Business Software for MongoDB - Page 17

Top Software that integrates with MongoDB as of October 2025 - Page 17

MongoDB Clear Filters
  • 1
    Acryl Data

    Acryl Data

    Acryl Data

    No more data catalog ghost towns. Acryl Cloud drives fast time-to-value via Shift Left practices for data producers and an intuitive UI for data consumers. Continuously detect data quality incidents in real-time, automate anomaly detection to prevent breakages, and drive fast resolution when they do occur. Acryl Cloud supports both push-based and pull-based metadata ingestion for easy maintenance, ensuring information is trustworthy, up-to-date, and definitive. Data should be operational. Go beyond simple visibility and use automated Metadata Tests to continuously expose data insights and surface new areas for improvement. Reduce confusion and accelerate resolution with clear asset ownership, automatic detection, streamlined alerts, and time-based lineage for tracing root causes.
  • 2
    Authorizer

    Authorizer

    Authorizer

    Build secure apps 10x faster. Low code tool and low cost deployment. Own your user data in your preferred database. Authenticate users with multiple auth recipes. Authorize users based on your business roles. OAuth2 and OpenID compatible APIs. Authentication and authorization have never been this simple before. Deploy production-ready Authorizer instance using one-click deployment options available. Open Authorizer instance endpoint in the browser. Sign up as an admin with a secure password. Configure environment variables from the dashboard. Authorizer object can be instantiated with JSON object. You can use Authorizer off the shelf and provide an amazing digital experience in just 3 minutes. We rather have you focused on your core business and build stuff that matters. Auth with best services baked in. Secure Session management implemented with HTTP-only cookies. Authorization Code flow implemented for mobile-based auth.
  • 3
    Polar Security

    Polar Security

    Polar Security

    Automate data discovery, protection & governance in your cloud workload and SaaS applications. Automatically pinpoint all your exposed sensitive data in cloud workloads and SaaS applications, allowing you to shrink the data attack surface. Identify and classify sensitive data such as PII, PHI, PCI, and custom company IP to prevent sensitive data exposure. Get actionable insights on how to protect your cloud data and ensure compliance, in real-time. Enforce data access policies to achieve least privileged access, maintain a strong security posture, and remain resilient to cyber-threats.
  • 4
    Stack Identity

    Stack Identity

    Stack Identity

    We identify, eliminate and govern shadow access - unauthorized, unmonitored and invisible access to cloud data, applications and infrastructure before an attacker can exploit it. We transform cloud IAM operations with an automated and risk-driven approach to securing and governing cloud data. This empowers cloud and security teams to quickly identify every data access pattern; who, what, when, where and why there is data access and its impact on cloud data security. Stack Identity protects cloud data by prioritizing both the risk and impact of identity, access and data vulnerabilities, visualized via our live data attack map. We help you remediate all types of access risks – human and API-based, guiding identity practitioners, governance and compliance teams and data owners to take definitive action and provide SecOps and DevOps teams with an honest view of cloud security risks.
  • 5
    Cypago

    Cypago

    Cypago

    Reduce manual efforts, lower costs and strengthen trust with customers with no-code automation workflows. Elevate your security Governance, Risk, and Compliance (GRC) maturity through simplified and automated cross-functional processes. Everything you need to know about achieving and maintaining compliance across all security frameworks and IT environments. Get in-depth ongoing insight into your compliance and risk posture. Save thousands of hours of manual work by leveraging the power of true automation. Put security policies and procedures into action to maintain accountability. At last, a complete audit automation experience, including audit scope generation and customization, 3600 evidence collection across data silos, in-context gap analysis, and auditor-trusted reports. Because audits can be easier and way more efficient than they are today. Transform chaos into compliance and enjoy instant insights on your employee and user base access privileges and permissions.
  • 6
    Kestra

    Kestra

    Kestra

    Kestra is an open-source, event-driven orchestrator that simplifies data operations and improves collaboration between engineers and business users. By bringing Infrastructure as Code best practices to data pipelines, Kestra allows you to build reliable workflows and manage them with confidence. Thanks to the declarative YAML interface for defining orchestration logic, everyone who benefits from analytics can participate in the data pipeline creation process. The UI automatically adjusts the YAML definition any time you make changes to a workflow from the UI or via an API call. Therefore, the orchestration logic is defined declaratively in code, even if some workflow components are modified in other ways.
  • 7
    Ikigai

