Business Software for GitLab - Page 20

Top Software that integrates with GitLab as of August 2025 - Page 20

GitLab Clear Filters
  • 1
    Faraday

    Faraday

    Faraday

    Powering B2C growth with actionable AI. Rich consumer data, proven algorithms, turnkey integrations — it’s all built in and ready to power your growth in 6-8 weeks. Prioritize, personalize, and optimize every interaction. Expand your reach and focus your ad spend on the right people. With Reach, you can build custom lookalike audiences from over 290MM U.S. consumers and target them across any channel, online and offline. We do one thing: AI for the B2C customer lifecycle, and we’ve been the market leader for 5+ years. We’re connected to 260+ systems, optimizing your work with AI wherever you spend your day. We practice data non-proliferation. You get access to rich data without seeing any one person’s details.
  • 2
    effx

    effx

    effx

    The simplest way to navigate and operate your microservices. Whether you only have two or thousands of microservices, effx will track and guide you regardless of orchestration system, public cloud, or on-premise environment. Incidents across a fleet of microservices are rarely simple. effx provides context to help you orient around the potential causes of every outage in real-time. You’ve invested in your ability to know when production breaks. We help you proactively prepare for those moments by scoring services on key attributes that ensure they’re ready.
  • 3
    Sweagle

    Sweagle

    Sweagle

    The easy way to control configuration data. Firstly, Sweagle makes it easy to manage all the configuration data from infra, applications and environments into a consolidated data model with full life cycle support. Secondly, Sweagle handles who sees what with intelligent role-based access controls and automatically encrypts secrets or sensitive data - so it never enters a release environment. Last, but not least, with zero effort on your part, you get continuous and automatic validation of configuration data from absolutely any environment, tool or team. It's a fact that no matter the industry, configuration data matters. Sweagle is super successful at bringing configuration data order to complex, global organizations like banking, insurance and telecommunications. Think about it... configuration data is everywhere. If you want to release more quickly, frequently and accurately, you have to manage, test and validate all that data.
  • 4
    Peoplelogic.ai

    Peoplelogic.ai

    Peoplelogic

    For $49 dollars a month, leaders can save over $10,000 dollars a year in improved customer retention, reduced employee attrition, and fewer unnecessary meetings. Not only do we help identify business optimizations like reducing wasted time and increasing employee satisfaction, but we can also help you spot potential issues around customers to increase your retention and help deliver a superior employee experience which reduces attrition. These are problems all growing companies face—and trust us we get it, we’ve been there. That’s why we’ve decided to make Peoplelogic.ai perfectly affordable, easy to use, and stupid simple to achieve an ROI. We’re partners in your growth, onwards and upwards! Peoplelogic connects to the tools your teams use to get work done with a few clicks. The platform will start to notice workflow patterns, detect repeated interactions, and discover critical lines of communication—guiding you to take actionable steps to optimize your workflows.
    Starting Price: $49 per month
  • 5
    Nightfall

    Nightfall

    Nightfall

    Discover, classify, and protect your sensitive data. Nightfall™ uses machine learning to identify business-critical data, like customer PII, across your SaaS, APIs, and data infrastructure, so you can manage & protect it. Integrate in minutes with cloud services via APIs to monitor data without agents. Machine learning classifies your sensitive data & PII with high accuracy, so nothing gets missed. Setup automated workflows for quarantines, deletions, alerts, and more - saving you time and keeping your business safe. Nightfall integrates directly with all your SaaS, APIs, and data infrastructure. Start building with Nightfall’s APIs for sensitive data classification & protection for free. Via REST API, programmatically get structured results from Nightfall’s deep learning-based detectors for things like credit card numbers, API keys, and more. Integrate with just a few lines of code. Seamlessly add data classification to your applications & workflows using Nightfall's REST API.
  • 6
    Revenera SCA
    Take control of your open source software management. Empower your organization to manage open source software (OSS) and third-party components. FlexNet Code Insight helps development, legal and security teams to reduce open source security risk and manage license compliance with an end-to-end system. FlexNet Code Insight is a single integrated solution for open source license compliance and security. Find vulnerabilities and remediate associated risk while you build your products and during their entire lifecycle. Manage open source license compliance, add automation to your processes, and implement a formal OSS strategy that balances business benefits and risk management. Integrate with build tools, CI/CD and SCM tools, artifact repositories, external repositories or build your own integrations using the FlexNet Code Insight REST API framework to make code scanning easy and effective.
  • 7
    SOAtest

