List of MongoDB Atlas Integrations

This is a list of platforms and tools that integrate with MongoDB Atlas. This list is updated as of May 2026.

  • 1
    Procyon Reviews & Ratings

    Procyon

    Procyon

    Unlock secure cloud access effortlessly, without passwords needed!
    Experience effortless and secure entry to your cloud infrastructure without relying on passwords. Embrace the power of passwordless authentication across leading cloud platforms and a variety of cloud resources, seamlessly integrating with AWS, GCP, Azure, and a range of other cloud-native solutions. Protect against excessive access by utilizing just-in-time permissions tailored for developers. DevOps teams can conveniently request access to cloud resources through a system that grants 'just enough privileges,' ensuring their permissions are both time-sensitive and appropriate. This configuration effectively alleviates the productivity hurdles associated with depending solely on a centralized administrator. You have the flexibility to set approval policies based on various criteria, and you will gain access to a detailed catalog of both utilized and unutilized resources. Reduce the dangers of credential sprawl and mitigate the fears linked to credential theft. Developers can obtain passwordless access to cloud resources through advanced Trusted Platform Module (TPM) technology, which enhances security. Furthermore, you can identify potential weaknesses today with our free assessment tool, which provides insights into how Procyon can resolve these vulnerabilities swiftly. By harnessing TPM, robust identification of users and their devices is ensured, significantly improving overall security. This cutting-edge method not only simplifies access but also greatly strengthens your cloud security framework, paving the way for a more secure and efficient cloud environment. As a result, organizations can focus on innovation while maintaining a high level of security.
  • 2
    Entitle Reviews & Ratings

    Entitle

    BeyondTrust

    Secure, efficient access management for seamless business collaboration.
    Entitle employs a security-driven approach to provisioning and governance, ensuring that it also facilitates business operations across all sectors, including research and development, sales, human resources, and finance. It enhances the provisioning workflow to support security measures that evolve in response to changing infrastructure and diverse employee requirements. Permissions can be allocated to specific resources like Google Drive folders, database tables, Git repositories, and more, enabling effective oversight. Sensitive resources and positions are protected by granting access only when required and retracting it when no longer necessary. This strategy allows colleagues, managers, and resource owners to approve access requests, which helps ensure the reliability of permissions granted. With the incorporation of automated access requests and a zero-touch provisioning model, teams in DevOps, IT, and other areas can greatly boost their efficiency and manage resources more effectively. Users can easily request access through communication platforms such as Slack, Teams, Jira, or email, creating a seamless approval process. Furthermore, the ability to quickly assign bulk permissions aids in expediting onboarding and offboarding tasks, allowing the organization to respond adeptly to its evolving needs. This holistic approach not only protects sensitive data but also cultivates a collaborative atmosphere that empowers teams to excel, ultimately driving overall business success.
  • 3
    Blink Reviews & Ratings

    Blink

    Blink Ops

    Transform security operations with automation and actionable insights.
    Blink acts as a robust ROI enhancer for business leaders and security teams aiming to efficiently secure a variety of use cases. It provides comprehensive visibility and coverage throughout your organization’s security framework. By automating processes, Blink minimizes false positives and reduces alert noise, allowing teams to scan for threats and vulnerabilities proactively. With the ability to create automated workflows, it adds valuable context, enhances communication, and lowers the Mean Time to Recovery (MTTR). You can automate your processes using no-code solutions and generative AI to respond to alerts effectively and bolster your cloud security posture. Additionally, it ensures your applications remain secure by enabling developers to access their applications seamlessly, simplifying approval processes, and facilitating early access requests. Continuous monitoring of your applications for compliance with SOC2, ISO, or GDPR standards is also a key feature, helping enforce necessary controls while maintaining security. Ultimately, Blink empowers organizations to enhance their overall security strategy while streamlining various operational tasks.
  • 4
    Apono Reviews & Ratings