    Ikigai

    Ikigai

    Model improvement and incremental model updates scenario analysis through simulations using historical data. Collaborate easily with data governance, access management, and version control. Ikigai’s out-of-the-box integrations make it easy to work with all kinds of tools that are already part of your workflows. Plug into almost any data source you can think of with Ikigai’s 200+ connectors. Want to push your ML pipeline to a website or dashboard? Just integrate directly using Ikigai’s web integrations. Use triggers to run data synchronizations and retrieve updates each time you run a data automation flow. Hook into your own APIs, or create APIs for your own data stack to integrate seamlessly with Ikigai.
  • 8
    Estuary Flow
    Estuary Flow is a new kind of DataOps platform that empowers engineering teams to build real-time, data-intensive applications at scale with minimal friction. This platform unifies a team’s databases, pub/sub systems, and SaaS around their data, without requiring new investments in infrastructure or development.
    Starting Price: $200/month
  • 9
    Revelstoke

    Revelstoke

    Revelstoke

    Rock your SOC with the first universal, low-code, high-speed security automation platform with case management built in. Revelstoke uses a single, universal data model that normalizes input and output data to allow for fast integration of any security product, and it’s future-proof. Our UI is based on the Kanban-style workflow. Grab a card, drag it into place, drop it where you want, and boom, the automation works. You can track and monitor case actions, timeline information, and workflow actions, all from the case management dashboard. IR is at your fingertips. Measure and report on the business impact of security automation, prove the value of the investment and show what your team is worth. Revelstoke radically simplifies security orchestration, automation, and response (SOAR), so security teams can work faster, smarter, and more effectively. With a low-code, drag-and-drop interface, dozens of built-in integrations, and incredible visibility into performance metrics.
  • 10
    Volante

    Volante

    Volante

    Our cloud-native payments as a service and low-code financial integration platform give you the freedom to evolve and innovate, fast. Volante helps financial institutions modernize payments, so banks can focus on growing their business, not IT. We help banks adapt their business model and realize new opportunities to grow and scale their business, with speed and agility. Volante’s low-code platform empowers business and technology users to quickly build financial transaction-based services. Using visual modeling, staff easily integrate with and orchestrate workflow across all financial and business systems. Accelerate digital transformation and payment modernization with our low-code platform. We partner with cloud infrastructure providers, technology suppliers, systems integrators, and consultancies across all areas of financial services, worldwide. By working with us, our partners innovate faster, broaden their reach, and differentiate themselves from their competitors.
  • 11
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 12
    Genie AI

    Genie AI

    Genie AI

    Harness the power of AI to analyze, summarize, and visualize data without all the complex SQL requirements. Allowing anyone on the team to easily ask any data question and get answers in seconds by connecting to any files, database, or API directly into Slack, Teams, or any workspace. Work 10x as fast with Al while keeping your internal data safe and secure. Self-hosted LLMs that run locally into your infrastructure, customized to your data. Genie ecosystem is built to enforce quality and security alongside spearheading the effort to allow any enterprise to easily train and deploy their own Al. Add your data and query in natural language across multiple tables. ‍Ask follow-up questions and get insights and visualizations in seconds.
  • 13
    LightBeam.ai

    LightBeam.ai

    LightBeam.ai

    Discover within minutes if sensitive information lurks in places you never expected (screenshots, logs, tickets, messages, tables). With one click, LightBeam can easily generate executive or delta reports to gain valuable insights into your sensitive data. Automate DSRs leveraging LightBeam's unique PII/PHI graphs comprehensively created from your data infrastructure. Build trust with your users by empowering them to exercise control over their data collection. Continuously monitor how sensitive data is collected, used, shared, and maintained with appropriate safeguards within your organization.
  • 14
    Blaze

