Business Software for GitLab - Page 23

Top Software that integrates with GitLab as of August 2025 - Page 23

GitLab Clear Filters
  • 1
    Beamible

    Beamible

    Beamible

    The ultimate tool for leaders to solve HR challenges in the modern world of work. Arm your organization with visibility and data to help identify and diagnose risks. Then use those insights to redesign and rebuild work to meet your business goals, using good work design to reduce work volume and achieve business objectives post-survey. Manage capacity gaps, prioritize, fix coverage and backfill problems when people leave, and eliminate unimportant work. Flag risks quickly using intelligent insights and lean on data when you need to make critical decisions. See how strategically aligned work is to business goals, and scenario plan when changes arise or things become unclear. Implement flexible working consistently, fairly, and compliantly to meet both employee and organizational needs. Capture what your people are really spending time on, identify inefficiencies, risks, and missed opportunities, scenario plan, implement changes, and repeat.
  • 2
    Offensive 360

    Offensive 360

    Offensive 360

    We’ve spent years researching and developing an all-in-one product that is affordable for any organization, offering the best quality ever seen in the SAST industry. We’ve spent years in research to create an all-in-one product that is affordable to any organization with the best quality ever in the industry. O’360 conducts an in-depth source code examination, identifying flaws in the open-source components used in your project. In addition, it offers malware analysis, licensing analysis, and IaC, all enabled by our “brain” technology. Offensive 360 is developed by cybersecurity researchers, not by investors. It is unlimited, as we don’t charge you based on lines of code, projects, or users. Moreover, O360 identifies vulnerabilities that most SAST tools in the market would never find.
  • 3
    OpsMx Enterprise for Spinnaker
    OES is highly available and scalable for increasing deployment workloads, and extensible to integrate with multiple SDLC tool chains. OES offers easy-to-define custom stages to parallely deploy into any number of targets and save time. Action such as rollback or roll forward or stopping of all the parallel deployments is easy and can be done with a click. Automate repeated activities in your SDLC process by the ability to create as many child pipelines and invoke them in the parent pipeline. OES is modular and can act as a central CD tool for many enterprises because it uses an API-based architecture. Developers across the team can easily integrate external services with Spinnaker services for deployment orchestration.
  • 4
    Kindo

    Kindo

    Kindo

    Kindo is here and work will never be the same. With just a few clicks, connect to any AI model, integrate with your current apps, and offload your endless tasks with workflows. Kindo streamlines your work so you get to focus on the best parts of your job—not all that extra stuff. The first self-serve Al platform that connects OpenAI's ChatGPT, Google Bard, Cohere Claude or any preferred AI model to your company's data in a secure and private manner. Work efficiently with seamless Al search, connect up to 200+ SaaS integrations, and easily create no-code AI-powered workflows. Ask questions about your data and get answers within seconds, no more having to dig through spreadsheets or wikis—Kindo securely layers AI tools over your existing apps to tackle all your burning questions.
  • 5
    MettleCI

    MettleCI

    Data Migrators

    Reducing the time, cost, risk, uncertainty, and stress of DataStage delivery. Ensure all jobs comply with your coding standards, or use MettleCI's extensive library of best practices. Manage code in Git, directly from the DataStage Designer client, without any command line headaches. Promote your code from Development to Production using a fully-automated delivery pipeline. Give sequences the boot and allow MettleCI to build and run your job schedule automatically. Let MettleCI handle the heavy lifting of testing to ensure your builds are deployable without problems. No command lines, hacking, or complex config files. Test, build, and deploy using point-and-click.
  • 6
    Second State

    Second State

    Second State

    Fast, lightweight, portable, rust-powered, and OpenAI compatible. We work with cloud providers, especially edge cloud/CDN compute providers, to support microservices for web apps. Use cases include AI inference, database access, CRM, ecommerce, workflow management, and server-side rendering. We work with streaming frameworks and databases to support embedded serverless functions for data filtering and analytics. The serverless functions could be database UDFs. They could also be embedded in data ingest or query result streams. Take full advantage of the GPUs, write once, and run anywhere. Get started with the Llama 2 series of models on your own device in 5 minutes. Retrieval-argumented generation (RAG) is a very popular approach to building AI agents with external knowledge bases. Create an HTTP microservice for image classification. It runs YOLO and Mediapipe models at native GPU speed.
  • 7
    Opus Security

