List of Kong Konnect Integrations
This is a list of platforms and tools that integrate with Kong Konnect. This list is updated as of April 2025.
-
1
Docker
Docker
Streamline development with portable, reliable containerized applications.Docker simplifies complex configuration tasks and is employed throughout the entire software development lifecycle, enabling rapid, straightforward, and portable application development on desktop and cloud environments. This comprehensive platform offers various features, including user interfaces, command-line utilities, application programming interfaces, and integrated security, which all work harmoniously to enhance the application delivery process. You can kickstart your programming projects by leveraging Docker images to create unique applications compatible with both Windows and Mac operating systems. With the capabilities of Docker Compose, constructing multi-container applications becomes a breeze. In addition, Docker seamlessly integrates with familiar tools in your development toolkit, such as Visual Studio Code, CircleCI, and GitHub, enhancing your workflow. You can easily package your applications into portable container images, guaranteeing consistent performance across diverse environments, whether on on-premises Kubernetes or cloud services like AWS ECS, Azure ACI, or Google GKE. Furthermore, Docker provides access to a rich repository of trusted assets, including official images and those from verified vendors, ensuring that your application development is both reliable and high-quality. Its adaptability and integration capabilities position Docker as an essential tool for developers striving to boost their productivity and streamline their processes, making it indispensable in modern software development. This ensures that developers can focus more on innovation and less on configuration management. -
2
Kubernetes
Kubernetes
Effortlessly manage and scale applications in any environment.Kubernetes, often abbreviated as K8s, is an influential open-source framework aimed at automating the deployment, scaling, and management of containerized applications. By grouping containers into manageable units, it streamlines the tasks associated with application management and discovery. With over 15 years of expertise gained from managing production workloads at Google, Kubernetes integrates the best practices and innovative concepts from the broader community. It is built on the same core principles that allow Google to proficiently handle billions of containers on a weekly basis, facilitating scaling without a corresponding rise in the need for operational staff. Whether you're working on local development or running a large enterprise, Kubernetes is adaptable to various requirements, ensuring dependable and smooth application delivery no matter the complexity involved. Additionally, as an open-source solution, Kubernetes provides the freedom to utilize on-premises, hybrid, or public cloud environments, making it easier to migrate workloads to the most appropriate infrastructure. This level of adaptability not only boosts operational efficiency but also equips organizations to respond rapidly to evolving demands within their environments. As a result, Kubernetes stands out as a vital tool for modern application management, enabling businesses to thrive in a fast-paced digital landscape. -
3
Red Hat OpenShift
Red Hat
Accelerate innovation with seamless, secure hybrid cloud solutions.Kubernetes lays a strong groundwork for innovative concepts, allowing developers to accelerate their project delivery through a top-tier hybrid cloud and enterprise container platform. Red Hat OpenShift enhances this experience by automating installations, updates, and providing extensive lifecycle management for the entire container environment, which includes the operating system, Kubernetes, cluster services, and applications across various cloud platforms. As a result, teams can work with increased speed, adaptability, reliability, and a multitude of options available to them. By enabling coding in production mode at the developer's preferred location, it encourages a return to impactful work. With a focus on security integrated throughout the container framework and application lifecycle, Red Hat OpenShift delivers strong, long-term enterprise support from a key player in the Kubernetes and open-source arena. It is equipped to manage even the most intensive workloads, such as AI/ML, Java, data analytics, and databases, among others. Additionally, it facilitates deployment and lifecycle management through a diverse range of technology partners, ensuring that operational requirements are effortlessly met. This blend of capabilities cultivates a setting where innovation can flourish without any constraints, empowering teams to push the boundaries of what is possible. In such an environment, the potential for groundbreaking advancements becomes limitless. -
4
Envoy is transforming the landscape of hybrid workplaces by facilitating safe connections and collaborations among individuals. With its innovative workplace platform, Envoy has redefined the visitor experience, enhanced employee safety, streamlined the booking of conference rooms and desks, and optimized delivery management across over 14,000 locations globally. The Envoy Visitors feature accommodates more than 100,000 sign-ins daily, prioritizing the security of individuals, property, ideas, and personal data. Meanwhile, Envoy Protect is dedicated to ensuring employee well-being by effectively organizing their schedules prior to their arrival at the office. Additionally, Envoy Desks allows employees to secure a workspace for any day they choose to be in the office, fostering teamwork with their peers. Envoy Rooms simplifies the process of reserving meeting spaces, ensuring efficient use of office real estate, while Envoy Deliveries guarantees that packages are successfully delivered to their intended recipients without causing congestion in mailrooms. This comprehensive approach by Envoy not only enhances operational efficiency but also enriches the overall workplace experience for everyone involved.
