Business Software for MongoDB - Page 17

Top Software that integrates with MongoDB as of August 2025 - Page 17

MongoDB Clear Filters
  • 1
    Kestra

    Kestra

    Kestra

    Kestra is an open-source, event-driven orchestrator that simplifies data operations and improves collaboration between engineers and business users. By bringing Infrastructure as Code best practices to data pipelines, Kestra allows you to build reliable workflows and manage them with confidence. Thanks to the declarative YAML interface for defining orchestration logic, everyone who benefits from analytics can participate in the data pipeline creation process. The UI automatically adjusts the YAML definition any time you make changes to a workflow from the UI or via an API call. Therefore, the orchestration logic is defined declaratively in code, even if some workflow components are modified in other ways.
  • 2
    Ikigai

    Ikigai

    Ikigai

    Model improvement and incremental model updates scenario analysis through simulations using historical data. Collaborate easily with data governance, access management, and version control. Ikigai’s out-of-the-box integrations make it easy to work with all kinds of tools that are already part of your workflows. Plug into almost any data source you can think of with Ikigai’s 200+ connectors. Want to push your ML pipeline to a website or dashboard? Just integrate directly using Ikigai’s web integrations. Use triggers to run data synchronizations and retrieve updates each time you run a data automation flow. Hook into your own APIs, or create APIs for your own data stack to integrate seamlessly with Ikigai.
  • 3
    Estuary Flow
    Estuary Flow is a new kind of DataOps platform that empowers engineering teams to build real-time, data-intensive applications at scale with minimal friction. This platform unifies a team’s databases, pub/sub systems, and SaaS around their data, without requiring new investments in infrastructure or development.
    Starting Price: $200/month
  • 4
    Revelstoke

    Revelstoke

    Revelstoke

    Rock your SOC with the first universal, low-code, high-speed security automation platform with case management built in. Revelstoke uses a single, universal data model that normalizes input and output data to allow for fast integration of any security product, and it’s future-proof. Our UI is based on the Kanban-style workflow. Grab a card, drag it into place, drop it where you want, and boom, the automation works. You can track and monitor case actions, timeline information, and workflow actions, all from the case management dashboard. IR is at your fingertips. Measure and report on the business impact of security automation, prove the value of the investment and show what your team is worth. Revelstoke radically simplifies security orchestration, automation, and response (SOAR), so security teams can work faster, smarter, and more effectively. With a low-code, drag-and-drop interface, dozens of built-in integrations, and incredible visibility into performance metrics.
  • 5
    Volante

    Volante

    Volante

    Our cloud-native payments as a service and low-code financial integration platform give you the freedom to evolve and innovate, fast. Volante helps financial institutions modernize payments, so banks can focus on growing their business, not IT. We help banks adapt their business model and realize new opportunities to grow and scale their business, with speed and agility. Volante’s low-code platform empowers business and technology users to quickly build financial transaction-based services. Using visual modeling, staff easily integrate with and orchestrate workflow across all financial and business systems. Accelerate digital transformation and payment modernization with our low-code platform. We partner with cloud infrastructure providers, technology suppliers, systems integrators, and consultancies across all areas of financial services, worldwide. By working with us, our partners innovate faster, broaden their reach, and differentiate themselves from their competitors.
  • 6
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 7
    Genie AI

    Genie AI

    Genie AI

    Harness the power of AI to analyze, summarize, and visualize data without all the complex SQL requirements. Allowing anyone on the team to easily ask any data question and get answers in seconds by connecting to any files, database, or API directly into Slack, Teams, or any workspace. Work 10x as fast with Al while keeping your internal data safe and secure. Self-hosted LLMs that run locally into your infrastructure, customized to your data. Genie ecosystem is built to enforce quality and security alongside spearheading the effort to allow any enterprise to easily train and deploy their own Al. Add your data and query in natural language across multiple tables. ‍Ask follow-up questions and get insights and visualizations in seconds.
  • 8
    LightBeam.ai