    Opus Security

    Opus Security

    Prioritize what really matters based on risk, contextual analysis, and event de-duplication. Manage the full remediation lifecycle and eliminate manual effort from the remediation process by introducing automation throughout. Drive cross-organizational initiatives with ease. Consolidate all your issues across posture management and vulnerability tools. Drastically reduce the number of issues by identifying common root causes, and get clear visibility and in-depth reporting. Effectively collaborate with distributed teams within their own tools. Deliver a personalized, relevant experience for every engineer. Provide actionable remediation guidance and practical code suggestions. Easily adapt to your own organizational structure. A centralized, unified platform designed to drive effective remediation across any attack surface, any tool, and any stakeholder. Easily integrating with existing posture management and vulnerability tools, Opus provides much-needed visibility.
  • 8
    Unified.to

    Unified.to

    Unified.to

    Ship the integrations your customers and prospects need now and watch your revenue soar, without compromising your core product. Deliver secure, deep and powerful integrations for all kinds of use cases with advanced observability and security features. We never store your customers' data, plus, you can even securely store your customers' OAUTH2 access tokens in your AWS Secrets Manager account. Keep your customers' credentials secure with OAUTH2 authentication while giving your customers full control to revoke access tokens anytime. Take charge of branding and security by using your OAUTH2 client IDS and secrets, giving your application full autonomy over authorization pages and access tokens. Skip the headache of juggling different APIs and complex data transformations. Simplify your integration process with one API and one data model.
    Starting Price: $250 per month
  • 9
    Daytona

    Daytona

    Daytona

    Daytona is the enterprise-grade GitHub Codespaces alternative for managing self-hosted, secure, and standardized development environments. Daytona supports dev containers and works with any IDE. You can self-host it on your own infrastructure and immediately benefit from high-density workspaces. Daytona ensures that development environments remain consistent and predictable throughout the DevOps lifecycle to boost developers' confidence in code deployment. Daytona enables team members and contractors to start contributing right away, reducing onboarding time and providing instant access to perfectly configured environments. Daytona scales with development requirements and removes constraints of local machines, providing computing power to handle any project size and complexity. Daytona allows developers to work on multiple projects by instantly running dev environments, including testing the same branch on multiple environments simultaneously.
  • 10
    Compass

    Compass

    Atlassian

    Catalog everything, improve software health, and keep everyone in the flow with Atlassian’s Developer Experience Platform. Track all of your services and systems, improve your software health and engineering standards, and create a better developer experience with Compass Track software health metrics, apply security and health scorecards, and empower teams to improve their developer experience. Never get stuck searching during an incident. Quickly identify who owns a service and critical details including recent changes, dependencies, errors, and more. Easily track DORA, SPACE and DevEx metrics across teams and services to identify bottlenecks and improve your Developer Experience. Don’t get lost in the wilderness of repos, channels, or docs. Whether on-call or building a new service, reduce time spent searching with all of the details you need in one catalog.
  • 11
    Quindar

    Quindar

    Quindar

    Monitor, control, and automate spacecraft operations. Operate multiple missions, diverse satellites, 
and various payloads within a unified interface. Control multiple satellite types in a single interface allowing for legacy fleet migration and next-gen payload support. Track spacecraft, reserve contacts, automate tasking, and intelligently respond to ground and space incidents with Quindar Mission Management. Harness the power of advanced analytics and machine learning to turn data into actionable intelligence. Make decisions faster via predictive maintenance, trend analysis, and anomaly detection. Leveraging data-driven insights that propel your mission forward. Built to integrate seamlessly with your existing systems and third-party applications. As your needs evolve, your operations can too without the constraint of vendor lock-in. Analyze flight paths and commands across most C2 systems.
  • 12
    Blink

    Blink

    Blink Ops

    Blink is an ROI force multiplier for security teams and business leaders looking to quickly and easily secure a wide variety of use cases. Get full visibility and coverage of alerts across your organization and security stack. Utilize automated flows to reduce noise and false positives in alerts. Scan for attacks and proactively identify insider threats and vulnerabilities. Create automated workflows that add relevant context, streamline communications, and reduce MTTR. Take action on alerts and improve your cloud security posture with no-code automation and generative AI. Shift-left access requests, streamline approvals flows, and unblock developers while keeping your applications secure. Continuously monitor your application for SOC2, ISO, GDPR, or other compliance checks and enforce controls.
  • 13
    Anycode AI