-
5
Cequence Security
Cequence Security
Revolutionize API security with advanced, adaptive, and intelligent solutions.Enhance the security of your APIs by conducting thorough analyses and safeguarding them through passive, inline, or API-driven integration with various network elements, including API gateways, proxies, or CDNs. Utilizing predefined policies that have been meticulously adjusted according to prevalent threat patterns, which have effectively safeguarded billions of API transactions daily, ensures unparalleled defense. A robust API-centric architecture paired with a comprehensive user interface facilitates seamless integration with threat intelligence feeds and additional security measures. Moreover, a patented machine learning-based analysis method mitigates the drawbacks of JavaScript integration, such as slow page loading times, prolonged development cycles, and the necessity for mobile app updates. This ML-driven approach creates a distinctive Behavioral Footprint that helps in recognizing harmful intentions while consistently monitoring attackers as they adapt their strategies, reinforcing the overall security framework. With these advanced technologies at your disposal, organizations can significantly bolster their API security posture against evolving threats. -
6
Istio
Istio
Effortlessly manage, secure, and optimize your services today.Implement, protect, oversee, and track your services with ease. Istio's advanced traffic management features allow you to control the flow of traffic and API exchanges between various services effortlessly. In addition, Istio makes it easier to configure service-level parameters like circuit breakers, timeouts, and retries, which are vital for executing processes such as A/B testing, canary releases, and staged rollouts by distributing traffic according to specified percentages. The platform is equipped with built-in recovery features that boost your application's resilience against failures from dependent services or network challenges. To tackle security concerns, Istio provides a comprehensive solution that safeguards your services in diverse environments, as detailed in this guide, which shows how to utilize Istio's security measures effectively. Specifically, Istio's security framework addresses both internal and external threats to your data, endpoints, communication channels, and overall platform integrity. Moreover, Istio consistently generates detailed telemetry data for all service interactions within a mesh, which enhances monitoring and offers valuable insights. This extensive telemetry is essential for ensuring high service performance and robust security, making Istio an indispensable tool for modern service management. By implementing Istio, you are not only reinforcing the security of your services but also improving their overall operational efficiency. -
7
OpenLegacy
OpenLegacy
Transform outdated systems into seamless digital innovation effortlessly.OpenLegacy’s integration software, powered by digital innovation, allows businesses with outdated systems to swiftly and seamlessly introduce new digital services like never before. It interfaces directly with nearly any core system, rapidly creating cloud-based digital services. OpenLegacy assists top-tier companies in significantly minimizing expenses and resource usage, facilitating their transformation into fully digital entities. Additionally, the OpenLegacy HUB serves as a comprehensive platform for enterprise digital and cloud modernization, ensuring a smooth transition without interruptions. This holistic approach empowers organizations to effectively navigate the complexities of digital transformation. -
8
Traceable
Traceable
Empower your API security with comprehensive protection and insights.Introducing the leading API security platform that understands the context of the industry. Traceable detects all your APIs, assesses their risk levels, prevents API-related attacks that can result in data breaches, and offers analytics for both threat detection and investigative purposes. By utilizing our platform, you can efficiently identify, oversee, and protect every aspect of your APIs, while also enabling rapid deployment and seamless scalability to adapt to your organization's evolving requirements. This comprehensive approach ensures that your API security remains robust in the face of emerging threats. -
9
Insomnia
Kong
