What Integrates with VMware Tanzu?
Find out what VMware Tanzu integrations exist in 2025. Learn what software and services currently integrate with VMware Tanzu, and sort them by reviews, cost, features, and more. Below is a list of products that VMware Tanzu currently integrates with:
-
1
Google Cloud Platform
Google
Free ($300 in free credits) 55,297 RatingsGoogle Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging. -
2
New Relic
New Relic
Free 2,522 RatingsAround 25 million engineers work across dozens of distinct functions. Engineers are using New Relic as every company is becoming a software company to gather real-time insight and trending data on the performance of their software. This allows them to be more resilient and provide exceptional customer experiences. New Relic is the only platform that offers an all-in one solution. New Relic offers customers a secure cloud for all metrics and events, powerful full-stack analytics tools, and simple, transparent pricing based on usage. New Relic also has curated the largest open source ecosystem in the industry, making it simple for engineers to get started using observability. -
3
Cloudian®, S3-compatible object storage and file storage, solves your capacity and cost problems. Cloud-compatible and exabyte-scalable, Cloudian software defined storage and appliances make it easy to deliver storage to one site or across multiple sites. Get actionable insight. Cloudian HyperIQTM provides real-time infrastructure monitoring as well as user behavior analytics. To verify compliance and monitor service levels, track user data access. With configurable, real time alerts, you can spot infrastructure problems before they become serious. HyperIQ can be customized to fit your environment with over 100 data panels. Cloudian Object Lock is a hardened solution to data immutability. HyperStore®, which is secured at the system level by HyperStore Shell (HSH), and RootDisable, makes it impregnable.
-
4
Trusted by the world’s largest organizations, Veeam Kasten delivers secure, Kubernetes-native data protection and application mobility for the most complete set of distributions and platforms at enterprise scale. We give operations and application teams the confidence to withstand the unexpected and deliver faster, all without complex scripting, unsupported tools, and legacy solutions.
-
5
If you need computing resources, data storage, content delivery, or various other capabilities, AWS provides the tools necessary to create advanced applications with enhanced flexibility, scalability, and dependability. Amazon Web Services (AWS) stands as the most extensive and widely utilized cloud platform worldwide, boasting more than 175 fully functional services across data centers around the globe. A diverse range of clients, including rapidly growing startups, large corporations, and prominent government bodies, leverage AWS to reduce expenses, enhance agility, and accelerate innovation. With a broader array of services and features compared to any other cloud provider—spanning from basic infrastructure like compute, storage, and databases to cutting-edge technologies such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things—AWS simplifies and streamlines the process of migrating your current applications to the cloud. This extensive offering ensures that businesses can take full advantage of cloud capabilities, ultimately leading to optimized operations and increased competitiveness in their respective markets.
-
6
Microsoft Azure
Microsoft
21 RatingsMicrosoft Azure is a cloud computing platform that allows you to quickly develop, test and manage applications. Azure. Invent with purpose. With more than 100 services, you can turn ideas into solutions. Microsoft continues to innovate to support your development today and your product visions tomorrow. Open source and support for all languages, frameworks and languages allow you to build what you want and deploy wherever you want. We can meet you at the edge, on-premises, or in the cloud. Services for hybrid cloud enable you to integrate and manage your environments. Secure your environment from the ground up with proactive compliance and support from experts. This is a trusted service for startups, governments, and enterprises. With the numbers to prove it, the cloud you can trust. -
7
OpenLegacy
OpenLegacy
$12K/monthly OpenLegacy’s Digital-Driven Integration software enables organizations with legacy systems to release new digital services faster and easier than ever before. It connects directly to virtually any core system, instantly generating digital services on the cloud. OpenLegacy helps industry-leading companies drastically reduce costs and resources while helping them become digital to the core. The OpenLegacy HUB is an all-in-one enterprise digital and cloud modernization platform, without disruption. -
8
CloudCasa
CloudCasa by Catalogic
$19 per node per monthYou can immediately benefit from a powerful, yet simple to use Kubernetes backup service and cloud database backup service. It will backup your multi-cloud, multicluster, applications, and provide granular and cluster-level recovery, including cross-account and cross-cluster recovery. CloudCasa makes backup management easy for even developers. It offers a generous free service plan, with no credit card required. It is a great alternative for Velero. CloudCasa can be used as a SaaS solution. This means that you don't need to set up backup infrastructure, manage complex backup installations, or worry about security. You can set it and forget about it, so you won't have to worry about it. We automate and take care of all the hard work, including checking your security posture. -
9
StormForge
StormForge
FreeStormForge drives immediate benefits for organization through its continuous Kubernetes workload rightsizing capabilities — leading to cost savings of 40-60% along with performance and reliability improvements across the entire estate. As a vertical rightsizing solution, Optimize Live is autonomous, tunable, and works seamlessly with the HPA at enterprise scale. Optimize Live addresses both over- and under-provisioned workloads by analyzing usage data with advanced ML algorithms to recommend optimal resource requests and limits. Recommendations can be deployed automatically on a flexible schedule, accounting for changes in traffic patterns or application resource requirements, ensuring that workloads are always right-sized, and freeing developers from the toil and cognitive load of infrastructure sizing. -
