Business Software for GitLab - Page 26

Top Software that integrates with GitLab as of November 2025 - Page 26

GitLab Clear Filters
  • 1
    1Data

    1Data

    Sincera

    1Data is a modern, flexible data management platform that enables businesses to integrate, analyze, and act on data through low-code/no-code tools. It helps break down data silos, ingesting data from multiple sources via connectors (databases, APIs, files, messages), and lets users define business rules and workflows to automate analysis and trigger actions. Components include connectors, rules, workflows, a data dictionary, exception management, and metrics. Users can build simple or complex flows of data/events/rules to achieve specific outcomes, track what data exists and how it’s used via the data dictionary, and monitor, manage, or resolve data exceptions. 1Data also supports use cases like ETL/data pipelines, data lakes/warehouses, data standardization, reconciliation and cleansing, and data distribution.
  • 2
    Luciq

    Luciq

    Luciq

    Luciq is an AI-powered mobile observability platform designed for app developers and enterprises to monitor, diagnose, and improve mobile applications seamlessly. The solution brings together bug reporting, crash analytics, session replay, and performance monitoring in one unified SDK that supports Android, iOS, web and hybrid apps. It enables users to capture detailed device logs, network traces, annotated screenshots, videos and user feedback, while automatically correlating events and errors using machine learning to prioritize issues by impact. Developers gain visibility into user sessions where things went wrong, reproduce defects through replay, and resolve issues faster using integrations with JIRA, Slack, Zapier, Zendesk and other tools. With Luciq’s “Agentic Mobile Observability” approach, the system surface the most critical problems, suggests root-causes and even recommends remediations, helping teams increase velocity, improve app stability and enhance user experience.
  • 3
    Defakto

    Defakto

    Defakto

    Defakto secures every automated interaction by issuing short-lived, verifiable identities to non-human actors such as services, pipelines, AI agents, and machines, eliminating static credentials, API keys, and standing privileges. Their unified non-human identity and access management solution enables discovery of unmanaged identities across cloud, on-premises, and hybrid environments, issu­ance of dynamic identities at runtime tied to policy, enforcement of least-privilege access, and full audit-ready logging. The product consists of modules; Ledger for continuous discovery and governance of non-human identities; Mint for automated issuance of purpose-bound, ephemeral identities; Ship for secretless CI/CD workflows where hard-coded credentials are removed; Trim for automatic right-sizing of access and removal of over-privileged service accounts; and Mind for securing AI agents and large-language models with the same identity model used for workloads.
  • 4
    Planview Hub
    Planview Hub is an integration and value-stream orchestration platform designed to automate the flow of artifacts, data, and activity across a software delivery toolchain, connecting planning, engineering, quality, operations, and support systems. With pre-built connectors to 60+ tools, Hub enables near-real-time synchronization of stories, defects, requirements, test results, and metrics so teams can reduce duplicate data entry, accelerate hand-offs, enhance traceability, and boost delivery velocity. Its model-based architecture (vs point-to-point mappings) simplifies configuration and maintenance, while visual “Landscape View” diagrams show how applications are connected and flowing. Metrics dashboards quantify adoption, ROI, and usage, and rule-based flows maintain nested folder structures and artifact hierarchies across disparate systems.
  • 5
    Teleskope

    Teleskope

    Teleskope

    Teleskope is a modern data protection platform designed to automate data security, privacy, and compliance at enterprise scale. It continuously discovers and catalogs data across cloud, SaaS, structured, and unstructured sources, classifying over 150 entity types such as PII, PHI, PCI, and secrets with high precision and high throughput. Once sensitive data is identified, Teleskope enables automated remediation, such as redaction, masking, encryption, deletion, and access correction, while integrating into developer workflows via its API-first model and supporting deployment as SaaS, managed, or self-hosted. The platform also builds prevention capabilities, embedding into SDLC pipelines to stop sensitive data from entering production systems, support safe AI adoption (without using unchecked sensitive data), handle data subject rights requests (DSARs), and map findings to regulatory standards (GDPR, CPRA, PCI-DSS, ISO, NIST, CIS).
  • 6
    Daylight

