Pipefy
Pipefy is a low-code Business Orchestration and Automation Technologies (BOAT) platform designed to act as a modern middleware layer for the enterprise stack.
Rather than replacing existing Systems of Record (SORs) like SAP, Oracle, or Salesforce, Pipefy wraps them in an agile orchestration layer. This architecture allows technical teams to modernize legacy operations and extend the life of core systems without the risks associated with "rip and replace" projects. Pipefy provides the infrastructure to sanitize data inputs, manage complex business logic, and orchestrate API calls between fragmented endpoints.
Technical & Architectural Highlights:
• Adaptive Governance Framework: Pipefy solves the "Shadow IT" problem by establishing IT-sanctioned "Safe Zones." Business users can build workflows within these guardrails, while IT retains control over critical data, integrations, and permissions via a centralized console.
• Agentic AI Engine (BYOLLM): The platform features a governable AI Agent Studio. Unlike "black box" solutions, Pipefy supports a Bring Your Own LLM approach, allowing enterprises to integrate preferred models (Azure OpenAI, AWS Bedrock) securely to automate document analysis (OCR) and decision-making.
• Robust Connectivity: Built with an API-first philosophy, Pipefy offers a GraphQL API, Webhooks, and enterprise-grade iPaaS capabilities to ensure seamless data interoperability across the stack.
• Security & Compliance: Engineered for regulated industries, the platform is ISO 27001, ISO 27701, and SOC2 Type II certified, supporting compliance with GDPR and SOX standards.
Pipefy empowers IT leaders to eliminate technical debt and clear development backlogs by safely delegating low-complexity builds to business units.
Learn more
UTunnel VPN and ZTNA
UTunnel Secure Access delivers Cloud VPN, ZTNA, and Mesh Networking solutions to ensure secure remote access and smooth network connectivity.
ACCESS GATEWAY: Our Cloud VPN as a Service enables quick deployment of Cloud or On-Premise VPN servers. Utilizing OpenVPN and IPSec protocols, it facilitates secure remote connections with policy-based access control, allowing you to easily establish a VPN network for your business.
ONE-CLICK ACCESS: The Zero Trust Application Access (ZTAA) solution transforms secure access to internal business applications such as HTTP, HTTPS, SSH, and RDP. Users can access these applications through web browsers without needing client software.
MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution provides granular access controls to specific business network resources and supports the creation of secure interconnected business networks.
SITE-TO-SITE VPN: The Access Gateway solution also allows for the setup of secure IPSec Site-to-Site tunnels. These tunnels can connect UTunnel's VPN servers with other network gateways, firewalls, routers, and unified threat management (UTM) systems.
Learn more
Kuma
Kuma is an open-source control plane designed for service mesh that provides essential features such as security, observability, and routing capabilities. It is built on the Envoy proxy and serves as a contemporary control plane for microservices and service mesh, compatible with both Kubernetes and virtual machines, allowing for multiple meshes within a single cluster. Its built-in architecture supports L4 and L7 policies to facilitate zero trust security, traffic reliability, observability, and routing with minimal effort. Setting up Kuma is a straightforward process that can be accomplished in just three simple steps. With Envoy proxy integrated, Kuma offers intuitive policies that enhance service connectivity, ensuring secure and observable interactions between applications, services, and even databases. This powerful tool enables the creation of modern service and application connectivity across diverse platforms, cloud environments, and architectures. Additionally, Kuma seamlessly accommodates contemporary Kubernetes setups alongside virtual machine workloads within the same cluster and provides robust multi-cloud and multi-cluster connectivity to meet the needs of the entire organization effectively. By adopting Kuma, teams can streamline their service management and improve overall operational efficiency.
Learn more
Kong Mesh
Kuma provides an enterprise service mesh that seamlessly operates across multiple clouds and clusters, whether on Kubernetes or virtual machines. With just a single command, users can deploy the service mesh and automatically connect to other services through its integrated service discovery features, which include Ingress resources and remote control planes. This solution is versatile enough to function in any environment, efficiently managing resources across multi-cluster, multi-cloud, and multi-platform settings. By leveraging native mesh policies, organizations can enhance their zero-trust and GDPR compliance initiatives, thereby boosting the performance and productivity of application teams. The architecture allows for the deployment of a singular control plane that can effectively scale horizontally to accommodate numerous data planes, or to support various clusters, including hybrid service meshes that integrate both Kubernetes and virtual machines. Furthermore, cross-zone communication is made easier with Envoy-based ingress deployments across both environments, coupled with a built-in DNS resolver for optimal service-to-service interactions. Built on the robust Envoy framework, Kuma also offers over 50 observability charts right out of the box, enabling the collection of metrics, traces, and logs for all Layer 4 to Layer 7 traffic, thereby providing comprehensive insights into service performance and health. This level of observability not only enhances troubleshooting but also contributes to a more resilient and reliable service architecture.
Learn more