Version 3.0 introduces the admin REST API for secure remote cluster administration

Cloud-to-edge sync

Securely sync data between your web, mobile, and IoT apps running Couchbase Lite and your backend Couchbase Server, as well as between cloud and edge data centers.

Learn about data routing
couchbase product moblie platform
couchbase product moblie platform

Built-in data integration APIs

Use secure RESTful APIs for accessing and managing data over the web and webhooks to integrate with external web clients, data stores, and services.

Learn about changes feed

Robust security

Enforce document-level read and field-level write access policies down to individual user and role. Admin REST API enforces authentication and role-based access control by default. Take advantage of third-party Open ID Connect providers or bring in custom providers.

Learn about user authentication
couchbase product moblie platform
couchbase product moblie platform

Elastically scalable in real time

Vertically and horizontally scale Sync Gateway nodes to handle changes in capacity demands. Apply tunable read and write scaling options to meet performance demands.

Learn about load balancer

Attributes of sync technology


Securely sync data between any cloud data center and edge devices or between cloud and edge data centers.

Learn more


Customize sync with filters to specify documents, direction, and frequency of sync (real time or on demand).

Learn more

Automatic conflict resolution

Conflicts due to concurrent changes from multiple clients are automatically handled using predefined policies with the flexibility of user-defined custom conflict resolvers.

Learn more


Using delta sync technology, reduce transfer costs and network load by only syncing the parts of the document that have changed.

Learn more


Retry logic enables automatic recovery from disruptions in network connectivity that can range in duration from a few minutes to days or months.

Learn more


Replications are secured end to end with TLS and x.509 certificate-based authentication. Document access is controlled using configurable access read and write level control policies.

Learn more

Start creating amazing customer experiences today.