[{"data":1,"prerenderedAt":1613},["ShallowReactive",2],{"page-local-integrations-index":3,"integration-page-category-cybersecurity":81,"mainMenu":111,"i-n8n:box":271,"i-n8n:boxes":274,"i-n8n:sparkle":276,"i-n8n:layers":278,"i-n8n:connection":280,"i-n8n:pieces":282,"i-n8n:blocks":284,"i-n8n:files":286,"i-n8n:drives":289,"i-n8n:docs":291,"i-n8n:copyright":293,"i-n8n:note":295,"i-ph:caret-down":297,"i-n8n:chat":299,"i-n8n:discord":301,"i-n8n:blog":303,"i-n8n:users":305,"i-n8n:contribute":307,"i-n8n:score":309,"i-n8n:shield":311,"i-n8n:lightning":313,"i-n8n:help":315,"integrations-overview-category-cybersecurity":317,"website-global-component-2":327,"footer":441,"i-ph:arrow-right":566,"githubCount":568,"i-uil:github":569,"integrations-overview-nodes-cybersecurity":571,"website-global-component-35":1126,"sub-footer":1323,"i-n8n:arrow-link":1518,"integrations-overview-categories":1520,"i-ph:magnifying-glass":1607,"i-ph:question-bold":1609,"i-ph:plus-bold":1611},{"id":4,"documentId":5,"url":6,"hideFooterCta":7,"hideFooterTestimonials":7,"createdAt":8,"updatedAt":9,"publishedAt":10,"pageTitle":11,"pageType":12,"templateId":12,"templateVariant":12,"SEO":13,"content":65,"editorialView":80,"searchPageConfig":12},909,"ihnazwpgj825s23s0nxmnpvn","/integrations",false,"2025-12-04T12:30:12.611Z","2026-02-25T15:30:41.070Z","2026-02-25T15:30:41.320Z","Best apps & software integrations | n8n",null,{"id":14,"metaTitle":15,"metaDescription":16,"keywords":12,"metaRobots":12,"structuredData":12,"metaViewport":12,"canonicalURL":12,"metaImage":17,"metaSocial":64},793,"Best Cybersecurity apps & software integrations","Optimize your workflows with top Cybersecurity integrations: seamlessly move and transform data between different apps and databases without getting caught up in API docs and troubleshooting CORS errors.",{"id":18,"documentId":12,"name":19,"alternativeText":20,"caption":20,"width":21,"height":22,"formats":23,"hash":58,"ext":25,"mime":28,"size":59,"url":60,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":62,"updatedAt":63,"publishedAt":12,"focalPoint":12},251,"n8n-og-image","Automate without limits",1200,630,{"large":24,"small":34,"medium":42,"thumbnail":50},{"ext":25,"url":26,"hash":27,"mime":28,"name":29,"path":12,"size":30,"width":31,"height":32,"sizeInBytes":33},".png","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/large_og_image_website_3_afd66761a9.png","large_og_image_website_3_afd66761a9","image/png","large_n8n-og-image",405.17,1000,525,405172,{"ext":25,"url":35,"hash":36,"mime":28,"name":37,"path":12,"size":38,"width":39,"height":40,"sizeInBytes":41},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/small_og_image_website_3_afd66761a9.png","small_og_image_website_3_afd66761a9","small_n8n-og-image",122.22,500,263,122223,{"ext":25,"url":43,"hash":44,"mime":28,"name":45,"path":12,"size":46,"width":47,"height":48,"sizeInBytes":49},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/medium_og_image_website_3_afd66761a9.png","medium_og_image_website_3_afd66761a9","medium_n8n-og-image",250,750,394,250002,{"ext":25,"url":51,"hash":52,"mime":28,"name":53,"path":12,"size":54,"width":55,"height":56,"sizeInBytes":57},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/thumbnail_og_image_website_3_afd66761a9.png","thumbnail_og_image_website_3_afd66761a9","thumbnail_n8n-og-image",39.59,245,129,39592,"og_image_website_3_afd66761a9",122.62,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/og_image_website_3_afd66761a9.png","strapi-provider-upload-azure-storage","2022-05-24T09:14:17.151Z","2025-04-24T07:38:57.057Z",[],[66,71,75],{"__component":67,"id":68,"tagline":12,"title":15,"description":69,"themeVariant":70},"components.hero-basic-section",346,"Optimize your workflows with these top software integrations. \nSeamlessly move and transform data between different apps with n8n.","orange",{"__component":72,"id":73,"paginationVariant":74},"components.integrations-overview",9,"pager",{"__component":76,"id":77,"globalComponent":78},"components.global-component",301,{"id":79},2,[],{"id":82,"name":83,"url":84,"categorySentence":85,"faq":86,"useCaseBanner":102,"subcategories":110},24,"Cybersecurity","/integrations/categories/cybersecurity/","Automate cybersecurity workflows by monitoring threats, managing incident responses, and securing data across platforms.",[87,90,93,96,99],{"answer":88,"question":89},"n8n offers integrations with a wide range of Cybersecurity tools, including firewalls, intrusion detection systems, antivirus solutions, and vulnerability scanners. Additionally, you can connect to incident response tools and security information and event management (SIEM) platforms to enhance your security automation processes. This flexibility allows you to create workflows that streamline your cybersecurity operations effectively. These integrations allow you to streamline your Cybersecurity workflows, automate repetitive tasks, and improve collaboration across your team.","What types of Cybersecurity tools can I integrate with n8n?",{"answer":91,"question":92},"Yes, each Cybersecurity integration may have specific requirements. For example, the integration might require certain software versions, API access, or specific configuration settings to function properly. Additionally, some integrations may limit the number of concurrent connections or data throughput based on your subscription level. Always refer to the documentation for the specific integration you are using for detailed requirements.\n\n n8n offers a significant number of pre-built Cybersecurity integrations (called nodes). If n8n doesn't support the integration you need, use the HTTP Request node or custom code to connect to the service's API. Be sure to review the integration documentation for any app-specific prerequisites. Additionally, consider any API rate limits or usage constraints that might affect your workflows.","Are there any specific requirements or limitations for using Cybersecurity integrations?",{"answer":94,"question":95},"Cybersecurity integrations with n8n offer a variety of practical use cases. For example:\n\n- Automating threat detection and alerts from security tools to notify teams in real-time.\n\n- Integrating with incident response platforms to streamline ticket creation for security incidents.\n\n- Enforcing data protection policies by connecting to data loss prevention solutions to automatically monitor and manage sensitive data.","What are some popular use cases for Cybersecurity integrations in n8n?",{"answer":97,"question":98},"n8n's pricing model, which charges only for full workflow executions rather than individual tasks or steps, is particularly advantageous for Cybersecurity workflows. This means you can build complex, multi-step workflows involving various Cybersecurity tools without worrying about cost increases due to the number of operations. For example, if your Cybersecurity workflows perform around 100k tasks, you could be paying $500+/month on other platforms, but with n8n's pro plan, you start at around $50. This approach allows you to scale your Cybersecurity integrations efficiently while maintaining predictable costs.","How does n8n’s pricing model benefit Cybersecurity workflows?",{"answer":100,"question":101},"n8n offers powerful AI capabilities that can enhance your Cybersecurity workflows. For example, you can integrate AI tools like OpenAI with n8n to analyze security logs, identify unusual patterns, and automate incident responses. Additionally, n8n's flexible workflow automation can help streamline processes such as threat detection and vulnerability assessments by integrating various services and notifications. By combining AI insights with n8n's automation, you can significantly improve your security posture and response times. To add AI capabilities, navigate to the AI category in n8n's integrations directory and set up the integration with your chosen AI service. This combination of AI and Cybersecurity integrations can significantly boost your development efficiency and innovation.","How can I leverage n8n's AI capabilities in my Cybersecurity workflows?",{"id":103,"title":104,"content":105,"link":106},3,"The SOAR platform you want","Mountains of monotonous tasks make building and monitoring your workflows a chore. Not anymore.",{"id":107,"url":108,"label":109,"hint":12},249,"https://n8n.io/secops/","Learn more",[],{"id":112,"documentId":113,"createdAt":114,"updatedAt":115,"publishedAt":116,"menuItems":117},1,"x5igzoueyirmhrv6wjhupd2d","2025-12-11T14:08:14.828Z","2026-04-08T15:22:03.916Z","2026-04-08T15:22:03.739Z",[118,143,190,214,263,267],{"id":103,"url":119,"label":120,"subMenuLabel":121,"subMenuLayout":122,"subMenu":123},"/features","Product","Discover n8n","default",[124,128,132,137],{"id":112,"url":119,"label":125,"shortDescription":126,"description":12,"icon":127},"Product overview","Automate business processes without limits on your logic.","box",{"id":79,"url":6,"label":129,"shortDescription":130,"description":12,"icon":131},"Integrations","Seamlessly move and transform data between different apps with n8n.","pieces",{"id":103,"url":133,"label":134,"shortDescription":135,"description":12,"icon":136},"/workflows","Templates","Explore +8500 workflow automation templates.","boxes",{"id":138,"url":139,"label":140,"shortDescription":141,"description":12,"icon":142},4,"/ai","AI","Get to prod faster — and with more flexibility than coding alone.","sparkle",{"id":138,"url":12,"label":144,"subMenuLabel":145,"subMenuLayout":146,"subMenu":147},"Use cases","Explore case study","columns",[148,152,157,162,167,171,176,180,185],{"id":149,"url":150,"label":151,"shortDescription":12,"description":12,"icon":142},5,"/ai-agents","Building AI agents",{"id":153,"url":154,"label":155,"shortDescription":12,"description":12,"icon":156},6,"/rag","RAG","layers",{"id":158,"url":159,"label":160,"shortDescription":12,"description":12,"icon":161},7,"/itops","IT operations","connection",{"id":163,"url":164,"label":165,"shortDescription":12,"description":12,"icon":166},8,"/secops","Security operations","shield",{"id":168,"url":169,"label":170,"shortDescription":12,"description":12,"icon":161},10,"/automate-lead-management","Lead automation",{"id":172,"url":173,"label":174,"shortDescription":12,"description":12,"icon":175},11,"/supercharge-your-crm","Supercharge your CRM","contribute",{"id":177,"url":178,"label":179,"shortDescription":12,"description":12,"icon":131},12,"/limitless-integrations","Limitless integrations",{"id":181,"url":182,"label":183,"shortDescription":12,"description":12,"icon":184},13,"/saas","Backend prototyping","blocks",{"id":186,"url":187,"label":188,"shortDescription":12,"description":12,"icon":189},28,"/case-studies","Case studies","files",{"id":149,"url":191,"label":192,"subMenuLabel":12,"subMenuLayout":12,"subMenu":193},"https://docs.n8n.io/","Docs",[194,199,204,209],{"id":195,"url":196,"label":197,"shortDescription":12,"description":12,"icon":198},14,"https://docs.n8n.io/hosting","Self-host n8n","drives",{"id":200,"url":201,"label":202,"shortDescription":12,"description":12,"icon":203},15,"https://docs.n8n.io","Documentation","docs",{"id":205,"url":206,"label":207,"shortDescription":12,"description":12,"icon":208},16,"https://docs.n8n.io/choose-n8n/faircode-license","Our license","copyright",{"id":210,"url":211,"label":212,"shortDescription":12,"description":12,"icon":213},17,"https://docs.n8n.io/release-notes/","Release