Business Software for GitHub - Page 55

Top Software that integrates with GitHub as of August 2025 - Page 55

GitHub Clear Filters
  • 1
    NVISIONx

    NVISIONx

    NVISIONx

    NVISIONx data risk Intelligence platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes, and storage costs. Data is growing out of control and getting worse every day. Business and security leaders are overwhelmed and can’t protect what they don’t know. More controls won’t fix the problem. Rich and unlimited analysis to support over 150 business use cases to empower data owners and cyber professionals to proactively manage their data from cradle to grave. First, categorize or group data that is redundant, outdated, or trivial (ROT) and see what data can be defensibly disposed of to reduce the classification scope (and storage costs). Then, contextually classify all remaining data using a number of easy-to-use data analytics techniques to enable the data owner to be their own data analyst! Data identified as useless and unwanted can then go through legal and records retention reviews.
  • 2
    Garden

    Garden

    Garden.io

    Garden is an end-to-end cloud delivery platform that accelerates your development, testing and CI/CD workflows. Get realistic environments on demand, rapidly iterate while coding, and efficiently run tests from anywhere. One tool, one configuration, from source to finish. One set of commands and configuration for all your environments, services, database migrations, even infrastructure. Use Garden to quickly and easily run end-to-end tests in any environment. Your laptop was not made to run a large distributed system. Garden can run, build and test your services remotely, but at the speed of local development. Automatically tear down environments and delete Kubernetes resources based on inactivity or on a schedule. White glove onboarding, personalized training, and expert support. We’re here to help every step of the way.
  • 3
    Trustero

    Trustero

    Trustero

    Many organizations are familiar with the complicated and tiresome SOC 2 Type 1 or Type 2 audit process that has become a prerequisite to closing most business deals. Using the power of artificial intelligence (AI) and other modern technologies, Trustero Compliance as a Service helps customers discover their source of truth with policies and controls mapped to a specific security framework. As a result, you will save hundreds of hours by automating hundreds of tasks, easing and speeding your path toward credible, sustainable compliance and trustworthiness. Simplify the path to audit readiness and continue to stay in compliance. When it’s time for an initial or annual SOC 2 audit, no one wants the headache of preparing for that audit from scratch. Our easy-to-manage dashboard gives you an up-to-date view of your audit readiness across your company. With these insights, you’ll know what’s working and what’s not, so you can keep on track and remain in compliance.
  • 4
    Anitian FedRAMP Comprehensive
    Anitian’s FedRAMP Comprehensive solution combines best-of-breed web security technologies, compliant-by-design integrations, and guidance from FedRAMP experts to help SaaS providers Navigate, Accelerate, and Automate their FedRAMP program. Rely on Anitian’s proven expertise to guide you through every step of the FedRAMP process. Obtain FedRAMP authorization in half the time and at half the cost using Anitian’s unique combination of automation and in-person assistance. Use Anitian’s pre-built security stack and automation tools to eliminate much of the manual, complex work typically required for FedRAMP authorization. Depend on Anitian’s compliance team to keep both your internal and external stakeholders fully appraised of project status, required actions and critical path dependencies.
  • 5
    ByteChek

    ByteChek

    ByteChek

    Simplify compliance with ByteChek’s advanced and easy-to-use compliance platform. Build your cybersecurity program, automate evidence collection, and earn your SOC 2 report so you can build trust faster, all from a single platform. Self-service readiness assessment and reporting without auditors. The only compliance software that includes the report. Complete risk assessments, vendor reviews, access reviews, and much more. Build, manage, and assess your cybersecurity program to build trust with your customers and unlock sales. Establish your security program, automate your readiness assessment, and complete your SOC 2 audit faster, all from a single platform. HIPAA compliance software to help you prove your company is securing protected health information (PHI) and building trust with healthcare companies. Information security management system (ISMS) software to help you build your ISO-compliant cybersecurity program and earn your ISO 27001 certification.
    Starting Price: $9,000 per year
  • 6
    Scytale

    Scytale

    Scytale

    Scytale is the global leader in security compliance automation, helping companies get compliant and stay compliant with security frameworks like SOC 1, SOC 2, ISO 27001, HIPAA, GDPR, PCI-DSS, and more, without breaking a sweat. Our experts offer personalized guidance to streamline compliance, enabling faster growth and boosting customer trust. Simplify compliance with automated evidence collection and 24/7 control monitoring. Everything you need to get audit-ready 90% faster. Centralize, manage, and track workflows in one place. You can increase sales by showing proof of information security to customers. You can continue to do business as usual, and automate your SOC 2 project. Transform compliance into a well-organized process that allows you to track the status of your workflows. The ultimate automation platform that assists SaaS companies in achieving ISO 27001 and SOC 2 compliance.
  • 7
    ThreatKey

