Business Software for GitHub - Page 65

Top Software that integrates with GitHub as of August 2025 - Page 65

GitHub Clear Filters
  • 1
    Exceptionly

    Exceptionly

    Exceptionly

    We find, test, and deliver software talent for a direct hire. Exceptionly is built to revolutionize the software talent industry by leveraging its unique big data set of 2 million hands-on tested software engineers from 175 countries. Exceptionly invests in its enterprise-level talent acquisition engine and offers a platform as a service for providing both quality and volume of tested remote software engineers for businesses around the world. Exceptionly’s mission is to enable 100% of the technology talent capital for highly skilled remote talent around the world. We help businesses go beyond their zip codes for hiring the best of the best and leverage their talent budget in full.
  • 2
    Stackreaction

    Stackreaction

    Stackreaction

    Building marketplace, online school or membership site? Find tools, integrations, workflows and guides to jumpstart your idea. Browse apps and tools, find alternatives, compare by feature, and leave feedback. Automating routine processes? Find all integrations from Zapier, Integromat, Automateio and other automation platforms in one place. Compare features and price. Explore guides and tutorials from community and vendors. Contribute with your know-how. Leverage the openness of the nocode community. Сreate your profile, pick up your favorite tools, share your stack.
  • 3
    Yet Analytics

    Yet Analytics

    Yet Analytics

    Our team members have leadership positions on the IEEE Learning Technology Standards Committee and can help you to understand the lay of the land while ensuring that data in your learning ecosystem is aligned to global best practices. The Enterprise Learner Record standard (IEEE P2997) will provide rollup capabilities for metadata and data cross-walking across the training and learning enterprise. We are leading this effort and will bring our expertise to your project. We can help you to deploy one or more SQL LRSs in any environment. That includes everything from the Cloud to a mobile device you can toss in a backpack. SQL LRS comes with a PostgreSQL DB, so you can connect to major BI tools out-of-the-box. We designed LRSPipe based on our experience getting an intelligent tutoring system and an automated competency assertion system to talk xAPI. Let’s discuss how we can improve the business logic and communications in your learning ecosystem.
  • 4
    Zenlytic

    Zenlytic

    Zenlytic

    Your data lives in multiple excel files, ad platforms, and SaaS apps – they never agree and it’s impossible to make sense of. Your team wastes 30+ hrs a week combing through data across multiple instances without arriving at any insights you can trust. Zenlytic is the first enterprise-grade BI tool designed for emerging commerce brands like yours. We help you understand your data so you can acquire more efficiently, improve churn, and power growth. Any BI tool can tell you churn increased by 5% last month. Only Zenlytic can tell you why. Our tech quickly identifies the friction points in your user journeys, the promotions that aren’t converting and the acquisition channels that yield low LTV/CAC scores. When you know what’s working, and what’s not, all you have to do is act. Business intelligence tools have always been built for technical users who understand SQL. Not anymore. Our powerful natural language interface empowers everybody to be data-driven.
  • 5
    SSIS Integration Toolkit
    Jump right to our product page to see our full range of data integration software, including solutions for SharePoint and Active Directory. With over 300 individual data integration tools for connectivity and productivity, our data integration solutions allow developers to take advantage of the flexibility and power of the SSIS ETL engine to integrate virtually any application or data source. You don't have to write a single line of code to make data integration happen so your development can be done in a matter of minutes. We make the most flexible integration solution on the market. Our software offers intuitive user interfaces that are flexible and easy to use. With a streamlined development experience and an extremely simple licensing model, our solution offers the best value for your investment. Our software offers many specifically designed features that help you achieve the best possible performance without having to hijack your budget.
  • 6
    Lens Autopilot
    Lens Autopilot is a DevOps as-a-Service offering that eliminates technology and operational complexity by providing teams with the necessary resources and tools to accelerate their application delivery process on top of Kubernetes. Lens Autopilot optimizes your operations with continuous proactive security and real-time monitoring and alerting, empowering your developers to focus on building and deploying valuable applications, not worrying about operational tasks. With Lens Autopilot, you work closely with a dedicated team of cloud native experts from Mirantis to transform your processes, optimize cost, and enhance security so you can accelerate your business outcomes.
  • 7
    Comake