    SOAtest

    Parasoft

    Anchored in artificial intelligence (AI) and machine learning (ML), Parasoft SOAtest simplifies the complexity of functional testing across APIs, UIs, databases, and more. Change management systems continuously monitor quality, making the API and web service testing tool a perfect fit for Agile DevOps environments. Parasoft SOAtest delivers fully integrated API and web service testing tools that automate end-to-end functional API testing. Streamline automated testing with advanced functional test-creation capabilities for applications with multiple interfaces (REST & SOAP APIs, microservices, databases, and more). The tools reduce the risk of security breaches and performance outages by transforming functional testing artifacts into security and load equivalents. Such reuse, along with continuous monitoring of API for change, allows faster and more efficient testing.
  • 8
    BMC Compuware Hiperstation
    Perform More Testing in Less Time to Meet Performance Demands Hiperstation provides automated load, performance and regression testing capabilities that help DevOps teams perform more testing in less time and on a more consistent basis while ensuring applications meet production performance and reliability criteria. Hiperstation enables developers to create automated, consistent, repeatable regression and performance tests representing application business requirements. Conduct pre-production performance testing for applications and systems software. Analyze test results in which all application response differences are identified. Thoroughly document mainframe application testing results. Simulate server application responses during a user interface test. Test operating system, language environment or subsystem changes. Test application changes without a user interface.
  • 9
    BMC Compuware File-AID
    Today’s Agile DevOps teams need the ability to go faster. BMC Compuware File-AID provides a cross-platform file and data management solution that enables developers and QA staff to quickly and conveniently access necessary data and files instead of hunting around for them. In turn, developers devote less time to data-related tasks and spend more time developing new functionality and managing production problems. Rightsizing your test data provides confidence to make code changes without unintended consequences. Access all standard file types regardless of record length or format for application integration. Compare data files or objects to simplify the test results validation process. Reformat files by easily modifying an existing file format instead of starting from scratch. Extract and load related subsets of data from multiple databases and files & more.
  • 10
    Pulumi

    Pulumi

    Pulumi

    Modern Infrastructure as Code. Create, deploy, and manage infrastructure on any cloud using familiar programming languages and tools. Many clouds, one workflow. Use the same language, tools, and workflow, on any cloud. Collaborate. Harmonize your engineering practices between developers and operators. Easy continuous delivery. Deploy from the CLI, or integrate with your favorite CI/CD system, and review all changes before they are made. Tame complexity. Gain visibility across all of your environments. Audit and secure. Know who changed what, when, and why. Enforce deployment policies with your identity provider of choice. Secrets management. Keep secrets safe with easy, built-in encrypted configuration. Familiar programming languages. Define infrastructure in JavaScript, TypeScript, Python, Go, or any .NET language, including C#, F#, and VB. Your favorite tools. Use familiar IDEs, test frameworks, and tools. Share and reuse. Codify best practices and policies.
  • 11
    Pipedream

    Pipedream

    Pipedream

    The fastest way to integrate APIs and run code. Pipedream is a serverless integration and compute platform that makes it easy to connect apps and develop event-driven workflows. Event sources turn any API into a real-time event stream. Create event sources to listen for new Tweets, Github events, Airtable records, RSS items, webhook events and more. Inspect events in a human-friendly way, trigger Node.js workflows on every event, or consume events in your own app via API. Workflows are composed of Node.js code steps that run on every event. Write your own Node.js (and use any npm package) or reuse actions that scaffold popular APIs. Trigger via sources or a custom URL, email address, SDK code or schedule. Auth apps once, connect to those apps in any workflow. Pipedream supports OAuth and key-based auth, and handles the OAuth flow and token refresh for you. Just link accounts to steps and reference the relevant auth info in code.
    Starting Price: Free
  • 12
    Seeker

    Seeker

    Black Duck

    Seeker® is an interactive application security testing (IAST) solution that provides unparalleled visibility into your web application's security posture. It identifies vulnerability trends against compliance standards such as OWASP Top 10, PCI DSS, GDPR, CAPEC, and CWE/SANS Top 25. Seeker enables security teams to track sensitive data, ensuring it is handled securely and not stored in log files or databases without proper encryption. Its seamless integration into DevOps CI/CD workflows allows for continuous application security testing and verification. Unlike other IAST solutions, Seeker not only identifies security vulnerabilities but also verifies their exploitability, providing developers with a prioritized list of confirmed issues to address. By employing patented methods, Seeker processes extensive HTTP(S) requests swiftly, reducing false positives to near zero and enhancing productivity while minimizing business risk.
  • 13
    bugScout