Elevate your API design with collaboration and efficiency.Develop, troubleshoot, and assess APIs with a personal touch instead of an automated one. Finally, a workflow that you'll truly value. Presenting the Collaborative API Design Tool, a platform designed for crafting, validating, and managing OpenAPI specifications. This desktop client supports interactions with both REST and GraphQL, allowing you to effortlessly send requests and review responses. You can easily generate and organize your requests, configure environment variables, handle authentication, create code snippets, and much more. Delve into the details of responses—analyze the complete request timeline, encompassing status codes, body content, headers, cookies, and additional insights. Structure your project with workspaces, folders, and environments while utilizing a user-friendly drag-and-drop interface for requests, accompanied by simple data import and export functionalities. Within a unified collaborative API design editor, you can create, edit, lint, troubleshoot, preview, and oversee your OpenAPI specifications. Moreover, generate configurations for well-known API gateways like the Kong API Gateway and Kong for Kubernetes. Seamlessly synchronize your API designs with version control platforms such as GitHub or GitLab, and deploy straight to API gateways like Kong with a single click, greatly enhancing your development workflow. This tool not only boosts efficiency but also encourages teamwork among members in designing effective APIs, ultimately leading to a more innovative development environment. -
10
Approov
Approov
Secure your mobile ecosystem, protect data, inspire trust.Incorporating APIs to serve a swiftly expanding mobile customer base significantly boosts your business's value; however, it also brings forth new challenges due to a rising number of mobile security threats. To mitigate these risks, it is essential that only authorized mobile applications, which function in secure environments and employ encrypted communication channels, are permitted access to your APIs and backend services, thereby thwarting potential botnets, fraudulent actions, harmful scripts, and fake applications from breaching your system. The mobile technology boom has transformed the banking and financial transaction landscape, creating a pressing need for innovative and easily deployable security strategies due to the unprecedented surge in mobile usage. As mobile healthcare applications become increasingly common, it is critical to protect personal health information by securing both the applications and their corresponding APIs. Moreover, the fast-paced changes in how we manage our transportation choices highlight the necessity of safeguarding these mobile interactions to uphold user trust and safety. In this context, organizations must adopt a vigilant and proactive stance toward mobile security, continually adapting to the evolving landscape of threats and opportunities. Ultimately, staying ahead of these challenges not only protects sensitive information but also fosters customer loyalty and confidence in your brand. -
11
Resurface
Resurface Labs
"Elevate your API security with real-time threat detection."Resurface serves as a specialized tool for runtime API security, enabling continuous scanning that facilitates immediate detection and response to potential threats and vulnerabilities. Designed specifically for API data, it captures every request and response payload, including those from GraphQL, allowing users to quickly identify possible risks and failures. With its real-time alert system, Resurface notifies users about data breaches, providing zero-day detection capabilities. Additionally, it aligns with the OWASP Top 10, offering alerts on various threats while employing comprehensive security patterns. As a self-hosted solution, it ensures that all data remains first-party and secure. Unique in its capabilities, Resurface can conduct extensive inspections at scale, efficiently detecting active attacks as it processes millions of API calls. Leveraging advanced machine learning models, it identifies unusual patterns and recognizes low-and-slow attack strategies, enhancing overall API security measures. This combination of features makes Resurface a crucial tool for any organization serious about safeguarding their APIs and mitigating risks. -
12
Kong Mesh
Kong
Effortless multi-cloud service mesh for enhanced enterprise performance.Kuma delivers an enterprise service mesh that operates effortlessly across various clouds and clusters, whether utilizing Kubernetes or virtual machines. Users can deploy the service mesh with a single command, automatically connecting to other services through its integrated service discovery capabilities, which encompass Ingress resources and remote control planes. This adaptable solution can function across any environment, efficiently overseeing resources in multi-cluster, multi-cloud, and multi-platform scenarios. By utilizing native mesh policies, businesses can strengthen their zero-trust and GDPR compliance efforts, resulting in improved performance and productivity for application teams. The architecture supports the deployment of a single control plane that can scale horizontally to accommodate multiple data planes or various clusters, including hybrid service meshes that incorporate both Kubernetes and virtual machines. Additionally, cross-zone communication is facilitated by Envoy-based ingress deployments across both environments, along with a built-in DNS resolver for optimal service-to-service interactions. Powered by the robust Envoy framework, Kuma provides over 50 observability charts right out of the box, allowing for the collection of metrics, traces, and logs for all Layer 4 to Layer 7 traffic, thereby offering comprehensive insights into service performance and health. This enhanced observability not only aids in troubleshooting but also contributes to a more resilient and dependable service architecture, ensuring organizations can maintain high operational standards. Overall, Kuma’s innovative approach positions it as a leading solution for enterprises seeking to enhance their service management in complex environments. -