    Blaze

    Blaze

    We give you everything you need to build your tool with no code. Create multiple apps with Blaze and easily connect them together to supercharge your team's processes. And when we say all-in-one, we mean it. Our Implementation Team helps build your app from start to finish so you can focus on growing your business. Enjoy our fully customizable templates and start launching apps like customer portals and internal tools that move your business forward. Leverage Blaze's ChatGPT AI system to help you build your app. Make tables that visualize your database, look up data, add forms, and more. You can also easily drag-and-drop pre-made Blaze components to build your app. Use Blaze's no-code database or connect into your own database to create incredible, custom tools. Be the ultimate value-add player on your team without writing any code.
    Starting Price: $400 per month
  • 15
    Syhunt Hybrid
    Syhunt dynamically injects data in web applications and analyzes the application response to determine if the application code is vulnerable, automating the web application security testing and proactively guarding your organization's Web infrastructure against several kinds of web application security threats. Syhunt Hybrid follows simple GUI standards, prioritizing ease of use and automation and thus requiring minimal to no user intervention before or during scans despite a large number of customization options. Compare past scan sessions to determine new, unchanged or removed vulnerabilities. Generate a comparison report that displays the evolution of vulnerabilities over time by automatically comparing previous scan session data related to a specific target.
  • 16
    HuLoop

    HuLoop

    HuLoop

    Get data-driven recommendations on your people, processes, and technologies. Set up automation of complex business processes, across disparate systems and data. Automate repetitive tasks to perform testing that is difficult to do manually. HuLoop platform creates, deploys, and manages intelligent agents as a digital workforce to perform repetitive tasks your people should no longer do. HuLoop digital agents can help you lower costs, improve productivity, and increase the job satisfaction of people across your organization. Helps you see, understand, and change your capabilities, as well as understand how your people, processes, and technologies interact. Automation and orchestration of complex business processes, across disparate systems and data, minimizing human dependency. Controls and executes tests and verifies expected outcomes. Automates repetitive tasks and performs testing that is difficult to do manually.
  • 17
    Yandex Managed Service for MongoDB
    Get access to new MongoDB features and official releases that are 100% compatible with the platform. If the load on your cluster increases, you can add new servers or increase their capacity in a matter of minutes. Invest your time in your project, and we’ll take care of database maintenance: software backups, monitoring, fault tolerance, and updates. You can enable sharding for clusters that have MongoDB version 4.0 or higher. You can also add and configure individual shards to improve cluster performance. All DBMS connections are encrypted using the TLS protocol, and DB backups are GPG-encrypted. Data is secured in accordance with the requirements of local regulatory, GDPR, and ISO industry standards. MongoDB has no regular tables and stores data as collections of JSON-like documents. This is great for projects where data structures may change during development.
  • 18
    Abstra

    Abstra

    Abstra

    Securely authenticate users with SSO or SAML providers and manage permissions to any app with advanced, custom granular control. Securely authenticate users with SSO or SAML providers and manage permissions to any app with advanced, custom granular control. Deploy on-premise to benefit from our fast-building tools while ensuring every piece of data stays within your network. Be that for customer-facing or internal processes, make sure your onboarding has the perfect fit. Integrate to your favorite services or manage it all inside Abstra. Skip error-prone, repetitive work by creating automated tasks. Combine dynamic forms and workflows to streamline information gathering, reminders and transactions. Save time and guarantee your data quality and transparency by automating your reconciliation workflow.
  • 19
    Seconize DeRisk Center
    Businesses are prone to increased attacks as the security teams are buried under tons of assessment reports and lack tools to manage the vulnerabilities that are key to their business. For companies ranging from SMBs, and start-ups to enterprises, Seconize makes discovering, identifying, prioritizing, and mitigating cyber risks and vulnerabilities easier. Identify potential losses as a result of cyber threats. Helps to evaluate the defenses constantly and mitigate the evolving threats. Factors multiple business facets to make it relevant to the organization. Compliance reports against standards like ISO 27001, NIST-CSF, PCI-DSS, RBI/SEBI/IRDAI guidelines. Loved by businesses, and individuals across the globe. Creating products that combine simplicity, flexibility, and security. Organizations of all types and sizes, from small businesses to very large enterprises are relying on Seconize to manage their risks and improve security posture.
  • 20
    SecHard