    bugScout

    bugScout

    Platform for detecting security vulnerabilities and analyzing code quality of applications. bugScout was born in 2010, with the objective of promoting global application security through audit and DevOps processes. Our purpose is to promote a culture of safe development and thus provide protection for your company’s information, assets and reputation. Designed by ethical hackers and reputable security auditors, bugScout® follows international security rules and standards and is at the forefront of cybercrime techniques to keep our customers’ applications safe and secure. We combine security with quality, offering the lowest false positive rate on the market and the fastest analysis. Lightest platform on the market, 100% integrated with SonarQube. A platform that unites SAST and IAST, promoting the most complete and versatile source code audit on the market for the detection of Application Security Vulnerabilities.
  • 14
    Akeyless Vault
    Protect and automate access to credentials, keys, tokens, and API-Keys across your DevOps tools and Cloud platforms using a secured vault
  • 15
    Oracle Container Engine for Kubernetes
    Container Engine for Kubernetes (OKE) is an Oracle-managed container orchestration service that can reduce the time and cost to build modern cloud native applications. Unlike most other vendors, Oracle Cloud Infrastructure provides Container Engine for Kubernetes as a free service that runs on higher-performance, lower-cost compute shapes. DevOps engineers can use unmodified, open source Kubernetes for application workload portability and to simplify operations with automatic updates and patching. Deploy Kubernetes clusters including the underlying virtual cloud networks, internet gateways, and NAT gateways with a single click. Automate Kubernetes operations with web-based REST API and CLI for all actions including Kubernetes cluster creation, scaling, and operations. Oracle Container Engine for Kubernetes does not charge for cluster management. Easily and quickly upgrade container clusters, with zero downtime, to keep them up to date with the latest stable version of Kubernetes.
  • 16
    Stackhero

    Stackhero

    Stackhero

    We host and manage services like PostgreSQL, Graylog, RabbitMQ, MariaDB, Elasticsearch, Redis and dozen more. Start your services in just 2 minutes and be production ready instantly. Focus on your business, not on your infrastructure anymore. Our catalog contains dozen of services and we add new ones each month. You'll no longer have to juggle between cloud providers and technical solutions. Our pricing is clear and simple, without surprises at the end of the month. Start a small infrastructure and make it choose your instance up to 16 vCPUs and 64 GB of RAM and scale it as your business grows. as your business grows. We optimize the hardware and tune the software to get a blazing fast solution. We use open source solutions so you're not locked into proprietary, dark ones. You and your data are free to move when you want, where want. Create and delete services when you want, you'll be billed per hour of use and will receive a single clear invoice, each month, with all the details.
  • 17
    ServiceNow Vaccine Management
    The ServiceNow® Vaccine Administration Management application enables organizations, such as governments and healthcare providers, to create and manage vaccination programs. Vaccine recipients can visit a self-service portal to review and provide privacy consent, use the knowledge base or Virtual Agent to address common questions, and self-schedule their appointment after responding to an eligibility questionnaire. Providers can schedule appointments for groups of eligible recipients, notify citizens and patients, administer and record vaccinations, and manage vaccination tasks. Request, reschedule, and cancel vaccination appointments, collect relevant pre-vaccination information and privacy consent, notify and remind users via email about upcoming appointments, schedule appointments for groups of eligible recipients, administer and record vaccinations.
  • 18
    Cortex Cloud

    Cortex Cloud

    Palo Alto Networks

    Cortex Cloud from Palo Alto Networks is a cutting-edge platform designed to provide real-time cloud security across the entire software delivery lifecycle. By combining Cloud Detection and Response (CDR) with advanced Cloud Native Application Protection Platform (CNAPP), Cortex Cloud offers unified visibility and proactive security for code, cloud, and SOC environments. It enables teams to prevent and respond to threats quickly with AI-driven risk prioritization, runtime protection, and automated remediation. With seamless integration across multicloud environments, Cortex Cloud ensures scalable and efficient protection for modern cloud-native applications.
  • 19
    Secureframe

