23 Integrations with Kong Konnect
View a list of Kong Konnect integrations and software that integrates with Kong Konnect below. Compare the best Kong Konnect integrations as well as features, ratings, user reviews, and pricing of software that integrates with Kong Konnect. Here are the current Kong Konnect integrations in 2026:
-
1
Docker
Docker
Docker takes away repetitive, mundane configuration tasks and is used throughout the development lifecycle for fast, easy and portable application development, desktop and cloud. Docker’s comprehensive end-to-end platform includes UIs, CLIs, APIs and security that are engineered to work together across the entire application delivery lifecycle. Get a head start on your coding by leveraging Docker images to efficiently develop your own unique applications on Windows and Mac. Create your multi-container application using Docker Compose. Integrate with your favorite tools throughout your development pipeline, Docker works with all development tools you use including VS Code, CircleCI and GitHub. Package applications as portable container images to run in any environment consistently from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE and more. Leverage Docker Trusted Content, including Docker Official Images and images from Docker Verified Publishers.Starting Price: $7 per month -
2
Kubernetes
Kubernetes
Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community. Designed on the same principles that allows Google to run billions of containers a week, Kubernetes can scale without increasing your ops team. Whether testing locally or running a global enterprise, Kubernetes flexibility grows with you to deliver your applications consistently and easily no matter how complex your need is. Kubernetes is open source giving you the freedom to take advantage of on-premises, hybrid, or public cloud infrastructure, letting you effortlessly move workloads to where it matters to you.Starting Price: Free -
3
Red Hat OpenShift
Red Hat
The Kubernetes platform for big ideas. Empower developers to innovate and ship faster with the leading hybrid cloud, enterprise container platform. Red Hat OpenShift offers automated installation, upgrades, and lifecycle management throughout the container stack—the operating system, Kubernetes and cluster services, and applications—on any cloud. Red Hat OpenShift helps teams build with speed, agility, confidence, and choice. Code in production mode anywhere you choose to build. Get back to doing work that matters. Red Hat OpenShift is focused on security at every level of the container stack and throughout the application lifecycle. It includes long-term, enterprise support from one of the leading Kubernetes contributors and open source software companies. Support the most demanding workloads including AI/ML, Java, data analytics, databases, and more. Automate deployment and life-cycle management with our vast ecosystem of technology partners.Starting Price: $50.00/month -
4
Envoy
Envoy, Inc.
Envoy is transforming modern workplaces for hybrid work and safely bringing people together so they can connect, collaborate, and thrive. Envoy’s workplace platform has redefined how companies welcome visitors, keep employees safe, book desks and conference rooms, and manage deliveries in over 14,000 locations around the globe by designing products for a flexible workplace experience. With more than 100,000 new sign-ins every day, Envoy Visitors creates a warm welcome for guests while safeguarding people, property, and ideas. Envoy Protect confirms employees are healthy and helps to coordinate schedules before they come on-site. Envoy Desks gives employees the flexibility to reserve a desk for the days they are in the office to collaborate with teammates. Envoy Rooms provides a simple solution to book meeting rooms and free up unused space. Envoy Deliveries ensures packages reach their recipients without mailroom pile-ups.Starting Price: Free -
5
Cequence Security
Cequence Security
Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool. -
6
Istio
Istio
Connect, secure, control, and observe services. Istio’s traffic routing rules let you easily control the flow of traffic and API calls between services. Istio simplifies configuration of service-level properties like circuit breakers, timeouts, and retries, and makes it easy to set up important tasks like A/B testing, canary rollouts, and staged rollouts with percentage-based traffic splits. It also provides out-of-box failure recovery features that help make your application more robust against failures of dependent services or the network. Istio Security provides a comprehensive security solution to solve these issues. This page gives an overview on how you can use Istio security features to secure your services, wherever you run them. In particular, Istio security mitigates both insider and external threats against your data, endpoints, communication, and platform. Istio generates detailed telemetry for all service communications within a mesh. -
7
OpenLegacy
OpenLegacy