    LightBeam.ai

    LightBeam.ai

    Discover within minutes if sensitive information lurks in places you never expected (screenshots, logs, tickets, messages, tables). With one click, LightBeam can easily generate executive or delta reports to gain valuable insights into your sensitive data. Automate DSRs leveraging LightBeam's unique PII/PHI graphs comprehensively created from your data infrastructure. Build trust with your users by empowering them to exercise control over their data collection. Continuously monitor how sensitive data is collected, used, shared, and maintained with appropriate safeguards within your organization.
  • 9
    Blaze

    Blaze

    Blaze

    We give you everything you need to build your tool with no code. Create multiple apps with Blaze and easily connect them together to supercharge your team's processes. And when we say all-in-one, we mean it. Our Implementation Team helps build your app from start to finish so you can focus on growing your business. Enjoy our fully customizable templates and start launching apps like customer portals and internal tools that move your business forward. Leverage Blaze's ChatGPT AI system to help you build your app. Make tables that visualize your database, look up data, add forms, and more. You can also easily drag-and-drop pre-made Blaze components to build your app. Use Blaze's no-code database or connect into your own database to create incredible, custom tools. Be the ultimate value-add player on your team without writing any code.
    Starting Price: $400 per month
  • 10
    Syhunt Hybrid
    Syhunt dynamically injects data in web applications and analyzes the application response to determine if the application code is vulnerable, automating the web application security testing and proactively guarding your organization's Web infrastructure against several kinds of web application security threats. Syhunt Hybrid follows simple GUI standards, prioritizing ease of use and automation and thus requiring minimal to no user intervention before or during scans despite a large number of customization options. Compare past scan sessions to determine new, unchanged or removed vulnerabilities. Generate a comparison report that displays the evolution of vulnerabilities over time by automatically comparing previous scan session data related to a specific target.
  • 11
    HuLoop

    HuLoop

    HuLoop

    Get data-driven recommendations on your people, processes, and technologies. Set up automation of complex business processes, across disparate systems and data. Automate repetitive tasks to perform testing that is difficult to do manually. HuLoop platform creates, deploys, and manages intelligent agents as a digital workforce to perform repetitive tasks your people should no longer do. HuLoop digital agents can help you lower costs, improve productivity, and increase the job satisfaction of people across your organization. Helps you see, understand, and change your capabilities, as well as understand how your people, processes, and technologies interact. Automation and orchestration of complex business processes, across disparate systems and data, minimizing human dependency. Controls and executes tests and verifies expected outcomes. Automates repetitive tasks and performs testing that is difficult to do manually.
  • 12
    Yandex Managed Service for MongoDB
    Get access to new MongoDB features and official releases that are 100% compatible with the platform. If the load on your cluster increases, you can add new servers or increase their capacity in a matter of minutes. Invest your time in your project, and we’ll take care of database maintenance: software backups, monitoring, fault tolerance, and updates. You can enable sharding for clusters that have MongoDB version 4.0 or higher. You can also add and configure individual shards to improve cluster performance. All DBMS connections are encrypted using the TLS protocol, and DB backups are GPG-encrypted. Data is secured in accordance with the requirements of local regulatory, GDPR, and ISO industry standards. MongoDB has no regular tables and stores data as collections of JSON-like documents. This is great for projects where data structures may change during development.
  • 13
    Abstra

    Abstra

    Abstra

    Securely authenticate users with SSO or SAML providers and manage permissions to any app with advanced, custom granular control. Securely authenticate users with SSO or SAML providers and manage permissions to any app with advanced, custom granular control. Deploy on-premise to benefit from our fast-building tools while ensuring every piece of data stays within your network. Be that for customer-facing or internal processes, make sure your onboarding has the perfect fit. Integrate to your favorite services or manage it all inside Abstra. Skip error-prone, repetitive work by creating automated tasks. Combine dynamic forms and workflows to streamline information gathering, reminders and transactions. Save time and guarantee your data quality and transparency by automating your reconciliation workflow.
  • 14
    Seconize DeRisk Center
    Businesses are prone to increased attacks as the security teams are buried under tons of assessment reports and lack tools to manage the vulnerabilities that are key to their business. For companies ranging from SMBs, and start-ups to enterprises, Seconize makes discovering, identifying, prioritizing, and mitigating cyber risks and vulnerabilities easier. Identify potential losses as a result of cyber threats. Helps to evaluate the defenses constantly and mitigate the evolving threats. Factors multiple business facets to make it relevant to the organization. Compliance reports against standards like ISO 27001, NIST-CSF, PCI-DSS, RBI/SEBI/IRDAI guidelines. Loved by businesses, and individuals across the globe. Creating products that combine simplicity, flexibility, and security. Organizations of all types and sizes, from small businesses to very large enterprises are relying on Seconize to manage their risks and improve security posture.
  • 15
    SecHard

