Results for: using class net.sourceforge.jtds.jdbc.driver

Suggested Categories:

Driver Update Software
Driver update software helps users automatically scan their computer’s hardware to ensure that the most up-to-date drivers are installed. These platforms can detect outdated, missing, or incompatible drivers and allow users to easily download and install the latest versions directly from the manufacturer’s database. By using driver update software, users can optimize system performance, prevent hardware malfunctions, and improve device compatibility. The software typically automates the process of scanning for driver updates and can be set to run on a schedule, ensuring that the system stays up to date with minimal effort. This helps reduce errors and enhances overall system efficiency.
Class Registration Software
Class registration software facilitates the process of scheduling, managing and registering to classes in educational, recreational and training programs.
AI Computer Use Agents (CUA) Software
AI Computer Use Agents (CUAs) are advanced AI systems that enable machines to interact with computer environments in a human-like manner. Unlike traditional AI models that rely on APIs, CUAs can navigate graphical user interfaces (GUIs), perform tasks such as clicking buttons, typing text, and scrolling, effectively operating software applications as a human would. This capability allows CUAs to automate complex workflows across various platforms without the need for specialized integrations.
NPS Software
NPS software helps businesses measure customer loyalty by collecting and analyzing Net Promoter Score (NPS) feedback. It automates the process of sending surveys, tracking responses, and segmenting promoters, passives, and detractors. Many platforms include real-time dashboards, sentiment analysis, and trend reporting to help teams understand customer satisfaction over time. The software also integrates with CRM and support systems to trigger follow-ups and improve customer retention. Overall, NPS software enables companies to monitor customer sentiment, respond to issues quickly, and strengthen long-term relationships.
Driving School Software
Driving school software helps driving schools manage their day-to-day operations, from scheduling lessons and tracking student progress to handling payments and generating reports. These platforms typically include features like booking systems, instructor management, student records, and curriculum tracking to streamline administrative tasks. Driving school software can also assist with managing compliance and certifications, ensuring that students complete the required training and exams. Additionally, many systems offer communication tools to keep students and instructors informed, along with billing and invoicing capabilities. By using driving school software, driving schools can improve efficiency, enhance the learning experience, and provide better customer service.
IoT Software
Internet of Things (IoT) software is a form of technology that allows for connected devices to communicate with each other over the internet. It generally consists of various hardware and software components such as sensors, wireless networks, and databases. With the help of IoT software, data can be collected from multiple sources for further analysis and it can also be used to control devices remotely. IoT software also offers advantages such as improved efficiency and better security for connected devices.
Logbook Software
Logbook software is software to record and track operational activities, such as vehicle usage, maintenance, and employee tasks. It enables users to maintain accurate logs for compliance, efficiency, and record-keeping purposes. The software typically supports features like automated entries, customizable templates, and real-time data entry, making it easier to manage day-to-day operations. It is commonly used in industries like transportation, fleet management, and equipment maintenance. Logbook software helps organizations streamline processes, reduce errors, and improve overall operational oversight.
Gymnastics Software
Gymnastics software is software for gymnastics clubs, coaches, and organizations to manage their operations, training, and competitions. These platforms often include features like scheduling, attendance tracking, athlete management, progress tracking, and score management for competitions. Gymnastics software can help coaches create personalized training plans, monitor skill development, and track individual athlete performance over time. Additionally, the software may offer tools for registration, payment processing, and communication with athletes and parents. It streamlines administrative tasks, improves organization, and enhances the overall experience for athletes and coaches.
Neural Network Software
Neural network software uses algorithms to simulate the human brain's ability to recognize patterns. It can be used for a variety of purposes, such as image and voice recognition, natural language processing, and decision making. The software is typically composed of a number of layers that contain parameters which are adjusted through training. Finally, it can be applied in various areas such as healthcare, finance, engineering and more.
Virtual Classroom Software
Virtual classroom software is designed to provide teachers and students with a virtual platform that serves as an online learning environment for hosting classes remotely.
Yoga Studio Software
Yoga studio software enables yoga studio owners and instructors to manage their studio's day-to-day operations, enhance client engagement, and streamline administrative tasks. These platforms typically include features for class scheduling, client booking, payment processing, membership management, and attendance tracking. Yoga studio software also offers tools for managing instructor schedules, tracking client progress, and sending reminders or promotions to clients. Many platforms integrate with mobile apps to allow clients to book classes, track their attendance, and receive updates directly from their phones. This software helps yoga studios improve efficiency and client satisfaction while simplifying business management.