    Secureframe

    Secureframe

    Secureframe helps organizations get SOC 2 and ISO 27001 compliant the smart way. We help you stay secure at every stage of growth. Get SOC 2 ready in weeks, not months. Preparing for a SOC 2 can be confusing and full of surprises. We believe achieving best-in-class security should be transparent at every step. With our clear pricing and process, know exactly what you’re getting from the start. You don’t have time to fetch your vendor data or manually onboard employees. We’ve streamlined every step for you, automating hundreds of manual tasks. Your employees can easily onboard themselves through our seamless workflows, saving you both time. Maintain your SOC 2 with ease. Our alerts and reports notify you when there’s a critical vulnerability, so you can fix it quickly. Get detailed guidance for correcting each issue, so you know you’ve done it right. Get support from our team of security and compliance experts. We strive to respond to questions in 1 business day or less.
  • 20
    HashiCorp Waypoint
    Waypoint uses a single configuration file and common workflow to manage and observe deployments across platforms such as Kubernetes, Nomad, EC2, Google Cloud Run, and more. Waypoint builds applications for any language or framework. You can use Buildpacks for automatically building common frameworks or custom Dockerfiles or other build tools for more fine-grained control. The build step is where your application and assets are compiled, validated, and an artifact is created. This artifact can be published to a remote registry or simply passed to the deploy step. Waypoint deploys artifacts created by the build step to a variety of platforms, from Kubernetes to EC2 to static site hosts. It configures your target platform and prepares the new application version to be publicly accessible. Deployments are accessible via a preview URL prior to release. Waypoint releases your staged deployments and makes them accessible to the public.
  • 21
    BMC Compuware ISPW
    A modern mainframe CI/CD tool can ensure your mainframe code pipelines are secure, stable, and streamlined throughout the DevOps lifecycle. With BMC Compuware ISPW, you’ll have the confidence of knowing that you can quickly and safely build, test, and deploy mainframe code. ISPW empowers developers of all experience levels to increase the quality, velocity, and efficiency of software development and delivery. Use ISPW for mainframe source code management (SCM) as well as build and deploy, or with enterprise Git. Connect with modern DevOps toolchains using REST APIs and command line interfaces (CLIs). Flexibility to work in Eclipse-based Topaz, ISPF, or VS Code. Automate, standardize, and monitor deployments into multiple target environments. Support multiple developers working on the same program at the same time. Catch conflicts early with intuitive displays that show the real-time status of all programs throughout the lifecycle.
  • 22
    Drata

    Drata

    Drata

    Drata is the world’s most advanced security and compliance automation platform with the mission to help companies earn and keep the trust of their users, customers, partners, and prospects. Drata helps hundreds of companies streamline their SOC 2 compliance through continuous, automated control monitoring and evidence collection, resulting in lower costs and less time spent preparing for annual audits. The company is backed by Cowboy Ventures, Leaders Fund, SV Angel, and many key industry leaders. Drata is based in San Diego, CA.
    Starting Price: $10,000/year
  • 23
    Apiiro

    Apiiro

    Apiiro

    Complete risk visibility with every change, from design to code to cloud. Industry-first Code Risk Platform™ A 360° view of security & compliance risks across applications, infrastructure, developers’ knowledge & business impact. Data-driven decisions are better decisions. Understand your security & compliance risks with a real-time inventory of apps & infra code behavior, devs knowledge, 3rd-party security alerts & business impact. From design to code to cloud. Security architects don’t have time to review every change & investigate every alert. Make the most of their expertise by analyzing context across developers, code & cloud to identify risky material changes & automatically build an actionable workplan. No one likes manual risk questionnaires, security & compliance reviews - they’re tedious, inaccurate & not synced with the code. When the code is the design, we must do better - trigger contextual & automatic workflows.
  • 24
    Atom

    Atom

    Atom

    We’re not most banks. In fact, we are the UK’s first app-based bank, here to make things better for you. Our award-winning customer service and competitive mortgage and savings rates keep our thousands of customers smiling. We’ve got what you’re looking for. All of our products are designed to be simple, straightforward and hassle-free. And because we don’t have to fork out for expensive branches, we can offer you better rates. At least one of our savings products was at the top of best buy table for a total of 116 days last year. Why not take a look at our range of savings products which are all protected under the FSCS. We offer competitive rates, advice on what’s best for you through our independent brokers and a process you can follow step-by-step, all in app. Take your savings and mortgages with you wherever you are, 24/7. We’ve done away with fiddly keypads and instead use your face and voice as your password. Simple. After all, we’re all about you.
  • 25
    Cycode