    Anycode AI

    Anycode AI

    The only auto-pilot agent that works with your unique software development workflow. Anycode AI converts your whole Legacy codebase to modern tech stacks up to 8X faster. Boost your coding speed tenfold with Anycode AI. Utilize AI for rapid, compliant coding and testing. Modernize swiftly with Anycode AI. Effortlessly handle legacy code and embrace updates for efficient applications. Upgrade seamlessly from outdated systems. Our platform refines old logic for a smooth transition to advanced tech.
  • 14
    OpenContext

    OpenContext

    OpenContext

    OpenContext eliminates drift and provides the insight DevOps folks need to reduce toil. OpenContext unites all aspects of the socio-technical stack, connecting your code to artifacts in the cloud into a graph-based view. Our always-growing integration ecosystem tells the whole story of your tech stack. OpenContext discovers your socio-technical graph in real time, tracking the data lineage and best practices that ensure your team is audit-ready. We’ll show you exactly who has the relevant knowledge to address the problem, finding your fixer without all the extra effort. That means fewer interruptions, fewer contributors pulled off their regular work, and a much better use of your time and money. OpenContext auto-discovers your technical stack. You can’t afford to let those liabilities stay hidden. It leads to a real scramble to find the key people, your fixers, who know exactly how everything is put together.
  • 15
    Mindflow

    Mindflow

    Mindflow

    Embrace hyper-automation at scale with intuitive no-code & AI-generated flows. Access every tool you need through the most extensive integration library ever provided. Pick the service you want from the Integrations library and automate your way. Onboard and build your first workflows in minutes. Use pre-built templates if you need them, help yourself with the AI assistant, or benefit from the Mindflow excellence center. Type your input in plain-language text and let Mindflow do the rest. Generate workflows adapted to your tech stack from any input. Create AI-generated workflows to help you address any use case and reduce the building time to the minimum. Mindflow redefines enterprise automation, offering an extensive catalog of integrations. Add any new tool to our platform within minutes, breaking the barriers of traditional integration. Connect and orchestrate your tech stack, no matter the tools you use.
  • 16
    AppSOC

    AppSOC

    AppSOC

    Coverage for a wide variety of security scanners - infrastructure, platforms, and applications. Create a single policy to apply across all the scanners in the pipeline - any microservice or application. Enriched software bill of material with information from your SCA platform and multiple scanners. With unified application and vulnerability correlation information reporting, business executives and product owners can accelerate the time to market. With automated triaging, deduping and 95% noise reduction, you know exactly the vulnerabilities to focus on. With workflow automation, risk-based triaging and prioritization, you can now scale instead of manually chasing every issue. With machine learning based correlation and application level risk scoring you have an exact understanding of impact of every vulnerability on your compliance.
  • 17
    Syhunt Hybrid
    Syhunt dynamically injects data in web applications and analyzes the application response to determine if the application code is vulnerable, automating the web application security testing and proactively guarding your organization's Web infrastructure against several kinds of web application security threats. Syhunt Hybrid follows simple GUI standards, prioritizing ease of use and automation and thus requiring minimal to no user intervention before or during scans despite a large number of customization options. Compare past scan sessions to determine new, unchanged or removed vulnerabilities. Generate a comparison report that displays the evolution of vulnerabilities over time by automatically comparing previous scan session data related to a specific target.
  • 18
    HuLoop

    HuLoop

    HuLoop

    Get data-driven recommendations on your people, processes, and technologies. Set up automation of complex business processes, across disparate systems and data. Automate repetitive tasks to perform testing that is difficult to do manually. HuLoop platform creates, deploys, and manages intelligent agents as a digital workforce to perform repetitive tasks your people should no longer do. HuLoop digital agents can help you lower costs, improve productivity, and increase the job satisfaction of people across your organization. Helps you see, understand, and change your capabilities, as well as understand how your people, processes, and technologies interact. Automation and orchestration of complex business processes, across disparate systems and data, minimizing human dependency. Controls and executes tests and verifies expected outcomes. Automates repetitive tasks and performs testing that is difficult to do manually.
  • 19
    Ema

    Ema

    Ema

    Meet Ema, a universal AI employee who boosts productivity across every role in your organization. She is simple to use, trusted, and accurate. Ema’s the missing operating system that makes generative AI work at an enterprise level. Using a proprietary generative workflow engine, Ema automates complex workflows with a simple conversation. She is trusted, and compliant and keeps your data safe. EmaFusion model combines the outputs from the best models (public large language models and custom private models) to amplify productivity with unrivaled accuracy. We believe everyone could contribute more if there were fewer repetitive tasks and more time for creative thinking. Gen AI offers an unprecedented opportunity to enable this. Ema connects seamlessly with hundreds of enterprise apps, with no learning curve. Ema can work with the guts of your organization, documents, logs, data, code, and policies.
  • 20
    Rally

