Compare the Top Data Governance Software that integrates with SQLite as of October 2025

This a list of Data Governance software that integrates with SQLite. Use the filters on the left to add additional filters for products that have integrations with SQLite. View the products that work with SQLite in the table below.

What is Data Governance Software for SQLite?

Data governance software helps organizations ensure the quality, consistency, security, and accessibility of their data across the enterprise. These platforms provide tools for defining data policies, standards, and processes, ensuring that data is properly classified, managed, and protected throughout its lifecycle. Data governance software often includes features like data cataloging, lineage tracking, metadata management, and role-based access controls. It supports compliance with data protection regulations such as GDPR and HIPAA, helping businesses maintain regulatory compliance and avoid potential legal risks. By using data governance software, organizations can improve data integrity, enhance decision-making, and foster better collaboration across teams. Compare and read user reviews of the best Data Governance software for SQLite currently available using the table below. This list is updated regularly.

  • 1
    Collate

    Collate

    Collate

    Collate is an AI‑driven metadata platform that empowers data teams with automated discovery, observability, quality, and governance through agent‑based workflows. Built on the open source OpenMetadata foundation and a unified metadata graph, it offers 90+ turnkey connectors to ingest metadata from databases, data warehouses, BI tools, and pipelines, delivering in‑depth column‑level lineage, data profiling, and no‑code quality tests. Its AI agents automate data discovery, permission‑aware querying, alerting, and incident‑management workflows at scale, while real‑time dashboards, interactive analyses, and a collaborative business glossary enable both technical and non‑technical users to steward high‑quality data assets. Continuous monitoring and governance automations enforce compliance with standards such as GDPR and CCPA, reducing mean time to resolution for data issues and lowering total cost of ownership.
    Starting Price: Free
  • 2
    Alteryx

    Alteryx

    Alteryx

    Step into a new era of analytics with the Alteryx AI Platform. Empower your organization with automated data preparation, AI-powered analytics, and approachable machine learning — all with embedded governance and security. Welcome to the future of data-driven decisions for every user, every team, every step of the way. Empower your teams with an easy, intuitive user experience allowing everyone to create analytic solutions that improve productivity, efficiency, and the bottom line. Build an analytics culture with an end-to-end cloud analytics platform and transform data into insights with self-service data prep, machine learning, and AI-generated insights. Reduce risk and ensure your data is fully protected with the latest security standards and certifications. Connect to your data and applications with open API standards.
  • 3
    Astro by Astronomer
    For data teams looking to increase the availability of trusted data, Astronomer provides Astro, a modern data orchestration platform, powered by Apache Airflow, that enables the entire data team to build, run, and observe data pipelines-as-code. Astronomer is the commercial developer of Airflow, the de facto standard for expressing data flows as code, used by hundreds of thousands of teams across the world.
  • 4
    Polar Security

    Polar Security

    Polar Security

    Automate data discovery, protection & governance in your cloud workload and SaaS applications. Automatically pinpoint all your exposed sensitive data in cloud workloads and SaaS applications, allowing you to shrink the data attack surface. Identify and classify sensitive data such as PII, PHI, PCI, and custom company IP to prevent sensitive data exposure. Get actionable insights on how to protect your cloud data and ensure compliance, in real-time. Enforce data access policies to achieve least privileged access, maintain a strong security posture, and remain resilient to cyber-threats.
  • Previous
  • You're on page 1
  • Next