Average Ratings 0 Ratings
Average Ratings 2 Ratings
Description
                    Galgos AI serves as your intelligent DevOps assistant specifically designed for cloud infrastructure, allowing you to create compliant and secure infrastructure-as-code simply by using natural language prompts. This tool seamlessly incorporates AI-driven DevOps best practices to automatically generate Terraform, CloudFormation, and Kubernetes manifests that conform to your organization's compliance requirements and security protocols. By using straightforward English requests for resources—including aspects like networking, identity management, encryption, logging, and monitoring—you can significantly speed up the cloud provisioning process, all while leveraging built-in modules aimed at cost efficiency and adherence to recognized standards such as CIS, NIST, and PCI DSS. Furthermore, it maintains an updated policy library, conducts real-time validation alongside remediation advice, and features drift detection with automatically generated corrections. The generated code can be easily previewed, version-controlled, and integrated into pre-existing CI/CD pipelines using API or CLI, supporting platforms like GitHub Actions, Jenkins, and HashiCorp Vault. Ultimately, this innovative solution not only enhances operational efficiency but also ensures that your cloud infrastructure remains robust and compliant in an ever-evolving technological landscape.
                
            
        
            Description
                    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure--on-prem, in the cloud, or at the edge. It is built on an event-driven automation engine that detects and responds intelligently to any system. This makes it a powerful solution for managing complex environments.
SaltStack's new SecOps offering can detect security flaws and mis-configured systems. This powerful automation can detect and fix any issue quickly, allowing you and your team to keep your infrastructure secure, compliant, and up to date.
Comply and Protect are both part of the SecOps suite. Comply scans for compliance with CIS, DISA, STIG, NIST and PCI standards. Also, scan your operating system for vulnerabilities and update it with patches and patches.
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Integrations
            
                
    GitHub
            
            
        
        
    
        
        
            
                
    Jenkins
            
            
        
        
    
        
        
            
                
    AWS CloudFormation
            
            
        
        
    
        
        
            
                
    Akeyless Vault
            
            
        
        
    
        
        
            
                
    Chocolatey
            
            
        
        
    
        
        
            
                
    GenRocket
            
            
        
        
    
        
        
            
                
    HashiCorp Vault
            
            
        
        
    
        
        
            
                
    Kubernetes
            
            
        
        
    
        
        
            
                
    NetWatch.ai
            
            
        
        
    
        
        
            
                
    OverOps
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Integrations
            
                
    GitHub
            
            
        
        
    
        
        
            
                
    Jenkins
            
            
        
        
    
        
        
            
                
    AWS CloudFormation
            
            
        
        
    
        
        
            
                
    Akeyless Vault
            
            
        
        
    
        
        
            
                
    Chocolatey
            
            
        
        
    
        
        
            
                
    GenRocket
            
            
        
        
    
        
        
            
                
    HashiCorp Vault
            
            
        
        
    
        
        
            
                
    Kubernetes
            
            
        
        
    
        
        
            
                
    NetWatch.ai
            
            
        
        
    
        
        
            
                
    OverOps
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
Galgos AI
Country
United States
Website
galgos.ai/
Vendor Details
Company Name
SaltStack
Founded
2012
Country
Utah, United States
Website
saltproject.io
Product Features
DevOps
                                        Approval Workflow
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        KPIs
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Portfolio Management
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Release Management
                                        
                                    
                                    
                                    
                                        Timeline Management
                                        
                                    
                                    
                                    
                                        Troubleshooting Reports
                                        
                                    
                            
                        Product Features
Build Automation
                                        Automated Testing
                                        
                                    
                                    
                                    
                                        Build Cache
                                        
                                    
                                    
                                    
                                        Build Management Tools
                                        
                                    
                                    
                                    
                                        Build Metrics
                                        
                                    
                                    
                                    
                                        Change Only Compiling
                                        
                                    
                                    
                                    
                                        Debugging Tools
                                        
                                    
                                    
                                    
                                        Dependency Management
                                        
                                    
                                    
                                    
                                        IDE Compatibility
                                        
                                    
                                    
                                    
                                        Parallel Testing
                                        
                                    
                                    
                                    
                                        Plugin Library
                                        
                                    
                                    
                                    
                                        Source Code Management
                                        
                                    
                                    
                                    
                                        Version Conflict Resolution
                                        
                                    
                            
                        Cloud Security
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Management
                                        
                                    
                            
                        Compliance
                                        Archiving & Retention
                                        
                                    
                                    
                                    
                                        Artificial Intelligence (AI)
                                        
                                    
                                    
                                    
                                        Audit Management
                                        
                                    
                                    
                                    
                                        Compliance Tracking
                                        
                                    
                                    
                                    
                                        Controls Testing
                                        
                                    
                                    
                                    
                                        Environmental Compliance
                                        
                                    
                                    
                                    
                                        FDA Compliance
                                        
                                    
                                    
                                    
                                        HIPAA Compliance
                                        
                                    
                                    
                                    
                                        ISO Compliance
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        OSHA Compliance
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Sarbanes-Oxley Compliance
                                        
                                    
                                    
                                    
                                        Surveys & Feedback
                                        
                                    
                                    
                                    
                                        Version Control
                                        
                                    
                                    
                                    
                                        Workflow / Process Automation
                                        
                                    
                            
                        Configuration Management
                                        Access Control / Permissions
                                        
                                    
                                    
                                    
                                        Application Deployment
                                        
                                    
                                    
                                    
                                        Automated Provisioning
                                        
                                    
                                    
                                    
                                        Infrastructure Automation
                                        
                                    
                                    
                                    
                                        Node Management
                                        
                                    
                                    
                                    
                                        Orchestration
                                        
                                    
                                    