    Comake

    Comake

    Easily create cutting-edge AI applications and unlock growth with unified data. Comake revolutionizes your data management and software landscape by consolidating fragmented data and simplifying access across your organization. Discover the right information effortlessly, exactly when you need it. Say farewell to data chaos and overwhelming complexity in your software initiatives. Experience unprecedented efficiency and productivity with Comake's seamless data unification. The future thrives on specialized, AI-driven applications that intelligently handle specific tasks. Comake enables you to establish a central hub for accessing all your data, while seamlessly integrating with the modular capabilities you build up, including automation, AI-powered processes, agents, and manual workflows. Experience the power of connected innovation with Comake. Unlock the potential of a unified data foundation with Comake's user-friendly infrastructure and technologies.
  • 8
    Autory

    Autory

    Autory

    Chain many blocks of work together. Make sure that outputs conform to your standards. Modularize working chains and combine many modules. Growing the size and possibilities of Automation like never before. Build your means and gain the power of another autonomous worker. Using Autory you can connect your tools to the power of GPT-4. Making the connections seamless with code snippets. Fetch information from many different sources to build the automation that work.
  • 9
    CloudKnit

    CloudKnit

    CloudKnit

    Open-source progressive delivery platform for managing cloud environments. It comes with dashboards to help visualize environments and observe them. Easy to read YAML format to define entire environments in a declarative way. Define entire environments using the declarative format. It enables organizations to define entire environments in a declarative way, Provision them, detect and reconcile drift, and teardown environments when no longer needed. It also comes with dashboards to help visualize environments and observe them. Environment as Code (EaC) is an abstraction over cloud-native tools that provides a declarative way of defining an entire environment. It has a control plane that manages the state of the environment, including resource dependencies, and drift detection and reconciliation. CloudKnit is an open-source progressive delivery platform for managing cloud environments. We currently support easy to use YAML format for the environment definition.
  • 10
    Common Room

    Common Room

    Common Room

    Gain complete visibility into engagement happening in digital channels. Take action to deliver personalized and authentic interactions across the entire customer journey. Empower and educate your builders. Scale your team’s impact with workflows and insights. Turn digital engagement into the pipeline. Today, your sales reps have 5% of your prospects' time during the customer journey. Community is where decisions are made. It’s where future customers discover your solution, where users ask questions for their evaluations, and where purchase decisions are made. Common Room combines engagement happening in these digital channels, product usage, and customer data to deliver intelligent insights and automated engagement that propel success across the entire customer journey. Harness digital engagement as a key input into your customer growth engine. Bring together community, product, and customer data to unlock insights and take action.
  • 11
    Cyera

    Cyera

    Cyera

    Automatically discover and classify your data, protect it from exposure, and maintain a resilient posture. Data is every business’s most crucial asset, requiring that it be the foundation of any security program. Cyera is a holistic data security platform that empowers security teams to manage and protect all of their company’s sensitive data. Cyera discovers, classifies, and protects data across IaaS, PaaS, and SaaS environments. Whether your sensitive data is in buckets, folders, or files, or managed in a self-managed database, managed database, or DBaaS environment, our solution has you covered. The most advanced data security solution is available on the market. Cyera allows security teams to apply security directly to their data, by overcoming the challenges inherent in traditional data security solutions. Choose a cloud account, tenant, or organization, and we'll automatically uncover the data you have, how it's managed, and how to remediate the security or compliance risks.
  • 12
    TimeTo

    TimeTo

    TimeTo

    Customize and deploy automation to accelerate team productivity. Prioritized focused time, reactive sprint planning, intelligent scheduling, and more, integrated with the tools you use. Expressive APIs and a flexible platform so you can choose from off-the-shelf automation and extensible custom code. Maximize deep work for the whole team with smart scheduling of flexible meetings. Smart scheduling and dynamic optimizations increase focus and amplify productivity. But more importantly, TimeTo provides actionable data to help your team adopt sustainable and productive habits. Your team's schedule can maximize or minimize productivity. From your team’s dashboard, see how time is spent and where there is room for optimization.
  • 13
    Zefi