13
Akto
Akto
Rapid API security solution for seamless vulnerability assessment.Akto is a rapid, open-source API security platform that enables users to set up in just one minute. Security teams utilize Akto to keep an ongoing inventory of APIs, assess them for vulnerabilities, and identify issues during runtime. The platform includes tests for all categories from the OWASP Top 10 and HackerOne Top 10, such as Broken Object Level Authorization (BOLA), authentication flaws, Server-Side Request Forgery (SSRF), Cross-Site Scripting (XSS), and various security configurations. With its robust testing engine, Akto conducts a range of business logic tests by analyzing traffic data to discern API usage patterns, effectively minimizing false positives. Additionally, Akto supports integration with a variety of traffic sources, including Burpsuite, AWS, Postman, GCP, and various gateways, enhancing its usability across different environments. This adaptability makes Akto a valuable tool for ensuring the security of APIs in diverse operational settings. -
14
One APIMarketplace
DigitalAPICraft
Empower developers with seamless API access and collaboration.Transform your API experience by leveraging our comprehensive, enterprise-level One APIMarketplace, designed to streamline consumption, promote collaboration, and enhance the overall developer experience. This innovative platform addresses challenges associated with API sprawl and reduces complexities by operationalizing APIs, making them easily discoverable, consumable, and accessible for teamwork. By facilitating a quicker time to market, One APIMarketplace significantly enhances API adoption through improved accessibility, detailed performance metrics, and heightened consumption rates. Empower developers with comprehensive documentation, community engagement, essential resources, SDKs, and sandbox environments to accelerate the adoption process even further. One APIMarketplace not only simplifies the process of discovering and using APIs but also ensures a smooth experience for both developers and enterprises alike. With thorough documentation and the option to test APIs in a sandbox environment before full integration, users can advance their projects with confidence. Moreover, our powerful analytics dashboard delivers crucial insights into API utilization, performance metrics, and user engagement, enabling strategic decision-making. This holistic approach ensures that your API initiatives are not only efficient but positioned for success in a dynamic digital landscape. -
15
Steadybit
Steadybit
Simplifying chaos engineering for reliable, secure, and efficient experimentation.Our experiment editor simplifies the journey to achieving reliability, making the process faster and more intuitive, with all essential tools easily accessible and allowing total control over your experiments. Every feature is crafted to help you attain your goals while implementing chaos engineering securely at scale within your organization. You can seamlessly add new targets, attacks, and checks through the extensions offered by Steadybit. The user-friendly discovery and selection mechanism enhances the experience of choosing targets. By reducing barriers, you can foster better teamwork across departments, while also allowing for easy export and import of experiments in JSON or YAML formats. The comprehensive view provided by Steadybit’s landscape illustrates the dependencies of your software and the interconnections among various components, giving you a solid foundation for launching your chaos engineering initiatives. Furthermore, the powerful query language enables you to classify your systems into diverse environments based on consistent data applicable throughout your infrastructure, while also allowing specific environments to be assigned to selected users and teams to minimize the risk of accidental disruption. This meticulous strategy guarantees that your chaos engineering practice remains not only effective but also secure and methodically organized, ultimately leading to improved resilience in your systems. Additionally, with these capabilities, your organization can adapt more swiftly to changes and challenges in the digital landscape. -
16
Wallarm API Security Platform
Wallarm
