Software Alternatives & Reviews
Register   |   Login

Cilium

API-aware Networking and Security

Cilium Alternatives

The best Cilium alternatives based on verified products, votes, reviews and other factors.
Latest update: | + Suggest alternative

  1. A high performance free open source web server powering busiest sites on the Internet.

  2. Data Center Networking

  3. Data Center Networking

  4. Alert your users when they're getting hacked

  5. Application Centric Infrastructure (ACI) simplifies, optimizes, and accelerates the application deployment lifecycle in next-generation data centers and clouds.

  6. A SoundCloud player that lives in your menubar.

  7. Monitors routers, switches, firewalls, load-balancers, wireless LAN controllers, servers, VMs, printers, storage devices, and everything that has an IP and is connected to the network.

  8. Arista Networks was founded to pioneer and deliver software-driven cloud networking solutions for large data center storage and computing environments. Arista’s award-winning platforms, ranging in Ethernet speeds from 10 to 100 gigabits per second,

  9. Weaveworks provides a simple and consistent way to connect and manage containers and microservices.

  10. Extreme Networks (EXTR) delivers customer-driven enterprise networking solutions that create stronger connections with customers, partners, and employees.

  11. AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards web applications running on AWS. 

  12. pfSense is a free and open source firewall and router that also features unified threat management, load balancing, multi WAN, and more

  13. Jscrambler is a JavaScript protection solution that makes apps self-defensive, resilient against tampering, malware injection, & code theft.

Cilium Reviews

There are no reviews of Cilium yet.
Be the first one to post

Was this Cilium alternatives list helpful? Your feedback is important!

2 out of 2 people consider this article as helpful.
This is equivalent to 5.0 / 5 rating.

This article was published on | Author: | Publisher: SaaSHub
Categories: Monitoring Tools, Identity And Access Management, Log Management