantageous for development settings where changes are made with high frequency, thus fostering a more agile workflow. By streamlining these processes, organizations can significantly enhance their operational efficiency and responsiveness.
  • 20
    Cribl AppScope Reviews
    AppScope introduces a revolutionary method for black-box instrumentation, providing comprehensive and consistent telemetry from any Linux executable simply by adding scope before the command. When you engage with customers who utilize Application Performance Management, they often express their satisfaction with the solution but lament the limited extension to additional applications. Typically, only a small fraction—10% or less—of their applications are equipped with APM, while they rely on basic metrics for the remainder. This raises the question: what happens to the other 80%? This is where AppScope comes into play. It eliminates the need for language-specific instrumentation and does not require input from application developers. As a language-agnostic tool that operates entirely in userland, AppScope can be utilized with any application and seamlessly scales from command-line interfaces to production environments. Users can channel AppScope data into any pre-existing monitoring tool, time-series database, or logging solution. Furthermore, AppScope empowers Site Reliability Engineers and Operations teams to closely analyze live applications, providing insights into their functionality and performance across various deployment environments, whether on-premises, in the cloud, or within containerized systems. This capability not only enhances monitoring but also fosters a deeper understanding of application behavior, paving the way for improved performance management.
  • 21
    ThreatStryker Reviews
    Runtime threat assessment, runtime attack analysis, and targeted protection of your infrastructure and applications. Zero-day attacks can be stopped by staying ahead of attackers. Observe attack behavior. ThreatStryker monitors, correlates, learns, and acts to protect your applications. Deepfence ThreatStryker displays a live, interactive, color-coded view on the topology and all processes and containers running. It inspects hosts and containers to find vulnerable components. It also interrogates configuration to identify file system, processes, and network-related misconfigurations. ThreatStryker uses industry and community standards to assess compliance. ThreatStryker conducts a deep inspection of network traffic, system behavior, and application behavior and accumulates suspicious events over time. The events are classified and correlated with known vulnerabilities and suspicious patterns.
  • 22
    ThreatMapper Reviews
    Open source, multi-cloud platform to scan, map, and rank vulnerabilities in containers, images hosts, repositories, and running containers. ThreatMapper detects threats to your applications in production across clouds, Kubernetes and serverless. You cannot secure what you can't see. ThreatMapper automatically discovers your production infrastructure. It can identify and interrogate cloud instances, Kubernetes nodes and serverless resources. This allows you to discover the applications and containers, and map their topology in real time. ThreatMapper allows you to visualize and discover the external and internal attack surfaces for your applications and infrastructure. Bad actors can gain access to your infrastructure by exploiting vulnerabilities in common dependencies. ThreatMapper scans hosts and containers for known vulnerable dependencies. It also takes threat feeds from more than 50 sources.
  • Previous
  • You're on page 1
  • Next