OpenLegacy enables organizations with legacy systems to release new digital services faster and more efficiently than ever before. It connects directly to even the most complex legacy systems, bypassing the need for extra layers of technology. Our product, OpenLegacy HUB is an all-in-one enterprise digital and cloud modernization platform, without disruption. With the OpenLegacy Hub, organizations can automatically generate digital services from any legacy source, deploy them to any cloud environment or framework, extend their functionality, add business logic, and manage these legacy assets in a reusable, discoverable, and easy-to-use way, all without any changes to the underlying legacy applications. 2022 New! OpenLegacy is available on AWS Marketplace.Starting Price: $12K/monthly -
8
Traceable
Traceable
Meet the Industry’s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. If you’re planning on improving the data security posture in your APIs, Traceable would love the opportunity to discuss how we could help and share some of our lessons learned from working with enterprise customers like Canon, Informatica, Outreach, and many others.Starting Price: $0 -
9
Insomnia
Kong
Design, debug, and test APIs like a human, not a robot. Finally, a workflow you'll love. The Collaborative API Design Tool for designing, testing and managing OpenAPI specifications. The Desktop API client for REST and GraphQL. Make requests, inspect responses. Quickly create and group requests, specify environment variables, authentication, generate code snippets, and more. Get all the details on responses. View the whole request timeline, status codes, body, headers, cookies, and more. Create workspaces, folders, environments, drag-and-drop requests, and easily import and export your data. Create, edit, lint, debug, preview, and manage all of your OpenAPI specs in one collaborative API design editor. Generate configuration for common API gateways such as the Kong API Gateway, and Kong for Kubernetes. Sync your API designs with source control such as Github / Gitlab, and deploy directly to API Gateways such as Kong with one click.Starting Price: $5 per month -
10
Approov
Approov
Introducing APIs to service an increasingly mobile customer base adds significant value to your business, but also adds new risks from a growing number of mobile security threats. Only your authorized mobile apps, running in untampered environments and communicating over secured channels, can access your APIs and backend services. Botnets, fraudulent transactions, malicious scripts, and fake apps are blocked at the source. Mobile has transformed how customers do banking and make financial transactions. Explosive growth in mobile requires fresh and easily introduced security solutions. Mobile healthcare apps are proliferating rapidly, but you must protect personal healthcare data by securing the apps and the APIs they use. The way we get around is changing fast. As we increasingly use mobile apps to engage with transportation services, protecting these interactions are essential.Starting Price: 2¢ per month -
11
Resurface
Resurface Labs
Resurface is a runtime API security solution. Detect and respond to API threats and risk in real-time with Resurface continuous API scanning. Purpose-built for API data, Resurface captures complete request and response payloads (including GraphQL) to instantly see threats and failures. Get alerts on data breaches for zero-day detection and response. Mapped to OWASP Top10, Resurface alerts on threats with complete data security patterns and behaviors. Resurface is self-hosted, all data is first-party, installed with a single Helm command. Resurface is the only API security solution engineered for deep inspection at scale. Handling millions of API calls, Resurface detects and alerts on active attacks. Machine learning models indicate anomalies and identify low-and-slow attack patterns.Starting Price: $9K/node/year -
12
Kong Mesh
Kong
Enterprise service mesh based on Kuma for multi-cloud and multi-cluster on both Kubernetes and VMs. Deploy with a single command. Connect to other services automatically with built-in service discovery, including an Ingress resource and remote CPs. Support across any environment, including multi-cluster, multi-cloud and multi-platform on both Kubernetes and VMs. Accelerate initiatives like zero-trust and GDPR with native mesh policies, improving the speed and efficiency of every application team. Deploy a single control plane that can scale horizontally to many data planes, or support multiple clusters or even hybrid service meshes running on both Kubernetes and VMs combined. Simplify cross-zone communication using an Envoy-based ingress deployment on both Kubernetes and VMs, as well as the built-in DNS resolver for service-to-service communication. Built on top of Envoy with 50+ observability charts out of the box, you can collect metrics, traces, and logs of all L4-L7 traffic.Starting Price: $250 per month -
13
Akto
Akto
Akto is an open source API security in CI/CD platform. Key features of Akto include: 1. API Discovery 2. API Security Testing 3. Sensitive Data Exposure 4. API Security Posture Management 5. Authentication and Authorization 6. API Security in DevSecOps Akto helps developers and security teams secure APIs in their CI/CD by continuously discovering and testing APIs for vulnerabilities. Akto's pricing is transparent on website. Free tier is available. You can deploy both self-hosted and in cloud. It takes only few mins to deploy and see results. Akto can integrate with multiple traffic sources - Burpsuite, AWS, postman, GCP, gateways, etc. -
14
DigitalAPI
DigitalAPI
