diff --git a/ADOPTERS.md b/ADOPTERS.md index 5876c7d525..e6e980c118 100644 --- a/ADOPTERS.md +++ b/ADOPTERS.md @@ -4,7 +4,6 @@ This is the list of organizations and users that have publicly shared how they a 💡 **Add your organization by creating a PR or [submitting this form](https://docs.google.com/forms/d/e/1FAIpQLSe1IBSxDFn_iAAq9vd0nQdjKbapvgGyM8j2IX_z4xSCu-OSNg/viewform)** - Note: There are several other organizations and users that are unable to publicly share their stories but are active in the Kyverno community. We appreciate all our users and their contributions to making Kyverno a successful CNCF project. The list of organizations that have publicly shared the usage of Kyverno: @@ -30,7 +29,9 @@ The list of organizations that have publicly shared the usage of Kyverno: | [Yahoo](https://www.yahoo.com/) | Use Kyverno for mutation, to replace image tags to digest and also for validation for checking freshness of images. | | [T-Systems](https://www.t-systems.com) | | | [Red Hat](https://www.redhat.com) | Learn more about Red Hat Advanced Cluster Management for Kubernetes for [Generating Governance Policies Using Kustomize and GitOps](https://cloud.redhat.com/blog/generating-governance-policies-using-kustomize-and-gitops).| -| [DE-CIX](https://www.de-cix.net) | Kyvernos policy enforcement is used to enforce the company's security guidelines. This is done using validation, mutation and generation techniques. | +| [DE-CIX](https://www.de-cix.net) | Kyvernos policy enforcement is used to enforce the company's security guidelines. This is done using validation, mutation and generation techniques. | +| [Saxo Bank](https://www.home.saxo/) | We use Kyverno to enforce security and best practises. | +| [Velux](https://www.velux.com/) | We successfully use Kyverno in our clusters for security, best practice enforcement, resource mutation, secret copying and more! |