Audience

Cloud security platform for IT teams

About Fugue

The Fugue Platform empowers teams with the tools to build, deploy and maintain cloud security at every stage of the development lifecycle. We're so confident that you'll get immediate value with Fugue that we guarantee it. Fugue leverages the open source Open Policy Agent (OPA) standard for IaC and cloud infrastructure policy as code. Build IaC checks into git workflows and CI/CD pipelines with Regula—an open-source tool powered by OPA. Develop custom rules—including multi-resource checks—using Rego, the simple and powerful open source language of OPA. Govern your IaC security for cloud resources, Kubernetes, and containers in one place and ensure consistent policy enforcement across the development lifecycle. View the results of security and compliance checks on IaC across your organization. Access and export tenant-wide, IaC-specific security and compliance reports.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Fugue
United States
www.fugue.co

Videos and Screen Captures

Fugue Screenshot 1
Other Useful Business Software
Gemini 3 and 200+ AI Models on One Platform Icon
Gemini 3 and 200+ AI Models on One Platform

Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

Build generative AI apps with Vertex AI. Switch between models without switching platforms.
Start Free

Product Details

Platforms Supported
Cloud
Training
Documentation
Webinars
Videos
Support
Phone Support
Online

Fugue Frequently Asked Questions

Q: What kinds of users and organization types does Fugue work with?
Q: What languages does Fugue support in their product?
Q: What kind of support options does Fugue offer?
Q: What other applications or services does Fugue integrate with?
Q: What type of training does Fugue provide?

Fugue Product Features

Cloud Security

Intrusion Detection System
Endpoint Management
Threat Intelligence
Application Security
Encryption
Behavioral Analytics
Antivirus
Vulnerability Management
Incident Management
Two-Factor Authentication

Fugue Additional Categories