10
Calico Cloud
Tigera
$0.05 per node hourA pay-as-you-go security and observability software-as-a-service (SaaS) solution designed for containers, Kubernetes, and cloud environments provides users with a real-time overview of service dependencies and interactions across multi-cluster, hybrid, and multi-cloud setups. This platform streamlines the onboarding process and allows for quick resolution of Kubernetes security and observability challenges within mere minutes. Calico Cloud represents a state-of-the-art SaaS offering that empowers organizations of various sizes to secure their cloud workloads and containers, identify potential threats, maintain ongoing compliance, and address service issues in real-time across diverse deployments. Built upon Calico Open Source, which is recognized as the leading container networking and security framework, Calico Cloud allows teams to leverage a managed service model instead of managing a complex platform, enhancing their capacity for rapid analysis and informed decision-making. Moreover, this innovative platform is tailored to adapt to evolving security needs, ensuring that users are always equipped with the latest tools and insights to safeguard their cloud infrastructure effectively. -
11
Sedai
Sedai
$10 per monthSedai intelligently finds resources, analyzes traffic patterns and learns metric performance. This allows you to manage your production environments continuously without any manual thresholds or human intervention. Sedai's Discovery engine uses an agentless approach to automatically identify everything in your production environments. It intelligently prioritizes your monitoring information. All your cloud accounts are on the same platform. All of your cloud resources can be viewed in one place. Connect your APM tools. Sedai will identify and select the most important metrics. Machine learning intelligently sets thresholds. Sedai is able to see all the changes in your environment. You can view updates and changes and control how the platform manages resources. Sedai's Decision engine makes use of ML to analyze and comprehend data at large scale to simplify the chaos. -
12
Kubecost
Kubecost
$199 per monthKubecost gives you real-time cloud cost visibility and insight for Kubernetes teams. This will help you to reduce your cloud costs. You can see the breakdown of costs for any Kubernetes concept, including deployment, service and namespace label. You can view costs across multiple clusters from one view or via an API endpoint. To get a complete picture, join Kubernetes infrastructure costs and any external cloud services costs. For a complete view of spend, external costs can be shared and then attributed any Kubernetes idea. Get dynamic recommendations to reduce spend without sacrificing performance. Prioritize application or infrastructure changes to improve resource efficiency and reliability. Real-time notifications allow you to quickly spot infrastructure outages and cost overruns before they become a problem. Integrating with tools such as PagerDuty or Slack will preserve engineering workflows. -
13
Seeker
Black Duck
Seeker® is an advanced interactive application security testing (IAST) tool that offers exceptional insights into the security status of your web applications. It detects trends in vulnerabilities relative to compliance benchmarks such as OWASP Top 10, PCI DSS, GDPR, CAPEC, and CWE/SANS Top 25. Moreover, Seeker allows security teams to monitor sensitive information, ensuring it is adequately protected and not inadvertently recorded in logs or databases without the necessary encryption. Its smooth integration with DevOps CI/CD workflows facilitates ongoing application security assessments and validations. Unlike many other IAST tools, Seeker not only uncovers security weaknesses but also confirms their potential for exploitation, equipping developers with a prioritized list of verified issues that need attention. Utilizing its patented techniques, Seeker efficiently processes a vast number of HTTP(S) requests, nearly eliminating false positives and fostering increased productivity while reducing business risks. In essence, Seeker stands out as a comprehensive solution that not only identifies but also mitigates security threats effectively. -
14
MayaData
MayaData
$100 per node per monthOpenEBS is the solution. OpenEBS is the most used open source storage solution for Kubernetes. It's also the fastest. Kubera provides an easy-to-use GUI for OpenEBS Mayastor, as well as APIs, configuration and active directory authentication, performance benchmarking, and additional operators to assist with upgrades and other uses. Kubera is free and available from MayaData. MayaData provides 24/7 support to customers to help reduce operational costs and complexity. Kubera Propel, a cloud-native declarative information plane written in Rust, is called Kubera Propel. It is based on the open-source OpenEBS Mayastor. Kubera Propel incorporates breakthrough technologies such as NVMe and SPDK with new storage features in Linux kernel. Independent benchmarks have shown that OpenEBS managed through Kubera Propel delivers extremely low latency performance in data bases and other workloads using Kubernetes. -
15
Ozone
Ozone
Ozone platform allows enterprises to quickly and securely ship modern applications. Ozone eliminates the need to manage too many DevOps tools, making it easy to deploy applications on Kubernetes. Integrate all your existing DevOps tools to automate your application delivery process. Automated pipeline workflows make deployments faster and allow for on-demand infrastructure management. Enforce compliance policies and governance for app deployments at scale to prevent business losses. One pane of glass, where engineering, DevOps, and security teams can collaborate on app releases in realtime. -
16
CyberArk Cloud Entitlements Manager
CyberArk
