Memgraph
An in-memory property graph database with ACID transactions and strong consistency. Includes the MAGE library of graph algorithms and supports real-time streaming ingestion.
Details
Links
Feature Scores
Community & Business
Active development Updated within last 3 months
Commercial support Paid support available
Live community 25-50% of issues addressed
Open Source Closed source
Pricing No pricing information
Trendiness
Deployment
Containerization Docker image available
Work as dedicated instance Can run as standalone server
Work as embedded Standalone only
Testing in-memory version
Platform
Operating on Linux Linux officially supported
Operating on Windows Docker image available
SaaS offering Cloud service available
Operations
Automatic updates Manual updates only
Client side caching No client-side caching
Data versioning support No versioning
Live backups Hot backup supported
Distribution
Cluster Re-balancing Auto-rebalancing supported
Data Distribution Data sharding supported
High-Availability HA mechanisms available
Query Distribution Distributed query execution
Replication support Replication available
Developer Experience
Data types defined Single data type (strings)
Logging/Auditing Event logging supported
Object-Graph Mapper OGM/ORM available
Reactive programming No reactive programming
Documentation up-to-date
Binary protocol Binary protocol available
CLI Command-line interface
GUI Visual interface available
Data Model
Multi-database Graph-only
Graph-native data Native graph storage
REST API No REST API
Query Language Standard query language (Cypher/Gremlin)
Transactions
Granular locking No granular locking
Multiple isolation levels Read uncommitted only
Read committed transaction Read committed available
Transaction support ACID transactions
Schema & Security
Constraints Full constraint support
Schema support
Secondary indexes Secondary indexes supported
Server side procedures Stored procedures supported
Triggers Event triggers supported
Authentication Authentication supported
Authorization Role-based access control
Data encryption No encryption