Automated defense for web applications, APIs, and microservices.Wallarm delivers automated, real-time defense for web applications, microservices, and APIs through its sophisticated WAF, API protection, automated incident management, and asset discovery features. This solution successfully shields digital assets from the OWASP Top 10 vulnerabilities, bot threats, and misuse of applications without the need for manual rule configurations, all while achieving an impressively low false positive rate. The platform is crafted for easy deployment across leading cloud services such as AWS, GCP, and Azure, as well as within hybrid cloud infrastructures. Furthermore, it is natively compatible with Kubernetes and service mesh frameworks, enhancing its adaptability in various environments. Wallarm also incorporates dynamic rules to mitigate account takeover (ATO) and credential stuffing risks, making it an ideal option for DevSecOps teams focused on secure cloud-native application development. Additionally, Wallarm’s API security features are designed to integrate smoothly with top API gateway solutions, facilitating straightforward installation regardless of a company's existing setup. Importantly, the extensive functionalities offered by Wallarm guarantee that security is integrated into the development process right from the outset, thereby reinforcing the overall integrity of applications. -
17
Spherical Defense
Spherical Defense
Effortless API protection with adaptive, real-time learning.Spherical Defense offers a cutting-edge API security solution that utilizes advanced deep unsupervised learning methods to protect your APIs efficiently. The Express version of Spherical Defense is tailored for AWS deployment and can be set up in under a minute, initiating its defense mechanisms within a two-hour timeframe at a cost-effective rate of just $1 per hour. Once your Spherical instance is operational, it immediately begins to analyze API traffic and continues this process until it accumulates sufficient data for its initial model training. After processing roughly 16,000 requests, the system enters a training phase, refining its security model over a span of approximately six hours, followed by a thorough evaluation. As the system consistently receives incoming data, it remains agile, training additional models to adapt to evolving API traffic patterns. This continual process of training and adjustment ensures that the solution maintains robust protection, rendering it a versatile and proactive safeguard for your APIs. Ultimately, following the assessment of the trained security model, the system enhances its capability to combat future threats with greater efficacy. This adaptability not only fortifies security but also builds trust in the integrity of your API operations. -
18
Casbin
Casbin
Unlock seamless, flexible authorization for diverse applications today!Casbin is a powerful open-source library tailored for authorization, facilitating the use of various access control models like Access Control Lists (ACL), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). This library supports a multitude of programming languages such as Golang, Java, C/C++, Node.js, JavaScript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter), and Elixir, allowing developers to benefit from a consistent API experience across multiple platforms. By employing the PERM metamodel, Casbin empowers developers to create access control models through configuration files, simplifying the process of modifying or upgrading authorization systems with ease. Furthermore, it offers a range of policy storage options that are compatible with various databases, including MySQL, PostgreSQL, Oracle, MongoDB, Redis, and AWS S3, catering to a wide array of storage preferences. In addition, Casbin features a role manager that adeptly handles RBAC role hierarchies and supports filtered policy management, thereby improving access enforcement efficiency. Consequently, developers find it straightforward to customize Casbin to meet their unique project needs while upholding strong security standards. This flexibility and ease of integration further solidify Casbin's reputation as a go-to solution for managing authorization effectively across diverse applications. -
19
AWS Marketplace
Amazon
Discover, purchase, and manage software seamlessly within AWS.The AWS Marketplace acts as a meticulously organized online venue where users can discover, purchase, implement, and manage third-party software, data products, and services smoothly within the AWS framework. It showcases a wide selection of offerings across multiple categories, such as security, machine learning, enterprise applications, and DevOps solutions. By providing an array of pricing models, including pay-as-you-go options, annual subscriptions, and free trial opportunities, AWS Marketplace simplifies the purchasing and billing processes by merging expenses into a single AWS invoice. Additionally, it promotes rapid deployment through pre-configured software that can be easily activated within AWS infrastructure. This streamlined approach not only accelerates innovation and reduces time-to-market for organizations but also gives them more control over software usage and related expenditures. Consequently, businesses are able to allocate more resources towards strategic objectives rather than getting bogged down by operational challenges, ultimately leading to more efficient resource management and improved overall performance. -
20
Kong AI Gateway
Kong Inc.
