
Merge earned its position. Thousands of B2B SaaS teams use Merge Unified API to stop reinventing HRIS, ATS, CRM, and ticketing integrations - one API, 220+ providers, maintained by someone else. The enterprise brand is real. The support is strong.
The question isn't whether Merge is good at what it was built for. It's whether what it was built for - normalized, deterministic API integration for SaaS products, is the right foundation for the agent use cases now landing on those same teams.
Merge earned its position. Thousands of B2B SaaS teams use Merge Unified API to stop reinventing HRIS, ATS, CRM, and ticketing integrations — one API, 220+ providers, maintained by someone else. The enterprise brand is real. The support is strong.
The question isn't whether Merge is good at what it was built for. It's whether what it was built for — normalized, deterministic API integration for SaaS products — is the right foundation for the agent use cases now landing on those same teams.
When you're building deterministic SaaS integrations, normalization is a feature. One schema for "Employee" across Workday, BambooHR, and Personio means you write integration logic once. The variation is abstracted away. That's the unified API value proposition and it's legitimate.
Agent tool calling has different requirements:

For teams whose agent use cases map to shallow reads and writes across many providers, Agent Handler is a credible extension of existing infrastructure.
Merge, Nango, and Paragon all built serious integration infrastructure for a specific problem: SaaS product teams that need their customers to connect third-party systems reliably. That problem is real and they solved it well.
Agent connectivity is adjacent but not identical. The infrastructure underneath a deterministic integration — schedule-based sync, fixed schema, developer-initiated — differs in meaningful ways from what an agent needs at tool-call time: per-user delegation, scope enforcement per operation, LLM-optimized schema, sub-second execution with retries.
The question when evaluating any of these products for agent use cases: how much of what they've built reflects the agent execution model natively, and how much is capable integration infrastructure with an agent API on top?

Scalekit was designed from the start around the agent execution model, not as an extension to an existing integration product but as infrastructure specifically for agents acting on behalf of users in multi-tenant environments.
The execution model:
Per-connector scope configuration means different orgs can have different permission profiles for the same integration. Enforcement happens before the API is touched. An agent attempting an operation outside its configured scope doesn't receive an API error — the request never leaves the platform.
What teams can build on top: Beyond pre-built connectors, teams can bring custom tools, custom API endpoints, and custom MCP servers into the same auth and authz framework. The credential management and scope enforcement apply uniformly — pre-built and custom integrations treated identically by the security layer.
Developer experience:
Connector catalog: ~300 and growing toward 400, built depth-first. Each connector covers the operations agents actually complete in production, not a surface-level wrapper that passes an integration count audit.
From Von's engineering team:
Von's agents act across Salesforce, Gong, HubSpot, Google Drive, and more on behalf of individual sales team members. The identity challenge was running across four credential surfaces simultaneously, per user, with enterprise-grade auditability.
"Von touches identity in four places: user auth, embedded SSO, token store for integrations, and an AI tool calling proxy. Having all of that managed by Scalekit behind the scenes is what let us ship fast without stitching together parallel systems."
~ Venu Madhav Kattagoni, Head of Engineering, Von
Each new integration Von added inherited the same auth and authz pattern. New connector, same layer. Enterprise security reviews answered by default.
One note for teams building user-facing products alongside agents: the same team also builds enterprise identity infrastructure — SSO, SCIM, user and org management. Running both on the same platform is an option for B2B products where "who is this user" and "what can their agent touch" need to be coherent answers from the same system.
Best fit: Production-grade agent products where per-tenant authz, depth of connector coverage, and enterprise-grade audit infrastructure matter from the start.

The most compelling alternative on customization and pricing. Nango is open source; tool definitions are TypeScript functions in your repo; pricing is usage-based rather than per-linked-account.
The observability story is the strongest in this comparison: full API request/response logs, custom log messages, OpenTelemetry export. 700+ APIs. Code-first: write a TypeScript function, deploy to Nango's runtime, iterate with Claude Code or Cursor directly in your repo.
The trade-off: you're authoring integration logic rather than consuming pre-built tools. The ceiling is higher; so is the floor.
Best fit: Teams that need to own their integration code, have high observability requirements, and want pricing that doesn't scale with customer count.

Composio is the agent-native option with the largest pre-built catalog: 1,000+ integrations, framework adapters across LangChain, CrewAI, OpenAI Agents SDK, and more. Time-to-first-tool-call is measurable in minutes.
The gap relative to Merge: enterprise compliance and governance features are less mature. Closed-source tools, limited observability, no per-tenant configuration. The auth model handles token storage and refresh; it doesn't enforce authz at the tool level.
Best fit: Teams coming from Merge who want agent-native breadth and are willing to accept weaker governance in exchange for faster integration coverage.

Arcade is the most principled auth-first option in this list. The Okta founding team DNA shows: agents act as users through proper OAuth delegation, not service accounts, not bot tokens. The tool evaluation framework is a genuine capability gap-filler that Merge Agent Handler lacks.
Limitations: ~112 first-party integrations. Closed-source runtime. Enterprise governance still developing.
Best fit: Teams where auth model correctness is the primary driver and current integration requirements fit within Arcade's catalog.

Paragon rebuilt around AI in 2025. ActionKit is a single API returning 1,000+ integration tools, with a white-labeled Connect Portal that's as polished as anything in this space. For teams moving from Merge because of pricing at scale, Paragon tends to be more favorable at growth-stage customer counts.
The constraint: similar per-tenant customization limitations as Merge — pre-built tools, no per-org configuration.
Best fit: ISVs moving from Merge who need similar integration breadth with a better pricing model at scale and for whom end-user connection UX is a product requirement.
The teams most likely to be evaluating Merge alternatives for agent use cases fall into two groups.
The first is already on Merge and evaluating whether Agent Handler is the right path. For standard use cases that map to Merge's existing catalog and don't require per-tenant tool configuration, Agent Handler is a reasonable extension. For anything requiring deeper authz control, custom tool behavior, or agent-native architecture, it's worth evaluating from scratch.
The second group is building agent products and considering Merge because of the enterprise brand and compliance story. The compliance story is real. The question is whether the unified API abstraction serves your agent use case — or whether you're optimizing for a familiar brand when the architecture isn't the right fit.
The evaluation question in both cases: does your agent need to act on behalf of users with their own credentials, scoped to their permissions, with audit evidence per action? If yes, that requirement should drive the selection — not which product has the longest integration list.