Business Software for MongoDB - Page 17

Top Software that integrates with MongoDB as of November 2025 - Page 17

MongoDB Clear Filters
  • 1
    AI2sql

    AI2sql

    AI2sql.io

    With AI2sql, engineers and non-engineers can easily write efficient, error-free SQL queries without knowing SQL. All you need to do is enter a few keywords about your data - AI2sql automatically builds an optimized SQL query for your data resulting in extremely fast performance. We wanted to share some exciting numbers with you about how many people have tried out AI2sql, and what they've been able to accomplish with it. To get the best results with AI2sql, it is important to clearly define your goals and use the tool's customization options, test and verify the generated SQL. You can also try changing the prompts or input used to generate the SQL statements to see if this results in more accurate or efficient queries.
  • 2
    Houseware

    Houseware

    Houseware

    Houseware adds a layer of revenue context to your data warehouse. Connect your existing data stack or individual SaaS tools to get out-of-the-box metrics and entities. Build user segments and cohorts, and choose from 30+ predefined blocks and templates to create revenue magic. Collaborate across the team to send out the best mix of personalized campaigns, internal alerts, and notifications, without coding. Our team of athletes believes in myth-busting the common startup cliche relating the journey to a marathon. We train for a marathon, knowing that we have to run several sprints, where each sprint is a marathon.
  • 3
    ElevateHQ

    ElevateHQ

    ElevateHQ

    Sales commission software for modern sales teams. Design and automate any commission plan. Easy-to-use sales incentive plan designer that lets you automate any sales commission structure under the sun. Welcome to the world of transparent sales commission plans that stay updated with real-time sync. Custom fields in your CRM? No problem. Complex commission workflow with multiple logical conditions? Walk in the park. All courtesy of the intuitive sales incentive plan designer at your service. One touch connection with all the tools you use. CRMs, Invoicing, Accounting, Prospecting, Payroll, etc. Highly nuanced sales incentive plan designer allows you to configure everything from the incentive triggers and credit rules, to payout schedules - thanks to a powerful commission tracking software under the hood. Setup up commission tracking, approval and payout workflows that run like clockwork. Any change is just a few clicks away.
  • 4
    AI Query

    AI Query

    AI Query

    Use simple English and let AI do the heavy lifting for you. With AI Query anyone can create efficient SQL queries, without even knowing a thing about it. Once your database schema is ready, you can easily generate SQL queries with simple text prompts. Let the AI do the work for you.
    Starting Price: $10 per month
  • 5
    UBOS

    UBOS

    UBOS

    Everything you need to transform your ideas into AI apps in minutes. Anyone can create next-generation AI-powered apps in 10 minutes, from professional developers to business users, using our no-code/low-code platform. Seamlessly integrate APIs like ChatGPT, Dalle-2, and Codex from Open AI, and even use custom ML models. Build custom admin client and CRUD functionalities to effectively manage sales, inventory, contracts, and more. Create dynamic dashboards that transform data into actionable insights and fuel innovation for your business. Easily create a chatbot to improve customer support and create a true omnichannel experience with multiple integrations. An all-in-one cloud platform combines low-code/no-code tools with edge technologies to make your web application scalable, secure, and easy to manage. Transform your software development process with our no-code/low-code platform, perfect for both business users and professional developers alike.
  • 6
    Layerup

    Layerup

    Layerup

    Extract and Transform any data from any data source with Natural Language connect to your data source - everything ranging from your DB to your CRM to your billing solution. Improve Productivity by 5-10x Forget about wasting time on clunky BI tools. Use Natural Language to query any complex data in seconds. Transition from DIY tools to non-DIY AI-powered tools. Generate complex dashboards and reports in a few lines. No more SQL or complex formulas - let Layerup AI do the heavy lifting for you. Layerup not only gives you instant answer to questions that would require 5-40 hours/month on SQL queries, but it will act as your personal data analyst 24/7 while providing you complex dashboards/charts that you can embed anywhere.
  • 7
    Wherobots