Seamlessly integrate, secure, and optimize your AI interactions.Kong AI Gateway acts as an advanced semantic AI gateway that controls and protects traffic originating from Large Language Models (LLMs), allowing for swift integration of Generative AI (GenAI) via innovative semantic AI plugins. This platform enables users to integrate, secure, and monitor popular LLMs seamlessly, while also improving AI interactions with features such as semantic caching and strong security measures. Moreover, it incorporates advanced prompt engineering strategies to uphold compliance and governance standards. Developers find it easy to adapt their existing AI applications using a single line of code, which greatly simplifies the transition process. In addition, Kong AI Gateway offers no-code AI integrations, allowing users to easily modify and enhance API responses through straightforward declarative configurations. By implementing sophisticated prompt security protocols, the platform defines acceptable behaviors and helps craft optimized prompts with AI templates that align with OpenAI's interface. This powerful suite of features firmly establishes Kong AI Gateway as a vital resource for organizations aiming to fully leverage the capabilities of AI technology. With its user-friendly approach and robust functionalities, it stands out as an essential solution in the evolving landscape of artificial intelligence. -
21
VMware Cloud
Broadcom
Transform your cloud experience with unified, efficient solutions.Create, implement, manage, connect, and protect all your applications in any cloud setting. VMware's Multi-Cloud solutions offer a comprehensive cloud operating framework designed for diverse application types. Accelerate your digital transformation with the most dependable and widely embraced cloud infrastructure available today. Leverage the same expertise you use in your on-premises data center while tapping into a broad network that includes six leading hyperscale public cloud providers and over 4,000 VMware Cloud Provider Partners. By adopting a hybrid cloud strategy through VMware Cloud Foundation, you can maintain consistent infrastructure and operations for both legacy and new cloud-native applications, from your data center to the cloud, and even to the edge. This consistency not only enhances agility but also reduces complexity, costs, and risks. You have the ability to build, operate, and oversee modern applications across various cloud environments, meeting diverse needs with resources sourced from both on-premises and public cloud infrastructures. Additionally, you can effortlessly manage both containerized and traditional VM-based workloads on a single, unified platform, ensuring both efficiency and flexibility while preparing for future cloud expansion. This integrated approach positions you to adapt to evolving technology landscapes effectively. -
22
Imvision
Imvision
Empower your API security with advanced anomaly detection solutions.Organizations adopt comprehensive strategies to protect their APIs throughout all phases of their lifecycle, ensuring their security no matter where they are deployed. Attaining a thorough level of visibility is vital, as it provides insights into the essential business logic that governs these APIs. By performing in-depth analyses of complete API payload data, companies can pinpoint endpoints, observe usage patterns, understand anticipated workflows, and detect any risks of sensitive data exposure. Imvision amplifies this effort by identifying concealed vulnerabilities that exceed standard protocols, effectively preventing functional attacks and encouraging proactive defense against emerging threats. Furthermore, the integration of Natural Language Processing (NLP) guarantees high precision in detection across extensive datasets, simultaneously offering transparent insights into the results. This innovative technology is particularly skilled at identifying 'Meaningful Anomalies' by treating API data as a language, thus uncovering the functionalities of APIs through AI that models complex data relationships. It is also proficient at detecting behavioral trends that may seek to disrupt API logic on a large scale, enabling organizations to recognize anomalies more quickly and in greater alignment with their strategic goals. Ultimately, harnessing these cutting-edge techniques empowers enterprises to remain proactive against potential intruders while effectively protecting their essential API frameworks, leading to improved resilience in a rapidly evolving digital landscape. -
23
Theom
Theom
Revolutionize your data security with unparalleled cloud protection.Theom is a cutting-edge solution for cloud data security that aims to discover and protect various forms of data stored in cloud environments, APIs, and messaging systems. Acting like a dedicated bodyguard for vital information, Theom guarantees that security protocols are uniformly enforced across all data, regardless of how or where it is accessed. By employing agentless scanning techniques alongside natural language processing classifiers, Theom proficiently detects personally identifiable information (PII), protected health information (PHI), financial records, and trade secrets, while also supporting tailored taxonomies for specific needs. Moreover, it uncovers dark data—unused information that often goes unnoticed—and shadow data, which possesses a different security posture than its original counterpart. Theom demonstrates exceptional capability in pinpointing sensitive items, such as developer keys, within APIs and message queues. In order to help organizations prioritize potential threats, it evaluates the financial implications associated with their data. Additionally, Theom intricately maps the relationships among datasets, access identities, and their security attributes, thereby exposing possible vulnerabilities that may exist. By visualizing how critical data is accessed by various identities, including users and roles, Theom offers a detailed understanding of security characteristics, such as user locations and abnormal access behaviors. This comprehensive and strategic approach not only enhances data protection but also empowers organizations to make well-informed choices about their overall data security frameworks. Ultimately, Theom serves as an indispensable tool for navigating the complexities of cloud data security.
- Previous
- You're on page 1
- Next