    Zefi

    Zefi

    Understand the voice of your users and drop the time spent to align with stakeholders. Focus on what matters: your product. Zefi is designed to address a whole new software paradigm triggered by the AI revolution. In the future, we aim to create the future AI-driven Company OS, but our initial entry point is where we have experience and can better address the problem. Today, Zefi automatically aligns stakeholders, customizing the communication to multiple recipients across different channels, and solves information overload by providing suggestions based on company data scattered across apps.
  • 14
    Chkk

    Chkk

    Chkk

    Prioritize your top business-critical risks with clear and actionable insights. Continuously harden your Kubernetes availability. Learn from others and avoid repeating their mistakes. Eliminate risks before they cause incidents. Stay up to date with visibility across all your infrastructure layers. Catalog containers, clusters, add-ons, and dependencies. Consolidate insights across clouds, on-prem, and more. Get alerted about all EOL and incompatible versions. Never use spreadsheets or custom scripts again. Chkk’s mission is to enable developers to proactively prevent incidents from happening by learning from others and not repeating known mistakes. Chkk's collective learning technology mines and curates known errors, failures, and disruptions that the Kubernetes community (comprising users/operators, cloud providers, and vendors) has encountered, ensuring that past mistakes are not repeated.
  • 15
    Chromatic

    Chromatic

    Chromatic

    Chromatic takes pixel-perfect snapshots of real code, styling, and assets. Your tests reflect what your users actually experience. Chromatic creates tests from the Storybook stories already created during the development process. No need to write the same tests twice. Our custom detection algorithm eliminates flakiness from latency, animations, resource loading, and browser state. Chromatic provides a unified workspace for designers, product managers, and other stakeholders to share feedback and sign-off on UI. Post comments and change requests right beside your live components, so that everyone can follow decision-making. Automatically assign specific stakeholders to review open pull requests to speed up sign-off.
  • 16
    Stylebit

    Stylebit

    Stylebit

    Track and analyze design system adoption within your organization with ease. Understand where the system is used efficiently, and identify areas that require additional training or support. Boost collaboration across your team with our clear overview of design system usage, minimizing miscommunication and redundancies, and enhancing output quality. By keeping an eye on how well your design system is used, you can make sure users have a great time. This leads to happier, more loyal customers. Keep your design system uniform across projects with Stylebit, this helps improve brand awareness, builds customer trust, and saves time and effort. Ask any question about your design system, and connect as many code repositories as you like. Create your own AI commands and chain them together, to have important reports and analytics in front of you.
  • 17
    Levo.ai

    Levo.ai

    Levo.ai

    Levo.ai gives enterprises unparalleled visibility into their APIs while continuously discovering and documenting internal, external and partner/third-party APIs. Enterprises can then see the risk from their apps and prioritize it based on the sensitive data flows, AuthN/AuthZ usage and several other criteria. Levo.ai then continuously security tests all apps and APIs to find vulnerabilities in the SDLC as early as possible.
  • 18
    Detexian

    Detexian

    Detexian

    1 in 4 user accounts is inactive, whether due to termination, role transitions, or neglect, leading to substantial risks of cost overruns, data leaks, and breaches. Ensuring the protection of data is not only essential for maintaining trust, brand equity but also a legal requirement. However, it’s not easy to know where to start. That's why we've developed a quick, efficient 3-step solution tailored specifically to SaaS-first businesses to make informed decisions about their data protection strategy. Our security guardians will help you prioritize issues and implement solutions through our customer success program to get the best outcomes for your organization’s goals in a timely fashion.
  • 19
    Cloudoor

    Cloudoor

    Cloudoor

    Your code is verified & shaped for the cloud, your infrastructure built, your images put into safe production. Go live by a click & Cloudoor serenely deliver your code to your end-user. Add your cloud & Cloudoor set for you a modern turnkey infrastructure. Add your code & Cloudoor makes sure it doesn't contain any vulnerabilities.
  • 20
    Cohort