Emissions Management Software
Emissions management software helps organizations monitor, track, and report their greenhouse gas emissions and environmental impact to comply with regulations and support sustainability goals. It collects data from various sources such as energy use, transportation, and industrial processes, providing analytics to identify emission trends and reduction opportunities. The software often includes tools for regulatory reporting, carbon accounting, and scenario modeling to help businesses plan and implement emission reduction strategies. By automating data collection and reporting, it improves accuracy, transparency, and decision-making. Ultimately, emissions management software supports organizations in minimizing their carbon footprint and enhancing environmental responsibility.
Camp Management Software
Camp management software is software designed to streamline the administration and operations of camps, including summer camps, day camps, and specialized retreats. It helps organizers manage registrations, payments, scheduling, and communication with campers and staff in one centralized platform. Many systems offer features like camper check-in/check-out, health record tracking, and automated billing to enhance efficiency and safety. Integrated communication tools allow for easy updates and notifications to parents, staff, and campers. By automating repetitive tasks, camp management software saves time, reduces errors, and improves the overall experience for both administrators and attendees.
Virtual Fitting Software
Virtual fitting software allows apparel and fashion retailers and ecommerce stores to offer online shoppers with a virtual fitting room so that the customer can try on clothing and accessories virtually, to see how they might look, and so that they can choose the correct size. eCommerce retailers that use virtual fitting rooms get more conversions and sales, and less returns, because customers are more confident in their size and purchase.
Parks and Recreation Software
Parks and recreation software helps municipalities, community centers, and parks departments manage facilities, programs, and public services. It supports scheduling for classes, camps, sports leagues, and events while handling registrations, payments, and waitlists. Many platforms include facility booking, membership management, and staff scheduling to streamline daily operations. The software often provides online portals for residents to register for activities, reserve spaces, and access community updates. Overall, parks and recreation software improves efficiency, enhances community engagement, and helps local agencies deliver better recreational services.
Land Management Software
Land management software helps organizations, governments, and landowners efficiently manage property assets, land use, and related data throughout the land lifecycle. It centralizes information on ownership, leases, boundaries, zoning, resources, and environmental factors in one digital platform. These systems often integrate with GIS (Geographic Information Systems), mapping tools, and satellite data for visualization and spatial analysis. Land management software supports decision-making in areas such as real estate, agriculture, mining, utilities, and conservation by improving accuracy, compliance, and resource allocation. By digitizing land records and automating administrative workflows, it enhances transparency, sustainability, and long-term land stewardship.
Route Planning Software
Route planning software helps businesses and individuals create the most efficient routes for transportation or delivery purposes. These systems analyze variables such as distance, traffic conditions, time windows, vehicle capacity, and stop locations to generate optimal routes, reducing fuel costs and improving overall efficiency. Many route planning tools also offer real-time tracking, allowing fleet managers to adjust routes based on live data or unforeseen circumstances. In addition to logistical uses, this software can enhance customer satisfaction by ensuring timely deliveries and improved service. Industries such as delivery, field services, and public transportation commonly use route planning software to streamline operations and improve productivity.
Delivery Management Software
Delivery management software helps businesses and restaurants streamline and automate the process of managing deliveries, from dispatch to final delivery. It provides real-time tracking, route optimization, and communication tools, enabling efficient coordination between drivers, dispatchers, and customers. The software often includes features like electronic proof of delivery, delivery status updates, and performance analytics, ensuring timely deliveries and improved customer satisfaction. By reducing manual processes and improving delivery logistics, businesses can optimize fuel usage, reduce delays, and increase overall operational efficiency. Ultimately, delivery management software enhances service quality, reduces costs, and provides greater visibility and control over the delivery process.
School Bus Routing Software
School bus routing software helps schools optimize and manage the transportation of students by creating efficient bus routes. These systems use various data inputs such as student locations, school zones, traffic patterns, and time constraints to generate routes that minimize travel time and costs. In addition to route planning, the software often includes features like real-time bus tracking, automated notifications for parents and schools, and integration with student databases for better organization. It can also help reduce fuel consumption and improve overall fleet management by optimizing the number of buses needed. This software ensures that students are safely and efficiently transported to and from school while maintaining regulatory compliance.
Continuing Education Software
Continuing education software provides a learning management system (LMS) designed for continuous education, and tools to streamline the tracking and management of post-secondary continuing education programs and credits.
View more categories (20) for "using class net.sourceforge.jtds.jdbc.driver"