    Apono

    Apono

    Boost security and efficiency with intelligent cloud access governance.
    Utilize the Apono cloud-native access governance platform to boost both efficiency and security, offering self-service, scalable access solutions designed for modern enterprises that function in the cloud environment. With enhanced contextual awareness, you can gain valuable insights into access permissions, helping to identify potential risks by leveraging enriched identity and cloud resource contexts from your operational landscape. Apono allows for the implementation of access guardrails at scale, all while intelligently recommending adaptive policies that match your specific business needs, thus streamlining the cloud access lifecycle and maintaining control over privileged access. By integrating Apono's AI-driven capabilities, organizations can detect high-risk situations, such as unused accounts, excessive permissions, and shadow access, which can pose significant threats. Reducing unnecessary standing access effectively lowers the risk of lateral movement within your cloud infrastructure, enhancing overall security. Additionally, organizations can enforce rigorous authentication, authorization, and auditing processes for these elevated accounts, which significantly diminishes the chances of insider threats, data breaches, and unauthorized access. Consequently, Apono not only fortifies your cloud environment but also fosters a culture of security and compliance throughout the entire organization, promoting awareness at every level. This comprehensive approach ultimately empowers businesses to operate in a secure and compliant manner while leveraging the full potential of cloud technology.
  • 5
    Refold Reviews & Ratings

    Refold

    Refold AI

    Effortlessly integrate and innovate with powerful AI solutions.
    Refold.ai is an advanced AI-powered integration platform designed to tackle the complex challenges of connecting modern enterprise systems and legacy applications like SAP, Oracle Fusion, and Workday Finance. Its AI agents function as tireless digital workers that automate the entire integration lifecycle — from scope definition and workflow creation to intelligent data mapping and automated test case generation. The platform uses an evolving memory graph to predict and resolve API version conflicts, detect brittle endpoints, and auto-fix workflows in real time, enabling scalable and resilient integrations. Refold offers instant support for over 100 enterprise applications through a curated marketplace and provides smooth authentication, XML/ETL pipeline management, and detailed observability with audit logs. Deployment options include cloud, self-hosted, and air-gapped on-premises setups, supporting AWS, GCP, and Azure environments. Refold empowers solution engineers to build demos quickly, professional services teams to deliver integrations efficiently, product teams to embed integrations as core features, and AI teams to develop memory-driven internal agents. The platform is trusted by global clients for accelerating sales cycles and slashing integration costs by more than half. It boasts enterprise-grade security certifications such as SOC 2 Type II, ISO 27001, GDPR, and HIPAA compliance. Refold’s combination of AI-driven automation, real-time adaptation, and comprehensive integration infrastructure makes it a vital tool for modern enterprises. Overall, Refold.ai turns integration bottlenecks into seamless workflows, enabling faster innovation and superior customer experiences.
  • 6
    Azure Marketplace Reviews & Ratings

    Azure Marketplace

    Microsoft

    Unlock cloud potential with diverse solutions for businesses.
    The Azure Marketplace operates as a vast digital platform, offering users access to a multitude of certified software applications, services, and solutions from Microsoft along with numerous third-party vendors. This marketplace enables businesses to efficiently find, obtain, and deploy software directly within the Azure cloud ecosystem. It showcases a wide range of offerings, including virtual machine images, frameworks for AI and machine learning, developer tools, security solutions, and niche applications designed for specific sectors. With a variety of pricing options such as pay-as-you-go, free trials, and subscription-based plans, the Azure Marketplace streamlines the purchasing process while allowing for consolidated billing through a unified Azure invoice. Additionally, it guarantees seamless integration with Azure services, which empowers organizations to strengthen their cloud infrastructure, improve operational efficiency, and accelerate their journeys toward digital transformation. In essence, the Azure Marketplace is crucial for enterprises aiming to stay ahead in a rapidly changing technological environment while fostering innovation and adaptability. This platform is not just a marketplace; it is a gateway to unlocking the potential of cloud capabilities for businesses worldwide.
  • 7
    Scarf Reviews & Ratings

    Scarf

    Scarf

    Empowering open-source maintainers with actionable insights and analytics.
    Scarf is an all-encompassing platform designed to provide detailed analytics to maintainers of open-source projects concerning the usage of their software. By offering crucial insights into various elements such as the businesses that interact with a project, the rate of package downloads, and the particular versions in use, Scarf significantly boosts the effectiveness of marketing and sales strategies. It plays an essential part in identifying potential customers within the open-source ecosystem through Open Source Qualified Leads (OQLs), enabling organizations to refine their outreach efforts with precision. Furthermore, Scarf's compatibility with numerous third-party platforms enhances the value of the data provided, guaranteeing that users gain a complete understanding of their project's market influence and reach. This comprehensive approach not only simplifies the analytics process but also strengthens the relationships between project maintainers and prospective users, ultimately creating a more engaged community. With its robust features, Scarf empowers maintainers to make informed decisions that can lead to greater project success.
  • 8
    Draftt Reviews & Ratings

