Business Software for GitLab - Page 26

Top Software that integrates with GitLab as of August 2025 - Page 26

GitLab Clear Filters
  • 1
    Levo.ai

    Levo.ai

    Levo.ai

    Levo.ai gives enterprises unparalleled visibility into their APIs while continuously discovering and documenting internal, external and partner/third-party APIs. Enterprises can then see the risk from their apps and prioritize it based on the sensitive data flows, AuthN/AuthZ usage and several other criteria. Levo.ai then continuously security tests all apps and APIs to find vulnerabilities in the SDLC as early as possible.
  • 2
    Detexian

    Detexian

    Detexian

    1 in 4 user accounts is inactive, whether due to termination, role transitions, or neglect, leading to substantial risks of cost overruns, data leaks, and breaches. Ensuring the protection of data is not only essential for maintaining trust, brand equity but also a legal requirement. However, it’s not easy to know where to start. That's why we've developed a quick, efficient 3-step solution tailored specifically to SaaS-first businesses to make informed decisions about their data protection strategy. Our security guardians will help you prioritize issues and implement solutions through our customer success program to get the best outcomes for your organization’s goals in a timely fashion.
  • 3
    Cloudoor

    Cloudoor

    Cloudoor

    Your code is verified & shaped for the cloud, your infrastructure built, your images put into safe production. Go live by a click & Cloudoor serenely deliver your code to your end-user. Add your cloud & Cloudoor set for you a modern turnkey infrastructure. Add your code & Cloudoor makes sure it doesn't contain any vulnerabilities.
  • 4
    Idealogic

    Idealogic

    Idealogic

    We provide advanced technology solutions using blockchain technology to ensure security, transparency and efficiency in your business processes. Idealogic works with private and public blockchains, enhancing privacy or ensuring transparency accordingly, depending on the product’s requirements and business objectives. We create platforms for trading cryptocurrencies. CEX operates with a central authority, while DEX relies on blockchain technology for decentralized, peer-to-peer trading. We integrate blockchain in financial solutions to cut intermediaries, and into gaming ecosystems to provide tokenized assets and economies for in-game transactions. We use blockchain technology to develop smart contracts for various use cases in a range of industries, automating and enforcing agreements.
  • 5
    CyberArrow

    CyberArrow

    CyberArrow

    Automate the implementation & certification of 50+ cybersecurity standards without having to attend audits. Improve and prove your security posture in real-time. CyberArrow simplifies the implementation of cyber security standards by automating as much as 90% of the work involved. Obtain cybersecurity compliance and certifications quickly with automation. Put cybersecurity on autopilot with CyberArrow’s continuous monitoring and automated security assessments. Get certified against leading standards via a zero-touch approach. The audit is carried out by auditors using the CyberArrow platform. Get expert cyber security advice from a dedicated virtual CISO through the chat function. Get certified against leading standards in weeks, not months. Safeguard personal data, comply with privacy laws, and earn the trust of your users. Secure cardholder information and instill confidence in your payment processing systems.
  • 6
    Clutch

    Clutch

    Clutch

    Clutch is addressing the increasingly critical challenge of non-human identity security within modern enterprises. As digital infrastructures expand and become more complex, the management and security of non-human identities, ranging from API keys and secrets to tokens and service accounts, have emerged as a pivotal yet often neglected aspect of cybersecurity. Recognizing this gap, Clutch is developing an enterprise platform dedicated to the comprehensive protection and management of these identities. Our solution is designed to fortify the digital backbone of enterprises, ensuring a secure, resilient, and trustworthy environment for their operations. Ever expanding, outpacing human identities by a staggering ratio of 45 to 1. Holds critical privileges and extensive access, essential for mission-critical automated processes. Lacks inherent security controls such as MFA and conditional access policies.
  • 7
    Clarity Security

    Clarity Security

    Clarity Security

    Eliminate audit angst with 10-minute user access reviews, flexible provisioning/de-provisioning workflows, and audit-friendly reporting, all in one simple, scalable IGA platform. White-glove onboarding takes the burden of implementing a solution off of team members reducing the impact on other IT initiatives. Automated evidence collection into a downloadable ledger mitigates the need for wasted time gathering spreadsheets, screenshots, etc. Nested entitlements and Clarity Explorer provide insight into what’s giving users access and why they’re being granted that access. True role-based access control (RBAC) and automated workflows for full alignment with your organizational structure and needs. Unlike "traditional" manual methods, Clarity has everything you need to quickly upgrade your identity governance program and seamlessly adapt it as your organization grows. Fast reviews for certifying user access, entitlements, roles, application access, and more.
  • 8
    Compyl

    Compyl

    Compyl

    Your GRC program should reflect your business. The Compyl platform puts you in charge by helping your organization scale and mature your GRC in the way that’s best for how work gets done across your organization. A unified, flexible GRC platform helping you reduce risk, stay compliant, and drive growth. Compliance teams are stretched thin and struggle to keep up. Automate error-prone, time-consuming manual processes and give your team back time to focus on priority work. Compliance alone isn’t sufficient to reduce organizational risk. You need clear visibility into your risk posture to take proactive action and demonstrate risk reduction over time. Functional and application silos can create risk gaps and blind spots. You need a single, consolidated view of risk to convey risk impact and enable better decision-making. Consolidate all compliance and risk activities in a single, unified platform.
  • 9
    RunSafe Security