    Rally

    Rally

    UX researchers and designers spend hours each week manually sending emails, coordinating calendars, buying gift cards, and updating messy spreadsheets, all just to talk to users. Rally streamlines your research process by automating outreach, scheduling, and incentives. Cut out the tedious manual work of recruiting so you can focus on what matters most: doing meaningful research. Rally brings all of your participants and studies together, lets you know when participants are eligible for new studies, and makes it easy for you to launch your next study with confidence. Set up templates for every type of outreach, then schedule and sequence emails. Screeners with skip logic and auto-qualification to quickly find your best-fit participants. Team scheduling that dynamically updates your availability, and supports moderators and observers. Send incentives that are easy for you to manage and your participants to claim.
  • 21
    BlueFlag Security

    BlueFlag Security

    BlueFlag Security

    BlueFlag Security provides multi-layer defense, protecting developer identities and their tools throughout the software development lifecycle (SDLC). Don't let uncontrolled developer and machine identities become the Achilles' heel of your software supply chain. Weaknesses in these identities create a backdoor for attackers. BlueFlag seamlessly integrates identity security across the SDLC safeguarding your code, tools, and infrastructure. BlueFlag automates the rightsizing of permissions for developer and machine identities, enforcing the principle of least privilege throughout the dev environment. BlueFlag enforces strong identity hygiene by deactivating off-boarded users, managing personal access tokens, and restricting direct access to developer tools and repositories. BlueFlag's ensures early detection and prevention of insider threats and unauthorized privileged escalation by continuously monitoring behavior patterns across the CI/CD.
  • 22
    Vorlon

    Vorlon

    Vorlon

    Continuous near real-time detection and identification of your data in motion between third-party apps with remediation capabilities. By not continuously monitoring third-party APIs, you inadvertently grant attackers an average of seven months to act before you detect and remediate an issue. Vorlon continuously monitors your third-party applications and detects abnormal behavior in near real-time, processing your data every hour. Understand your risks in the third-party apps your Enterprise uses with clear insights and recommendations. Report progress to your stakeholders and board with confidence. Gain visibility into your third-party apps. Detect, investigate, and respond to abnormal third-party app activity, data breaches, and security incidents in near real-time. Determine whether the third-party apps your Enterprise uses are compliant with regulations. Provide proof of compliance to stakeholders with confidence.
  • 23
    Aftra

    Aftra

    Aftra

    Gain valuable insights, protect sensitive data, and strengthen your defenses with our automated scanning, monitoring, and continuous vulnerability detection. Aftra provides the insight; you steer the course. Safeguard your reputation, trust, and assets. Aftra illuminates what needs protection. Aftra is your ally in the fight against cyber threats. Proactive, insightful, and empowering. Aftra empowers you with insights and tools to secure your digital assets, so you can make informed decisions and bolster your defenses with confidence. Aftra offers a comprehensive view of both internal and external digital assets, providing invaluable insights for making informed security decisions. Aftra identifies both known and unknown domains and accounts associated with your organization. Aftra actively suggests domains and accounts that may belong to your organization. Aftra reveals the services and accounts used by your company and identifies employee digital footprints on third-party platforms.
  • 24
    SecureFlag

    SecureFlag

    SecureFlag

    SecureFlag’s hands-on training in real development environments offers a tailored approach to enterprise training needs. 45+ technologies supported and over 150 vulnerability types covered. Each comprises a fully configured development environment. With more than 70% of vulnerabilities introduced during development, writing secure software is more critical than ever. SecureFlag has revolutionized the approach to secure coding training. With SecureFlag’s hands-on labs, participants learn in virtualized environments using the tools they know and love. SecureFlag’s Labs teaches participants how to identify and remediate the most prevalent security issues by doing instead of simply just seeing. Labs run in real, virtualized development environments, and participants learn using the same tools they use at work. Engage with your organization’s developer community and promote learning through enjoyable competition.
  • 25
    Leo