    Cycode

    Cycode

    A platform for security, governance, and pipeline integrity for all your development tools & infrastructure. Harden your source control management systems (SCM), find secrets, leaks and prevent code tampering. Scan your CI/CD settings and Infrastructure-as-Code (IaC) for security misconfiguration. Identify drift between production systems IaC configurations and prevent source code tampering. Stop developers from inadvertently exposing proprietary code in public repositories, fingerprint code assets and proactively identify exposure on public sites. Inventory assets, enforce security policies, and easily demonstrate compliance across all your DevOps tools and infrastructure, both in the cloud and on-premises. Scan IaC for security misconfigurations and ensure compliance between defined IaC configurations and production infrastructure. Scan every commit or pull/merge request for hard-coded secrets and prevent them from reaching the master branch across all SCMs and programming languages.
  • 26
    HPE Ezmeral

    HPE Ezmeral

    Hewlett Packard Enterprise

    Run, manage, control and secure the apps, data and IT that run your business, from edge to cloud. HPE Ezmeral advances digital transformation initiatives by shifting time and resources from IT operations to innovations. Modernize your apps. Simplify your Ops. And harness data to go from insights to impact. Accelerate time-to-value by deploying Kubernetes at scale with integrated persistent data storage for app modernization on bare metal or VMs, in your data center, on any cloud or at the edge. Harness data and get insights faster by operationalizing the end-to-end process to build data pipelines. Bring DevOps agility to the machine learning lifecycle, and deliver a unified data fabric. Boost efficiency and agility in IT Ops with automation and advanced artificial intelligence. And provide security and control to eliminate risk and reduce costs. HPE Ezmeral Container Platform provides an enterprise-grade platform to deploy Kubernetes at scale for a wide range of use cases.
  • 27
    Permeasyon

    Permeasyon

    Anduseit

    Employees come and go. Depending on your company sector and size, you may be hiring new employees very often. And every time a new employee starts in your company, he needs to have access to different applications. Different people will need to be contacted to authorize and assign all the permissions, which may take several days with the consequent loss of working time. However, Permeasyon solves this task within minutes. The needs of a company vary over time: new projects that start and others that finish, but also projects that move to maintenance needing less human resources and, more critical, projects requiring higher resources for some time to meet deadlines or client requirements. These situations mean an urgent need to relocate current employees, adding or removing permissions to those users to accomplish with important milestones. How can you correctly relocate the users in a timely and efficient way when needed? Permeasyon is the perfect tool to help you achieve this task.
  • 28
    Functionize

    Functionize

    Functionize

    Today’s speed of change demands a new way of testing. Empower your teams to build smart tests that don’t break and can scale in the cloud. Rapidly create AI powered tests using the smart agent (Architect) or convert steps written in plain-text English into automation using natural language processing. Stop wasting time fixing broken tests. Functionize dynamically updates your tests using machine learning to keep up with UI changes. Quickly diagnose test failures with one-click SmartFix suggestions. Quickly diagnose failures with screenshot comparisons and and easy to understand errors. Interact with your test while it runs live on the VM using breakpoints with Live Debug. Update your tests using Smart Screenshots and apply one-click SmartFix suggestions. Eliminate test infrastructure. Run as many tests as often as needed across all major browsers at scale using Functionize’s Test Cloud.
  • 29
    DNSWatch

    DNSWatch

    WatchGuard

    WatchGuard DNSWatch is a Cloud-based service adding DNS-level filtering to detect and block potentially dangerous connections and protect networks and employees from damaging attacks. WatchGuard analysts triage any critical alerts, following up with an easy-to-understand accounting that includes detailed insights about the potential infection. When the attack uses phishing, and an employee clicks the link, DNSWatch automatically redirects them away from the malicious site and offers resources that reinforce phishing education. Hackers rely on DNS to execute attacks on unsuspecting victims, so careful examination of DNS requests is a great way to find and ultimately intercept attacks! DNSWatch brings DNS-level filtering into our Total Security Suite, providing an added layer of security to stop malware infections. Unwitting attempts to connect to known malicious DNS addresses by your users are automatically blocked, and the user is seamlessly redirected to a safe landing page.
  • 30
    Apache Yetus

    Apache Yetus

    Apache Software Foundation

    Apache Yetus is a collection of libraries and tools that enable contribution and release processes for software projects. It provides a robust system for automatically checking new contributions against a variety of community accepted requirements, the means to document a well defined supported interface for downstream projects, and tooling to help release managers generate release documentation based on the information provided by community issue trackers and source repositories. Most of the software is written in shell and scripting languages. In honor of the shell code, the project takes its name. Yetus from a synonym of the Cymbium genus of gastropods. The Yetus Precommit build, patch, and CI suite allows projects to codify their patch acceptance criteria and then evaluate incoming contributions prior to review by a committer. Audience Annotations allows you to use Java Annotations to denote which parts of your Java library is publicly consumable.