    ThreatKey

    ThreatKey

    ThreatKey integrates seamlessly with your third party SaaS providers and contextualizes the data in your environment. ThreatKey finds what is vulnerable and gives you safe remediations and recommendations to reduce your risk instantly, before incidents happen. ThreatKey constantly scans and monitors your ever-changing environment to alert you as misconfigurations appear through your SaaS application stack. Teams across your organization procure new third-party platforms to do their job effectively. But configurations around SaaS is convenience first, not security first. Finally, teams across your company can adopt new tech with confidence that they didn’t just widen the attack surface. ThreatKey Deputy enables modern security teams to shift left and automate first-line communications regarding suspicious events and indicators.
  • 8
    Enso

    Enso

    Enso Security

    Enso is transforming application security by empowering organizations to build, manage and scale their AppSec programs. Its Application Security Posture Management (ASPM) platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build a simplified, agile and scalable application security program without interfering with development. Enso has been recognized with numerous awards including the 2022 Excellence Awards, Globee Awards, and Forbes Top 20 Cybersecurity Startups to Watch.
  • 9
    Code Intelligence

    Code Intelligence

    Code Intelligence

    Our platform uses various security techniques, including coverage-guided and feedback-based fuzz testing, to automatically generate millions of test cases that trigger hard-to-find bugs deep within your application. This white-box approach protects against edge cases and speeds up development. Advanced fuzzing engines generate inputs that maximize code coverage. Powerful bug detectors check for errors during code execution. Uncover true vulnerabilities only. Get the input and stack trace as proof, so you can reliably reproduce errors every time. AI white-box testing uses data from all previous test runs to continuously learn the inner-workings of your application, triggering security-critical bugs with increasingly high precision.
  • 10
    Opal

    Opal

    Opal

    Opal is a security platform that enables organizations to scale least privilege, creating new ways for teams to work smarter. We believe access should be decentralized, self-service, and integrated with the technologies your team already uses. Remove bottlenecks. Delegate access requests to those who have the most context. More context = faster and better decisions. Intelligent automation. Let Opal handle it all, giving access when it matters most, sending automatic reminders, and removing access when no longer needed. Transparency matters. Be on the same page about who approves access, who has access to what, the status of requests, and more. Skip the game of telephone! Companies give out far too much access. Access is granted in a way that is overly coarse and often for an indefinite amount of time. Most companies have painfully manual and inconsistent ways of granting just-in-time access.
  • 11
    Seemplicity

    Seemplicity

    Seemplicity

    The fundamentals of workplace productivity have been redefined with automated workflows in nearly all domains. But what about security? When it comes to driving risk down, security teams are forced to play air traffic controller, deduplicating, sorting, and prioritizing every security finding that comes in, then routing and following up with developers all across the organization to make sure problems get fixed. The result, is a massive administrative burden on an already resource-constrained team, stubbornly long time-to-remediation, friction between security and development, and an inability to scale. Seemplicity revolutionizes the way security teams work by automating, optimizing, and scaling all risk reduction workflows in one workspace. Aggregated findings with the same solution on the same resource. Exceptions, such as rejected tickets or tickets with a fixed status but an open finding, are automatically redirected to the security team for review.
  • 12
    Integrate.io

    Integrate.io

    Integrate.io

    Unify Your Data Stack: Experience the first no-code data pipeline platform and power enlightened decision making. Integrate.io is the only complete set of data solutions & connectors for easy building and managing of clean, secure data pipelines. Increase your data team's output with all of the simple, powerful tools & connectors you’ll ever need in one no-code data integration platform. Empower any size team to consistently deliver projects on-time & under budget. We ensure your success by partnering with you to truly understand your needs & desired outcomes. Our only goal is to help you overachieve yours. Integrate.io's Platform includes: -No-Code ETL & Reverse ETL: Drag & drop no-code data pipelines with 220+ out-of-the-box data transformations -Easy ELT & CDC :The Fastest Data Replication On The Market -Automated API Generation: Build Automated, Secure APIs in Minutes - Data Warehouse Monitoring: Finally Understand Your Warehouse Spend - FREE Data Observability: Custom
  • 13
    Meltano