    Daylight

    Daylight

    Daylight merges lightning-fast agentic AI with elite human expertise to deliver a next-gen managed detection and response service that goes beyond alerts, aiming to “take command” of your cyber-frontier. It promises full coverage of your environment with no blind spots, context-aware protection that continuously learns from your systems and past cases (including Slack chats), near-zero false positives, the industry’s lowest mean time to detection and mean time to response, and deep integration with your IT and security stack so it supports unlimited platforms, unlimited integrations, and delivers actionable, noise-free insights via AI dashboards. With Daylight, you get true end-to-end threat detection and response (no escalation games), 24/7 expert support, custom response workflows, environment-wide visibility, and measurable improvements in analyst utilization and response speed, all built to shift your security operations from reactive to commanding.
  • 7
    Micromerce

    Micromerce

    Micromerce

    Micromerce is a modular cloud software platform that streamlines and automates the end-to-end processes of client or partner onboarding, data migration, enablement, and support. It provides a unified onboarding portal, back-office management system, and automation layer so organizations can manage, track, and automate every onboarding task, from sales hand-off through activation, while giving clients a clear step-by-step view and reducing manual coordination. For data migration, it offers an integrated toolkit that supports any source format, automatic transformation and mapping, built-in validation dashboards, and full transparency over migration quality and status. In the support and enablement domain, Micromerce includes AI-powered workflows, ticket deflection, embedded contextual guidance, and analytics to reduce support load and accelerate customer activation.
  • 8
    Mondoo

    Mondoo

    Mondoo

    Mondoo is a unified security and compliance platform designed to drastically reduce business-critical vulnerabilities by combining full-stack asset visibility, risk prioritization, and agentic remediation. It builds a complete inventory of every asset, cloud, on-premises, SaaS, endpoints, network devices, and developer pipelines, and continuously assesses configurations, exposures, and interdependencies. It then applies business context (such as asset criticality, exploitability, and policy deviation) to score and highlight the most urgent risks. Users can choose guided remediation (pre-tested code snippets and playbooks) or autonomous remediation via orchestration pipelines, with tracking, ticket creation, and verification built in. Mondoo supports ingestion of third-party findings, integrates with DevSecOps toolchains (CI/CD, IaC, container registries), and includes 300 + compliance frameworks and benchmark templates.
  • 9
    HackerOne

    HackerOne

    HackerOne

    HackerOne empowers the world to build a safer internet. As the world’s most trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet. Armed with the most robust database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses for organizations across all industries and attack surfaces. Customers include The U.S. Department of Defense, Dropbox, General Motors, GitHub, Goldman Sachs, Google, Hyatt, Intel, Lufthansa, Microsoft, MINDEF Singapore, Nintendo, PayPal, Qualcomm, Slack, Starbucks, Twitter, and Verizon Media. HackerOne was ranked fifth on the Fast Company World’s Most Innovative Companies list for 2020. Headquartered in San Francisco, HackerOne has a presence in London, New York, the Netherlands, France, Singapore, and over 70 other locations across the globe.
  • 10
    aSISt

    aSISt

    FINGO

    Since 2007 banks are required to submit financial reporting compliant with COREP and FINREP taxonomies in the XBRL standard. Under the new regulations many Polish banks faced a massive challenge. The reports were not only difficult to prepare, but also the market lacked relevant tools for managing and preparing XBRL reports. To address this, we partnered with GPM Systems Sp. z o.o. and created an application that allows to prepare and manage these mandatory filings in line with the XBRL format. aSISt hides the technical complexity of XBRL behind an interface and vastly simplifies the filing process. The user is given forms similar to Excel sheets, which makes the application uniquely intuitive. The process of preparing filings was simplified to four basic steps. aSISt supports reporting periods, taxonomies (dictionaries) versioning management and ensures compliance with the selected taxonomy version for each report.
  • 11
    iceScrum

    iceScrum

    Kagilum

    Your true Agile project management tool. iceScrum helps you materialize your vision, makes it visible to your teams and ensures that it stays up-to-date as business knowledge grows. Stories helps formalizing the main features of your product and organizing requirements with a simple yet powerful visual representation. Scale up Scrum with ease, coordinate the work between your feature teams and get a high-level vision of their progress with SAFe, LeSS and more. Ensure that deadlines are always met and that the right amount of work is planned in every iteration to ensure predictable progress
  • 12
    Provar

    Provar

    Provar Testing

    About Provar Provar pairs intuitive testing solutions, including Provar Test Automation and Provar Test Manager, with world-class service to help teams capitalize on their Salesforce investment. Its comprehensive suite of testing products is designed to improve release agility, drive down system defects and advance innovation, meeting people at every stage in their journey — from the individual manual tester to comprehensive QA teams with automated workflows.
  • 13
    Zoomin