notes","note",{"id":153,"url":12,"label":215,"subMenuLabel":12,"subMenuLayout":146,"subMenu":216},"Community",[217,222,227,232,237,242,246,250,254,258],{"id":218,"url":219,"label":220,"shortDescription":12,"description":12,"icon":221},18,"https://community.n8n.io/","Forum","chat",{"id":223,"url":224,"label":225,"shortDescription":12,"description":12,"icon":226},19,"https://discord.gg/XPKeKXeB7d","Discord","discord",{"id":228,"url":229,"label":230,"shortDescription":12,"description":12,"icon":231},20,"/careers","Careers","lightning",{"id":233,"url":234,"label":235,"shortDescription":12,"description":12,"icon":236},21,"https://blog.n8n.io/","Blog","blog",{"id":238,"url":239,"label":240,"shortDescription":12,"description":12,"icon":241},22,"/creators","Creators","users",{"id":243,"url":244,"label":245,"shortDescription":12,"description":12,"icon":175},23,"https://docs.n8n.io/help-community/contributing/","Contribute",{"id":82,"url":247,"label":248,"shortDescription":12,"description":12,"icon":249},"/partners","Partners","score",{"id":251,"url":252,"label":253,"shortDescription":12,"description":12,"icon":166},61,"https://experts.n8n.io/","Hire an expert",{"id":255,"url":256,"label":257,"shortDescription":12,"description":12,"icon":231},26,"/community/events","Events",{"id":259,"url":260,"label":261,"shortDescription":12,"description":12,"icon":262},25,"/support","Support","help",{"id":112,"url":264,"label":265,"subMenuLabel":12,"subMenuLayout":12,"subMenu":266},"/enterprise","Enterprise",[],{"id":79,"url":268,"label":269,"subMenuLabel":12,"subMenuLayout":12,"subMenu":270},"/pricing","Pricing",[],{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":273},0,"\u003Cg fill=\"none\">\u003Cpath\n    d=\"M2.742 5.833 10 10m0 0 7.258-4.167M10 10v8.333m7.5-5V6.666a1.667 1.667 0 0 0-.833-1.441L10.833 1.89a1.666 1.666 0 0 0-1.666 0L3.333 5.225A1.667 1.667 0 0 0 2.5 6.666v6.667a1.667 1.667 0 0 0 .833 1.442l5.834 3.333a1.666 1.666 0 0 0 1.666 0l5.834-3.333a1.667 1.667 0 0 0 .833-1.442z\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":275},"\u003Cg fill=\"none\">\u003Cpath\n    d=\"M2.475 10.767a1.666 1.666 0 0 0-.808 1.425v2.7a1.666 1.666 0 0 0 .808 1.425l2.5 1.5a1.667 1.667 0 0 0 1.716 0L10 15.833V11.25l-4.167-2.5-3.358 2.017zM5.833 13.75l-3.95-2.375M5.833 13.75 10 11.25M5.833 13.75v4.308M10 11.25v4.583l3.308 1.984a1.667 1.667 0 0 0 1.717 0l2.5-1.5a1.667 1.667 0 0 0 .808-1.425v-2.7a1.665 1.665 0 0 0-.808-1.425L14.167 8.75 10 11.25zM14.167 13.75 10 11.25M14.166 13.75l3.95-2.375M14.166 13.75v4.308\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\n  \u003Cpath\n    d=\"M6.642 3.683a1.667 1.667 0 0 0-.809 1.425V8.75L10 11.25l4.167-2.5V5.108a1.665 1.665 0 0 0-.809-1.425l-2.5-1.5a1.667 1.667 0 0 0-1.716 0l-2.5 1.5zM10 6.668 6.05 4.293M10 6.668l3.95-2.375M10 11.251V6.668\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":277},"\u003Cg fill=\"none\">\u003Cpath d=\"M8.28 12.918a1.667 1.667 0 0 0-1.197-1.197l-5.112-1.319a.416.416 0 0 1 0-.801l5.112-1.32a1.667 1.667 0 0 0 1.198-1.196l1.318-5.113a.417.417 0 0 1 .803 0l1.317 5.113a1.667 1.667 0 0 0 1.198 1.197L18.029 9.6a.417.417 0 0 1 0 .803l-5.112 1.318a1.667 1.667 0 0 0-1.198 1.197l-1.318 5.113a.416.416 0 0 1-.803 0l-1.317-5.113zM16.666 2.5v3.333M18.333 4.168H15M3.333 14.168v1.667M4.167 15H2.5\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":279},"\u003Cg fill=\"none\">\u003Cpath d=\"M10.833 11.45a1.667 1.667 0 0 1-1.667 0L2.083 7.392a.833.833 0 0 1 0-1.45l7.083-4.059a1.667 1.667 0 0 1 1.667 0l7.083 4.059a.833.833 0 0 1 0 1.45l-7.083 4.058zM16.666 11.902l1.25.705a.833.833 0 0 1 0 1.45l-7.083 4.058a1.667 1.667 0 0 1-1.667 0l-7.083-4.058a.834.834 0 0 1 0-1.45l1.25-.705\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":281},"\u003Cg fill=\"none\">\u003Cpath d=\"M7.5 2.5H4.167c-.92 0-1.667.746-1.667 1.667V7.5c0 .92.746 1.667 1.667 1.667H7.5c.92 0 1.667-.747 1.667-1.667V4.167c0-.92-.747-1.667-1.667-1.667zM5.833 9.168v3.333A1.667 1.667 0 0 0 7.5 14.168h3.334M15.834 10.832H12.5c-.92 0-1.666.746-1.666 1.667v3.333c0 .92.746 1.667 1.666 1.667h3.334c.92 0 1.666-.746 1.666-1.667v-3.333c0-.92-.746-1.667-1.666-1.667z\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":283},"\u003Cg fill=\"none\">\u003Cpath d=\"M8.333 18.333v-12.5A.833.833 0 0 0 7.5 5H3.333a1.667 1.667 0 0 0-1.667 1.667v10a1.667 1.667 0 0 0 1.667 1.666h10A1.667 1.667 0 0 0 15 16.667V12.5a.834.834 0 0 0-.834-.833h-12.5M17.5 1.668h-5a.833.833 0 0 0-.834.833v5c0 .46.374.834.834.834h5c.46 0 .833-.373.833-.834v-5a.833.833 0 0 0-.833-.833z\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":285},"\u003Cg fill=\"none\">\u003Cpath\n    d=\"M18.333 6.418c0-.5-.333-1-.666-1.25l-5.25-3.25a1.433 1.433 0 0 0-1.417 0l-8.584 5c-.416.166-.75.666-.75 1.166v5.5c0 .417.334 1 .667 1.25l5.25 3.25a1.434 1.434 0 0 0 1.417 0l8.583-5c.417-.25.75-.833.75-1.25V6.418z\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\n  \u003Cpath d=\"M8.333 18.249v-6.584L1.75 7.582M8.334 11.668l9.916-5.75M11.666 16.5V9.75M15 14.582v-6.75\" stroke=\"#fff\"\n        stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":287,"height":287,"rotate":272,"vFlip":7,"hFlip":7,"body":288},256,"\u003Crect width=\"256\" height=\"256\" fill=\"none\"/>\u003Cpath d=\"M168,224H56a8,8,0,0,1-8-8V72a8,8,0,0,1,8-8h80l40,40V216A8,8,0,0,1,168,224Z\" fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"16\"/>\u003Cpath d=\"M80,64V40a8,8,0,0,1,8-8h80l40,40V184a8,8,0,0,1-8,8H176\" fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"16\"/>\u003Cline x1=\"88\" y1=\"152\" x2=\"136\" y2=\"152\" fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"16\"/>\u003Cline x1=\"88\" y1=\"184\" x2=\"136\" y2=\"184\" fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"16\"/>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":290},"\u003Cg fill=\"none\">\u003Cpath d=\"M16.666 1.668H3.333c-.92 0-1.667.746-1.667 1.667v3.333c0 .92.747 1.667 1.667 1.667h13.334c.92 0 1.666-.747 1.666-1.667V3.335c0-.92-.746-1.667-1.666-1.667zM16.666 11.668H3.333c-.92 0-1.667.746-1.667 1.667v3.333c0 .92.747 1.667 1.667 1.667h13.334c.92 0 1.666-.747 1.666-1.667v-3.333c0-.92-.746-1.667-1.666-1.667zM5 5h.008M5 15h.008\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":292},"\u003Cg fill=\"none\">\u003Cpath d=\"M10 5.832v11.667M13.334 10H15M13.334 6.668H15M2.5 15a.833.833 0 0 1-.833-.833V3.333A.833.833 0 0 1 2.5 2.5h4.167A3.333 3.333 0 0 1 10 5.833 3.333 3.333 0 0 1 13.333 2.5H17.5a.833.833 0 0 1 .833.833v10.834A.833.833 0 0 1 17.5 15h-5a2.5 2.5 0 0 0-2.5 2.5A2.5 2.5 0 0 0 7.5 15h-5zM5 10h1.667M5 6.668h1.667\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":294},"\u003Cg fill=\"none\">\u003Cpath d=\"M10 18.335a8.333 8.333 0 1 0 0-16.667 8.333 8.333 0 0 0 0 16.667z\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003Cpath d=\"M12.358 12.36a3.334 3.334 0 1 1 0-4.717\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":296},"\u003Cg fill=\"none\">\u003Cpath d=\"M12.5 10H8.334M12.5 6.668H8.334M15.834 14.167v-10A1.667 1.667 0 0 0 14.167 2.5H3.333\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003Cpath d=\"M6.667 17.5h10a1.666 1.666 0 0 0 1.666-1.667V15a.833.833 0 0 0-.833-.833H9.166a.834.834 0 0 0-.833.833v.833A1.666 1.666 0 0 1 6.666 17.5zm0 0A1.667 1.667 0 0 1 5 15.833V4.167a1.667 1.667 0 0 0-3.333 0v1.666a.833.833 0 0 0 .833.834H5\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":287,"height":287,"rotate":272,"vFlip":7,"hFlip":7,"body":298},"\u003Cpath fill=\"currentColor\" d=\"m213.66 101.66l-80 80a8 8 0 0 1-11.32 0l-80-80a8 8 0 0 1 11.32-11.32L128 164.69l74.34-74.35a8 8 0 0 1 11.32 11.32\"/>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":300},"\u003Cg fill=\"none\">\u003Cpath d=\"M11.666 7.501A1.667 1.667 0 0 1 10 9.168H5l-3.333 3.333V3.335a1.667 1.667 0 0 1 1.666-1.667H10a1.666 1.666 0 0 1 1.666 1.667V7.5zM15 7.5h1.667a1.666 1.666 0 0 1 1.666 1.667v9.166L15 15h-5a1.667 1.667 0 0 1-1.666-1.667V12.5\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":302},"\u003Cg fill=\"none\">\u003Cpath d=\"M12.945 14.446 14.075 16c.775-.025 3.7-.6 4.725-2.4 0-3.836-1.667-8.304-2.4-8.981-1.516-1.218-4-1.419-4-1.419s-.198.441-.25.99\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003Cpath d=\"M12.6 12c.773 0 1.4-.716 1.4-1.6 0-.883-.627-1.6-1.4-1.6-.773 0-1.4.717-1.4 1.6 0 .884.627 1.6 1.4 1.6zM7.85 4.19c-.052-.55-.25-.99-.25-.99s-2.484.2-4 1.418c-.733.677-2.4 5.145-2.4 8.981 1.025 1.8 3.95 2.375 4.725 2.4l1.13-1.553\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003Cpath d=\"M4.205 13.105s1.92 1.697 5.795 1.697 5.795-1.697 5.795-1.697M15.22 5.371C13.257 4.153 10.85 4 10 4c-.849 0-3.256.153-5.22 1.371M7.4 12c.773 0 1.4-.716 1.4-1.6 0-.883-.627-1.6-1.4-1.6-.773 0-1.4.717-1.4 1.6 0 .884.627 1.6 1.4 1.6z\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":304},"\u003Cg fill=\"none\">\u003Cpath\n    d=\"M12.5 15H8.334M15 11.668H8.334M3.333 18.335h13.334a1.667 1.667 0 0 0 1.666-1.667V3.335a1.667 1.667 0 0 0-1.666-1.667h-10A1.667 1.667 0 0 0 5 3.335v13.333a1.667 1.667 0 0 1-1.667 1.667zm0 0a1.667 1.667 0 0 1-1.667-1.667v-7.5a1.667 1.667 0 0 1 1.667-1.667H5\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\n  \u003Cpath\n    d=\"M14.167 5h-5a.833.833 0 0 0-.833.833V7.5c0 .46.373.833.833.833h5c.46 0 .833-.373.833-.833V5.833A.833.833 0 0 0 14.167 5z\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":306},"\u003Cg fill=\"none\">\u003Cpath\n    d=\"M13.333 17.5v-1.667A3.333 3.333 0 0 0 10 12.5H5a3.333 3.333 0 0 0-3.333 3.333V17.5M13.334 2.605a3.333 3.333 0 0 1 0 6.454M18.334 17.501v-1.667a3.334 3.334 0 0 0-2.5-3.225M7.5 9.167a3.333 3.333 0 1 0 0-6.667 3.333 3.333 0 0 0 0 6.667z\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":308},"\u003Cg fill=\"none\">\u003Cpath d=\"M12.5 10.832a2.5 2.5 0 0 0-5 0\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\n  \u003Cpath\n    d=\"M3.333 16.251v-12.5a2.083 2.083 0 0 1 2.084-2.083h10.416a.833.833 0 0 1 .834.833v15a.834.834 0 0 1-.834.834H5.418a2.083 2.083 0 0 1-2.083-2.084zm0 0a2.083 2.083 0 0 1 2.084-2.083h11.25\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\n  \u003Cpath d=\"M10 8.333A1.667 1.667 0 1 0 10 5a1.667 1.667 0 0 0 0 3.333z\" stroke=\"#fff\" stroke-linecap=\"round\"\n        stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":310},"\u003Cg fill=\"none\">\u003Cpath d=\"m12.897 10.742 1.263 7.105a.416.416 0 0 1-.675.392l-2.983-2.24a.834.834 0 0 0-.998 0l-2.988 2.239a.417.417 0 0 1-.675-.39l1.261-7.106\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003Cpath d=\"M10 11.668a5 5 0 1 0 0-10 5 5 0 0 0 0 10z\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":312},"\u003Cg fill=\"none\">\u003Cpath d=\"M16.667 10.835c0 4.167-2.917 6.25-6.384 7.458a.833.833 0 0 1-.558-.008c-3.475-1.2-6.391-3.283-6.391-7.45V5.002a.833.833 0 0 1 .833-.834c1.667 0 3.75-1 5.2-2.266a.975.975 0 0 1 1.266 0c1.459 1.275 3.534 2.266 5.2 2.266a.833.833 0 0 1 .834.834v5.833zM6.667 10h.008M10 10h.008M13.334 10h.008\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":272,"top":272,"width":82,"height":259,"rotate":272,"vFlip":7,"hFlip":7,"body":314},"\u003Cg fill=\"none\">\u003Cpath\n    d=\"M20.2299 11.5785C20.2015 11.4583 20.1438 11.3469 20.062 11.2544C19.9803 11.1618 19.8769 11.0908 19.7611 11.0478L14.3602 9.0219L15.7345 2.14721C15.7657 1.98748 15.744 1.82197 15.6728 1.67564C15.6016 1.5293 15.4847 1.4101 15.3398 1.33602C15.1949 1.26193 15.0299 1.23698 14.8696 1.26493C14.7093 1.29288 14.5624 1.37222 14.4511 1.49096L3.95111 12.741C3.86583 12.8308 3.80413 12.9404 3.77154 13.0599C3.73895 13.1795 3.73647 13.3052 3.76432 13.4259C3.79218 13.5466 3.84951 13.6585 3.93118 13.7517C4.01285 13.8448 4.11632 13.9163 4.23236 13.9597L9.63517 15.9857L8.26454 22.8528C8.23342 23.0126 8.2551 23.1781 8.3263 23.3244C8.3975 23.4708 8.51436 23.59 8.65926 23.664C8.80415 23.7381 8.9692 23.7631 9.12952 23.7351C9.28983 23.7072 9.43671 23.6278 9.54798 23.5091L20.048 12.2591C20.1317 12.1692 20.1921 12.0601 20.2238 11.9415C20.2555 11.8228 20.2576 11.6981 20.2299 11.5785ZM10.253 20.5625L11.2345 15.6519C11.2697 15.4777 11.2418 15.2968 11.156 15.1412C11.0701 14.9857 10.9319 14.8656 10.7658 14.8025L5.81204 12.9416L13.7452 4.44221L12.7645 9.35284C12.7294 9.527 12.7572 9.70797 12.8431 9.86352C12.9289 10.0191 13.0672 10.1391 13.2333 10.2022L18.1833 12.0585L10.253 20.5625Z\"\n    