38 Products for "using class net.sourceforge.jtds.jdbc.driver" with 3 filters applied:

  • 1
    Digital Defense
    Providing best-in-class cyber security doesn’t mean blindly chasing the latest trends. It does mean a commitment to core technology and meaningful innovation. See how our vulnerability and threat management solutions provide organizations like yours with the security foundation needed to protect vital assets. Eliminating network vulnerabilities doesn’t have to be complicated, even though that’s what some companies would have you believe.
  • 2
    SaltStack

    SaltStack

    SaltStack

    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured...
  • 3
    Wiz

    Wiz

    Wiz

    Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments. Find all lateral movement risks such as private keys used to access both development and production environments. Scan for vulnerable and unpatched operating systems, installed software, and code libraries in your workloads prioritized by risk. Get a complete and up-to-date inventory of all services and software in your cloud environments including the version and package. Identify all keys located on your workloads cross referenced with the privileges they have in your cloud environment. ...
    View Software
    Visit Website
  • 4
    CyCognito

    CyCognito

    CyCognito

    Expose all the hidden security gaps in your organization using nation-state grade technology. CyCognito’s Global Bot Network uses attacker-like reconnaissance techniques to scan, discover and fingerprint billions of digital assets all over the world. No input or configuration needed. Uncover the unknown. The Discovery Engine uses graph data modeling to map your organization’s full attack surface.
    Starting Price: $11/asset/month
  • 5
    Rotate

    Rotate

    Rotate

    Use your multi-tenancy control center for vulnerability scans and rapid deployments. Manage unlimited clients through a single pane of glass. Empower your business customers with a complete cybersecurity solution and reduce portfolio risk. Rotate protects all types of organizations in the new world of digital-first work. Get complete cybersecurity for every employee who uses email or brings a device to work.
  • 6
    Kloudle

    Kloudle

    Kloudle

    ...Scan your cloud accounts (AWS, Google Cloud, Digitalocean, Azure), cloud servers (Linux), Kubernetes clusters (Managed - EKS, GKE, AKS, DOKS or Self-hosted). All of this and more without breaking the bank. Simple pricing with a pay as you go model. Buy credits and use them for security scans, downloading custom reports. Every user gets 5 free SuperFast scans. There is no time limit on these. You can scan the configuration of cloud virtual machines (EC2 in AWS) and object stores (S3 buckets in AWS). After utilizing your 5 free scans, you will need to purchase credits to continue running security scans. ...
    Leader badge
    Starting Price: $30 per credit
  • 7
    Mindflow

    Mindflow

    Mindflow

    ...Mindflow redefines enterprise automation, offering an extensive catalog of integrations. Add any new tool to our platform within minutes, breaking the barriers of traditional integration. Connect and orchestrate your tech stack, no matter the tools you use.
  • 8
    MetaPhish

    MetaPhish

    MetaCompliance

    ...Templates are based on current phishing threats which imitate reputable websites and brands. The templates can be matched with relevant domain names that improve the ease of use within your organization’s network. The templates are all fully customizable and can be adapted to suit specific business sectors. Phishing emails can be created from the ground up using our in-house design team and the extensive range of templates are available in 12 different languages.
  • 9
    Cisco Secure Network Analytics
    ...Analyze encrypted traffic for threats and compliance, without decryption. Quickly detect unknown malware, insider threats like data exfiltration, policy violations, and other sophisticated attacks using advanced analytics. Store telemetry data for long periods for forensic analysis.
  • 10
    VaultCore

    VaultCore

    Fornetix

    ...Request a demo and experience VaultCore's: - Rapid, seamless integration with existing technology - Separation of Duties (a best practice) - Centralized Control of policy through powerful automation - Strengthened security of data at rest, in motion and in use - Drastic reduction in costs associated with data breaches — lost business, recovery time, reputation damage - Simplified compliance and regulatory enforcement - Scalable to over 100 million keys (more than enough to meet any industry's or government's needs) - Reporting abilities to meet compliance needs - Ease of use...
    Starting Price: $1,118 per year
  • 11
    Push Security