    Zoomin

    Zoomin Software

    Deliver effortless self-service with personalized content at key points in the customer journey. Transform the technical content you already own into a great self-service experience. Deliver personalized, relevant and easy-to-find answers that customers need in your documentation portal, community, support site, and in your product. Enable your remote workforce by delivering real-time guidance that analyzes each support case and recommends contextually relevant technical content. Strengthen your product value and improve the customer experience by understanding areas of friction and how customers are engaging with your content. Zoomin integrates seamlessly with dozens of leading tools and platforms, providing a scalable solution that provides the product answers your customers need, effortlessly without your existing workflow.
  • 14
    ShuttleOps

    ShuttleOps

    ShuttleOps

    DevOps teams now have a single platform to build, deploy and manage applications, so they can get fixes, features, and updates to customers quickly and securely. One platform. Ample integrations. Rapid scalability. ShuttleOps is a no-code continuous delivery platform that makes it quick and simple to build, deploy and manage complex distributed applications. Using a simple drag and drop interface, ShuttleOps allows teams and organizations to quickly adopt and scale their DevOps practices. ShuttleOps supports Chef Habitat, Docker Container registries and custom build configurations. That means out-of-the box YAML free deployments, Persistent Volume Claims, Ingress rules, and log management. Define custom workflows with built-in collaboration including acknowledgement and approval gates, as well as real-time notifications to Slack, email and our in-app notification centre.
  • 15
    CodePatrol

    CodePatrol

    Claranet

    Automated code reviews driven by security. CodePatrol performs powerful SAST scans on your project source code and identifies security flaws early. Powered by Claranet and Checkmarx. CodePatrol provides support for a wide variety of languages and scans your code with multiple SAST engines for better results. Stay up-to-date with the latest code flaws in your project using automated alerting and user-defined filter rules. CodePatrol uses industry-leading SAST software provided by Checkmarx and expertise from Claranet Cyber Security to identify the latest threat vectors. Multiple code scanning engines are frequently triggered on your code base and perform in-depth analysis on your project. You may access CodePatrol anytime and retrieve the aggregated scan results in order to fix your project security flaws.
  • 16
    Jtest

    Jtest

    Parasoft

    Meet Agile development cycles while maintaining high-quality code. Use Jtest’s comprehensive set of Java testing tools to ensure defect-free coding through every stage of software development in the Java environment. Streamline Compliance With Security Standards. Ensure your Java code complies with industry security standards. Have compliance verification documentation automatically generated. Release Quality Software, Faster. Integrate Java testing tools to find defects faster and earlier. Save time and money by mitigating complicated and expensive problems down the line. Increase Your Return From Unit Testing. Achieve code coverage targets by creating a maintainable and optimized suite of JUnit tests. Get faster feedback from CI and within your IDE using smart test execution. Parasoft Jtest integrates tightly into your development ecosystem and CI/CD pipeline for real-time, intelligent feedback on your testing and compliance progress.
  • 17
    CodeSonar

    CodeSonar

    CodeSecure

    CodeSonar employs a unified dataflow and symbolic execution analysis that examines the computation of the complete application. By not relying on pattern matching or similar approximations, CodeSonar's static analysis engine is extraordinarily deep, finding 3-5 times more defects on average than other static analysis tools. Unlike many software development tools, such as testing tools, compilers, configuration management, etc., SAST tools can be integrated into a team's development process at any time with ease. SAST technologies like CodeSonar simply attach to your existing build environments to add analysis information to your verification process. Like a compiler, CodeSonar does a build of your code using your existing build environment, but instead of creating object code, CodeSonar creates an abstract model of your entire program. From the derived model, CodeSonar’s symbolic execution engine explores program paths, reasoning about program variables and how they relate.
  • 18
    ConnectALL

    ConnectALL

    ConnectALL

    ConnectALL allows you to align digital initiatives and IT to the business outcomes you want to achieve by enabling you to capture, visualize, analyze, and optimize critical indicators of speed and quality in your software delivery value stream. ConnectALL allows you to automate the flow of critical product information across the value stream, helping you identify waste in tools, people and processes and improve cross-functional collaboration between teams. ConnectALL captures KPIs and metrics that drive speed and quality, enabling you to identify growth opportunities, reduce costs and understand competitive advantages to stay ahead in the market. Quickly identify roadblocks, missed releases, bottlenecks, and vulnerabilities in processes and evaluate constraints, while also tracing the flow of work. ConnectALL helps you identify what you can improve in your value stream before it’s too late with tool integration and interoperability.
  • 19
    Thoropass