fill=\"#fff\"/>\u003C/g>",{"left":272,"top":272,"width":228,"height":228,"rotate":272,"vFlip":7,"hFlip":7,"body":316},"\u003Cg fill=\"none\">\u003Cpath d=\"M10 18.335a8.333 8.333 0 1 0 0-16.667 8.333 8.333 0 0 0 0 16.667zM4.108 4.11l3.534 3.533M12.358 7.643l3.534-3.534M12.358 12.36l3.534 3.533M7.642 12.36l-3.534 3.533\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003Cpath d=\"M10 13.335a3.333 3.333 0 1 0 0-6.667 3.333 3.333 0 0 0 0 6.667z\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"id":82,"name":83,"url":84,"categorySentence":85,"faq":318,"useCaseBanner":324,"subcategories":326},[319,320,321,322,323],{"answer":88,"question":89},{"answer":91,"question":92},{"answer":94,"question":95},{"answer":97,"question":98},{"answer":100,"question":101},{"id":103,"title":104,"content":105,"link":325},{"id":107,"url":108,"label":109,"hint":12},[],{"id":79,"documentId":328,"name":329,"createdAt":330,"updatedAt":331,"publishedAt":332,"globalComponent":333},"ta8lnzuowupddrp9yjac1ymx","Client logos - rotator","2025-12-05T12:37:36.093Z","2026-03-11T12:41:58.205Z","2026-03-11T12:41:58.061Z",[334],{"__component":335,"id":112,"title":336,"logos":337,"settings":12},"components.logos-rotator","The world's most popular workflow automation platform for technical teams including",[338,350,356,365,374,384,394,402,410,418,427,434],{"id":339,"documentId":340,"name":341,"alternativeText":12,"caption":12,"width":342,"height":343,"formats":12,"hash":344,"ext":345,"mime":346,"size":347,"url":348,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":349,"updatedAt":349,"publishedAt":349,"focalPoint":12},2963,"z3mcexda909comu2nr9afih0","meta.svg",160,60,"meta_66ca35072c",".svg","image/svg+xml",1.94,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/meta_66ca35072c.svg","2026-02-23T13:14:38.348Z",{"id":351,"documentId":12,"name":352,"alternativeText":12,"caption":12,"width":342,"height":343,"formats":12,"hash":353,"ext":345,"mime":346,"size":153,"url":354,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":355,"updatedAt":355,"publishedAt":12,"focalPoint":12},2622,"re-mistral-ai.svg","re_mistral_ai_e2a2bff83f","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/re_mistral_ai_e2a2bff83f.svg","2025-07-01T09:21:12.863Z",{"id":357,"documentId":12,"name":358,"alternativeText":12,"caption":12,"width":359,"height":360,"formats":12,"hash":361,"ext":345,"mime":346,"size":362,"url":363,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":364,"updatedAt":364,"publishedAt":12,"focalPoint":12},1829,"microsoft-logo-white.svg",116,49,"microsoft_logo_white_673a9e3e32",7.03,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/microsoft_logo_white_673a9e3e32.svg","2023-11-27T16:31:23.491Z",{"id":366,"documentId":12,"name":367,"alternativeText":12,"caption":12,"width":368,"height":251,"formats":12,"hash":369,"ext":345,"mime":346,"size":370,"url":371,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":372,"updatedAt":373,"publishedAt":12,"focalPoint":12},2662,"seat.svg",208,"seat_67bbe322ec",3.17,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/seat_67bbe322ec.svg","2025-09-03T12:29:59.229Z","2026-02-23T13:13:08.928Z",{"id":375,"documentId":12,"name":376,"alternativeText":12,"caption":12,"width":377,"height":378,"formats":12,"hash":379,"ext":345,"mime":346,"size":380,"url":381,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":382,"updatedAt":383,"publishedAt":12,"focalPoint":12},2623,"re-delivery-hero.svg",163,27,"re_delivery_hero_aeb8ebd112",6.49,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/re_delivery_hero_aeb8ebd112.svg","2025-07-02T07:59:22.751Z","2026-03-11T12:13:07.188Z",{"id":385,"documentId":12,"name":386,"alternativeText":12,"caption":12,"width":387,"height":388,"formats":12,"hash":389,"ext":345,"mime":346,"size":390,"url":391,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":392,"updatedAt":393,"publishedAt":12,"focalPoint":12},1828,"wayfair-logo-white.svg",99,54,"wayfair_logo_white_fe595e6b33",10.76,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/wayfair_logo_white_fe595e6b33.svg","2023-11-27T16:30:32.944Z","2026-03-11T12:14:20.135Z",{"id":395,"documentId":12,"name":396,"alternativeText":12,"caption":12,"width":397,"height":228,"formats":12,"hash":398,"ext":345,"mime":346,"size":399,"url":400,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":401,"updatedAt":401,"publishedAt":12,"focalPoint":12},1824,"zendesk-logo-white.svg",104,"zendesk_logo_white_33a443408b",2.65,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/zendesk_logo_white_33a443408b.svg","2023-11-27T16:25:37.797Z",{"id":403,"documentId":12,"name":404,"alternativeText":12,"caption":12,"width":405,"height":343,"formats":12,"hash":406,"ext":345,"mime":346,"size":407,"url":408,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":409,"updatedAt":409,"publishedAt":12,"focalPoint":12},2616,"re-dedatech.svg",158,"re_dedatech_bfc8c7c7ff",7.61,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/re_dedatech_bfc8c7c7ff.svg","2025-06-30T13:58:45.359Z",{"id":411,"documentId":12,"name":412,"alternativeText":12,"caption":12,"width":413,"height":343,"formats":12,"hash":414,"ext":345,"mime":346,"size":415,"url":416,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":417,"updatedAt":417,"publishedAt":12,"focalPoint":12},2256,"onfleet.svg",140,"onfleet_04f3069030",6.5,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/onfleet_04f3069030.svg","2025-01-09T11:53:11.451Z",{"id":419,"documentId":12,"name":420,"alternativeText":12,"caption":12,"width":421,"height":422,"formats":12,"hash":423,"ext":345,"mime":346,"size":424,"url":425,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":426,"updatedAt":426,"publishedAt":12,"focalPoint":12},2255,"paddle.svg",92,35,"paddle_e74541f6b3",3.83,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/paddle_e74541f6b3.svg","2025-01-09T11:53:11.430Z",{"id":428,"documentId":12,"name":429,"alternativeText":12,"caption":12,"width":413,"height":343,"formats":12,"hash":430,"ext":345,"mime":346,"size":431,"url":432,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":433,"updatedAt":433,"publishedAt":12,"focalPoint":12},2258,"unbabel.svg","unbabel_1392f8b8ac",9.84,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/unbabel_1392f8b8ac.svg","2025-01-09T11:53:11.471Z",{"id":435,"documentId":12,"name":436,"alternativeText":12,"caption":12,"width":342,"height":343,"formats":12,"hash":437,"ext":345,"mime":346,"size":438,"url":439,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":440,"updatedAt":440,"publishedAt":12,"focalPoint":12},2615,"re-vodafone.svg","re_vodafone_1dfddd2e7c",9.56,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/re_vodafone_1dfddd2e7c.svg","2025-06-30T13:58:19.007Z",{"id":112,"documentId":442,"content":20,"copyright":443,"createdAt":444,"updatedAt":445,"publishedAt":446,"testimonials":447,"ctaBox":448,"socialLinks":454,"navigation":504,"bottomLinks":549},"zfq1in9y6ikz2ibhh2o6yafr","© 2026 n8n &nbsp; | &nbsp; All rights reserved.","2025-12-12T07:46:36.173Z","2026-04-21T15:25:49.085Z","2026-04-21T15:25:48.819Z",{"id":422},{"id":112,"content":449,"button":450},"\u003Ch2>Simple enough to see.\u003Cbr>Powerful enough to ship.\u003C/h2>\u003Cp>Join the teams building AI automation they can actually explain.\u003C/p>",{"id":387,"text":451,"url":452,"type":453},"Start building","https://app.n8n.cloud/register","primary",[455,465,475,484,494],{"id":112,"url":456,"label":457,"image":458},"https://twitter.com/n8n_io","Twitter",{"id":459,"documentId":12,"name":460,"alternativeText":12,"caption":12,"width":82,"height":233,"formats":12,"hash":461,"ext":345,"mime":346,"size":462,"url":463,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":464,"updatedAt":464,"publishedAt":12,"focalPoint":12},2250,"twitter.svg","twitter_f8db5c2135",0.64,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/twitter_f8db5c2135.svg","2024-11-22T11:32:41.445Z",{"id":79,"url":466,"label":467,"image":468},"https://github.com/n8n-io/n8n","GitHub",{"id":469,"documentId":12,"name":470,"alternativeText":12,"caption":12,"width":259,"height":259,"formats":12,"hash":471,"ext":345,"mime":346,"size":472,"url":473,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":474,"updatedAt":474,"publishedAt":12,"focalPoint":12},2248,"github.svg","github_e1f217d7a3",0.84,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/github_e1f217d7a3.svg","2024-11-22T11:30:12.205Z",{"id":103,"url":476,"label":225,"image":477},"https://discord.gg/n8n",{"id":478,"documentId":12,"name":479,"alternativeText":12,"caption":12,"width":82,"height":223,"formats":12,"hash":480,"ext":345,"mime":346,"size":481,"url":482,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":483,"updatedAt":483,"publishedAt":12,"focalPoint":12},2249,"discord.svg","discord_253947c90b",1.24,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/discord_253947c90b.svg","2024-11-22T11:30:32.106Z",{"id":138,"url":485,"label":486,"image":487},"https://www.linkedin.com/company/n8n/","Linkedin",{"id":488,"documentId":12,"name":489,"alternativeText":12,"caption":12,"width":259,"height":259,"formats":12,"hash":490,"ext":345,"mime":346,"size":491,"url":492,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":493,"updatedAt":493,"publishedAt":12,"focalPoint":12},2247,"linkedin.svg","linkedin_d710e84d63",0.58,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/linkedin_d710e84d63.svg","2024-11-22T11:29:49.214Z",{"id":149,"url":495,"label":496,"image":497},"https://www.youtube.com/c/n8n-io","youtube",{"id":498,"documentId":12,"name":499,"alternativeText":12,"caption":12,"width":82,"height":210,"formats":12,"hash":500,"ext":345,"mime":346,"size":501,"url":502,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":503,"updatedAt":503,"publishedAt":12,"focalPoint":12},2246,"youtube.svg","youtube_de4bdef50a",0.48,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/youtube_de4bdef50a.svg","2024-11-22T11:29:27.359Z",[505,507,509,510,513,516,519,522,526,529,532,535,538,541,543,546],{"id":112,"url":229,"label":230,"hint":506},"Hiring",{"id":79,"url":187,"label":508,"hint":12},"Case Studies",{"id":153,"url":247,"label":248,"hint":12},{"id":138,"url":511,"label":512,"hint":12},"/contact","Contact",{"id":195,"url":514,"label":515,"hint":12},"/reports/ai-agent-development-tools","AI agent report",{"id":103,"url":517,"label":518,"hint":12},"/affiliates","Affiliate program",{"id":158,"url":520,"label":521,"hint":12},"https://merch.n8n.io","Merch",{"id":523,"url":524,"label":525,"hint":12},356,"/ai-benchmark/","AI benchmark ",{"id":527,"url":528,"label":253,"hint":12},414,"https://experts.n8n.io",{"id":168,"url":530,"label":531,"hint":12},"/press","Press",{"id":149,"url":533,"label":534,"hint":12},"/vs/","n8n alternatives",{"id":73,"url":536,"label":537,"hint":12},"https://internal.users.n8n.cloud/form/n8n-usability-test-signup","Join user tests, get a gift",{"id":181,"url":539,"label":540,"hint":12},"/legal/","Legal",{"id":177,"url":542,"label":257,"hint":12},"https://luma.com/n8n-events",{"id":200,"url":544,"label":545,"hint":12},"/brandguidelines/","Brand guidelines",{"id":172,"url":547,"label":548,"hint":12},"/tools/","Tools",[550,554,558,562],{"id":551,"url":552,"label":553,"hint":12},136,"/imprint/","Imprint",{"id":555,"url":556,"label":557,"hint":12},137,"/legal/security/","Security",{"id":559,"url":560,"label":561,"hint":12},138,"/legal/privacy/","Privacy",{"id":563,"url":564,"label":565,"hint":12},139,"/report-a-vulnerability/","Report a vulnerability",{"left":272,"top":272,"width":287,"height":287,"rotate":272,"vFlip":7,"hFlip":7,"body":567},"\u003Cpath fill=\"currentColor\" d=\"m221.66 133.66l-72 72a8 8 0 0 1-11.32-11.32L196.69 136H40a8 8 0 0 1 0-16h156.69l-58.35-58.34a8 8 0 0 1 11.32-11.32l72 72a8 8 0 0 1 0 11.32\"/>",186240,{"left":272,"top":272,"width":82,"height":82,"rotate":272,"vFlip":7,"hFlip":7,"body":570},"\u003Cpath fill=\"currentColor\" d=\"M12 2.247a10 10 0 0 0-3.162 