    Wherobots

    Wherobots

    Wherobots enables users to easily develop, test, and deploy geospatial data analytics and AI pipelines within the user's existing data stack. That can be deployed in the cloud. Users do not have to worry about the hassle of resource administration, workload scalability, and geospatial processing support/optimization. Connect your Wherobots account to the cloud database where the data is stored using our SaaS web interface. Develop your geospatial data science, machine learning, or analytics application using Sedona Developer Tool. Schedule automatic deployment of your geospatial pipeline to the cloud data platform and monitor the performance in Wherobots. Consume the outcome of your geospatial analytics task. The consumption model can be through a single geospatial map visualization or API calls.
  • 8
    Acryl Data

    Acryl Data

    Acryl Data

    No more data catalog ghost towns. Acryl Cloud drives fast time-to-value via Shift Left practices for data producers and an intuitive UI for data consumers. Continuously detect data quality incidents in real-time, automate anomaly detection to prevent breakages, and drive fast resolution when they do occur. Acryl Cloud supports both push-based and pull-based metadata ingestion for easy maintenance, ensuring information is trustworthy, up-to-date, and definitive. Data should be operational. Go beyond simple visibility and use automated Metadata Tests to continuously expose data insights and surface new areas for improvement. Reduce confusion and accelerate resolution with clear asset ownership, automatic detection, streamlined alerts, and time-based lineage for tracing root causes.
  • 9
    Authorizer

    Authorizer

    Authorizer

    Build secure apps 10x faster. Low code tool and low cost deployment. Own your user data in your preferred database. Authenticate users with multiple auth recipes. Authorize users based on your business roles. OAuth2 and OpenID compatible APIs. Authentication and authorization have never been this simple before. Deploy production-ready Authorizer instance using one-click deployment options available. Open Authorizer instance endpoint in the browser. Sign up as an admin with a secure password. Configure environment variables from the dashboard. Authorizer object can be instantiated with JSON object. You can use Authorizer off the shelf and provide an amazing digital experience in just 3 minutes. We rather have you focused on your core business and build stuff that matters. Auth with best services baked in. Secure Session management implemented with HTTP-only cookies. Authorization Code flow implemented for mobile-based auth.
  • 10
    Polar Security

    Polar Security

    Polar Security

    Automate data discovery, protection & governance in your cloud workload and SaaS applications. Automatically pinpoint all your exposed sensitive data in cloud workloads and SaaS applications, allowing you to shrink the data attack surface. Identify and classify sensitive data such as PII, PHI, PCI, and custom company IP to prevent sensitive data exposure. Get actionable insights on how to protect your cloud data and ensure compliance, in real-time. Enforce data access policies to achieve least privileged access, maintain a strong security posture, and remain resilient to cyber-threats.
  • 11
    Stack Identity

    Stack Identity

    Stack Identity

    We identify, eliminate and govern shadow access - unauthorized, unmonitored and invisible access to cloud data, applications and infrastructure before an attacker can exploit it. We transform cloud IAM operations with an automated and risk-driven approach to securing and governing cloud data. This empowers cloud and security teams to quickly identify every data access pattern; who, what, when, where and why there is data access and its impact on cloud data security. Stack Identity protects cloud data by prioritizing both the risk and impact of identity, access and data vulnerabilities, visualized via our live data attack map. We help you remediate all types of access risks – human and API-based, guiding identity practitioners, governance and compliance teams and data owners to take definitive action and provide SecOps and DevOps teams with an honest view of cloud security risks.
  • 12
    Cypago

    Cypago

    Cypago

    Reduce manual efforts, lower costs and strengthen trust with customers with no-code automation workflows. Elevate your security Governance, Risk, and Compliance (GRC) maturity through simplified and automated cross-functional processes. Everything you need to know about achieving and maintaining compliance across all security frameworks and IT environments. Get in-depth ongoing insight into your compliance and risk posture. Save thousands of hours of manual work by leveraging the power of true automation. Put security policies and procedures into action to maintain accountability. At last, a complete audit automation experience, including audit scope generation and customization, 3600 evidence collection across data silos, in-context gap analysis, and auditor-trusted reports. Because audits can be easier and way more efficient than they are today. Transform chaos into compliance and enjoy instant insights on your employee and user base access privileges and permissions.
  • 13
    Kestra

