Connect the systems within your business. Access the full target system schemas to map and transform the source data on a scheduled or ad hoc basis.
Powerful mapping capabilities allow the transformation of data, including querying the target system in the mapping to enable any transformation imaginable into the target systems.
Full cron scheduling of jobs including customisable system downtime, dependencies between connections and deployment via email to allow self-service within the business.
Powerful mapping | Simple UI allowing powerful and flexible mapping of source data into the full target system schema. Multi-section, complex conditions, query target and data transformations including complex scripting (JEXL) |
Scaleable | Batching and use of any available bulk apis make CONVAYR both efficient and scaleable. |
Secure | OAuth and SSL are used whenever the systems allow. All credentials are stored securely encrypted. |
Single Sign On | CONVAYR supports SSO with your company's IDP using SAML 2.0. |
Binary data support | Ability to create binary data (attachments, documents etc) in target systems. |
Scheduling engine | Specify and modify scheduling for hourly, daily, monthly etc runs. |
Dependent connections | Add dependencies between connections |
Multi-user security model | Restrict access on a per folder basis to connections within an account. Administrator has user management rights. |
Full logging | Jobs are fully logged allowing the examination of the results of a job and also the modification and re-run of errors. Retention of data is set on a per connection basis. |
Track and trace | Quickly search logs for specific target system Ids. |
Notifications | Set notifications of job status to be emailed to selected users. |
Email control | Allow specific users to start, stop, pause schedules and resume schedules on connections. |
Connection management | Connections can be put in folders and within the folder have tags added to allow easy identification. |
Run from email | Allow specific users to submit csv data as an email attachment to run a connection with. |
Credentials management | Credentials have their own management, independent of the connection. |
Archive | Store unlimited inactive connections in the archive, these do not count against the license. |
Activation Blocking | Set rules to prevent unwanted updates to systems on a schedule, attempts can be ignored or run immediately after the blocking period. |
Recycle Bin | Deleted connections can be restored in a click for upto 7 days after deletion. |
Powerful mapping |
Simple UI allowing powerful and flexible mapping of source data into the full target system schema. Multi-section, complex conditions, query target and data transformations including complex scripting (JEXL) |
Scaleable |
Batching and use of any available bulk apis make CONVAYR both efficient and scaleable. |
Secure |
OAuth and SSL are used whenever the systems allow. All credentials are stored securely encrypted. |
Single Sign On |
CONVAYR supports SSO with your company's IDP using SAML 2.0. |
Binary data support |
Ability to create binary data (attachments, documents etc) in target systems. |
Scheduling engine |
Specify and modify scheduling for hourly, daily, monthly etc runs. |
Dependent connections |
Add dependencies between connections |
Multi-user security model |
Restrict access on a per folder basis to connections within an account. Administrator has user management rights. |
Full logging |
Jobs are fully logged allowing the examination of the results of a job and also the modification and re-run of errors. Retention of data is set on a per connection basis. |
Track and trace |
Quickly search logs for specific target system Ids. |
Notifications |
Set notifications of job status to be emailed to selected users. |
Email control |
Allow specific users to start, stop, pause schedules and resume schedules on connections. |
Connection management |
Connections can be put in folders and within the folder have tags added to allow easy identification. |
Run from email |
Allow specific users to submit csv data as an email attachment to run a connection with. |
Credentials management |
Credentials have their own management, independent of the connection. |
Archive |
Store unlimited inactive connections in the archive, these do not count against the license. |
Activation Blocking |
Set rules to prevent unwanted updates to systems on a schedule, attempts can be ignored or run immediately after the blocking period. |
Recycle Bin |
Deleted connections can be restored in a click for upto 7 days after deletion. |
Andy Louca
I'm always a bit dubious of new apps, I've been in the Salesforce space for years and am familiar with most of what the ecosystem has to offer. CONVAYR is hands down my favourite app. As an early adopter for the last few years (across 3 organisations) I'm thrilled to see it's debut on the AppExchange.
Salesforce for most organisations is not an island! This app has helped me push, pull and transform data from so many different systems to the point where I often now often use this instead of dataloader. My favourite use cases:
Seth Jenner
Nice integration tool with excellent data manipulation/transfection and even “Search before create”. I have found it easy to use and very useful for a variety of data tasks big and small. It also has an innovative webhook feature that allows real-time integrations thats easy to setup for Admins.
Here are some uses that our customers have found for CONVAYR
$ | £ | € | |
Users* | $100/user/month | £85/user/month | €90/user/month |
Connections** | $250/pack/month | £190/pack/month | €225/pack/month |
Users* | Connections** |
$100/user/month | $250/pack/month |
£85/user/month | £190/pack/month |
€90/user/month | €225/pack/month |
Billed Annually
Minimun of 1 User and 1 Connection Pack
*Any named individual with access to CONAVYR
**A connection is any connection between a source and target system. Packs are of 20