    SecHard

    SecHard

    SecHard is a multi-module software for implementing zero-trust architecture. SecHard provides automated security hardening auditing, scoring, and remediation for servers, clients, network devices, applications, databases, and more. A powerful identity and access management software to get compliant with zero trust and to prevent attacks like privilege abuse, ransomware, and more. SecHard solves the risk awareness problem in asset management. Automated discovery, access, identification, and remediation features provide ultra-wide visibility for all regulations. With the passive scanning method, SecHard operates the vulnerability detection and management processes for all IT assets without creating any risks. SecHard auto-discovers the certificates in the company’s environment report the expiration dates of these certificates, and it can automatically renew some of these certificates through well-known certificate authorities.
  • 21
    UnifyApps

    UnifyApps

    UnifyApps

    Reduce fragmented systems & bridge data silos by enabling your teams to develop complex applications, automate workflows and build data pipelines. Automate complex business processes across applications within minutes. Build and deploy customer-facing and internal applications. Use from a wide range of pre-built rich components. Enterprise-grade security and governance and robust debugging and change management. Build enterprise-grade applications 10x faster without writing code. Automate complex business processes across applications within minutes. Powered by enterprise-grade reliability features like caching, rate limiting, and circuit breakers. Build custom integrations in less than a day with connector SDK. Real-time data replication from any source to the destination system. Instantly move data across applications, data warehouses, or data lakes. Enable preload transformations, and automated schema mapping.
  • 22
    Docu Dig

    Docu Dig

    Docu Dig

    Docu Dig is your business solution for easy and secure content search and insights within your documents. Elevate your organization's document insights with a customized Docu Dig solution. Unlock your documents' potential with AI-powered smart search and insights, securely. Docu Dig uses cutting-edge AI technology to securely enhance document insights retrieval, boosting team productivity and improving access to information. At Docu Dig, your data security is paramount. We use advanced encryption to protect your documents both at rest and in transit, ensuring they are secure at all times. For highly sensitive data, we provide private, sandboxed AI models in the cloud or the option of on-premises physical servers, guaranteeing that your data never leaves your premises. Unlike traditional methods that depend on exact keyword matches, our AI understands the context behind your queries, providing accurate insights from your chosen documents.
  • 23
    Quest

    Quest

    Quest

    Empower growth & marketing teams to boost engagement and conversion 10x faster without data or engineering teams. Enhance your app with AI-driven personalized UI, seamlessly integrated with your data stack for a tailored user experience. Tailoring the onboarding process can significantly improve user activation. By considering factors like user roles, company type, and intent, we can create custom quick-start guides and tours. By allowing users to customize menu items or shop items based on their interests and behavior, we can create a personalized browsing experience. By leveraging insights such as purchase history, browsing behavior, and demographics, we can deliver targeted promotions and discounts that resonate with each user. Our analytical models find common traits for users who are not active and create thousands of segments to activate them. Easily find winning variants among millions of variants to power users across the customer journey.
  • 24
    IBM Storage Defender
    More data resilience is in store. Monitor, protect, detect and recover across primary and secondary storage. IBM Storage Defender detects threats early and helps you safely and quickly recover your operations in the event of an attack. It is part of the IBM Storage portfolio for data resilience. IBM Storage Defender provides visibility across all of your storage, leverages AI-driven intelligence from IBM to detect threats such as ransomware, and identifies the safest recovery points. Defender integrates with your existing security operations so you can recover quickly and securely. See what IBM Storage Defender can do by registering for a live demo today. Align infrastructure, data, and security teams through actionable alerts so that threats can be quickly isolated, and recovery plans can be quickly executed. Identify the safest recovery points and orchestrate recovery at scale across primary and secondary workloads.
  • 25
    Gemma 2

    Gemma 2

    Google

    A family of state-of-the-art, light-open models created from the same research and technology that were used to create Gemini models. These models incorporate comprehensive security measures and help ensure responsible and reliable AI solutions through selected data sets and rigorous adjustments. Gemma models achieve exceptional comparative results in their 2B, 7B, 9B, and 27B sizes, even outperforming some larger open models. With Keras 3.0, enjoy seamless compatibility with JAX, TensorFlow, and PyTorch, allowing you to effortlessly choose and change frameworks based on task. Redesigned to deliver outstanding performance and unmatched efficiency, Gemma 2 is optimized for incredibly fast inference on various hardware. The Gemma family of models offers different models that are optimized for specific use cases and adapt to your needs. Gemma models are large text-to-text lightweight language models with a decoder, trained in a huge set of text data, code, and mathematical content.
  • 26
    Velotix