    Draftt

    Draftt

    Software Maintenance on Cruise Control. Powered by AI.
    Draftt is a cutting-edge governance software that proactively manages technology stacks by continuously monitoring the lifecycle and configuration of every component across diverse environments such as clouds, workloads, and code. This platform equips teams with the tools they need to anticipate potential technical debt and minimize risks linked to unexpected end-of-life situations. With its comprehensive visibility features, Draftt incorporates a unified control panel that visually organizes all technologies, their versions, dependencies, and Kubernetes clusters, replacing outdated methods like manual audits and static spreadsheets with a dynamic inventory that provides necessary context. By employing secure, read-only integrations with cloud services and developer tools, it collects lifecycle metadata, spots version inconsistencies, and identifies compatibility challenges early in the process. Additionally, Draftt's AI-powered prioritization and impact assessment functionalities draw attention to upgrade risks by analyzing urgency, effort, and business relevance, while also crafting detailed remediation strategies tailored to specific environments. To further facilitate upgrades, it offers well-structured, step-by-step pathways, accompanied by prebuilt actions and automated workflows that can be easily executed within the Draftt interface, thus optimizing the upgrade experience for teams. Beyond simplifying governance, Draftt enhances operational efficiency and significantly decreases the chances of encountering technical issues, ensuring organizations can maintain a robust tech ecosystem. With its ability to adapt to changing technology landscapes, Draftt positions itself as an invaluable asset for any forward-thinking team.
  • 9
    voyage-4-large Reviews & Ratings

    voyage-4-large

    Voyage AI

    Revolutionizing semantic embeddings for optimized accuracy and efficiency.
    The Voyage 4 model family from Voyage AI signifies a pioneering stage in the development of text embedding models, engineered to produce exceptional semantic vectors via a unique shared embedding space that allows for the generation of compatible embeddings among the various models within the series, thus empowering developers to effortlessly integrate models for both document and query embedding, which significantly boosts accuracy while also considering latency and cost factors. This lineup includes the voyage-4-large, the premier model that utilizes a mixture-of-experts architecture to reach state-of-the-art retrieval accuracy while achieving nearly 40% lower serving costs than comparable dense models; voyage-4, which effectively balances quality with performance; voyage-4-lite, which provides high-quality embeddings with a minimized parameter count and lower computational requirements; and the open-weight voyage-4-nano, ideal for local development and prototyping, distributed under an Apache 2.0 license. The seamless interoperability among these four models, all operating within the same shared embedding space, allows for interchangeable embeddings that foster innovative asymmetric retrieval techniques, which can greatly elevate performance across a wide range of applications. This integrated approach equips developers with a dynamic toolkit that can be customized to address various project demands, establishing the Voyage 4 family as an attractive option in the continuously evolving field of AI-driven technologies. Furthermore, the diverse capabilities and flexibility of these models enable organizations to experiment and adapt their embedding strategies to optimize specific use cases effectively.
  • 10
    Clutch Reviews & Ratings

    Clutch

    Clutch

    Secure non-human identities for a resilient digital future.
    Clutch is addressing the increasingly critical challenge of securing non-human identities within modern enterprises. With the expansion and advancement of digital infrastructures, the management and protection of non-human identities—such as API keys, secrets, tokens, and service accounts—has emerged as a pivotal, albeit often neglected, aspect of cybersecurity. Recognizing this gap in security, Clutch is developing a dedicated platform designed specifically to ensure comprehensive protection and management of these identities. This innovative solution aims to bolster the digital framework of organizations, fostering a secure, resilient, and dependable environment for their operations. The rise of non-human identities is remarkable, with their numbers outstripping human identities by a staggering 45 to 1, and these identities possess considerable privileges and broad access necessary for essential automated functions. Furthermore, they frequently lack vital security features such as multi-factor authentication and conditional access policies, amplifying the urgency of their protection. By tackling these vulnerabilities, Clutch is paving the way for stronger integrity in automated systems across various enterprises, ultimately enhancing their overall cybersecurity posture. This proactive approach not only safeguards sensitive data but also fortifies the trust in automated processes that are becoming increasingly integral to business operations.