    Leo

    Leo

    Choose an inbound assistant or an outbound one that activates on events, like new lead submissions, or on a schedule. Connect your assistant to our integrations and select desired capabilities. our AI phone assistant is ready to start making and receiving calls. Feel free to create as many assistants as you need. Instantly implement your workflows, and have your AI phone assistant ready in under 2 minutes. Each phone agent is tailored with a knowledge base and tools designed exclusively for your needs and use case. No more spending weeks on rep training. Enjoy complete customizability from selecting voices and defining prompts to choosing LLMs. Our phone agents are available around the clock, 24/7/365, whether handling incoming or outgoing calls. Allow callers to request a transfer to a human representative at any moment during the call. Every call is recorded (unless you prefer otherwise), allowing you to travel back in time and review it.
  • 26
    Redactive

    Redactive

    Redactive

    Redactive's developer platform removes the specialist data engineering knowledge that developers need to learn, implement, and maintain to build scalable & secure AI-enhanced applications for your customers or productivity use cases for your employees. Built with enterprise security needs in mind so you can focus on getting to production quickly. Don't rebuild your permission models just because you're starting to implement AI in your business. Redactive always respects access controls set by the data source & our data pipeline can be configured to never store your end documents, reducing your risk on downstream technology vendors. Redactive has you covered with pre-built data connectors & reusable authentication flows to connect with an ever-growing list of tools, along with custom connectors and LDAP/IdP provider integrations so you can power your AI use cases no matter your architecture.
  • 27
    Cloud 66

    Cloud 66

    Cloud 66

    Cloud 66 gives you everything you need to build, deploy and grow your applications on any cloud, without the headache of the server stuff. Works with any programming language or framework you prefer. Natively builds, configures, and manages all major databases and components. Deploys to your account on these cloud providers or non-cloud servers. Connect your git repository to Cloud 66. We support all major Git providers including GitHub, GitLab, Bitbucket, and Azure DevOps. Your code can be in a mono repo or a multi-repo setup. All programming languages and frameworks are supported, either natively or via containers. Connect your cloud provider account to Cloud 66. All major cloud providers including AWS, DigitalOcean, Google Cloud, Azure, and Linode are supported. Cloud 66 will analyze your code to find out the components that are needed to run your application. Static site generators like Gatsby, Hugo, or Jekyll are supported.
    Starting Price: $23 per year
  • 28
    DROPS

    DROPS

    DROPS

    DROPS is a release management tool designed to simplify, secure, and centralize the deployment of applications across data centers, hybrid, and multi-cloud infrastructures. It supports a wide range of platforms, integrates seamlessly with various CI/CD pipelines, and offers both agent-based and agentless operations. With features like full-stack release management, automated infrastructure provisioning, and 24/7 availability, DROPS aims to streamline deployment processes and ensure consistent, reliable delivery. The tool is flexible enough to manage both legacy and modern applications, catering to diverse enterprise needs. Select agent-based or agentless operation. No need for agent installation and management. DROPS adapts to your configuration and if agents are needed, they are provisioned automatically. Plan and organize your application deployment from the web console with no scripting needed. Ease collaboration between stakeholders and technical teams.
  • 29
    ModelOp

    ModelOp

    ModelOp

    ModelOp is the leading AI governance software that helps enterprises safeguard all AI initiatives, including generative AI, Large Language Models (LLMs), in-house, third-party vendors, embedded systems, etc., without stifling innovation. Corporate boards and C‑suites are demanding the rapid adoption of generative AI but face financial, regulatory, security, privacy, ethical, and brand risks. Global, federal, state, and local-level governments are moving quickly to implement AI regulations and oversight, forcing enterprises to urgently prepare for and comply with rules designed to prevent AI from going wrong. Connect with AI Governance experts to stay informed about market trends, regulations, news, research, opinions, and insights to help you balance the risks and rewards of enterprise AI. ModelOp Center keeps organizations safe and gives peace of mind to all stakeholders. Streamline reporting, monitoring, and compliance adherence across the enterprise.
  • 30
    KaneAI

    KaneAI

    LambdaTest

    Advanced AI-powered platform built on modern Large Language Models (LLMs). A unique approach to create, debug, and evolve end to end tests using natural language. Test generation & evolution effortlessly using natural language inputs, simplifying the testing process with intelligent automation. Intelligent test planner automatically generates and automates test steps using high-level objectives. Multi-language code export converts your automated tests in all major languages and frameworks. Convert your actions into natural language instructions to generate bulletproof tests. Express sophisticated conditions and assertions in natural language. As easy as conversing and communicating with your team. Convey the same instructions to KaneAI and watch it automate your tests. Generate your tests with just high-level objectives. Develop tests across your stack on both web and mobile devices for extensive test coverage.