19.487c.5.088.687-.212.687-.475c0-.237-.012-1.025-.012-1.862c-2.513.462-3.163-.613-3.363-1.175a3.64 3.64 0 0 0-1.025-1.413c-.35-.187-.85-.65-.013-.662a2 2 0 0 1 1.538 1.025a2.137 2.137 0 0 0 2.912.825a2.1 2.1 0 0 1 .638-1.338c-2.225-.25-4.55-1.112-4.55-4.937a3.9 3.9 0 0 1 1.025-2.688a3.6 3.6 0 0 1 .1-2.65s.837-.262 2.75 1.025a9.43 9.43 0 0 1 5 0c1.912-1.3 2.75-1.025 2.75-1.025a3.6 3.6 0 0 1 .1 2.65a3.87 3.87 0 0 1 1.025 2.688c0 3.837-2.338 4.687-4.562 4.937a2.37 2.37 0 0 1 .674 1.85c0 1.338-.012 2.413-.012 2.75c0 .263.187.575.687.475A10.005 10.005 0 0 0 12 2.247\"/>",[572,586,596,606,630,640,652,662,672,682,692,702,714,730,740,750,760,770,780,790,800,810,820,830,840,852,862,872,882,892,902,912,928,942,952,962,972,982,992,1016,1030,1040,1050,1060,1070,1082,1092,1102,1116],{"categories":573,"description":576,"displayName":577,"name":578,"isCoreNode":7,"isTrigger":7,"isCommunityNode":579,"popularity":12,"createdAt":580,"logoUrl":581,"logoIcon":582,"url":583,"slug":584,"mostPopular":7,"alias":585},[574],{"id":82,"name":83,"url":84,"subcategories":575},[],"Bypass captchas natively in n8n with the official 2Captcha integration. Supports Cloudflare Turnstile, reCAPTCHA v2, v3 and Enterprise, plus Normal image-to-text. The node handles task creation, polling, and token extraction so your workflow receives a ready-to-use token. Works as an AI tool.","2Captcha","n8n-nodes-2captcha-official.twoCaptcha",true,"2026-04-24T08:36:50.041Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/2_Captcha_91bbcf69c5.svg","","/integrations/2captcha/","2captcha",[],{"categories":587,"description":589,"displayName":590,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":591,"logoUrl":592,"logoIcon":582,"url":593,"slug":594,"mostPopular":7,"alias":595},[588],{"id":82,"name":83,"url":84},"AbuseIPDB contributes to a safer internet, addressing malicious activities one IP at a time. Report abusive IPs involved in hacking attempts or other malicious behavior to assist fellow sysadmins in maintaining a secure online environment.","AbuselPDB","2026-02-02T08:34:28.338Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/abuselpdb_d09b49325b.jpeg","/integrations/abuselpdb/","abuselpdb",[],{"categories":597,"description":599,"displayName":600,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":601,"logoUrl":602,"logoIcon":582,"url":603,"slug":604,"mostPopular":7,"alias":605},[598],{"id":82,"name":83,"url":84},"AlienVault software, part of the Unified Security Management (USM) platform, provided integrated threat detection, incident response, and compliance management. It offered a centralized solution for monitoring and protecting against cybersecurity threats, helping organizations safeguard their digital assets.","AlienVault","2026-02-02T08:53:44.516Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/alienvault_usm_from_at_t_cybersecurity_bac24d529b.jpg","/integrations/alienvault/","alienvault",[],{"categories":607,"description":622,"displayName":623,"name":624,"isCoreNode":7,"isTrigger":7,"isCommunityNode":579,"popularity":12,"createdAt":625,"logoUrl":626,"logoIcon":582,"url":627,"slug":628,"mostPopular":7,"alias":629},[608,612,616,618],{"id":243,"name":609,"url":610,"subcategories":611},"Developer Tools","/integrations/categories/developer-tools/",[],{"id":138,"name":613,"url":614,"subcategories":615},"Productivity","/integrations/categories/productivity/",[],{"id":82,"name":83,"url":84,"subcategories":617},[],{"id":149,"name":619,"url":620,"subcategories":621},"Development","/integrations/categories/development/",[],"Build reliable browser agents.\nAnchor is the developer platform that turns browser automation from a fragile, costly nightmare into a reliable, enterprise-ready solution.","Anchor Browser","n8n-nodes-anchorbrowser.anchorBrowser","2025-10-23T08:19:40.771Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Anchor_Browser_48863300ed.svg","/integrations/anchor-browser/","anchor-browser",[],{"categories":631,"description":633,"displayName":634,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":635,"logoUrl":636,"logoIcon":582,"url":637,"slug":638,"mostPopular":7,"alias":639},[632],{"id":82,"name":83,"url":84},"Auth0 Management API is a tool for developers to manage and configure their Auth0 identity and access management service programmatically. It allows for user management, access control, and other administrative tasks through API calls.","Auth0 Management API","2026-02-02T08:33:45.349Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/auth0_4e3cfdc471.png","/integrations/auth0-management-api/","auth0-management-api",[],{"categories":641,"description":644,"displayName":645,"name":646,"isCoreNode":7,"isTrigger":7,"isCommunityNode":579,"popularity":12,"createdAt":647,"logoUrl":648,"logoIcon":582,"url":649,"slug":650,"mostPopular":7,"alias":651},[642],{"id":82,"name":83,"url":84,"subcategories":643},[],"Authentica provides a unified platform for user verification that is trusted, fast,\nand flexible, supported by the latest technologies on the market.","Authentica","n8n-nodes-authentica.authentica","2025-09-30T14:48:14.704Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Authentica_2dc2956293.svg","/integrations/authentica/","authentica",[],{"categories":653,"description":655,"displayName":656,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":657,"logoUrl":658,"logoIcon":582,"url":659,"slug":660,"mostPopular":7,"alias":661},[654],{"id":82,"name":83,"url":84},"Carbon Black, now part of VMware, offers endpoint security software. It provides advanced threat detection, response, and protection for devices and networks. Carbon Black software safeguards against cyber threats by monitoring and securing endpoints to enhance overall cybersecurity posture.","Carbon Black","2026-02-02T08:53:44.702Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/vmwarecarbonblackcloud_9953_logo_1615028556_ariat_9a4579c299.jpg","/integrations/carbon-black/","carbon-black",[],{"categories":663,"description":665,"displayName":666,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":667,"logoUrl":668,"logoIcon":582,"url":669,"slug":670,"mostPopular":7,"alias":671},[664],{"id":82,"name":83,"url":84},"Cisco Meraki is a cloud-managed IT solution that includes networking, security, and device management. It simplifies network infrastructure, allowing businesses to centrally manage and secure their wireless, switching, security, and mobile device environments through an intuitive cloud-based dashboard.","Cisco Meraki","2026-02-02T08:53:45.693Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/cisco_meraki_6e8fc120e7.jpg","/integrations/cisco-meraki/","cisco-meraki",[],{"categories":673,"description":675,"displayName":676,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":677,"logoUrl":678,"logoIcon":582,"url":679,"slug":680,"mostPopular":7,"alias":681},[674],{"id":82,"name":83,"url":84},"Cisco Secure Endpoint (formerly known as AMP for Endpoints) is a cybersecurity solution that combines antivirus, advanced malware protection, and endpoint detection and response (EDR) capabilities. It helps organizations prevent, detect, and respond to security threats on their endpoints and provides valuable threat intelligence.","Cisco Secure Endpoint","2026-02-02T08:53:45.526Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/large_detail_1527083662_2a3dd72b2d.png","/integrations/cisco-secure-endpoint/","cisco-secure-endpoint",[],{"categories":683,"description":685,"displayName":686,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":687,"logoUrl":688,"logoIcon":582,"url":689,"slug":690,"mostPopular":7,"alias":691},[684],{"id":82,"name":83,"url":84},"Cisco Umbrella is a cloud security platform that offers secure web gateway and DNS filtering services. It protects users and devices from accessing malicious websites and threats by enforcing security policies, helping organizations safeguard their network and data from cyberattacks.","Cisco Umbrella","2026-02-02T08:53:44.864Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/cisco_umbrella_0489b576a3.png","/integrations/cisco-umbrella/","cisco-umbrella",[],{"categories":693,"description":695,"displayName":696,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":697,"logoUrl":698,"logoIcon":582,"url":699,"slug":700,"mostPopular":7,"alias":701},[694],{"id":82,"name":83,"url":84},"CrowdStrike is a cybersecurity company known for its cloud-based endpoint security platform, Falcon. It provides advanced threat detection and response solutions, leveraging artificial intelligence and machine learning to protect organizations from cyberattacks and breaches.","CrowdStrike","2026-02-02T08:34:32.173Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/large_detail_1536279580_f358ace00d.jpg","/integrations/crowdstrike/","crowdstrike",[],{"categories":703,"description":706,"displayName":707,"name":708,"isCoreNode":7,"isTrigger":7,"isCommunityNode":579,"popularity":12,"createdAt":709,"logoUrl":710,"logoIcon":582,"url":711,"slug":712,"mostPopular":7,"alias":713},[704],{"id":82,"name":83,"url":84,"subcategories":705},[],"Integrate DeepKeep AI Firewall into n8n with guardrails such as prompt injection, jailbreaks, PII exposure, and unsafe content. Model-agnostic and multilingual, DeepKeep checks prompts and responses, manages firewall conversations, and supports direct API calls.","DeepKeep","n8n-nodes-deepkeep.deepKeep","2026-04-24T08:53:57.506Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Deep_Keep_532ad9a712.svg","/integrations/deepkeep/","deepkeep",[],{"categories":715,"description":722,"displayName":723,"name":724,"isCoreNode":7,"isTrigger":7,"isCommunityNode":579,"popularity":12,"createdAt":725,"logoUrl":726,"logoIcon":582,"url":727,"slug":728,"mostPopular":7,"alias":729},[716,718,720],{"id":243,"name":609,"url":610,"subcategories":717},[],{"id":82,"name":83,"url":84,"subcategories":719},[],{"id":149,"name":619,"url":620,"subcategories":721},[],"The Red Hat Dependency Analytics node for n8n enables DevSecOps teams to automate vulnerability tracking and risk management directly within their workflows.\n\nBy integrating with Red Hat’s security data, the node allows you to consume and manage Software Bill of Materials (SBOMs), Vulnerability Exploitability eXchange (VEX) data, and Vendor advisories. It provides a streamlined way to audit your software supply chain, resolve package advisories, and retrieve detailed CVE records to identify and mitigate organizational risk.","Dependency Analytics","@trustify-da/n8n-nodes-dependency-analytics.dependencyAnalytics","2026-02-25T07:27:29.676Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Dependency_Analytics_3841aac4e8.svg","/integrations/dependency-analytics/","dependency-analytics",[],{"categories":731,"description":733,"displayName":734,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":735,"logoUrl":736,"logoIcon":582,"url":737,"slug":738,"mostPopular":7,"alias":739},[732],{"id":82,"name":83,"url":84},"DigiCert is a leading provider of digital certificates and SSL/TLS security solutions, ensuring secure communication and encryption for websites. With a vast range of services, they help businesses and organizations authenticate and protect their identities and data online.","DigiCert","2026-02-02T08:34:11.023Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/digicert_af5962ee2b.jpeg","/integrations/digicert/","digicert",[],{"categories":741,"description":743,"displayName":744,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":745,"logoUrl":746,"logoIcon":582,"url":747,"slug":748,"mostPopular":7,"alias":749},[742],{"id":82,"name":83,"url":84},"F5 Big-IP is a suite of application delivery and security services. It provides load balancing, application firewall, and traffic management for applications and websites, optimizing performance and ensuring security, availability, and scalability in data center