    Meltano

    Meltano

    Meltano provides the ultimate flexibility in deployment options. Own your data stack, end to end. Ever growing connector library of 300+ connectors have been running in production for years. Run workflows in isolated environments, execute end-to-end tests, and version control everything. Open source gives you the power to build your ideal data stack. Define your entire project as code and collaborate confidently with your team. The Meltano CLI enables you to rapidly create your project, making it easy to start replicating data. Meltano is designed to be the best way to run dbt to manage your transformations. Your entire data stack is defined in your project, making it simple to deploy it to production. Validate your changes in development before moving to CI, and in staging before moving to production.
  • 14
    Valence

    Valence

    Valence Security

    Valence finds and fixes SaaS risks. The Valence platform discovers, protects, and defends SaaS applications by monitoring shadow IT, misconfigurations, and identity activities through unparalleled SaaS discovery, SSPM, and ITDR capabilities. Recent high-profile breaches highlight how decentralized SaaS adoption creates significant security challenges. With Valence, security teams can control SaaS sprawl, protect their data, and detect suspicious activities from human and non-human identities. Valence goes beyond visibility by enabling security teams to remediate risks through one-click remediation, automated workflows, and business user collaboration. Trusted by leading organizations, Valence ensures secure SaaS adoption while mitigating today’s most critical SaaS security risks.
  • 15
    Hub

    Hub

    Hub

    Orchestrate your daily presales work. Analyze your presales business. Deliver more technical wins. There is a need by both presales leaders and individual contributors for a better way to perform work now! Optimizing presales can generate millions of incremental revenue without additional headcount. We are a team that is in the service of helping you be successful. Run your business. Hub provides you with the pertinent information you need to effectively lead your team. Run your presales business. Do your work. Hub gives you ways to optimize your time to win more business. Sales engineering is the hub of your go-to-market organization. Help your C-suite and board obtain better oversight. Detailed tech sales metrics. Show tech sales activities. Rationalize investments and optimize your resources. Comply with security, adhere to their processes, deliver granular ROI, and contextualize investment.
  • 16
    Argon

    Argon

    ArgonSec

    The first unified security solution protecting the integrity of your software throughout the entire DevOps CI CD pipeline. Track all events and actions across your software supply chain with unparalleled clarity, get actionable information and make decisions faster. Bolster your security posture by enforcing security best practices at all stages of the software delivery process with real-time alerts and auto-remediation. Ensure source code integrity with automated validity checks on each release, so you can be sure the code you committed is the source code deployed. Argon continuously monitors your DevOps infrastructure to identify security risks, code leaks, misconfigurations, and anomalies, and provide insights about the posture of your CI CD pipeline.
  • 17
    ThreatBlockr

    ThreatBlockr

    ThreatBlockr

    The only solution that blocks every threat from every path in your network. Networks relying primarily on archaic firewall technology without including other more modern security layers like ThreatBlockr® are easy prey for cybercriminals. Firewalls are easily blinded by encrypted attacks. They’re easily traversed by port forwarding fragmented packet attacks. They’re often misconfigured. They can also get confused by simple extended web and messaging protocols. Side-channel attacks, BYOD, and WFH all compound the problem. Organizations use ThreatBlockr® to gain instant network protection without having to drastically re-engineer their existing security stacks, whether they are on-premise, in the cloud, or both. Fix your security stack by deploying ThreatBlockr® today, and get back to working with the confidence that you’re secure, wherever you are. Enable an ideal protected network while improving firewall efficiency.
  • 18
    ActionKit

    ActionKit

    ActionKit

    Supercharge your online organizing, advocacy, and fundraising with the most powerful tools in the business. ActionKit is used by progressive organizations, large and small, around the world, to make a difference on issues from climate change to gun control to disaster relief to social justice and more. We tested and we learned what works, so we made it simple to implement personalization, segmented targeting, source tracking, tell-a-friend, optimized layouts, customized asks a/b testing, and much more. Simple steps guide you through commonly used settings for the quick launch of everything from a new petition page to an urgent action alert email to a fundraising campaign. Advanced options and customizations are easily enabled when your needs go beyond the basics. ActionKit is always improving. We regularly put out new releases with features, bug fixes, and infrastructure improvements, often based on requests and learnings from our clients.
  • 19
    TeamDynamix iPaaS
    Jumpstart digital transformation with a codeless integration and workflow platform that includes out-of-the-box connectors to popular systems like Salesforce, Workday, Office365, DocuSign, Active Directory, Azure, Amazon Web Services, and more. With iPaaS you can easily build workflows using a codeless visual flow builder and watch automation take off. iPaaS (Integration Platform as a Service) is a cloud-based platform that connects different systems, technologies, and applications on-premise or within the cloud. It enables companies to deploy and maintain a data integration strategy. Empower your team to build workflows between systems, synchronize data across the cloud and automate processes within your applications. Connect to the systems you use every day or easily build new connectors. Stop worrying about poorly built or unknown integrations that pose a security risk. With iPaaS you can find, understand and use APIs with confidence.
  • 20
    TeamDynamix ESM