Cloud least privilege can be established with minimal impact on your company. Protect your business from external and internal threats and allow you to focus on the important things. Cloud least privilege can be applied quickly and easily without affecting productivity. To reduce uncertainty, detect and correct excessive cloud permissions. You can automatically remove excessive cloud permissions from AWS, Azure, and GCP. Protect your cloud environment and your company. Securely expand your cloud presence by confidently adopting advanced services. A centralized dashboard provides cloud-agnostic insight to monitor and control permissions across AWS, AWS Elastic Kubernetes Service Azure, GCP, and Azure. You can apply code-level IAM policies for machine and human identities to your operations without affecting ongoing operations. You can reduce risk and track progress by using dynamic, quantifiable exposure levels scores for all identities. -
17
NetScaler
Cloud Software Group
It can be difficult to deliver applications at scale. NetScaler simplifies the process. On-premise is the way to go. Cloud is the future. Hybrid is good. NetScaler will work the same on any platform. NetScaler uses a software-based architectural design, which means that it will behave the same regardless of the ADC form factor. NetScaler can help you deliver applications to hundreds or millions of users, whether they are consumers, employees, or both. NetScaler has become the platform of choice by the world's biggest companies for application delivery and security. NetScaler is used by thousands of organizations around the world, including more than 90 percent Fortune 500 companies, for high-performance app delivery, comprehensive API and application security, and end to end observability. -
18
Cribl AppScope
Cribl
AppScope, a new approach in black-box instrumentation, delivers ubiquitous, unified Telemetry from any Linux executable. It does this by simply prepending scope on the command. Any customer who uses Application Performance Management will tell you how much they love the solution but wish they could expand it to more applications. Most customers have only 10% of their apps set up for APM and supplement what they can with basic metrics. What about the remaining 80%? Enter AppScope. No language-specific instrumentation. No application developers required. AppScope works with all applications, from the CLI to production. It is language-independent and completely usable. AppScope data can be sent to any existing monitoring tool or time series database. AppScope allows Ops teams and SREs to query running applications in order to determine how they behave in any deployment context. This includes on-prem, cloud, containers and cloud. -
19
ThreatStryker
Deepfence
Runtime threat assessment, runtime attack analysis, and targeted protection of your infrastructure and applications. Zero-day attacks can be stopped by staying ahead of attackers. Observe attack behavior. ThreatStryker monitors, correlates, learns, and acts to protect your applications. Deepfence ThreatStryker displays a live, interactive, color-coded view on the topology and all processes and containers running. It inspects hosts and containers to find vulnerable components. It also interrogates configuration to identify file system, processes, and network-related misconfigurations. ThreatStryker uses industry and community standards to assess compliance. ThreatStryker conducts a deep inspection of network traffic, system behavior, and application behavior and accumulates suspicious events over time. The events are classified and correlated with known vulnerabilities and suspicious patterns. -
20
ThreatMapper
Deepfence
Open source, multi-cloud platform to scan, map, and rank vulnerabilities in containers, images hosts, repositories, and running containers. ThreatMapper detects threats to your applications in production across clouds, Kubernetes and serverless. You cannot secure what you can't see. ThreatMapper automatically discovers your production infrastructure. It can identify and interrogate cloud instances, Kubernetes nodes and serverless resources. This allows you to discover the applications and containers, and map their topology in real time. ThreatMapper allows you to visualize and discover the external and internal attack surfaces for your applications and infrastructure. Bad actors can gain access to your infrastructure by exploiting vulnerabilities in common dependencies. ThreatMapper scans hosts and containers for known vulnerable dependencies. It also takes threat feeds from more than 50 sources. -
21
Argon
ArgonSec
Introducing a comprehensive security solution designed to safeguard the integrity of your software throughout the entire DevOps CI/CD pipeline. Gain exceptional visibility into all events and actions within your software supply chain, allowing you to obtain actionable insights and make timely decisions. Strengthen your security framework by implementing best practices at every phase of the software delivery process, complete with real-time alerts and automated remediation features. Maintain the integrity of your source code through automated validity checks conducted on each release, ensuring that the code you have committed aligns with what is ultimately deployed. Argon offers continuous monitoring of your DevOps environment to detect security vulnerabilities, code leaks, misconfigurations, and anomalies, while also delivering valuable insights regarding the overall security posture of your CI/CD pipeline. This proactive approach significantly enhances your ability to respond to potential threats before they escalate. -
22
Rafay
Rafay
Developers and operations teams will be delighted by the self-service and automation that they require. This is achieved with the right combination of standardization, control, and control that the business demands. Centrally manage configurations (in Git), for clusters that include security policy and software addons like service mesh, ingress controllers and monitoring. Blueprints and addon lifecycle management are easily applied to both brownfield and greenfield clusters. Blueprints can be shared among multiple teams to facilitate central governance of add-ons distributed across the fleet. Users can move from a Git push to an updated app on managed clusters in just seconds, 100+ times per day, for environments that require agile development cycles. This is especially useful for environments that require frequent updates.
- Previous
- You're on page 1
- Next