and cloud environments.","F5 Big-IP","2026-02-02T08:33:44.575Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/f5_big_ip_dns_b2116cb95b.png","/integrations/f5-big-ip/","f5-big-ip",[],{"categories":751,"description":753,"displayName":754,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":755,"logoUrl":756,"logoIcon":582,"url":757,"slug":758,"mostPopular":7,"alias":759},[752],{"id":82,"name":83,"url":84},"Filescan is a cloud-based file analysis tool that scans and analyzes files for malware and other threats. It provides detailed reports on file behavior and threat levels, helping security teams to identify and mitigate potential risks in their digital environments.","Filescan","2026-02-02T08:34:32.514Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/filescan_604628de7d.png","/integrations/filescan/","filescan",[],{"categories":761,"description":763,"displayName":764,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":765,"logoUrl":766,"logoIcon":582,"url":767,"slug":768,"mostPopular":7,"alias":769},[762],{"id":82,"name":83,"url":84},"Fortinet FortiGate is a line of integrated security appliances that offer firewall, VPN, intrusion prevention, and other security features. It protects networks from cyber threats, providing robust security and centralized management for organizations of all sizes.","Fortinet FortiGate","2026-02-02T08:53:45.853Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/large_detail_1508770484_f77dcd6d93.jpg","/integrations/fortinet-fortigate/","fortinet-fortigate",[],{"categories":771,"description":773,"displayName":774,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":775,"logoUrl":776,"logoIcon":582,"url":777,"slug":778,"mostPopular":7,"alias":779},[772],{"id":82,"name":83,"url":84},"FullContact is a top SaaS provider for privacy-conscious Identity Resolution, employing its patented Identity Graph to facilitate the connection, consolidation, and enhancement of fragmented or incomplete offline, online, professional, and personal identifiers for brands and marketing platforms.","FullContact","2026-02-02T08:34:37.615Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/fullcontact_391493825e.png","/integrations/fullcontact/","fullcontact",[],{"categories":781,"description":783,"displayName":784,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":785,"logoUrl":786,"logoIcon":582,"url":787,"slug":788,"mostPopular":7,"alias":789},[782],{"id":82,"name":83,"url":84},"Hybrid Analysis is a cloud-based malware analysis platform. It enables cybersecurity professionals to analyze and understand the behavior of suspicious files and URLs. Using a combination of static and dynamic analysis techniques, it helps identify and combat malware and security threats effectively.","Hybrid Analysis","2026-02-02T08:33:44.685Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/hybrid_analysis_3d5463931e.png","/integrations/hybrid-analysis/","hybrid-analysis",[],{"categories":791,"description":793,"displayName":794,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":795,"logoUrl":796,"logoIcon":582,"url":797,"slug":798,"mostPopular":7,"alias":799},[792],{"id":82,"name":83,"url":84},"iAuditor by SafetyCulture is a digital inspection app that allows businesses to conduct audits and inspections efficiently. It enables users to easily create checklists, collect data, and generate reports, improving safety and compliance procedures for organizations across various industries.","iAuditor by SafetyCulture","2026-02-02T08:33:47.597Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/iauditor_by_safetyculture_b6b60b5348.jpeg","/integrations/iauditor-by-safetyculture/","iauditor-by-safetyculture",[],{"categories":801,"description":803,"displayName":804,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":805,"logoUrl":806,"logoIcon":582,"url":807,"slug":808,"mostPopular":7,"alias":809},[802],{"id":82,"name":83,"url":84},"Imperva WAF (Web Application Firewall) is a cybersecurity solution that protects web applications from online threats and attacks. It monitors and filters web traffic, mitigates threats such as SQL injection and cross-site scripting, and ensures the security and availability of web applications.","Imperva WAF","2026-02-02T08:33:44.002Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/imperva_web_application_firewall_waf_a4580d47e1.png","/integrations/imperva-waf/","imperva-waf",[],{"categories":811,"description":813,"displayName":814,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":815,"logoUrl":816,"logoIcon":582,"url":817,"slug":818,"mostPopular":7,"alias":819},[812],{"id":82,"name":83,"url":84},"Iris DFIR (Digital Forensics and Incident Response) is a platform designed for investigating cybersecurity incidents. It offers tools for forensic analysis, evidence collection, and incident response management, allowing security professionals to efficiently handle and resolve security breaches.","Iris Dfir","2026-02-02T08:34:32.643Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/iris_dfir_1db5832147.png","/integrations/iris-dfir/","iris-dfir",[],{"categories":821,"description":823,"displayName":824,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":825,"logoUrl":826,"logoIcon":582,"url":827,"slug":828,"mostPopular":7,"alias":829},[822],{"id":82,"name":83,"url":84},"Kibana is an open-source data visualization and exploration tool often used with Elasticsearch. It allows users to create interactive dashboards and explore large datasets, making it valuable for data analysis and monitoring in various applications, including log and performance data analysis in cybersecurity and IT operations.","Kibana","2026-02-02T08:53:45.188Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/elastic_stack_323d9d83cc.png","/integrations/kibana/","kibana",[],{"categories":831,"description":833,"displayName":834,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":835,"logoUrl":836,"logoIcon":582,"url":837,"slug":838,"mostPopular":7,"alias":839},[832],{"id":82,"name":83,"url":84},"KnowBe4 is a security awareness and simulated phishing platform that helps organizations educate their employees about cybersecurity threats. It offers training modules, phishing simulations, and assessment tools to test and improve the knowledge of individuals, ensuring they can spot and avoid potential cyberattacks.","KnowBe4","2026-02-02T08:34:05.639Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/knowbe4_3af29063ac.png","/integrations/knowbe4/","knowbe4",[],{"categories":841,"description":844,"displayName":845,"name":846,"isCoreNode":7,"isTrigger":7,"isCommunityNode":579,"popularity":12,"createdAt":847,"logoUrl":848,"logoIcon":582,"url":849,"slug":850,"mostPopular":7,"alias":851},[842],{"id":82,"name":83,"url":84,"subcategories":843},[],"LiteSOC is a cloud-based Security Operations Center (SOC) platform for applications and web, designed specifically for startups and developers who want to monitor and detect security threats in real time without building their own security team, turning ordinary logs into meaningful, actionable security insights.\n\nBy making enterprise-grade security accessible and simple to implement, LiteSOC helps founders protect users, build trust, and scale securely without the burden of legacy security infrastructure.","LiteSOC","n8n-nodes-litesoc.liteSoc","2026-04-24T13:00:05.861Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Lite_SOC_f8816ce683.svg","/integrations/litesoc/","litesoc",[],{"categories":853,"description":855,"displayName":856,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":857,"logoUrl":858,"logoIcon":582,"url":859,"slug":860,"mostPopular":7,"alias":861},[854],{"id":82,"name":83,"url":84},"Malcore is a malware analysis and detection platform that uses multiple antivirus engines and machine learning algorithms to identify and analyze malicious files. It provides comprehensive reports and threat intelligence, aiding in the proactive defense against malware attacks.","Malcore","2026-02-02T08:34:32.750Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/malcore_2d83a2560e.png","/integrations/malcore/","malcore",[],{"categories":863,"description":865,"displayName":866,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":867,"logoUrl":868,"logoIcon":582,"url":869,"slug":870,"mostPopular":7,"alias":871},[864],{"id":82,"name":83,"url":84},"Microsoft Azure Monitor tracks and analyzes telemetry data from Azure resources, on-premises systems, and applications. It enhances performance, security, and troubleshooting with metrics, logs, and AI insights. Integrated with Log Analytics and Application Insights, it enables proactive monitoring and automation.","Microsoft Azure Monitor","2026-02-02T08:33:45.580Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/microsoft_azure_monitor_09fb5e1d73.jpeg","/integrations/microsoft-azure-monitor/","microsoft-azure-monitor",[],{"categories":873,"description":875,"displayName":876,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":877,"logoUrl":878,"logoIcon":582,"url":879,"slug":880,"mostPopular":7,"alias":881},[874],{"id":82,"name":83,"url":84},"Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management service. It provides secure authentication and authorization for users, enabling them to access applications, resources, and services in the Azure cloud and other integrated applications.","Microsoft Entra ID (Azure Active Directory)","2026-02-02T08:34:33.692Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/azure_ad_2_1edfd66113.png","/integrations/microsoft-entra-id-azure-active-directory/","microsoft-entra-id-azure-active-directory",[],{"categories":883,"description":885,"displayName":886,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":887,"logoUrl":888,"logoIcon":582,"url":889,"slug":890,"mostPopular":7,"alias":891},[884],{"id":82,"name":83,"url":84},"Mist, now part of Juniper Networks, offers a cloud-managed wireless networking solution. Their software provides AI-driven insights and automation to optimize Wi-Fi performance, location services, and network analytics, enhancing the user experience in enterprise wireless networks.","MIST","2026-02-02T08:33:44.115Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/mist_10a87d4afb.jpg","/integrations/mist/","mist",[],{"categories":893,"description":895,"displayName":896,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":897,"logoUrl":898,"logoIcon":582,"url":899,"slug":900,"mostPopular":7,"alias":901},[894],{"id":82,"name":83,"url":84},"Nightfall-ai is an advanced technology leveraging artificial intelligence to protect sensitive data by automatically discovering and redacting personally identifiable information (PII). It ensures privacy by applying machine learning algorithms to aid in the secure handling of information and prevent data breaches.","Nightfall.ai","2026-02-02T08:33:57.885Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/nightfallai_bdaa96848d.jpeg","/integrations/nightfallai/","nightfallai",[],{"categories":903,"description":905,"displayName":906,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":907,"logoUrl":908,"logoIcon":582,"url":909,"slug":910,"mostPopular":7,"alias":911},[904],{"id":82,"name":83,"url":84},"OpenCTI is an open-source platform designed for cyber threat intelligence management. It facilitates the collection, analysis, and sharing of threat intelligence data, helping organizations proactively defend against cyber threats by providing insights into vulnerabilities, indicators of compromise, and attacker tactics.","OpenCTI","2026-02-02T08:33:45.008Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/opencti_text_medium_600x96_6979927830.png","/integrations/opencti/","opencti",[],{"categories":913,"description":920,"displayName":921,"name":922,"isCoreNode":7,"isTrigger":7,"isCommunityNode":579,"popularity":12,"createdAt":923,"logoUrl":924,"logoIcon":582,"url":925,"slug":926,"mostPopular":7,"alias":927},[914,918],{"id":168,"name":915,"url":916,"subcategories":917},"Analytics","/integrations/categories/analytics/",[],{"id":82,"name":83,"url":84,"subcategories":919},[],"Prey for n8n helps IT and security teams automate device fleet operations at scale across Windows, macOS, Linux, Android, and iOS.