    Kestra

    Kestra

    Kestra is an open-source, event-driven orchestrator that simplifies data operations and improves collaboration between engineers and business users. By bringing Infrastructure as Code best practices to data pipelines, Kestra allows you to build reliable workflows and manage them with confidence. Thanks to the declarative YAML interface for defining orchestration logic, everyone who benefits from analytics can participate in the data pipeline creation process. The UI automatically adjusts the YAML definition any time you make changes to a workflow from the UI or via an API call. Therefore, the orchestration logic is defined declaratively in code, even if some workflow components are modified in other ways.
  • 14
    Ikigai

    Ikigai

    Ikigai

    Model improvement and incremental model updates scenario analysis through simulations using historical data. Collaborate easily with data governance, access management, and version control. Ikigai’s out-of-the-box integrations make it easy to work with all kinds of tools that are already part of your workflows. Plug into almost any data source you can think of with Ikigai’s 200+ connectors. Want to push your ML pipeline to a website or dashboard? Just integrate directly using Ikigai’s web integrations. Use triggers to run data synchronizations and retrieve updates each time you run a data automation flow. Hook into your own APIs, or create APIs for your own data stack to integrate seamlessly with Ikigai.
  • 15
    Estuary Flow
    Estuary Flow is a new kind of DataOps platform that empowers engineering teams to build real-time, data-intensive applications at scale with minimal friction. This platform unifies a team’s databases, pub/sub systems, and SaaS around their data, without requiring new investments in infrastructure or development.
    Starting Price: $200/month
  • 16
    Revelstoke

    Revelstoke

    Revelstoke

    Rock your SOC with the first universal, low-code, high-speed security automation platform with case management built in. Revelstoke uses a single, universal data model that normalizes input and output data to allow for fast integration of any security product, and it’s future-proof. Our UI is based on the Kanban-style workflow. Grab a card, drag it into place, drop it where you want, and boom, the automation works. You can track and monitor case actions, timeline information, and workflow actions, all from the case management dashboard. IR is at your fingertips. Measure and report on the business impact of security automation, prove the value of the investment and show what your team is worth. Revelstoke radically simplifies security orchestration, automation, and response (SOAR), so security teams can work faster, smarter, and more effectively. With a low-code, drag-and-drop interface, dozens of built-in integrations, and incredible visibility into performance metrics.
  • 17
    Volante

    Volante

    Volante

    Our cloud-native payments as a service and low-code financial integration platform give you the freedom to evolve and innovate, fast. Volante helps financial institutions modernize payments, so banks can focus on growing their business, not IT. We help banks adapt their business model and realize new opportunities to grow and scale their business, with speed and agility. Volante’s low-code platform empowers business and technology users to quickly build financial transaction-based services. Using visual modeling, staff easily integrate with and orchestrate workflow across all financial and business systems. Accelerate digital transformation and payment modernization with our low-code platform. We partner with cloud infrastructure providers, technology suppliers, systems integrators, and consultancies across all areas of financial services, worldwide. By working with us, our partners innovate faster, broaden their reach, and differentiate themselves from their competitors.
  • 18
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 19
    Genie AI

    Genie AI

    Genie AI

    Harness the power of AI to analyze, summarize, and visualize data without all the complex SQL requirements. Allowing anyone on the team to easily ask any data question and get answers in seconds by connecting to any files, database, or API directly into Slack, Teams, or any workspace. Work 10x as fast with Al while keeping your internal data safe and secure. Self-hosted LLMs that run locally into your infrastructure, customized to your data. Genie ecosystem is built to enforce quality and security alongside spearheading the effort to allow any enterprise to easily train and deploy their own Al. Add your data and query in natural language across multiple tables. ‍Ask follow-up questions and get insights and visualizations in seconds.
  • 20
    LightBeam.ai