    Cohort

    Cohort

    Easily activate your first customer engagement journeys in just a few clicks, thanks to our ready-to-use templates. Without any technical skills, you can also build your own engagement scenarios thanks to an intuitive drag-and-drop interface. Track performance and assess easily your impact on sales and customer satisfaction. Connect social media, CMS, CRM, 
third-party apps and brand partners to easily create outstanding experiences. The plug and play marketing solution that turns brands' customer accounts into a powerful engagement channel.
  • 21
    ChatRTX

    ChatRTX

    NVIDIA

    ChatRTX is a demo app that lets you personalize a GPT large language model (LLM) connected to your own content—docs, notes, images, or other data. Leveraging retrieval-augmented generation (RAG), TensorRT-LLM, and RTX acceleration, you can query a custom chatbot to quickly get contextually relevant answers. And because it all runs locally on your Windows RTX PC or workstation, you’ll get fast and secure results. ChatRTX supports various file formats, including text, PDF, doc/docx, JPG, PNG, GIF, and XML. Simply point the application at the folder containing your files and it'll load them into the library in a matter of seconds. ChatRTX features an automatic speech recognition system that uses AI to process spoken language and provide text responses with support for multiple languages. Simply click the microphone icon and talk to ChatRTX to get started.
  • 22
    CyberArrow

    CyberArrow

    CyberArrow

    Automate the implementation & certification of 50+ cybersecurity standards without having to attend audits. Improve and prove your security posture in real-time. CyberArrow simplifies the implementation of cyber security standards by automating as much as 90% of the work involved. Obtain cybersecurity compliance and certifications quickly with automation. Put cybersecurity on autopilot with CyberArrow’s continuous monitoring and automated security assessments. Get certified against leading standards via a zero-touch approach. The audit is carried out by auditors using the CyberArrow platform. Get expert cyber security advice from a dedicated virtual CISO through the chat function. Get certified against leading standards in weeks, not months. Safeguard personal data, comply with privacy laws, and earn the trust of your users. Secure cardholder information and instill confidence in your payment processing systems.
  • 23
    Clutch

    Clutch

    Clutch

    Clutch is addressing the increasingly critical challenge of non-human identity security within modern enterprises. As digital infrastructures expand and become more complex, the management and security of non-human identities, ranging from API keys and secrets to tokens and service accounts, have emerged as a pivotal yet often neglected aspect of cybersecurity. Recognizing this gap, Clutch is developing an enterprise platform dedicated to the comprehensive protection and management of these identities. Our solution is designed to fortify the digital backbone of enterprises, ensuring a secure, resilient, and trustworthy environment for their operations. Ever expanding, outpacing human identities by a staggering ratio of 45 to 1. Holds critical privileges and extensive access, essential for mission-critical automated processes. Lacks inherent security controls such as MFA and conditional access policies.
  • 24
    Entro

    Entro

    Entro Security

    Non-Human Identity & Secrets Security Platform. A pioneer in non-human identity management, Entro enables organizations to securely utilize non-human identities and secrets, overseeing their usage and automating their lifecycle from inception to rotation. Secrets-based cyber attacks are devastating and growing as more and more secrets are created by R&D teams and spread across various vaults and repositories with no real secret management, monitoring, or security oversight. Streamline and secure your non-human identity lifecycle management. With Entro, security teams can now oversee and protect Non-human identities with automated lifecycle management and seamless integration, ensuring comprehensive security & compliance through a unified interface.
  • 25
    Clarity Security

    Clarity Security

    Clarity Security

    Eliminate audit angst with 10-minute user access reviews, flexible provisioning/de-provisioning workflows, and audit-friendly reporting, all in one simple, scalable IGA platform. White-glove onboarding takes the burden of implementing a solution off of team members reducing the impact on other IT initiatives. Automated evidence collection into a downloadable ledger mitigates the need for wasted time gathering spreadsheets, screenshots, etc. Nested entitlements and Clarity Explorer provide insight into what’s giving users access and why they’re being granted that access. True role-based access control (RBAC) and automated workflows for full alignment with your organizational structure and needs. Unlike "traditional" manual methods, Clarity has everything you need to quickly upgrade your identity governance program and seamlessly adapt it as your organization grows. Fast reviews for certifying user access, entitlements, roles, application access, and more.
  • 26
    Compyl