    Thoropass

    Thoropass

    An audit without aggravation? Compliance without crisis? Yep, that’s what we’re talking about. SOC 2, ISO 27001, HITRUST, PCI DSS, and all of your favorite information security frameworks now worry-free. Whether you need last-minute compliance to close a deal, or multiple frameworks to expand into new markets, we can solve all of your challenges on a single platform. If you’re new to compliance or rebooting old processes, we can get you started quickly. Free your team from time-consuming evidence collection so that they can focus on strategy and innovation. Complete your audit end-to-end on Thororpass, without gaps or surprises. Our in-house auditors can provide you with the just-in-time support you need and use our platform to expand that into future-proof strategies for years to come.
  • 20
    Cybellum

    Cybellum

    Cybellum

    Cybellum sets the new standard for product security at scale, eliminating cyber risk and facilitating compliance from the earliest stages of development all the way through integration and production, and while on the road. The Cybellum Cyber Digital Twins™ platform provides the infrastructure and means needed to develop and maintain secure products at scale. Minimize risk to your customers and your organization through smart vulnerability management, compliance validation, continuous monitoring and incident response. Get an exact blueprint of your automotive software components including their make-up, characteristics and the context in which they operate, so you can quickly pinpoint vulnerabilities and secure your vehicles throughout their lifespan.
  • 21
    Singer

    Singer

    Singer

    Singer describes how data extraction scripts called “taps” and data loading scripts called “targets” should communicate, allowing them to be used in any combination to move data from any source to any destination. Send data between databases, web APIs, files, queues, and just about anything else you can think of. Singer taps and targets are simple applications composed with pipes—no daemons or complicated plugins needed. Singer applications communicate with JSON, making them easy to work with and implement in any programming language. Singer also supports JSON Schema to provide rich data types and rigid structure when needed. Singer makes it easy to maintain state between invocations to support incremental extraction.
  • 22
    CYRES

    CYRES

    CYRES

    The best solution to guarantee a high level of security on all your equipment & data. Choose Exchange, the most complete and secure business messaging solution on the market. By relying on Cloudera, centralize, process and analyze your data within flexible Cloud platforms, in an industrialized and secure manner. Launch micro-services architectures with the Docker containerization platform and automate deployment to production with GitLab. Take advantage of our managed services to integrate the AWS or Azure cloud. Deploy your applications in the most efficient environments on the market. Use Veeam Cloud Connect to deploy your PRA/PCA or outsource your virtual machine backups. Your private cloud to respond with agility to the rapid evolution of your business. The cloud benchmark on which millions of companies are already relying to gain agility. A wide range of cloud solutions to create VMs in seconds.
  • 23
    Cilium

    Cilium

    Cilium

    Cilium is open-source software for providing, securing and observing network connectivity between container workloads, cloud native, and fueled by the revolutionary Kernel technology eBPF. Kubernetes doesn't come with an implementation of Load Balancing. This is usually left as an exercise for your cloud provider or in private cloud environments an exercise for your networking team. Cilium can attract this traffic with BGP and accelerate leveraging XDP and eBPF. Together these technologies provide a very robust and secure implementation of load balancing. Cilium and eBPF operate at the kernel layer. With this level of context, we can make intelligent decisions about how to connect different workloads whether on the same node or between clusters. With eBPF and XDP Cilium enables significant improvements in latency and performance and eliminates the need for Kube-proxy entirely.
  • 24
    ServiceNow DevOps
    Expand DevOps success across the enterprise. Take the risk out of going fast and minimize friction to bring IT operations and development together. Simplify and scale enterprise DevOps while minimizing the risks of moving at speed. Connect teams to ServiceNow and speed up software development. Automate administrative tasks and bring ops and dev teams together. Extend DevOps value to quickly reach your business goals. Add connectivity, visibility, and traceability to existing toolchains, and drive collaboration with integrations. Automate change creation and approvals so you can deliver innovation at the pace your business needs, without compromising quality. Develop and deploy at speed while reducing risk. Automatically gather and connect information from the DevOps toolchain for app and infrastructure changes and maintain an audit trail, all in one place. Connect development tools to change management for automatic ticketing and approval.
  • 25
    Cider