    RunSafe Security

    RunSafe Security

    RunSafe Security protects embedded software across critical infrastructure, delivering automated vulnerability identification and software hardening from build-time to runtime to defend the software supply chain and critical systems without compromising performance or requiring code rewrites. The RunSafe Security Platform includes the authoritative build-time SBOM generator for embedded systems and C/C++ projects, automated vulnerability identification and risk quantification, patented memory relocation techniques to mitigate memory-based vulnerabilities, and pre-hardened open-source packages and containers for immediate protection. RunSafe Security’s customers span the aerospace and defense, energy, operational technology, industrial automation, transportation and automotive, medical device, and high-tech manufacturing verticals.
  • 10
    ZeroNorth

    ZeroNorth

    ZeroNorth

    Complete risk visibility and assurance from a single pane of glass. Organizations rely on ZeroNorth (formerly CYBRIC) for software and infrastructure risk management at the speed of business. The ZeroNorth platform accelerates and scales the discovery and remediation of software and infrastructure vulnerabilities. converting your manual and siloed efforts into a single, orchestrated process. Only the ZeroNorth platform enables organizations to orchestrate a consistent vulnerability discovery and remediation program, deliver continuous risk visibility and assurance, improve the value of existing scanning tools and help organizations move forward from any point in their journey to secure DevOps.
  • 11
    Veracode

    Veracode

    Veracode

    Veracode offers a holistic, scalable way to manage security risk across your entire application portfolio. We are the only solution that can provide visibility into application status across all testing types, including SAST, DAST, SCA, and manual penetration testing, in one centralized view.
  • 12
    Saasdesk

    Saasdesk

    Saasdesk

    Saasdesk is a free SaaS management software for CFOs and CEOs. With Saasdesk, you can collect all your invoices and monitor your SaaS spend. Save up to 30% on your software expenses. Stop your excel sheet and automate your SaaS management. Saasdesk shows you what you spend on SaaS and automatically find your invoices. Saasdesk helps you optimize and reduce your costs.It is the ideal partner for connected CFOs. Automate your IT Onboarding & Offboarding processManage all your account and automatically generate report on your SaaS usage. Our goal is to establish a trustworthy relationship with all of you, we are and will always be transparent and available for you. Integrity and communication is key for a long term relationship. Every time we will make any decision you will be the first to know. Our main goal is to make your work easier. And our goal as a brand is to create a product that is useful and simple.
  • 13
    CycloneDX

    CycloneDX

    CycloneDX

    OWASP CycloneDX is a lightweight Software Bill of Materials (SBOM) standard designed for use in application security contexts and supply chain component analysis. Strategic direction and maintenance of the specification is managed by the CycloneDX Core working group, with origins in the OWASP community. A complete and accurate inventory of all first-party and third-party components is essential for risk identification. BOMs should ideally contain all direct and transitive components and the dependency relationships between them. Adopting CycloneDX allows organizations to quickly meet these minimum requirements and mature into using more sophisticated use cases over time. CycloneDX is capable of achieving all SBOM requirements defined in the OWASP Software Component Verification Standard (SCVS).
  • 14
    Homie

    Homie

    Homie

    Homie helps your team overcome timezone struggles, context switching, stale project boards, knowledge silos, and many more issues that can slow down team software development. Out the box, with zero config, Homie can: - act as a search engine for your project & code - create tasks in Slack - generate good PR summaries in GitHub/Gitlab - Provide code help, by explaining PRs, and bug fixes - write changelogs, and documentation - notify of potential duplicate tasks - Send weekly progress summaries for PRs, and contributors Everything to help speed up software development.
  • 15
    CodeBeaver

    CodeBeaver

    CodeBeaver

    CodeBeaver writes and updates your unit tests. Not only that! It highlights bugs in your Pull Requests by running tests and checking out your code. It works natively with GitHub, GitLab and Bitbucket. The onboarding takes 2 clicks! We currently help 30k GitHub stars and counting.
    Starting Price: $12/month
  • 16
    InventHub

    InventHub

    InventHub

    Develop hardware products better and faster! A cloud based engineering data manager for electronics hardware with collaboration at its core. Enable engineering teams with efficient electronics design process. InventHub let’s you collaborate on ECAD designs from any device on the go. Save time on reporting and discussions. Visualize each and every change on schematic and layout designs. We believe in our community and we champion open source, which is why we are determined to empower you with resources. Host your designs, help others with projects, or improve your skillset by collaborating with other developers. InventHub brings hardware support using the most popular Git version control system.
  • 17
    Synth

    Synth

    Synth

    Augment your work and your mind with the internet, don't just browse it. Create issues, tasks, and PRs without leaving the dashboard. Skip all the forms and back-and-forths. Manage logins and accounts separately by creating workspaces. This makes switching between accounts, whether it's Google or your favorite SaaS, easy. Create workspaces for projects, your different hats, or whatever else you want. You can add emails, events, issues, articles, products, reports, and anything really. Bookmarks and history took to the next level. They are enriched with their content and context so you can search them quickly. No more guessing what the title of that one page you bookmarked was. Just type what you remember and we'll find it. Extend your browser by enabling background indexing of your favorite tools and sites with our integrations. Once that's set you can search across your whole universe of things.