    Compyl

    Compyl

    Your GRC program should reflect your business. The Compyl platform puts you in charge by helping your organization scale and mature your GRC in the way that’s best for how work gets done across your organization. A unified, flexible GRC platform helping you reduce risk, stay compliant, and drive growth. Compliance teams are stretched thin and struggle to keep up. Automate error-prone, time-consuming manual processes and give your team back time to focus on priority work. Compliance alone isn’t sufficient to reduce organizational risk. You need clear visibility into your risk posture to take proactive action and demonstrate risk reduction over time. Functional and application silos can create risk gaps and blind spots. You need a single, consolidated view of risk to convey risk impact and enable better decision-making. Consolidate all compliance and risk activities in a single, unified platform.
  • 27
    Data Sentinel

    Data Sentinel

    Data Sentinel

    As a business leader, you need to trust your data and be 100% certain that it’s well-governed, compliant, and accurate. Including all data, in all sources, and in all locations, without limitations. Understand your data assets. Audit for risk, compliance, and quality in support of your project. Catalog a complete data inventory across all sources and data types, creating a shared understanding of your data assets. Run a one-time, fast, affordable, and accurate audit of your data. PCI, PII, and PHI audits are fast, accurate, and complete. As a service, with no software to purchase. Measure and audit data quality and data duplication across all of your enterprise data assets, cloud-native and on-premises. Comply with global data privacy regulations at scale. Discover, classify, track, trace and audit privacy compliance. Monitor PII/PCI/PHI data propagation and automate DSAR compliance processes.
  • 28
    ClaimBuster

    ClaimBuster

    ClaimBuster

    ClaimBuster is the umbrella under which all fact-checking related projects for the IDIR Lab fall under. It started as an effort to create an AI model that could automatically detect claims worth checking. Since then it has steadily made progress towards the holy grail of automated fact-checking. ClaimBuster is mainly used by journalists, but in reality, anyone interested in tackling misinformation can make use of it. Our API provides easy access to our models and is accessible by just registering for a free API key. ClaimBuster is made possible by human data-labeling contributions. Feel free to sign up for an account and begin labeling to help us deliver better models. We have also open-sourced our machine learning model training code, so if you are a savvy AI engineer feel free to make contributions there as well. Our claim-spotting model re-tweets tweets it thinks may need fact-checking.
  • 29
    Kubevious

    Kubevious

    Kubevious

    Kubevious helps you avoid breaking apps and producing bad or conflicting configurations. It brings operational safety to your apps and makes your teams efficient and successful, without interfering with existing DevOps processes. Kubevious helps Kubernetes operators to quickly identify configuration specifics, inconsistencies, compliance, and best practices violations. Kubevious application-centric UI is unique. By correlating configurations, it allows operators to be efficient and get the most out of Kubernetes. Kubevious validates and enforces cloud-native best practices. Achieve ultimate safety across all domains: application configuration, state, RBAC, storage, networking, service mesh, and more. Kubernetes operators love the user friendly and intuitive interface provided by Kubevious. Kubevious is equipped with rules engine which was purposely build to enforce application and cloud native best practices in Kubernetes.
  • 30
    Canonic Security

    Canonic Security

    Canonic Security

    SaaS-based organizations use Canonic to reduce their attack surface, detect SaaS-native threats, and automate response. Business apps are proliferating. Add-ons and API extensions are even more so. Users are taking full advantage of the new app world, its access, and ease of interconnection. But app-to-app integration benefits also come with a new landscape of risks. Uncover rogue and vulnerable apps, Assess each integration posture, behavior, and the risk involved with its API access. Quarantine suspicious apps, reduce excessive and inappropriate privileges, and revoke and block access if necessary. Enable app integrations by automating app-vetting and app access recertification processes. Map and analyze apps, services, add-ons, and other integrations blast radius. Uncover vulnerable, abused, and misconfigured integrations. Continuously monitor behavior, revoke access if necessary, and streamline end-user notifications.