DigitalAPI is a unified API management platform designed to help organizations manage the full lifecycle of APIs, events, and agents across multiple environments. It centralizes API discovery, governance, deployment, and monetization into a single control plane. The platform enables businesses to manage APIs across different gateways and cloud infrastructures with enhanced visibility and control. It includes tools like a lightweight API gateway, developer portal, and external API marketplace for improved accessibility and adoption. DigitalAPI also supports AI-ready capabilities, allowing APIs to be integrated with agent-based workflows and automation. Its governance features ensure security, compliance, and structured API management at scale. Overall, DigitalAPI helps organizations streamline API operations and unlock new revenue opportunities.Starting Price: $99 per month -
15
Steadybit
Steadybit
With our experiment editor, your journey toward reliability is faster and easier, everything is at your fingertips, and you have full control over your experiments. All are meant to help you achieve your goals and roll out chaos engineering safely at scale in your organization. You can add new targets, attacks, and checks by implementing extensions inside Steadybit. A unique discovery and selection process makes it easy to pick the targets. Remove friction when collaborating between teams, and export and import experiments using JSON or YAML. Using Steadybit's landscape, you can see your software's dependencies and relationships between components, the perfect start to kick off your chaos engineering journey. Using the powerful query language, divide your system(s) into different environments based on the same information you use elsewhere. Explicitly assigning environments to specific users and teams in which they're allowed to work and prevent unwanted damages.Starting Price: $1,250 per month -
16
Wallarm API Security Platform
Wallarm
Built by security practitioners for practitioners, Wallarm's API security platform provides robust protection for APIs, web apps, microservices, and serverless workloads in cloud-native, multi-cloud, Kubernetes, and on-premises environments. It delivers coverage against OWASP API Top-10 risks and advanced threats, ensuring visibility and rapid vulnerability remediation. The Wallarm platform is a best-in-class API security solution that supports multiple deployment options. Trusted by security teams globally, Wallarm's API security platform is the fastest, easiest, and most effective way to stop API attacks. Customers choose Wallarm to protect their applications and AI agents because the platform delivers a complete inventory of APIs, patented AI/ML-based abuse detection, real-time blocking, and an API SOC-as-a-service. -
17
Spherical Defense
Spherical Defense
Spherical Defense is an API security solution that uses deep unsupervised learning to protect your APIs. Spherical Defense Express is deployed on AWS, takes just a minute to download and will be protecting your assets within two hours at the cost of $1 per hour. Once you have deployed your Spherical instance, it will immediately start listening for API traffic. It will stay in this mode for only as long as there is insufficient data to train the first security model. After receiving roughly 16,000 requests, it will move to the next stage. After sufficient data has been received, the system moves into training mode. This mode will result in a trained security model after roughly 6 hours, which will then be mounted for evaluation. As new data is received, the Spherical instance will train more models to account for natural changes in your API traffic over time. Once the first security model has been trained, it is mounted for evaluation.Starting Price: $1 per hour -
18
Casbin
Casbin
Casbin is an open-source authorization library that supports various access control models, including Access Control Lists (ACL), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). It is implemented in multiple programming languages such as Golang, Java, C/C++, Node.js, JavaScript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter), and Elixir, providing a consistent API across different platforms. Casbin abstracts access control models into configuration files based on the PERM metamodel, allowing developers to switch or upgrade authorization mechanisms by simply modifying configurations. It offers flexible policy storage options, supporting various databases like MySQL, PostgreSQL, Oracle, MongoDB, Redis, and AWS S3. The library also features a role manager to handle RBAC role hierarchies and supports filtered policy management for efficient enforcement.Starting Price: Free -
19
AWS Marketplace
Amazon
AWS Marketplace is a curated digital catalog that enables customers to discover, purchase, deploy, and manage third-party software, data products, AI agents, and services directly within the AWS ecosystem. It provides access to thousands of listings across categories like security, machine learning, business applications, and DevOps tools. With flexible pricing models such as pay-as-you-go, annual subscriptions, and free trials, AWS Marketplace simplifies procurement and billing by integrating costs into a single AWS invoice. It also supports rapid deployment with pre-configured software that can be launched on AWS infrastructure. This streamlined approach allows businesses to accelerate innovation, reduce time-to-market, and maintain better control over software usage and costs. -
20
Kong AI Gateway
Kong Inc.