    SecHard

    SecHard

    SecHard is a multi-module software for implementing zero-trust architecture. SecHard provides automated security hardening auditing, scoring, and remediation for servers, clients, network devices, applications, databases, and more. A powerful identity and access management software to get compliant with zero trust and to prevent attacks like privilege abuse, ransomware, and more. SecHard solves the risk awareness problem in asset management. Automated discovery, access, identification, and remediation features provide ultra-wide visibility for all regulations. With the passive scanning method, SecHard operates the vulnerability detection and management processes for all IT assets without creating any risks. SecHard auto-discovers the certificates in the company’s environment report the expiration dates of these certificates, and it can automatically renew some of these certificates through well-known certificate authorities.
  • 16
    UnifyApps

    UnifyApps

    UnifyApps

    Reduce fragmented systems & bridge data silos by enabling your teams to develop complex applications, automate workflows and build data pipelines. Automate complex business processes across applications within minutes. Build and deploy customer-facing and internal applications. Use from a wide range of pre-built rich components. Enterprise-grade security and governance and robust debugging and change management. Build enterprise-grade applications 10x faster without writing code. Automate complex business processes across applications within minutes. Powered by enterprise-grade reliability features like caching, rate limiting, and circuit breakers. Build custom integrations in less than a day with connector SDK. Real-time data replication from any source to the destination system. Instantly move data across applications, data warehouses, or data lakes. Enable preload transformations, and automated schema mapping.
  • 17
    Docu Dig

    Docu Dig

    Docu Dig

    Docu Dig is your business solution for easy and secure content search and insights within your documents. Elevate your organization's document insights with a customized Docu Dig solution. Unlock your documents' potential with AI-powered smart search and insights, securely. Docu Dig uses cutting-edge AI technology to securely enhance document insights retrieval, boosting team productivity and improving access to information. At Docu Dig, your data security is paramount. We use advanced encryption to protect your documents both at rest and in transit, ensuring they are secure at all times. For highly sensitive data, we provide private, sandboxed AI models in the cloud or the option of on-premises physical servers, guaranteeing that your data never leaves your premises. Unlike traditional methods that depend on exact keyword matches, our AI understands the context behind your queries, providing accurate insights from your chosen documents.
  • 18
    Quest

    Quest

    Quest

    Empower growth & marketing teams to boost engagement and conversion 10x faster without data or engineering teams. Enhance your app with AI-driven personalized UI, seamlessly integrated with your data stack for a tailored user experience. Tailoring the onboarding process can significantly improve user activation. By considering factors like user roles, company type, and intent, we can create custom quick-start guides and tours. By allowing users to customize menu items or shop items based on their interests and behavior, we can create a personalized browsing experience. By leveraging insights such as purchase history, browsing behavior, and demographics, we can deliver targeted promotions and discounts that resonate with each user. Our analytical models find common traits for users who are not active and create thousands of segments to activate them. Easily find winning variants among millions of variants to power users across the customer journey.
  • 19
    IBM Storage Defender
    More data resilience is in store. Monitor, protect, detect and recover across primary and secondary storage. IBM Storage Defender detects threats early and helps you safely and quickly recover your operations in the event of an attack. It is part of the IBM Storage portfolio for data resilience. IBM Storage Defender provides visibility across all of your storage, leverages AI-driven intelligence from IBM to detect threats such as ransomware, and identifies the safest recovery points. Defender integrates with your existing security operations so you can recover quickly and securely. See what IBM Storage Defender can do by registering for a live demo today. Align infrastructure, data, and security teams through actionable alerts so that threats can be quickly isolated, and recovery plans can be quickly executed. Identify the safest recovery points and orchestrate recovery at scale across primary and secondary workloads.
  • 20
    Gemma 2