                                    
                                        Reporting Analytics / Visualization
                                        
                                    
                                    
                                    
                                        Task Management
                                        
                                    
                            
                        Cybersecurity
                                        AI / Machine Learning
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        IOC Verification
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Tokenization
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        Data Center Management
                                        Audit Trail
                                        
                                    
                                    
                                    
                                        Behavior-Based Acceleration
                                        
                                    
                                    
                                    
                                        Cross Reference System
                                        
                                    
                                    
                                    
                                        Device Auto Discovery
                                        
                                    
                                    
                                    
                                        Diagnostic Testing
                                        
                                    
                                    
                                    
                                        Import / Export Data
                                        
                                    
                                    
                                    
                                        JCL Management
                                        
                                    
                                    
                                    
                                        Multi-Platform
                                        
                                    
                                    
                                    
                                        Multi-User
                                        
                                    
                                    
                                    
                                        Power Management
                                        
                                    
                                    
                                    
                                        Sarbanes-Oxley Compliance
                                        
                                    
                            
                        DevOps
                                        Approval Workflow
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        KPIs
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Portfolio Management
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Release Management
                                        
                                    
                                    
                                    
                                        Timeline Management
                                        
                                    
                                    
                                    
                                        Troubleshooting Reports
                                        
                                    
                            
                        HIPAA Compliance
                                        Access Control / Permissions
                                        
                                    
                                    
                                    
                                        Audit Management
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Data Security
                                        
                                    
                                    
                                    
                                        Documentation Management
                                        
                                    
                                    
                                    
                                        For Healthcare
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Policy Training
                                        
                                    
                                    
                                    
                                        Remediation Management
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Vendor Management
                                        
                                    
                            
                        IT Management
                                        Capacity Monitoring
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Event Logs
                                        
                                    
                                    
                                    
                                        Hardware Inventory
                                        
                                    
                                    
                                    
                                        IT Budgeting
                                        
                                    
                                    
                                    
                                        License Management
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Remote Access
                                        
                                    
                                    
                                    
                                        Scheduling
                                        
                                    
                                    
                                    
                                        Software Inventory
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                            
                        IT Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Anti Virus
                                        
                                    
                                    
                                    
                                        Email Attachment Protection
                                        
                                    
                                    
                                    
                                        Event Tracking
                                        
                                    
                                    
                                    
                                        IP Protection
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Spyware Removal
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Web Traffic Reporting
                                        
                                    
                            
                        Network Automation
                                        Compliance Monitoring
                                        
                                    
                                    
                                    
                                        Configuration Backup
                                        
                                    
                                    
                                    
                                        Configuration Changes
                                        
                                    
                                    
                                    
                                        Network Orchestration
                                        
                                    
                                    
                                    
                                        Performance Monitoring
                                        
                                    
                                    
                                    
                                        Tool Access Control
                                        
                                    
                                    
                                    
                                        Vulnerability Assessments
                                        
                                    
                            
                        Network Security
                                        Access Control
                                        
                                    
                                    
                                    
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Firewalls
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Response
                                        
                                    
                                    
                                    
                                        VPN
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                        Patch Management
                                        Alerts/Notifications
                                        
                                    
                                    
                                    
                                        Automatic Approval
                                        
                                    
                                    
                                    
                                        Automatic Patch Deployment
                                        
                                    
                                    
                                    
                                        Automatic Scans
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Custom Patches
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        Network Wide Management
                                        
                                    
                                    
                                    
                                        Patch Prioritization
                                        
                                    
                                    
                                    
                                        Patch Testing
                                        
                                    
                                    
                                    
                                        Remote Access/Control
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                        PCI Compliance
                                        Access Control
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Exceptions Management
                                        
                                    
                                    
                                    
                                        File Integrity Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Log Management
                                        
                                    
                                    
                                    
                                        PCI Assessment
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                            
                        Server Management
                                        CPU Monitoring
                                        
                                    
                                    
                                    
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Database Servers
                                        
                                    
                                    
                                    
                                        Email Monitoring
                                        
                                    
                                    
                                    
                                        Event Logs
                                        
                                    
                                    
                                    
                                        History Tracking
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Scheduling
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                                    
                                    
                                        Virtual Machine Monitoring
                                        
                                    
                            
                        Software Configuration Management (SCM)
                                        Automated Cleanup
                                        
                                    
                                    
                                    
                                        Branch Merging
                                        
                                    
                                    
                                    
                                        Code Review
                                        
                                    
                                    
                                    
                                        Concurrency Management
                                        
                                    
                                    
                                    
                                        Defect Tracking
                                        
                                    
                                    
                                    
                                        Flexible Branching
                                        
                                    
                                    
                                    
                                        Rapid Hotfix
                                        
                                    
                                    
                                    
                                        Rapid Rebuilds
                                        
                                    
                                    
                                    
                                        Regulatory Compliance
                                        
                                    
                                    
                                    
                                        Version Control / Management
                                        
                                    
                                    
                                    
                                        Workflow / Process Automation
                                        
                                    
                            
                        Vulnerability Scanners
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Black Box Scanning
                                        
                                    
                                    
                                    
                                        Compliance Monitoring
                                        
                                    
                                    
                                    
                                        Continuous Monitoring
                                        
                                    
                                    
                                    
                                        Defect Tracking
                                        
                                    
                                    
                                    
                                        Interactive Scanning
                                        
                                    
                                    
                                    
                                        Logging and Reporting
                                        
                                    
                                    
                                    
                                        Network Mapping
                                        
                                    
                                    
                                    
                                        Perimeter Scanning
                                        
                                    
                                    
                                    
                                        Risk Analysis
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Web Inspection
                                        
                                    
                            
                         
         
         
         
         
        