\n\nWith this node, you can connect Prey to your operational workflows to monitor devices, detect risks, and trigger actions automatically—without manual follow-up.\n\nUse it to:\n  - Track device status and location in real time\n  - Automate geofence and movement-based workflows\n  - Trigger incident-response actions for lost or at-risk devices\n  - Enrich alerts with fleet context for faster decisions\n  - Feed dashboards and reports for IT managers and security teams\n\nPrey + n8n gives your team a practical way to reduce response time, standardize operations, and improve fleet visibility from a single automation layer.","Prey","@preyproject/n8n-nodes-prey.prey","2026-02-25T15:27:00.361Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Prey_b258ba5776.svg","/integrations/prey/","prey",[],{"categories":929,"description":934,"displayName":935,"name":936,"isCoreNode":7,"isTrigger":7,"isCommunityNode":579,"popularity":12,"createdAt":937,"logoUrl":938,"logoIcon":582,"url":939,"slug":940,"mostPopular":7,"alias":941},[930,932],{"id":168,"name":915,"url":916,"subcategories":931},[],{"id":82,"name":83,"url":84,"subcategories":933},[],"Add GDPR, HIPAA, and PCI-DSS compliance guardrails to any AI workflow. Detects and redacts PII/PHI before it reaches the LLM, blocks prompt injection attacks, and generates an encrypted per-interaction audit log — the evidence trail regulators and enterprise buyers require.\n","PromptLock Guard","n8n-nodes-promptlock-guard.promptLockGuard","2026-04-27T11:45:34.676Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Prompt_Lock_Guard_c9574ac04e.svg","/integrations/promptlock-guard/","promptlock-guard",[],{"categories":943,"description":945,"displayName":946,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":947,"logoUrl":948,"logoIcon":582,"url":949,"slug":950,"mostPopular":7,"alias":951},[944],{"id":82,"name":83,"url":84},"QRadar is IBM's security information and event management (SIEM) software. It centralizes and analyzes log and network flow data to detect and respond to security threats. QRadar helps organizations identify and mitigate security incidents by providing real-time monitoring and in-depth analysis of security data.","QRadar","2026-02-02T08:53:45.023Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/qradar_logo_d324fdac7d.png","/integrations/qradar/","qradar",[],{"categories":953,"description":955,"displayName":956,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":957,"logoUrl":958,"logoIcon":582,"url":959,"slug":960,"mostPopular":7,"alias":961},[954],{"id":82,"name":83,"url":84},"Qualys is a cybersecurity company offering cloud-based solutions for vulnerability management, security and compliance. Its software scans and assesses an organization's IT infrastructure to identify vulnerabilities and ensure compliance with security standards, helping businesses protect their systems and data.","Qualys","2026-02-02T08:34:31.210Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/qualys_vmdr_e946e12b32.png","/integrations/qualys/","qualys",[],{"categories":963,"description":965,"displayName":966,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":967,"logoUrl":968,"logoIcon":582,"url":969,"slug":970,"mostPopular":7,"alias":971},[964],{"id":82,"name":83,"url":84},"Rapid7 InsightVM is a vulnerability management platform that provides real-time visibility into network vulnerabilities, enabling proactive security measures. It offers dynamic risk assessment, prioritization, and remediation guidance, helping organizations enhance their security posture and protect against potential threats.","Rapid7 InsightVM","2026-02-02T08:34:33.999Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/rapid7_insightvm_a10ec02f31.jpeg","/integrations/rapid7-insightvm/","rapid7-insightvm",[],{"categories":973,"description":975,"displayName":976,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":977,"logoUrl":978,"logoIcon":582,"url":979,"slug":980,"mostPopular":7,"alias":981},[974],{"id":82,"name":83,"url":84},"Recorded Future is a threat intelligence platform that collects and analyzes vast amounts of data from the internet to provide actionable insights on cyber threats. Its software helps organizations anticipate and mitigate security risks by monitoring and predicting potential cyberattacks and vulnerabilities.","Recorded Future","2026-02-02T08:34:31.845Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/recorded_future_a8b3d7c169.png","/integrations/recorded-future/","recorded-future",[],{"categories":983,"description":985,"displayName":986,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":987,"logoUrl":988,"logoIcon":582,"url":989,"slug":990,"mostPopular":7,"alias":991},[984],{"id":82,"name":83,"url":84},"Rootly is a platform that streamlines incident management by automating manual tasks. Trusted by thousands globally, it simplifies the incident resolution process, ensuring consistency and efficiency for users.","Rootly","2026-02-02T08:34:24.076Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/rootly_04103f0cbc.png","/integrations/rootly/","rootly",[],{"categories":993,"description":1008,"displayName":1009,"name":1010,"isCoreNode":7,"isTrigger":7,"isCommunityNode":579,"popularity":12,"createdAt":1011,"logoUrl":1012,"logoIcon":582,"url":1013,"slug":1014,"mostPopular":7,"alias":1015},[994,998,1000,1004],{"id":158,"name":995,"url":996,"subcategories":997},"Utility","/integrations/categories/utility/",[],{"id":82,"name":83,"url":84,"subcategories":999},[],{"id":172,"name":1001,"url":1002,"subcategories":1003},"Miscellaneous","/integrations/categories/miscellaneous/",[],{"id":103,"name":1005,"url":1006,"subcategories":1007},"Data & Storage","/integrations/categories/data-and-storage/",[],"The Seclore n8n integration enables developers to automate protection and unprotection of sensitive files within workflows. It supports applying persistent data-centric security, enforcing access controls, and securely protecting or unprotecting documents for downstream processing across a wide range of automated use cases.","Seclore","@seclore/n8n-nodes-seclore.secloreProtect","2025-12-17T16:05:50.351Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Seclore_066e88fa1a.svg","/integrations/seclore/","seclore",[],{"categories":1017,"description":1022,"displayName":1023,"name":1024,"isCoreNode":7,"isTrigger":7,"isCommunityNode":579,"popularity":12,"createdAt":1025,"logoUrl":1026,"logoIcon":582,"url":1027,"slug":1028,"mostPopular":7,"alias":1029},[1018,1020],{"id":82,"name":83,"url":84,"subcategories":1019},[],{"id":243,"name":609,"url":610,"subcategories":1021},[],"Analyze prompts for security threats like injection attacks, jailbreaks, and data exfiltration. Get risk scores, recommended actions (allow/warn/block), and batch analysis for high-volume workflows.","SecureVector","@securevector/n8n-nodes-securevector.secureVector","2026-01-28T12:41:09.068Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Secure_Vector_d9f2dd05a2.svg","/integrations/securevector/","securevector",[],{"categories":1031,"description":1033,"displayName":1034,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":1035,"logoUrl":1036,"logoIcon":582,"url":1037,"slug":1038,"mostPopular":7,"alias":1039},[1032],{"id":82,"name":83,"url":84},"Sekoia platform empowers security teams with automated incident identification and response capabilities across their entire attack surface. Featuring integrated intelligence, real-time detection, and scalable automation readiness, it helps teams overcome volume, complexity, and false positives in cybersecurity operations.","Sekoia","2026-02-02T08:33:44.224Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/sekoia_32ec4a5d72.jpg","/integrations/sekoia/","sekoia",[],{"categories":1041,"description":1043,"displayName":1044,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":1045,"logoUrl":1046,"logoIcon":582,"url":1047,"slug":1048,"mostPopular":7,"alias":1049},[1042],{"id":82,"name":83,"url":84},"Shuffler is a platform that offers cloud-based deployment and management of Jupyter notebooks, a popular tool for data analysis and machine learning. It provides collaboration features, version control, and automation for data science teams, simplifying workflow and enhancing productivity in data-related projects.","Shuffler","2026-02-02T08:34:32.287Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/shuffle_3785c6d9d3.png","/integrations/shuffler/","shuffler",[],{"categories":1051,"description":1053,"displayName":1054,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":1055,"logoUrl":1056,"logoIcon":582,"url":1057,"slug":1058,"mostPopular":7,"alias":1059},[1052],{"id":82,"name":83,"url":84},"Spike is an app that helps manage incidents efficiently by providing unlimited alerts and on-call schedules for team members. It ensures all team members are notified promptly and have clear responsibilities to address any issues that arise.","Spike","2026-02-02T08:34:24.911Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/spike_d9c0d2c28e.jpeg","/integrations/spike/","spike",[],{"categories":1061,"description":1063,"displayName":1064,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":1065,"logoUrl":1066,"logoIcon":582,"url":1067,"slug":1068,"mostPopular":7,"alias":1069},[1062],{"id":82,"name":83,"url":84},"Trellix ePO (ePolicy Orchestrator) is a centralized security management software by McAfee. It streamlines security management, allowing organizations to monitor and control their cybersecurity infrastructure, including antivirus and firewall settings, for comprehensive threat protection and efficient security policy enforcement.","Trellix ePO","2026-02-02T08:33:44.899Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Trellix_Logo_eae4a00e54.svg","/integrations/trellix-epo/","trellix-epo",[],{"categories":1071,"description":1074,"displayName":1075,"name":1076,"isCoreNode":7,"isTrigger":7,"isCommunityNode":579,"popularity":12,"createdAt":1077,"logoUrl":1078,"logoIcon":582,"url":1079,"slug":1080,"mostPopular":7,"alias":1081},[1072],{"id":82,"name":83,"url":84,"subcategories":1073},[],"n8n community node for Vigil Guard Enterprise, a self-hosted AI Detection & Response (AIDR) platform. Guards LLM inputs and outputs against prompt injection, PII leakage, and harmful content. Supports fail-open mode, passthrough fields, and full detection branch details.","VGE AIDR","n8n-nodes-vge.vgeAidr","2026-03-20T18:51:33.568Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/VGE_AIDR_11679ff926.svg","/integrations/vge-aidr/","vge-aidr",[],{"categories":1083,"description":1085,"displayName":1086,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":1087,"logoUrl":1088,"logoIcon":582,"url":1089,"slug":1090,"mostPopular":7,"alias":1091},[1084],{"id":82,"name":83,"url":84},"VirusTotal is an online service owned by Google that analyzes files and URLs for malware and security threats. It aggregates antivirus scan results from multiple engines, providing users with a comprehensive assessment of potential threats, aiding in cybersecurity and threat intelligence efforts.","VirusTotal","2026-02-02T08:34:33.800Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/virustotal_20ecaeef72.png","/integrations/virustotal/","virustotal",[],{"categories":1093,"description":1095,"displayName":1096,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":1097,"logoUrl":1098,"logoIcon":582,"url":1099,"slug":1100,"mostPopular":7,"alias":1101},[1094],{"id":82,"name":83,"url":84},"Zabbix is an open-source monitoring software