    LightBeam.ai

    LightBeam.ai

    Discover within minutes if sensitive information lurks in places you never expected (screenshots, logs, tickets, messages, tables). With one click, LightBeam can easily generate executive or delta reports to gain valuable insights into your sensitive data. Automate DSRs leveraging LightBeam's unique PII/PHI graphs comprehensively created from your data infrastructure. Build trust with your users by empowering them to exercise control over their data collection. Continuously monitor how sensitive data is collected, used, shared, and maintained with appropriate safeguards within your organization.
  • 21
    Blaze

    Blaze

    Blaze

    We give you everything you need to build your tool with no code. Create multiple apps with Blaze and easily connect them together to supercharge your team's processes. And when we say all-in-one, we mean it. Our Implementation Team helps build your app from start to finish so you can focus on growing your business. Enjoy our fully customizable templates and start launching apps like customer portals and internal tools that move your business forward. Leverage Blaze's ChatGPT AI system to help you build your app. Make tables that visualize your database, look up data, add forms, and more. You can also easily drag-and-drop pre-made Blaze components to build your app. Use Blaze's no-code database or connect into your own database to create incredible, custom tools. Be the ultimate value-add player on your team without writing any code.
    Starting Price: $400 per month
  • 22
    Syhunt Hybrid
    Syhunt dynamically injects data in web applications and analyzes the application response to determine if the application code is vulnerable, automating the web application security testing and proactively guarding your organization's Web infrastructure against several kinds of web application security threats. Syhunt Hybrid follows simple GUI standards, prioritizing ease of use and automation and thus requiring minimal to no user intervention before or during scans despite a large number of customization options. Compare past scan sessions to determine new, unchanged or removed vulnerabilities. Generate a comparison report that displays the evolution of vulnerabilities over time by automatically comparing previous scan session data related to a specific target.
  • 23
    HuLoop

    HuLoop

    HuLoop

    Get data-driven recommendations on your people, processes, and technologies. Set up automation of complex business processes, across disparate systems and data. Automate repetitive tasks to perform testing that is difficult to do manually. HuLoop platform creates, deploys, and manages intelligent agents as a digital workforce to perform repetitive tasks your people should no longer do. HuLoop digital agents can help you lower costs, improve productivity, and increase the job satisfaction of people across your organization. Helps you see, understand, and change your capabilities, as well as understand how your people, processes, and technologies interact. Automation and orchestration of complex business processes, across disparate systems and data, minimizing human dependency. Controls and executes tests and verifies expected outcomes. Automates repetitive tasks and performs testing that is difficult to do manually.
  • 24
    Yandex Managed Service for MongoDB
    Get access to new MongoDB features and official releases that are 100% compatible with the platform. If the load on your cluster increases, you can add new servers or increase their capacity in a matter of minutes. Invest your time in your project, and we’ll take care of database maintenance: software backups, monitoring, fault tolerance, and updates. You can enable sharding for clusters that have MongoDB version 4.0 or higher. You can also add and configure individual shards to improve cluster performance. All DBMS connections are encrypted using the TLS protocol, and DB backups are GPG-encrypted. Data is secured in accordance with the requirements of local regulatory, GDPR, and ISO industry standards. MongoDB has no regular tables and stores data as collections of JSON-like documents. This is great for projects where data structures may change during development.
  • 25
    Abstra

