Pipefy
Pipefy is a low-code Business Orchestration and Automation Technologies (BOAT) platform designed to act as a modern middleware layer for the enterprise stack.
Rather than replacing existing Systems of Record (SORs) like SAP, Oracle, or Salesforce, Pipefy wraps them in an agile orchestration layer. This architecture allows technical teams to modernize legacy operations and extend the life of core systems without the risks associated with "rip and replace" projects. Pipefy provides the infrastructure to sanitize data inputs, manage complex business logic, and orchestrate API calls between fragmented endpoints.
Technical & Architectural Highlights:
• Adaptive Governance Framework: Pipefy solves the "Shadow IT" problem by establishing IT-sanctioned "Safe Zones." Business users can build workflows within these guardrails, while IT retains control over critical data, integrations, and permissions via a centralized console.
• Agentic AI Engine (BYOLLM): The platform features a governable AI Agent Studio. Unlike "black box" solutions, Pipefy supports a Bring Your Own LLM approach, allowing enterprises to integrate preferred models (Azure OpenAI, AWS Bedrock) securely to automate document analysis (OCR) and decision-making.
• Robust Connectivity: Built with an API-first philosophy, Pipefy offers a GraphQL API, Webhooks, and enterprise-grade iPaaS capabilities to ensure seamless data interoperability across the stack.
• Security & Compliance: Engineered for regulated industries, the platform is ISO 27001, ISO 27701, and SOC2 Type II certified, supporting compliance with GDPR and SOX standards.
Pipefy empowers IT leaders to eliminate technical debt and clear development backlogs by safely delegating low-complexity builds to business units.
Learn more
UTunnel VPN and ZTNA
UTunnel Secure Access delivers Cloud VPN, ZTNA, and Mesh Networking solutions to ensure secure remote access and smooth network connectivity.
ACCESS GATEWAY: Our Cloud VPN as a Service enables quick deployment of Cloud or On-Premise VPN servers. Utilizing OpenVPN and IPSec protocols, it facilitates secure remote connections with policy-based access control, allowing you to easily establish a VPN network for your business.
ONE-CLICK ACCESS: The Zero Trust Application Access (ZTAA) solution transforms secure access to internal business applications such as HTTP, HTTPS, SSH, and RDP. Users can access these applications through web browsers without needing client software.
MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution provides granular access controls to specific business network resources and supports the creation of secure interconnected business networks.
SITE-TO-SITE VPN: The Access Gateway solution also allows for the setup of secure IPSec Site-to-Site tunnels. These tunnels can connect UTunnel's VPN servers with other network gateways, firewalls, routers, and unified threat management (UTM) systems.
Learn more
Tetrate
Manage and connect applications seamlessly across various clusters, cloud environments, and data centers. Facilitate application connectivity across diverse infrastructures using a unified management platform. Incorporate traditional workloads into your cloud-native application framework effectively. Establish tenants within your organization to implement detailed access controls and editing permissions for teams sharing the infrastructure. Keep track of the change history for services and shared resources from the very beginning. Streamline traffic management across failure domains, ensuring your customers remain unaware of any disruptions. TSB operates at the application edge, functioning at cluster ingress and between workloads in both Kubernetes and traditional computing environments. Edge and ingress gateways efficiently route and balance application traffic across multiple clusters and clouds, while the mesh framework manages service connectivity. A centralized management interface oversees connectivity, security, and visibility for your entire application network, ensuring comprehensive oversight and control. This robust system not only simplifies operations but also enhances overall application performance and reliability.
Learn more
Kuma
Kuma is an open-source control plane designed for service mesh that provides essential features such as security, observability, and routing capabilities. It is built on the Envoy proxy and serves as a contemporary control plane for microservices and service mesh, compatible with both Kubernetes and virtual machines, allowing for multiple meshes within a single cluster. Its built-in architecture supports L4 and L7 policies to facilitate zero trust security, traffic reliability, observability, and routing with minimal effort. Setting up Kuma is a straightforward process that can be accomplished in just three simple steps. With Envoy proxy integrated, Kuma offers intuitive policies that enhance service connectivity, ensuring secure and observable interactions between applications, services, and even databases. This powerful tool enables the creation of modern service and application connectivity across diverse platforms, cloud environments, and architectures. Additionally, Kuma seamlessly accommodates contemporary Kubernetes setups alongside virtual machine workloads within the same cluster and provides robust multi-cloud and multi-cluster connectivity to meet the needs of the entire organization effectively. By adopting Kuma, teams can streamline their service management and improve overall operational efficiency.
Learn more