Listing Thumbnail

    Secured Harbor

     Info
    Sold by: Pi Cloud 
    Harbor is an open source trusted cloud native registry project that stores, signs, and scans content.

    Overview

    Harbor is an open source registry that secures artifacts with policies and role-based access control, ensures images are scanned and free from vulnerabilities, and signs images as trusted. Harbor, a CNCF Graduated project, delivers compliance, performance, and interoperability to help you consistently and securely manage artifacts across cloud native compute platforms like Kubernetes and Docker.

    Highlights

    • Security and vulnerability analysis

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Secured Harbor

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (1)

     Info
    Dimension
    Description
    Cost/GB
    apiharbor
    This is to measure data usage in GB
    $1.00

    Vendor refund policy

    Thanks for purchasing our products operated by PiCloud. In order to be eligible for a refund, you have to get back within 30 calendar days of your purchase. After we receive your request, our team of professionals will inspect it and process your refund. The money will be refunded to the original payment method you've used during the purchase. For credit card payments it may take 5 to 10 business days for a refund to show up on your credit card statement.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Users can always reach the support email for any queries or concerns at admin@datawizai.net 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    100
    In Log Analysis
    Top
    10
    In Application Stacks, Infrastructure as Code, Application Development
    Top
    100
    In Collaboration & Productivity, Application Development

    Overview

     Info
    AI generated from product descriptions
    Container Registry Security
    Provides policy-based access control and role-based security mechanisms for container artifacts
    Vulnerability Scanning
    Automatically scans container images to detect and identify potential security vulnerabilities
    Image Signing
    Enables cryptographic signing of container images to ensure artifact integrity and trustworthiness
    Cloud Native Compatibility
    Supports integration with Kubernetes and Docker container orchestration platforms
    Artifact Management
    Offers centralized storage and management of container images and related artifacts across cloud environments
    Container Orchestration
    Enables building, sharing, and running containerized applications across local and cloud resources
    Security Management
    Provides fine-grained role-based access control (RBAC), secure access tokens, and centralized security settings management
    Vulnerability Detection
    Continuously analyzes container images for vulnerabilities throughout development lifecycle with actionable remediation guidance
    Image Access Control
    Implements granular permissions for managing container registries and image access through administrative tools
    Cloud-Native Development
    Supports enterprise-grade cloud-native development with integrated tools for workflow optimization and secure software supply chain
    Vulnerability Reduction
    Automatically removes up to 95% of Common Vulnerabilities and Exposures (CVEs) without requiring code modifications
    Software Supply Chain Security
    Generates high-quality Software Bill of Materials (SBOMs) in multiple standard formats including JSON, SPDX, and Cyclone DX
    Continuous Security Hardening
    Provides daily patched and hardened images for operating systems, frameworks, and applications with near-zero vulnerability status
    CI/CD Integration
    Supports seamless integration with multiple popular continuous integration and container deployment platforms through API calls
    Compliance Automation
    Enables compliance with security standards including FedRAMP, DSS, and PCI through automated vulnerability management and remediation

    Contract

     Info
    Standard contract
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.