    Abstra

    Abstra

    Securely authenticate users with SSO or SAML providers and manage permissions to any app with advanced, custom granular control. Securely authenticate users with SSO or SAML providers and manage permissions to any app with advanced, custom granular control. Deploy on-premise to benefit from our fast-building tools while ensuring every piece of data stays within your network. Be that for customer-facing or internal processes, make sure your onboarding has the perfect fit. Integrate to your favorite services or manage it all inside Abstra. Skip error-prone, repetitive work by creating automated tasks. Combine dynamic forms and workflows to streamline information gathering, reminders and transactions. Save time and guarantee your data quality and transparency by automating your reconciliation workflow.
  • 26
    Seconize DeRisk Center
    Businesses are prone to increased attacks as the security teams are buried under tons of assessment reports and lack tools to manage the vulnerabilities that are key to their business. For companies ranging from SMBs, and start-ups to enterprises, Seconize makes discovering, identifying, prioritizing, and mitigating cyber risks and vulnerabilities easier. Identify potential losses as a result of cyber threats. Helps to evaluate the defenses constantly and mitigate the evolving threats. Factors multiple business facets to make it relevant to the organization. Compliance reports against standards like ISO 27001, NIST-CSF, PCI-DSS, RBI/SEBI/IRDAI guidelines. Loved by businesses, and individuals across the globe. Creating products that combine simplicity, flexibility, and security. Organizations of all types and sizes, from small businesses to very large enterprises are relying on Seconize to manage their risks and improve security posture.
  • 27
    SecHard

    SecHard

    SecHard

    SecHard is a multi-module software for implementing zero-trust architecture. SecHard provides automated security hardening auditing, scoring, and remediation for servers, clients, network devices, applications, databases, and more. A powerful identity and access management software to get compliant with zero trust and to prevent attacks like privilege abuse, ransomware, and more. SecHard solves the risk awareness problem in asset management. Automated discovery, access, identification, and remediation features provide ultra-wide visibility for all regulations. With the passive scanning method, SecHard operates the vulnerability detection and management processes for all IT assets without creating any risks. SecHard auto-discovers the certificates in the company’s environment report the expiration dates of these certificates, and it can automatically renew some of these certificates through well-known certificate authorities.
  • 28
    UnifyApps

    UnifyApps

    UnifyApps

    Reduce fragmented systems & bridge data silos by enabling your teams to develop complex applications, automate workflows and build data pipelines. Automate complex business processes across applications within minutes. Build and deploy customer-facing and internal applications. Use from a wide range of pre-built rich components. Enterprise-grade security and governance and robust debugging and change management. Build enterprise-grade applications 10x faster without writing code. Automate complex business processes across applications within minutes. Powered by enterprise-grade reliability features like caching, rate limiting, and circuit breakers. Build custom integrations in less than a day with connector SDK. Real-time data replication from any source to the destination system. Instantly move data across applications, data warehouses, or data lakes. Enable preload transformations, and automated schema mapping.
  • 29
    Docu Dig

    Docu Dig

    Docu Dig

    Docu Dig is your business solution for easy and secure content search and insights within your documents. Elevate your organization's document insights with a customized Docu Dig solution. Unlock your documents' potential with AI-powered smart search and insights, securely. Docu Dig uses cutting-edge AI technology to securely enhance document insights retrieval, boosting team productivity and improving access to information. At Docu Dig, your data security is paramount. We use advanced encryption to protect your documents both at rest and in transit, ensuring they are secure at all times. For highly sensitive data, we provide private, sandboxed AI models in the cloud or the option of on-premises physical servers, guaranteeing that your data never leaves your premises. Unlike traditional methods that depend on exact keyword matches, our AI understands the context behind your queries, providing accurate insights from your chosen documents.
  • 30
    Quest

    Quest

    Quest

    Empower growth & marketing teams to boost engagement and conversion 10x faster without data or engineering teams. Enhance your app with AI-driven personalized UI, seamlessly integrated with your data stack for a tailored user experience. Tailoring the onboarding process can significantly improve user activation. By considering factors like user roles, company type, and intent, we can create custom quick-start guides and tours. By allowing users to customize menu items or shop items based on their interests and behavior, we can create a personalized browsing experience. By leveraging insights such as purchase history, browsing behavior, and demographics, we can deliver targeted promotions and discounts that resonate with each user. Our analytical models find common traits for users who are not active and create thousands of segments to activate them. Easily find winning variants among millions of variants to power users across the customer journey.