    TeamDynamix ESM

    TeamDynamix

    Work better together with a connected enterprise. Spurred on by digital transformation initiatives, many organizations are finding the old standards of ITSM no longer apply to their rapidly changing IT and business needs. Modern, smart service management platforms offer both the traditional support for ITIL, end-user self-service; change and asset management, as well as true, connected enterprise service for groups like HR, marketing, and facilities. All on a codeless platform. Enterprise service management is defined as the strategy of applying service management principles to departments outside of IT, or throughout an organization. Using a single platform for all service management (including IT service management), you can tailor portals for each department; automate routing and workflows; utilize a single information repository, and track and report on outcomes. Manage work orders, assets, preventative maintenance, and projects with the ability to assign and track all resources.
  • 21
    TeamDynamix PPM

    TeamDynamix PPM

    TeamDynamix

    PPM software tailored to you, card walls, kanban, agile, waterfall, and teamwork task lists, integrate with ITSM/ESM. PPM software that allows you to look across all projects within a portfolio is vital. By managing with a portfolio approach rather than managing projects in isolation, stakeholders can see how everything is tracking and aligned to the strategic needs of the business. Project tracking needs to be flexible to manage different types of projects with various complexities. Project Portfolio Management (PPM) software can help create project plans with tracking tools and dashboards. Collaboration across teams can be daunting at times, especially when many resources are working remotely. Having a clear view with dashboards, easy time tracking and status updates keeps everyone on track and informed. Manage project resources using drag-and-drop capabilities. Manage multiple baselines, variance, and key performance indicators (KPIs).
  • 22
    Zepl

    Zepl

    Zepl

    Sync, search and manage all the work across your data science team. Zepl’s powerful search lets you discover and reuse models and code. Use Zepl’s enterprise collaboration platform to query data from Snowflake, Athena or Redshift and build your models in Python. Use pivoting and dynamic forms for enhanced interactions with your data using heatmap, radar, and Sankey charts. Zepl creates a new container every time you run your notebook, providing you with the same image each time you run your models. Invite team members to join a shared space and work together in real time or simply leave their comments on a notebook. Use fine-grained access controls to share your work. Allow others have read, edit, and run access as well as enable collaboration and distribution. All notebooks are auto-saved and versioned. You can name, manage and roll back all versions through an easy-to-use interface, and export seamlessly into Github.
  • 23
    BalkanID

    BalkanID

    BalkanID

    Leverage AI to automate discovery & risk prioritization of entitlement sprawl. Streamline access reviews & certifications across the public cloud and SaaS landscape. Connect all third-party integrations to the BalkanID dashboard. Integrations are supported for the most commonly used SaaS apps. Single pane of glass for coarse and fine-grained entitlements, as well as outliers across SaaS and public cloud environments. Simplify the access review and certification process across the SaaS and public cloud landscape. Leverage data science and machine learning to provide visibility into entitlement risks across SaaS and public cloud environments. Discovery and prioritization of entitlement risks. Discover, normalize and attribute entitlement taxonomy and associated data sets, to ensure that while an access review can be high-level there is still detailed data (permissions, roles, groups, etc.) to support certification actions.
  • 24
    ActiveControl
    Increase business agility and competitiveness with faster, safer, more frequent delivery of SAP change. Today’s industry leaders need the power of innovation to beat the competition and adapt to rapidly-changing markets. But innovating fast can be a challenge for companies who run complex SAP environments where rapid, low-risk change isn’t easy. ActiveControl’s advanced automation solves that problem with a fundamentally new approach to change and release that enables companies to adopt agile development, DevOps, and continuous delivery in SAP. Customizable workflows let you automatically deploy SAP transports (and even non-SAP changes) after relevant approvals. Whether you define system-specific import schedules or adopt a continuous delivery model, change deployments and dependent manual activities are automatically orchestrated across all your SAP systems. For maximum DevOps value SAP systems should be part of your global IT landscape and best-practice delivery processes.
  • 25
    Relevize

