Neo4j - The #1 Platform for Connected Data
Case Study: Monsanto
Forrester Research explores how Monsanto used Neo4j alongside traditional technology to harness connected data.
Now Here! Neo4j 3.2
The Graph Foundation
for the Enterprise
Neo4j delivers internet-scale for global applications, enterprise governance and security, and performance up and down the native graph stack.Download Now
Native Graph Database
Experience the leading database engineered from top to bottom for connected data.Learn More
Tap into an ecosystem of solutions and graph-based services to shorten your learning curve.Professional Services
New to Graphs?
From data modeling and drivers to scalability and Cypher queries, learn more about graph database development.
Neo4j for RDBMS Developers
Get an introduction to Neo4j with The Definitive Guide to Graph Databases for the RDBMS Developer.Get the Guide
Graph Technology Solutions
From fraud detection and real-time recommendations to network security and master data applications, Neo4j powers some of the most essential enterprise use cases for connected data.Explore Solutions
Connected Enterprises Powered by Neo4j
See for yourself how Neo4j customers use the world's leading graph database to power real-time intelligent applications.Read Case Studies
I am very happy to announce the first public release of the Neo4j graph algorithms library. You can use these graph algorithms on your connected data to gain new insights more easily within Neo4j. You can use these graph analytics to improve results from your graph data, for example by focusing onRead More
Regardless of your political affiliation or demographic it’s difficult to deny the effects of the recent fake news boom. The Pew Research Center conducted a survey that found that two in three adults in U.S. believe that the upsurge of fake news has left Americans confused about even basicRead More
Financial Services & Neo4j: Cybersecurity
Cybersecurity is of critical importance to financial services firms. IT organizations must mitigate cybersecurity risk, both in terms of external access to the infrastructure and in understanding how a malware infection or attack can move across a particular network. These efforts are made challengingRead More