for networks, servers, and applications. It provides real-time monitoring, data visualization, and alerting, enabling proactive issue detection and resolution. Zabbix supports a variety of monitoring methods, including SNMP, IPMI, JMX, and more.","Zabbix","2026-02-02T08:34:32.851Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/zabbix_4b1dda60ea.jpeg","/integrations/zabbix/","zabbix",[],{"categories":1103,"description":1108,"displayName":1109,"name":1110,"isCoreNode":7,"isTrigger":7,"isCommunityNode":579,"popularity":12,"createdAt":1111,"logoUrl":1112,"logoIcon":582,"url":1113,"slug":1114,"mostPopular":7,"alias":1115},[1104,1106],{"id":82,"name":83,"url":84,"subcategories":1105},[],{"id":243,"name":609,"url":610,"subcategories":1107},[],"A production-ready n8n community node for integrating with the Zscaler AI Guard - https://help.zscaler.com/ai-guard API. This node enables you to scan AI prompts and responses for security threats — toxicity, PII, secrets, prompt injection, and more — directly within your n8n workflows.","Zscaler AI Guard","@bdzscaler/n8n-nodes-aiguard.aiGuard","2026-04-15T15:56:18.160Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Zscaler_AI_Guard_3e7137021b.svg","/integrations/zscaler-ai-guard/","zscaler-ai-guard",[],{"categories":1117,"description":1119,"displayName":1120,"name":582,"isCoreNode":7,"isTrigger":7,"isCommunityNode":7,"popularity":12,"createdAt":1121,"logoUrl":1122,"logoIcon":582,"url":1123,"slug":1124,"mostPopular":7,"alias":1125},[1118],{"id":82,"name":83,"url":84},"Zscaler ZIA (Zero Trust Internet Access) is a cloud security service that provides secure and direct internet access for users, regardless of their location. It enforces security policies, filters web traffic, and protects against threats, improving cybersecurity and user productivity.","ZScaler ZIA","2026-02-02T08:53:45.358Z","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/large_detail_1546011494_4280d0a004.jpeg","/integrations/zscaler-zia/","zscaler-zia",[],{"id":422,"documentId":1127,"name":1128,"createdAt":1129,"updatedAt":1130,"publishedAt":1131,"globalComponent":1132},"t0ayg0szkkkvlrgaepay3ll1","Testimonials - carousel","2025-12-12T08:03:01.909Z","2026-03-18T13:16:39.638Z","2026-03-18T13:16:39.411Z",[1133],{"__component":1134,"id":112,"testimonials":1135},"components.testimonials-carousel",[1136,1158,1171,1189,1211,1229,1252,1282,1300,1318],{"id":112,"name":1137,"description":1138,"opinion":1139,"avatar":1140},"Igor Fediczko","[@igordisco](https://x.com/@igordisco)","**Build complex workflows that other tools can't**. I used other tools before. I got to know the N8N and I say it properly: it is better to do everything on the n8n! Congratulations on your work, you are a star!",{"id":1141,"documentId":12,"name":1142,"alternativeText":12,"caption":12,"width":1143,"height":1143,"formats":1144,"hash":1154,"ext":1146,"mime":1149,"size":1155,"url":1156,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":1157,"updatedAt":1157,"publishedAt":12,"focalPoint":12},2415,"avatar_igordisco.jpg",400,{"thumbnail":1145},{"ext":1146,"url":1147,"hash":1148,"mime":1149,"name":1150,"path":12,"size":1151,"width":1152,"height":1152,"sizeInBytes":1153},".jpg","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/thumbnail_avatar_igordisco_9243b86232.jpg","thumbnail_avatar_igordisco_9243b86232","image/jpeg","thumbnail_avatar_igordisco.jpg",6.81,156,6812,"avatar_igordisco_9243b86232",29.39,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/avatar_igordisco_9243b86232.jpg","2025-03-24T22:08:40.697Z",{"id":79,"name":1159,"description":1160,"opinion":1161,"avatar":1162},"Robin Tindall","[@robm](https://x.com/@robm)","**Thank you to the n8n community**. I did the beginners course and promptly took an automation WAY beyond my skill level.",{"id":1163,"documentId":12,"name":1164,"alternativeText":1164,"caption":1164,"width":1165,"height":1165,"formats":12,"hash":1166,"ext":1167,"mime":28,"size":1168,"url":1169,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":1170,"updatedAt":1170,"publishedAt":12,"focalPoint":12},352,"neutral-avatar-purple.PNG",50,"neutral_avatar_purple_fee36bffe3",".PNG",1.26,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/neutral_avatar_purple_fee36bffe3.PNG","2022-06-01T06:40:21.001Z",{"id":103,"name":1172,"description":1173,"opinion":1174,"avatar":1175},"Anderoav","[@Anderoav](https://x.com/anderoav)","**n8n is a beast for automation.** self-hosting and low-code make it a dev’s dream. if you’re not automating yet, you’re working too hard.",{"id":1176,"documentId":12,"name":1177,"alternativeText":12,"caption":12,"width":1143,"height":1143,"formats":1178,"hash":1185,"ext":1146,"mime":1149,"size":1186,"url":1187,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":1188,"updatedAt":1188,"publishedAt":12,"focalPoint":12},2413,"avatar_anderoav.jpg",{"thumbnail":1179},{"ext":1146,"url":1180,"hash":1181,"mime":1149,"name":1182,"path":12,"size":1183,"width":1152,"height":1152,"sizeInBytes":1184},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/thumbnail_avatar_anderoav_589989fc39.jpg","thumbnail_avatar_anderoav_589989fc39","thumbnail_avatar_anderoav.jpg",3.41,3414,"avatar_anderoav_589989fc39",15.7,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/avatar_anderoav_589989fc39.jpg","2025-03-24T21:54:26.581Z",{"id":422,"name":1190,"description":1191,"opinion":1192,"avatar":1193},"Luiza Vidal","[@Luiza Vidal](https://www.linkedin.com/in/luiza-vidal-po/)","**n8n accelerated our development**, we were able to release the solution before the rest of the market even realized what we were building.",{"id":1194,"documentId":1195,"name":1196,"alternativeText":12,"caption":12,"width":1197,"height":1197,"formats":1198,"hash":1206,"ext":1200,"mime":1149,"size":1207,"url":1208,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":1209,"updatedAt":1209,"publishedAt":1210,"focalPoint":12},3117,"pzosn1sgzf63hwrvndnr9kv6","Luiza-Vidal-Icatu.jpeg",800,{"thumbnail":1199},{"ext":1200,"url":1201,"hash":1202,"mime":1149,"name":1203,"path":12,"size":1204,"width":1152,"height":1152,"sizeInBytes":1205},".jpeg","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/thumbnail_Luiza_Vidal_Icatu_00f78cb493.jpeg","thumbnail_Luiza_Vidal_Icatu_00f78cb493","thumbnail_Luiza-Vidal-Icatu.jpeg",5.88,5875,"Luiza_Vidal_Icatu_00f78cb493",90.6,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Luiza_Vidal_Icatu_00f78cb493.jpeg","2026-03-18T11:02:18.131Z","2026-03-18T11:02:18.132Z",{"id":138,"name":1212,"description":1213,"opinion":1214,"avatar":1215},"Maxim Poulsen","[@maximpoulsen](https://x.com/@maximpoulsen)","**I've said it many times. But I'll say it again. n8n is the GOAT**. Anything is possible with n8n. You just need some technical knowledge + imagination. I'm actually looking to start a side project. Just to have an excuse to use n8n more 😅",{"id":1216,"documentId":12,"name":1217,"alternativeText":12,"caption":12,"width":1143,"height":1143,"formats":1218,"hash":1225,"ext":1200,"mime":1149,"size":1226,"url":1227,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":1228,"updatedAt":1228,"publishedAt":12,"focalPoint":12},2414,"avatar_maxim_poulsen.jpeg",{"thumbnail":1219},{"ext":1200,"url":1220,"hash":1221,"mime":1149,"name":1222,"path":12,"size":1223,"width":1152,"height":1152,"sizeInBytes":1224},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/thumbnail_avatar_maxim_poulsen_48f450887b.jpeg","thumbnail_avatar_maxim_poulsen_48f450887b","thumbnail_avatar_maxim_poulsen.jpeg",4.62,4621,"avatar_maxim_poulsen_48f450887b",25.77,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/avatar_maxim_poulsen_48f450887b.jpeg","2025-03-24T22:06:58.349Z",{"id":1230,"name":1231,"description":1232,"opinion":1233,"avatar":1234},34,"Ollie Scheers","[@olliescheers](https://www.linkedin.com/in/olliescheers/)","**n8n was the big unlock.** Tools like ChatGPT and Claude are great, but n8n is the thing that allows you to integrate AI into your work and your processes in a safe and controlled way.",{"id":1235,"documentId":1236,"name":1237,"alternativeText":12,"caption":12,"width":1238,"height":1238,"formats":1239,"hash":1246,"ext":1167,"mime":28,"size":1247,"url":1248,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":1249,"updatedAt":1250,"publishedAt":1251,"focalPoint":12},2968,"fzudvcj1wdkxb9raph2z3tr7","Oliver_Scheers_Huel.PNG",391,{"thumbnail":1240},{"ext":1167,"url":1241,"hash":1242,"mime":28,"name":1243,"path":12,"size":1244,"width":1152,"height":1152,"sizeInBytes":1245},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/thumbnail_Oliver_Zoom_d4152b86d2.PNG","thumbnail_Oliver_Zoom_d4152b86d2","thumbnail_Oliver_Zoom.PNG",52.4,52397,"Oliver_Zoom_d4152b86d2",64.63,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-prod/assets/Oliver_Zoom_d4152b86d2.PNG","2026-02-23T13:31:02.552Z","2026-03-18T10:56:36.962Z","2026-02-23T13:31:02.553Z",{"id":149,"name":1253,"description":1254,"opinion":1255,"avatar":1256},"Felix Leber","[@felixleber](https://www.linkedin.com/in/felixleber/)","**It blows my mind.** I was hating on no-code tools my whole life, but n8n changed everything. Made a Slack agent that can basically do everything, in half an hour. ",{"id":1257,"documentId":12,"name":1258,"alternativeText":12,"caption":12,"width":1197,"height":1197,"formats":1259,"hash":1278,"ext":1200,"mime":1149,"size":1279,"url":1280,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":1281,"updatedAt":1281,"publishedAt":12,"focalPoint":12},2411,"Felix_Leber.jpeg",{"small":1260,"medium":1266,"thumbnail":1272},{"ext":1200,"url":1261,"hash":1262,"mime":1149,"name":1263,"path":12,"size":1264,"width":39,"height":39,"sizeInBytes":1265},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/small_Felix_Leber_f7a5b3c776.jpeg","small_Felix_Leber_f7a5b3c776","small_Felix_Leber.jpeg",27.77,27766,{"ext":1200,"url":1267,"hash":1268,"mime":1149,"name":1269,"path":12,"size":1270,"width":47,"height":47,"sizeInBytes":1271},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/medium_Felix_Leber_f7a5b3c776.jpeg","medium_Felix_Leber_f7a5b3c776","medium_Felix_Leber.jpeg",51.32,51316,{"ext":1200,"url":1273,"hash":1274,"mime":1149,"name":1275,"path":12,"size":1276,"width":1152,"height":1152,"sizeInBytes":1277},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/thumbnail_Felix_Leber_f7a5b3c776.jpeg","thumbnail_Felix_Leber_f7a5b3c776","thumbnail_Felix_Leber.jpeg",5.12,5117,"Felix_Leber_f7a5b3c776",87.74,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/Felix_Leber_f7a5b3c776.jpeg","2025-03-24T21:46:11.228Z",{"id":153,"name":1283,"description":1284,"opinion":1285,"avatar":1286},"Nanbing","[@1ronben](https://x.com/1ronben)","I just have to say, **n8n's integration with third-party services is absolutely mind-blowing**. It's like having a Swiss Army knife for automation. So many tasks become a breeze, and I can quickly validate and implement my ideas without any hassle.",{"id":1287,"documentId":12,"name":1288,"alternativeText":12,"caption":12,"width":1143,"height":1143,"formats":1289,"hash":1296,"ext":1146,"mime":1149,"size":1297,"url":1298,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":1299,"updatedAt":1299,"publishedAt":12,"focalPoint":12},2416,"avatar_Ironben.jpg",{"thumbnail":1290},{"ext":1146,"url":1291,"hash":1292,"mime":1149,"name":1293,"path":12,"size":1294,"width":1152,"height":1152,"sizeInBytes":1295},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/thumbnail_avatar_Ironben_0a4b3e7d12.jpg","thumbnail_avatar_Ironben_0a4b3e7d12","thumbnail_avatar_Ironben.jpg",4.31,4307,"avatar_Ironben_0a4b3e7d12",16.42,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/avatar_Ironben_0a4b3e7d12.jpg","2025-03-24T22:09:36.609Z",{"id":158,"name":1301,"description":1302,"opinion":1303,"avatar":1304},"Francois Laßl","[@francois-laßl](https://www.linkedin.com/in/francois-la%C3%9Fl-817937243/)","**Found the holy grail of automation yesterday...