    Gemma 2

    Google

    A family of state-of-the-art, light-open models created from the same research and technology that were used to create Gemini models. These models incorporate comprehensive security measures and help ensure responsible and reliable AI solutions through selected data sets and rigorous adjustments. Gemma models achieve exceptional comparative results in their 2B, 7B, 9B, and 27B sizes, even outperforming some larger open models. With Keras 3.0, enjoy seamless compatibility with JAX, TensorFlow, and PyTorch, allowing you to effortlessly choose and change frameworks based on task. Redesigned to deliver outstanding performance and unmatched efficiency, Gemma 2 is optimized for incredibly fast inference on various hardware. The Gemma family of models offers different models that are optimized for specific use cases and adapt to your needs. Gemma models are large text-to-text lightweight language models with a decoder, trained in a huge set of text data, code, and mathematical content.
  • 21
    Velotix

    Velotix

    Velotix

    Velotix empowers organizations to maximize the value of their data while ensuring security and compliance in a rapidly evolving regulatory landscape. The Velotix Data Security Platform offers automated policy management, dynamic access controls, and comprehensive data discovery, all driven by advanced AI. With seamless integration across multi-cloud environments, Velotix enables secure, self-service data access, optimizing data utilization without compromising on governance. Trusted by leading enterprises across financial services, healthcare, telecommunications, and more, Velotix is reshaping data governance for the ‘need to share’ era.
  • 22
    Cloud 66

    Cloud 66

    Cloud 66

    Cloud 66 gives you everything you need to build, deploy and grow your applications on any cloud, without the headache of the server stuff. Works with any programming language or framework you prefer. Natively builds, configures, and manages all major databases and components. Deploys to your account on these cloud providers or non-cloud servers. Connect your git repository to Cloud 66. We support all major Git providers including GitHub, GitLab, Bitbucket, and Azure DevOps. Your code can be in a mono repo or a multi-repo setup. All programming languages and frameworks are supported, either natively or via containers. Connect your cloud provider account to Cloud 66. All major cloud providers including AWS, DigitalOcean, Google Cloud, Azure, and Linode are supported. Cloud 66 will analyze your code to find out the components that are needed to run your application. Static site generators like Gatsby, Hugo, or Jekyll are supported.
    Starting Price: $23 per year
  • 23
    ModelOp

    ModelOp

    ModelOp

    ModelOp is the leading AI governance software that helps enterprises safeguard all AI initiatives, including generative AI, Large Language Models (LLMs), in-house, third-party vendors, embedded systems, etc., without stifling innovation. Corporate boards and C‑suites are demanding the rapid adoption of generative AI but face financial, regulatory, security, privacy, ethical, and brand risks. Global, federal, state, and local-level governments are moving quickly to implement AI regulations and oversight, forcing enterprises to urgently prepare for and comply with rules designed to prevent AI from going wrong. Connect with AI Governance experts to stay informed about market trends, regulations, news, research, opinions, and insights to help you balance the risks and rewards of enterprise AI. ModelOp Center keeps organizations safe and gives peace of mind to all stakeholders. Streamline reporting, monitoring, and compliance adherence across the enterprise.
  • 24
    Canvas

    Canvas

    Canvas

    The first data tool that you'll love and a team of experts to get you started. Focus on the data, not the data engineering. Connect, explore, and visualize from over 150 SaaS tools without engineering or SQL. If it has an API, we'll build you a customer connector in 48 hours for free or your money back. Filters for your team to explore easily. Tons of visualization options. Color themes that make your charts pop. Familiar with Excel shortcuts. Slice and dice with powerful pivot tables. Formulas that translate to SQL. Get alerts about sign-ups, sales, and reactivations when they happen. Our analysts can build complex models and dashboards for you. Powered by a best-in-class backend that all the pros use. Scales to billions of rows like it's nothing. Works with all your other apps. Follow data from the chart all the way back to the source tables. Share your work with partners while keeping your data safe.
    Starting Price: $1,000 per month
  • 25
    Apono