Kong AI Gateway is a semantic AI gateway designed to run and secure Large Language Model (LLM) traffic, enabling faster adoption of Generative AI (GenAI) through new semantic AI plugins for Kong Gateway. It allows users to easily integrate, secure, and monitor popular LLMs. The gateway enhances AI requests with semantic caching and security features, introducing advanced prompt engineering for compliance and governance. Developers can power existing AI applications written using SDKs or AI frameworks by simply changing one line of code, simplifying migration. Kong AI Gateway also offers no-code AI integrations, allowing users to transform, enrich, and augment API responses without writing code, using declarative configuration. It implements advanced prompt security by determining allowed behaviors and enables the creation of better prompts with AI templates compatible with the OpenAI interface. -
21
VMware Cloud
Broadcom
Build, run, manage, connect and protect all of your apps on any cloud. The Multi-Cloud solutions from VMware deliver a cloud operating model for all applications. Support your digital business initiatives with the world’s most proven and widely deployed cloud infrastructure. Leverage the same skills you use in the data center, while tapping into the depth and breadth of six global hyperscale public cloud providers and 4,000+ VMware Cloud Provider Partners. With hybrid cloud built on VMware Cloud Foundation, you get consistent infrastructure and operations for new and existing cloud native applications, from data center to cloud to edge. This consistency improves agility and reduces complexity, cost and risk. Build, run and manage modern apps on any cloud, meeting diverse needs with on-premises and public cloud resources. Manage both container-based workloads and traditional VM-based workloads on a single platform. -
22
Imvision
Imvision
How enterprises secure their APIs. Protect your APIs wherever they are, throughout their lifecycle. Gain visibility across the board and deeply understand the business logic behind your APIs. Uncover endpoints, usage patterns, expected flows, and sensitive data exposure through full API payload data analysis. By analyzing the full API data, Imvision allows you to go beyond predefined rules in order to discover unknown vulnerabilities, prevent functional attacks, and automatically shift-left to outsmart attackers. Natural Language Processing (NLP) allows us to achieve high detection accuracy at scale while providing detailed explainability. It can effectively detect ‘Meaningful Anomalies’ when analyzing API data as language. Uncover the API functionality using NLP-based AI to model the complex data relations. Detect behavior sequences attempting to manipulate the logic, at any scale. Understand anomalies faster and in the context of the business logic. -
23
Theom
Theom
Theom is a cloud data security product that discovers and protects all data in cloud stores, APIs, and message queues. Like a bodyguard who closely follows and protects a high-value asset, Theom ensures controls follow the data regardless of how it is stored or accessed. Theom identifies PII, PHI, financial information, and trade secrets using agentless scanning and NLP classifiers, which support custom taxonomies. Theom discovers dark data, data that are never accessed, and shadow data, data whose security posture is different from the primary copy. Theom pinpoints confidential data, e.g., developer keys, in APIs and message queues. Theom estimates the financial value of data to help prioritize risks. Theom maps the relationships between data, access identities, and security attributes to uncover the risks to data. Theom shows how high-value data is accessed by identities (users and roles). Security attributes including user location, atypical access patterns, etc.
- Previous
- You're on page 1
- Next