    Velotix

    Velotix

    Velotix empowers organizations to maximize the value of their data while ensuring security and compliance in a rapidly evolving regulatory landscape. The Velotix Data Security Platform offers automated policy management, dynamic access controls, and comprehensive data discovery, all driven by advanced AI. With seamless integration across multi-cloud environments, Velotix enables secure, self-service data access, optimizing data utilization without compromising on governance. Trusted by leading enterprises across financial services, healthcare, telecommunications, and more, Velotix is reshaping data governance for the ‘need to share’ era.
  • 27
    Cloud 66

    Cloud 66

    Cloud 66

    Cloud 66 gives you everything you need to build, deploy and grow your applications on any cloud, without the headache of the server stuff. Works with any programming language or framework you prefer. Natively builds, configures, and manages all major databases and components. Deploys to your account on these cloud providers or non-cloud servers. Connect your git repository to Cloud 66. We support all major Git providers including GitHub, GitLab, Bitbucket, and Azure DevOps. Your code can be in a mono repo or a multi-repo setup. All programming languages and frameworks are supported, either natively or via containers. Connect your cloud provider account to Cloud 66. All major cloud providers including AWS, DigitalOcean, Google Cloud, Azure, and Linode are supported. Cloud 66 will analyze your code to find out the components that are needed to run your application. Static site generators like Gatsby, Hugo, or Jekyll are supported.
    Starting Price: $23 per year
  • 28
    ModelOp

    ModelOp

    ModelOp

    ModelOp is the leading AI governance software that helps enterprises safeguard all AI initiatives, including generative AI, Large Language Models (LLMs), in-house, third-party vendors, embedded systems, etc., without stifling innovation. Corporate boards and C‑suites are demanding the rapid adoption of generative AI but face financial, regulatory, security, privacy, ethical, and brand risks. Global, federal, state, and local-level governments are moving quickly to implement AI regulations and oversight, forcing enterprises to urgently prepare for and comply with rules designed to prevent AI from going wrong. Connect with AI Governance experts to stay informed about market trends, regulations, news, research, opinions, and insights to help you balance the risks and rewards of enterprise AI. ModelOp Center keeps organizations safe and gives peace of mind to all stakeholders. Streamline reporting, monitoring, and compliance adherence across the enterprise.
  • 29
    Canvas

    Canvas

    Canvas

    The first data tool that you'll love and a team of experts to get you started. Focus on the data, not the data engineering. Connect, explore, and visualize from over 150 SaaS tools without engineering or SQL. If it has an API, we'll build you a customer connector in 48 hours for free or your money back. Filters for your team to explore easily. Tons of visualization options. Color themes that make your charts pop. Familiar with Excel shortcuts. Slice and dice with powerful pivot tables. Formulas that translate to SQL. Get alerts about sign-ups, sales, and reactivations when they happen. Our analysts can build complex models and dashboards for you. Powered by a best-in-class backend that all the pros use. Scales to billions of rows like it's nothing. Works with all your other apps. Follow data from the chart all the way back to the source tables. Share your work with partners while keeping your data safe.
    Starting Price: $1,000 per month
  • 30
    Apono

    Apono

    Apono

    Use the Apono cloud-native access governance platform to work faster and more securely with self-service, secure, scalable access built for modern enterprises running in the cloud. Discover who has access to what with context. Identify access risk leveraging enriched identity and cloud resource context from the environment. Enforce access guardrails at scale. Apono automatically suggests dynamic policies that fit your business needs, streamlining the cloud access lifecycle and gaining control of cloud-privileged access. Improve your environment access controls with Apono’s AI, which detects high-risk unused, over provisioned and shadow access. Remove standing access and prevent lateral movement in your cloud environment. Organizations can enforce strict authentication, authorization, and audit controls for these high-level accounts, reducing the risk of insider threats, data breaches, and unauthorized access.