    Apono

    Apono

    Use the Apono cloud-native access governance platform to work faster and more securely with self-service, secure, scalable access built for modern enterprises running in the cloud. Discover who has access to what with context. Identify access risk leveraging enriched identity and cloud resource context from the environment. Enforce access guardrails at scale. Apono automatically suggests dynamic policies that fit your business needs, streamlining the cloud access lifecycle and gaining control of cloud-privileged access. Improve your environment access controls with Apono’s AI, which detects high-risk unused, over provisioned and shadow access. Remove standing access and prevent lateral movement in your cloud environment. Organizations can enforce strict authentication, authorization, and audit controls for these high-level accounts, reducing the risk of insider threats, data breaches, and unauthorized access.
  • 26
    Attlaz

    Attlaz

    Attlaz

    Automate and manage data flows throughout your o­r­g­a­n­i­z­a­t­i­o­n. Streamlines processes connects core applications, automates tasks, and uncovers insights. Break down data barriers with Attlaz, transform unstructured data, and get a unified and comprehensive view of all business information. Automate even the most complex manual workflows with Attlaz. Our learnable decision engines equip your team with the tools they need to make faster, more informed decisions. Reduce the time and effort required to collect, format, and a­n­a­l­y­z­e data. Provide your customers and internal teams with high-quality data. Knowing what’s likely to happen before it does gives you more time to plan and prepare. Stop being purely reactive and start making proactive decisions. Reduce the occurrence of mistakes caused by manual input, resulting in more precise conclusions. Build omnichannel ecommerce with the best software integrations.
  • 27
    InformationGrid

    InformationGrid

    InformationGrid

    Most businesses are aware that data can help them to understand their customers better to improve processes and solve problems. We have developed a safe solution for sharing and aggregating data: InformationGrid. Get valuable insights with InformationGrid, a safe solution for sharing and aggregating data. A solution that allows hospitals and general practitioners to share data in order to prescribe better medications. Whether you have a clear idea of your data strategy or need some guidance defining this; we’re here to help you put your data strategy into action. Our SAAS platform enables you to share and aggregate data in a way that’s secure and cost-efficient. To keep time to value as short as possible we can build an application that can handle large amounts of data, and we can build it fast by using cloud-native techniques. This enables you to reap the short-term benefits of the data and get ready to start using AI to advance your business.
  • 28
    RAD Security

    RAD Security

    RAD Security

    RAD Security automates threat investigations, cuts through security noise, and helps teams secure smarter and defend faster. Powered by AI-driven digital workers, RAD Security is on a mission to make security make sense. RAD's holistic security platform goes beyond static alerts to correlate signals, prioritize threats, and deliver accurate, actionable insights. From continuous cloud monitoring to automated compliance readiness, RAD enables lean security teams to operate at enterprise scale. With RAD, security teams spend less time chasing false positives and more time solving real security issues. See RAD in action at radsecurity.ai.
  • 29
    Timbr.ai

    Timbr.ai

    Timbr.ai

    The smart semantic layer integrates data with business meaning and relationships, unifies metrics, and accelerates the delivery of data products with 90% shorter SQL queries. Easily model data using business terms to give it common meaning and align business metrics. Define semantic relationships that substitute JOINs so queries become much simpler. Use hierarchies and classifications to better understand data. Automatically map data to the semantic model. Join multiple data sources with a powerful distributed SQL engine to query data at scale. Consume data as a connected semantic graph. Boost performance and save compute costs with an intelligent cache engine and materialized views. Benefit from advanced query optimizations. Connect to most clouds, datalakes, data warehouses, databases, and any file format. Timbr empowers you to work with your data sources seamlessly. When a query is run, Timbr optimizes the query and pushes it down to the backend.
  • 30
    Simba

    Simba

    insightsoftware

    Common dashboards, reporting, and ETL tools often lack connectivity to certain data sources, creating integration challenges for users. Simba offers ready-to-use, standards-based drivers that ensure compatibility, simplifying the connectivity process. Companies that provide data to customers struggle to offer headache-free, easy data connectivity to their users. Simba’s SDK allows developers to build custom, standards-based drivers, making connectivity more friendly than CSV export or API-based access. Unique backend requirements, such as specific implementation needs dictated by specific applications or internal processes, can complicate connectivity. Using Simba’s SDK or managed services enables the creation of drivers tailored to meet these requirements. Simba provides comprehensive ODBC/JDBC extensibility for a wide range of applications and data tools. Simba Drivers plug into these tools to enhance their offerings, enabling additional connectivity to data sources.