    Cider

    Cider

    Gain granular visibility with engineering technologies, systems, and processes, all the way from code to deployment. Easily connect Cider to your ecosystem and seamlessly integrate security without interrupting engineering. Optimize your CI/CD security, based on a set of prioritized risks and recommendations tailored to your environment. Cider seamlessly integrates with all systems across your CI/CD and provides you with a comprehensive and accurate analysis of all technologies, frameworks, and integrations which exist in the environment. Cider maps all intelligent connections within your environment to create end-to-end visibility over the full CI/CD journey, all the way from SCM user to an artifact deployed to production. Assess the posture of your engineering systems and processes. Analyze your environment against realistic attack scenarios and identify the controls required to reduce your CI/CD attack surface.
  • 26
    ThreatStryker

    ThreatStryker

    Deepfence

    Runtime attack analysis, threat assessment, and targeted protection for your infrastructure and applications. Stay ahead of attackers and neutralize zero-day attacks. Observe attack behavior. ThreatStryker observes, correlates, learns and acts to protect your applications and keep you one step ahead of attackers. Deepfence ThreatStryker discovers all running containers, processes, and online hosts, and presents a live and interactive color-coded view of the topology. It audits containers and hosts to detect vulnerable components and interrogates configuration to identify file system, process, and network-related misconfigurations. ThreatStryker assesses compliance using industry and community standard benchmarks. ThreatStryker performs deep inspection of network traffic, system, and application behavior, and accumulates suspicious events over time. Events are classified and correlated against known vulnerabilities and suspicious patterns of behavior.
  • 27
    ThreatMapper

    ThreatMapper

    Deepfence

    Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories. ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. What you cannot see, you cannot secure. ThreatMapper auto-discovers your production infrastructure. It identifies and interrogates cloud instances, Kubernetes nodes, and serverless resources, discovering the applications and containers and mapping their topology in real-time. Use ThreatMapper to discover and visualize the external and internal attack surface for your applications and infrastructure. Exploiting known vulnerabilities in common dependencies is one of the easiest ways for bad actors to gain a foothold within your infrastructure. ThreatMapper scans hosts, containers, and applications for known vulnerable dependencies, taking threat feeds from over 50 different sources.
  • 28
    Crossplane

    Crossplane

    Crossplane

    Crossplane is an open-source Kubernetes add-on that enables platform teams to assemble infrastructure from multiple vendors, and expose higher-level self-service APIs for application teams to consume, without having to write any code. Provision and manage cloud infrastructure and services using kubectl. Crossplane extends your Kubernetes cluster, providing you with CRDs for any infrastructure or managed service. Compose these granular resources into higher-level abstractions that can be versioned, managed, deployed, and consumed using your favorite tools and existing processes you've already integrated with your clusters. We built Crossplane to help organizations build their clouds like the cloud vendors build theirs, with a control plane. Crossplane is a CNCF project which extends the Kubernetes API to manage and compose infrastructure. Operators can encapsulate policies, permissions, and other guardrails behind a custom API line generated by Crossplane.
  • 29
    Exceptionly

    Exceptionly

    Exceptionly

    We find, test, and deliver software talent for a direct hire. Exceptionly is built to revolutionize the software talent industry by leveraging its unique big data set of 2 million hands-on tested software engineers from 175 countries. Exceptionly invests in its enterprise-level talent acquisition engine and offers a platform as a service for providing both quality and volume of tested remote software engineers for businesses around the world. Exceptionly’s mission is to enable 100% of the technology talent capital for highly skilled remote talent around the world. We help businesses go beyond their zip codes for hiring the best of the best and leverage their talent budget in full.
  • 30
    Stackreaction

    Stackreaction

    Stackreaction

    Building marketplace, online school or membership site? Find tools, integrations, workflows and guides to jumpstart your idea. Browse apps and tools, find alternatives, compare by feature, and leave feedback. Automating routine processes? Find all integrations from Zapier, Integromat, Automateio and other automation platforms in one place. Compare features and price. Explore guides and tutorials from community and vendors. Contribute with your know-how. Leverage the openness of the nocode community. Сreate your profile, pick up your favorite tools, share your stack.