** Yesterday I tried n8n and it blew my mind 🤯 What would've taken me 3 days to code from scratch? Done in 2 hours. The best part? If you still want to get your hands dirty with code (because let's be honest, we developers can't help ourselves 😅), you can just drop in custom code nodes. Zero restrictions.",{"id":1305,"documentId":12,"name":1306,"alternativeText":12,"caption":12,"width":1143,"height":1143,"formats":1307,"hash":1314,"ext":1200,"mime":1149,"size":1315,"url":1316,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":1317,"updatedAt":1317,"publishedAt":12,"focalPoint":12},2412,"Francois_laßl.jpeg",{"thumbnail":1308},{"ext":1200,"url":1309,"hash":1310,"mime":1149,"name":1311,"path":12,"size":1312,"width":1152,"height":1152,"sizeInBytes":1313},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/thumbnail_Francois_lassl_d5cfb504c7.jpeg","thumbnail_Francois_lassl_d5cfb504c7","thumbnail_Francois_laßl.jpeg",3.75,3748,"Francois_lassl_d5cfb504c7",19.3,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/Francois_lassl_d5cfb504c7.jpeg","2025-03-24T21:51:27.185Z",{"id":163,"name":1319,"description":1320,"opinion":1321,"avatar":1322},"Jodie M","[@jodiem](https://x.com/@jodiem)","**Anything is possible with n8n**. I think @n8n_io Cloud version is great, they are doing amazing stuff and I love that everything is available to look at on Github.",{"id":1163,"documentId":12,"name":1164,"alternativeText":1164,"caption":1164,"width":1165,"height":1165,"formats":12,"hash":1166,"ext":1167,"mime":28,"size":1168,"url":1169,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":1170,"updatedAt":1170,"publishedAt":12,"focalPoint":12},{"id":112,"documentId":1324,"createdAt":1325,"updatedAt":1325,"publishedAt":1326,"columns":1327},"zoopqgk9x2v1frf37f0i4zwo","2025-12-12T10:56:49.848Z","2025-12-12T10:56:49.650Z",[1328,1362,1401,1433,1476],{"id":112,"columnName":1329,"autofillOptions":1330,"bottomLink":6,"bottomLinkLabel":1331,"links":1332},"Popular integrations","popular_integrations","Show more integrations",[1333,1336,1339,1342,1345,1347,1350,1353,1356,1359],{"id":205,"url":1334,"label":1335,"hint":12},"/integrations/google-sheets/","Google Sheets",{"id":210,"url":1337,"label":1338,"hint":12},"/integrations/telegram/","Telegram",{"id":218,"url":1340,"label":1341,"hint":12},"/integrations/mysql/","MySQL",{"id":223,"url":1343,"label":1344,"hint":12},"/integrations/slack/","Slack",{"id":228,"url":1346,"label":225,"hint":12},"/integrations/discord/",{"id":233,"url":1348,"label":1349,"hint":12},"/integrations/postgres/","Postgres",{"id":238,"url":1351,"label":1352,"hint":12},"/integrations/notion/","Notion",{"id":243,"url":1354,"label":1355,"hint":12},"/integrations/gmail/","Gmail",{"id":82,"url":1357,"label":1358,"hint":12},"/integrations/airtable/","Airtable",{"id":259,"url":1360,"label":1361,"hint":12},"/integrations/google-drive/","Google Drive",{"id":79,"columnName":1363,"autofillOptions":12,"bottomLink":1364,"bottomLinkLabel":1331,"links":1365},"Trending combinations","/integrations/",[1366,1369,1372,1375,1379,1383,1387,1391,1395,1398],{"id":255,"url":1367,"label":1368,"hint":12},"/integrations/hubspot/and/salesforce/","HubSpot and Salesforce",{"id":378,"url":1370,"label":1371,"hint":12},"/integrations/twilio/and/whatsapp-business-cloud/","Twilio and WhatsApp",{"id":186,"url":1373,"label":1374,"hint":12},"/integrations/github/and/jira-software/","GitHub and Jira",{"id":1376,"url":1377,"label":1378,"hint":12},29,"/integrations/asana/and/slack/","Asana and Slack",{"id":1380,"url":1381,"label":1382,"hint":12},30,"/integrations/asana/and/salesforce/","Asana and Salesforce",{"id":1384,"url":1385,"label":1386,"hint":12},31,"/integrations/jira-software/and/slack/","Jira and Slack",{"id":1388,"url":1389,"label":1390,"hint":12},32,"/integrations/jira-software/and/salesforce/","Jira and Salesforce",{"id":1392,"url":1393,"label":1394,"hint":12},33,"/integrations/github/and/slack/","GitHub and Slack",{"id":1230,"url":1396,"label":1397,"hint":12},"/integrations/hubspot/and/quickbooks-online/","HubSpot and QuickBooks",{"id":422,"url":1399,"label":1400,"hint":12},"/integrations/hubspot/and/slack/","HubSpot and Slack",{"id":103,"columnName":1402,"autofillOptions":1403,"bottomLink":1364,"bottomLinkLabel":1404,"links":1405},"Top integration categories","top_integration_categories","Explore more categories",[1406,1410,1412,1414,1417,1419,1423,1425,1429,1431],{"id":1407,"url":1408,"label":1409,"hint":12},36,"/integrations/categories/communication/","Communication",{"id":1411,"url":620,"label":619,"hint":12},37,{"id":1413,"url":84,"label":83,"hint":12},38,{"id":1415,"url":1416,"label":140,"hint":12},39,"/integrations/categories/ai/",{"id":1418,"url":1006,"label":1005,"hint":12},40,{"id":1420,"url":1421,"label":1422,"hint":12},41,"/integrations/categories/marketing/","Marketing",{"id":1424,"url":614,"label":613,"hint":12},42,{"id":1426,"url":1427,"label":1428,"hint":12},43,"/integrations/categories/sales/","Sales",{"id":1430,"url":996,"label":995,"hint":12},44,{"id":1432,"url":1002,"label":1001,"hint":12},45,{"id":138,"columnName":1434,"autofillOptions":1435,"bottomLink":1436,"bottomLinkLabel":1437,"links":1438},"Trending templates","top_templates","/workflows/","Explore 800+ workflow templates",[1439,1443,1447,1451,1454,1457,1461,1465,1469,1472],{"id":1440,"url":1441,"label":1442,"hint":12},46,"/workflows/1750-creating-an-api-endpoint/","Creating an API endpoint",{"id":1444,"url":1445,"label":1446,"hint":12},47,"/workflows/1954-ai-agent-chat/","AI agent chat",{"id":1448,"url":1449,"label":1450,"hint":12},48,"/workflows/1951-scrape-and-summarize-webpages-with-ai/","Scrape and summarize webpages with AI",{"id":360,"url":1452,"label":1453,"hint":12},"/workflows/1747-joining-different-datasets/","Joining different datasets",{"id":1165,"url":1455,"label":1456,"hint":12},"/workflows/1534-back-up-your-n8n-workflows-to-github/","Back Up Your n8n Workflows To Github",{"id":1458,"url":1459,"label":1460,"hint":12},51,"/workflows/1700-very-quick-quickstart/","Very quick quickstart",{"id":1462,"url":1463,"label":1464,"hint":12},52,"/workflows/1862-openai-gpt-3-company-enrichment-from-website-content/","OpenAI GPT-3: Company Enrichment from website content",{"id":1466,"url":1467,"label":1468,"hint":12},53,"/workflows/1748-pulling-data-from-services-that-n8n-doesnt-have-a-pre-built-integration-for/","Pulling data from services that n8n doesn’t have a pre-built integration for",{"id":388,"url":1470,"label":1471,"hint":12},"/workflows/1435-convert-json-to-an-excel-file/","Convert JSON to an Excel file",{"id":1473,"url":1474,"label":1475,"hint":12},55,"/workflows/1934-telegram-ai-chatbot/","Telegram AI Chatbot",{"id":149,"columnName":1477,"autofillOptions":12,"bottomLink":234,"bottomLinkLabel":1478,"links":1479},"Top guides","Show guides",[1480,1484,1488,1492,1496,1499,1502,1506,1510,1514],{"id":1481,"url":1482,"label":1483,"hint":12},56,"https://blog.n8n.io/telegram-bots/","Telegram bots",{"id":1485,"url":1486,"label":1487,"hint":12},57,"https://blog.n8n.io/open-source-chatbot/","Open-source chatbot",{"id":1489,"url":1490,"label":1491,"hint":12},58,"https://blog.n8n.io/open-source-llm/","Open-source LLM",{"id":1493,"url":1494,"label":1495,"hint":12},59,"https://blog.n8n.io/open-source-low-code-platforms/","Open-source low-code platforms",{"id":343,"url":1497,"label":1498,"hint":12},"https://blog.n8n.io/free-zapier-alternatives/","Zapier alternatives",{"id":251,"url":1500,"label":1501,"hint":12},"https://blog.n8n.io/make-vs-zapier/","Make vs Zapier",{"id":1503,"url":1504,"label":1505,"hint":12},62,"https://blog.n8n.io/ai-agents/","AI agents",{"id":1507,"url":1508,"label":1509,"hint":12},63,"https://blog.n8n.io/ai-coding-assistants/","AI coding assistants",{"id":1511,"url":1512,"label":1513,"hint":12},64,"https://blog.n8n.io/create-chatgpt-discord-bot/","ChatGPT Discord bot",{"id":1515,"url":1516,"label":1517,"hint":12},65,"https://blog.n8n.io/best-ai-chatbot/","Best AI chatbot",{"left":272,"top":272,"width":168,"height":168,"rotate":272,"vFlip":7,"hFlip":7,"body":1519},"\u003Cg fill=\"none\">\u003Cpath\n    fill=\"#fff\"\n    fill-rule=\"evenodd\"\n    d=\"M7.678 1.36H.481V0H10v9.52H8.64v-7.2L.962 10 0 9.038 7.678 1.36Z\"\n  />\u003C/g>",[1521,1524,1577,1579,1581,1583,1585,1587,1589,1593,1597,1599,1601,1603,1605],{"label":1522,"value":1364,"subcategories":1523,"url":1364},"All categories",[],{"label":140,"value":1416,"subcategories":1525,"url":1416},[1526,1530,1534,1538,1542,1545,1549,1553,1557,1561,1565,1569,1573],{"name":1527,"slug":1528,"url":1529},"Agents","agents","/integrations/categories/ai/agents/",{"name":1531,"slug":1532,"url":1533},"Embeddings","embeddings","/integrations/categories/ai/embeddings/",{"name":1535,"slug":1536,"url":1537},"Chains","chains","/integrations/categories/ai/chains/",{"name":1539,"slug":1540,"url":1541},"Language Models","language-models","/integrations/categories/ai/language-models/",{"name":548,"slug":1543,"url":1544},"tools","/integrations/categories/ai/tools/",{"name":1546,"slug":1547,"url":1548},"Vector Stores","vector-stores","/integrations/categories/ai/vector-stores/",{"name":1550,"slug":1551,"url":1552},"Document Loaders","document-loaders","/integrations/categories/ai/document-loaders/",{"name":1554,"slug":1555,"url":1556},"Memory","memory","/integrations/categories/ai/memory/",{"name":1558,"slug":1559,"url":1560},"Text Splitters","text-splitters","/integrations/categories/ai/text-splitters/",{"name":1562,"slug":1563,"url":1564},"Output Parsers","output-parsers","/integrations/categories/ai/output-parsers/",{"name":1566,"slug":1567,"url":1568},"Model Context Protocol","model-context-protocol","/integrations/categories/ai/model-context-protocol/",{"name":1570,"slug":1571,"url":1572},"Retrievers","retrievers","/integrations/categories/ai/retrievers/",{"name":1574,"slug":1575,"url":1576},"Rerankers","rerankers","/integrations/categories/ai/rerankers/",{"label":915,"value":916,"subcategories":1578,"url":916},[],{"label":1409,"value":1408,"subcategories":1580,"url":1408},[],{"label":83,"value":84,"subcategories":1582,"url":84},[],{"label":1005,"value":1006,"subcategories":1584,"url":1006},[],{"label":609,"value":610,"subcategories":1586,"url":610},[],{"label":619,"value":620,"subcategories":1588,"url":620},[],{"label":1590,"value":1591,"subcategories":1592,"url":1591},"Finance & Accounting","/integrations/categories/finance-and-accounting/",[],{"label":1594,"value":1595,"subcategories":1596,"url":1595},"HITL","/integrations/categories/hitl/",[],{"label":1422,"value":1421,"subcategories":1598,"url":1421},[],{"label":1001,"value":1002,"subcategories":1600,"url":1002},[],{"label":613,"value":614,"subcategories":1602,"url":614},[],{"label":1428,"value":1427,"subcategories":1604,"url":1427},[],{"label":995,"value":996,"subcategories":1606,"url":996},[],{"left":272,"top":272,"width":287,"height":287,"rotate":272,"vFlip":7,"hFlip":7,"body":1608},"\u003Cpath fill=\"currentColor\" d=\"m229.66 218.34l-50.07-50.06a88.11 88.11 0 1 0-11.31 11.31l50.06 50.07a8 8 0 0 0 11.32-11.32M40 112a72 72 0 1 1 72 72a72.08 72.08 0 0 1-72-72\"/>",{"left":272,"top":272,"width":287,"height":287,"rotate":272,"vFlip":7,"hFlip":7,"body":1610},"\u003Cpath fill=\"currentColor\" d=\"M144 180a16 16 0 1 1-16-16a16 16 0 0 1 16 16m92-52A108 108 0 1 1 128 20a108.12 108.12 0 0 1 108 108m-24 0a84 84 0 1 0-84 84a84.09 84.09 0 0 0 84-84m-84-64c-24.26 0-44 17.94-44 40v4a12 12 0 0 0 24 0v-4c0-8.82 9-16 20-16s20 7.18 20 16s-9 16-20 16a12 12 0 0 0-12 12v8a12 12 0 0 0 23.73 2.56C158.31 137.88 172 122.37 172 104c0-22.06-19.74-40-44-40\"/>",{"left":272,"top":272,"width":287,"height":287,"rotate":272,"vFlip":7,"hFlip":7,"body":1612},"\u003Cpath fill=\"currentColor\" d=\"M228 128a12 12 0 0 1-12 12h-76v76a12 12 0 0 1-24 0v-76H40a12 12 0 0 1 0-24h76V40a12 12 0 0 1 24 0v76h76a12 12 0 0 1 12 12\"/>",1777565838640]