    Relevize

    Relevize

    Channel sales are critical for continued growth. Automate the demand generation process for your partners to efficiently generate leads, pipeline, and revenue. Easily launch paid campaigns for your partners in one click. Gain visibility into every part of your partners' pipeline. Understand which programs are successful and which need adjustments. Automate paid demand generation programs for partners. Enable your partners to launch paid campaigns to acquire new leads that can be nurtured to generate a qualified channel pipeline. Everything you need to turn your partners into your best revenue channel. Your partners go through a seamless onboarding process to get ready to distribute paid campaigns and follow up with leads. Our partner success team is also there to teach them best practices and ensure they are set up for success. Set up new paid programs, with pre-defined target audiences, to distribute through your partners' paid channels.
  • 26
    Rezonate

    Rezonate

    Rezonate

    Rezonate detects and auto-remediates access configurations, risky activities, and weak security practices from build time to real-time, across your identity providers and IaaS for a complete identity risk reduction. Rezonate continuously synthesizes the data all your cloud applications, resources as well as your human and machine identities. The single, identity storyline it provides gives you a panoramic view of all your identity and access risk. Rezonate’s Identity Storyline goes beyond traditional overloaded graph views to tell you the story behind each identity, exposure and threat, so you can confidently pinpoint, prioritize and act to eliminate access risks. For every risk detected, exposure or an active threat, Identity Storyline tells how it came to be and what havoc it might wreak. Go beyond periodic configuration scans and unlock real-time view of every change and every activity across your cloud identity attack surface.
  • 27
    ArmorCode

    ArmorCode

    ArmorCode

    Centralize all AppSec findings (SAST, DAST, SCA, etc) and correlate with infrastructure and cloud security vulnerabilities to get a 360o view of you application security posture. Normalize, de-dup and correlate findings to improve risk mitigation efficiency and prioritize the findings that impact the business. A single source of truth for findings and remediations from across tools, teams and applications. AppSecOps is the process of identifying, prioritizing, remediating and preventing Security breaches, vulnerabilities and risks - fully integrated with existing DevSecOps workflows, teams and tools ‍‍ An AppSecOps platform enables security teams to scale their ability to successfully identify, remediate and prevent high-priority application level security, vulnerability, and compliance issues, as well as identify and eliminate coverage gaps.
  • 28
    AlphaCode

    AlphaCode

    DeepMind

    Creating solutions to unforeseen problems is second nature in human intelligence, a result of critical thinking informed by experience. The machine learning community has made tremendous progress in generating and understanding textual data, but advances in problem-solving remain limited to relatively simple maths and programming problems, or else retrieving and copying existing solutions. As part of DeepMind’s mission to solve intelligence, we created a system called AlphaCode that writes computer programs at a competitive level. AlphaCode achieved an estimated rank within the top 54% of participants in programming competitions by solving new problems that require a combination of critical thinking, logic, algorithms, coding, and natural language understanding. AlphaCode uses transformer-based language models to generate code at an unprecedented scale, and then smartly filters to a small set of promising programs.
  • 29
    Korrect

    Korrect

    Korrect

    Korrect is a simple product feedback management tool specially crafted for product teams who are working on scale and listening to multiple channels of feedback. We also discovered that being transparent with your users and customers earns you customer loyalty so we ended up building stuff where you can build and maintain a public roadmap along with internal roadmaps.
    Starting Price: $149 per month
  • 30
    Bytesafe

    Bytesafe

    Bitfront

    Increase your open source security posture with automated best practices, with a unified workflow for security and developer teams. The cloud-native security platform reduces risk and protects revenue, without slowing down developers. The dependency firewall quarantines malicious open source before reaching developers and infrastructure, protecting data, assets, and company reputation. Our policy engine evaluates threat signals such as known vulnerabilities, license information, and customer-defined rules. Having insight into what open-source components are used in applications is crucial to avoid exploitable vulnerabilities. Software Composition Analysis (SCA) and dashboard reporting give stakeholders a holistic overview with immediate insights into the current situation. Discover when new open-source licenses are introduced in the codebase. Automatically track license compliance issues and restrict problematic or unlicensed packages.
    Starting Price: €1100 per month