    Push Security

    Push Security

    Map out your entire cloud identity attack surface and harden it against identity-based attacks. Push is a vulnerability scanner for your cloud identities. Push uses a lightweight browser extension to give you real-time visibility of all your employees’ cloud identities and the vulnerabilities putting your business at risk. - Get real-time visibility of all your cloud identities, apps and integrations. - Onboard unmanaged apps to SSO. Detect and harden non-SSO identities. - Find and secure vulnerable identities. ...
    Starting Price: $5 per employee per month
  • 12
    Skybox Security

    Skybox Security

    Skybox Security

    ...Harness the power vulnerability and asset data, as well as network topology and security controls. Use network modeling and attack simulation to find exposed vulnerabilities. Augment vulnerability data with intelligence on the current threat landscape. Know your best remediation option, including patching, IPS signatures and network–based changes.
  • 13
    Arcules

    Arcules

    Arcules

    Use your existing IP cameras and network gear.
  • 14
    SpamTitan

    SpamTitan

    TitanHQ

    ...SpamTitan email security blocks spam as well as phishing and day-zero attacks, viruses, malware, ransomware, and other email threats. Helps control mail flow, clean it, and protect against unwanted email. We provide easy-to-use yet advanced email security for businesses, smbs and MSPs that are Office365 friendly. SpamTitan - Premium functionality included: • CEO Impersonation protection • Phishing/ Spear phishing protection • Link analysis • Full Sandboxing • Zero Day Attacks protection • Mail Spooling • Spoofing protection • Malware and Ransomware protection • SPF/DKIM/DMARC checking • Encryption • Fully multitenant environment • Ability to rebrand the entire UI • Full REST API: • Comprehensive support and set up docs Try a FREE, fully supported trial of SpamTitan Email Security today.
    Leader badge
    Starting Price: $2.14/user/month
  • 15
    Enigma Vault

    Enigma Vault

    Enigma Vault

    ...Enigma Vault takes care of all of the heavy liftings for you. Turn your lengthy and costly PCI audit into a simple SAQ. By storing tokens instead of sensitive card data, you greatly mitigate your security risk and PCI scope. Using modern methods and technologies, searching millions of encrypted values takes just milliseconds. Fully managed by us, we built a solution to scale with you and your needs. Enigma Vault encrypts and tokenizes data of all shapes and sizes. Enigma Vault offers true field-level protection; instead of storing sensitive data, you store a token. ...
  • 16
    Stream Security

    Stream Security

    Stream Security

    Stay ahead of exposure risks & threat actors with real-time detection of config change impacts and automated threat investigations fused to posture and all activities. Track all changes, and detect critical exposure and toxic combinations before attackers do. Leverage AI to effectively address and fix issues using your preferred methods. Utilize any of your preferred SOAR tools to respond in real time or use our suggested code snippets. Harden and prevent external exposure & lateral movement risks, focus on risks that are truly exploitable. Detect toxic combinations of posture and vulnerabilities. Detect gaps from segmentation intent and implement zero-trust. ...
    Starting Price: $8,000 per year
  • 17
    Prophaze WAF

    Prophaze WAF

    Prophaze Technologies

    Prophaze Cloud WAF protects organizations from malicious hackers who are trying to attack and steal data from Web Applications or Mobile App Gateways or APIs. Unlike traditional firewalls, Prophaze WAF exclusively protects web and mobile APIs from security breach using its Adaptive Profiling and Behavioral-based machine learning algorithms. The product is built natively on Kubernetes Platform and secures customers Kubernetes clusters and cloud infrastructure from various attack vectors.
    Starting Price: $299 per month
  • 18
    Quantum Armor

    Quantum Armor

    Silent Breach

    Your attack surface is the sum of every attack vector that can be used to breach your perimeter defenses. In other words, it is the total quantity of information you are exposing to the outside world. Typically, the larger the attack surface, the more opportunities hackers will have to find a weak link which they can then exploit to breach your network. Professional hackers typically follow the cyber kill chain when attacking a target, and surveying the target's attack surface is normally the very first step in this process; what is known as advanced reconnaissance. ...
    Starting Price: From $49/asset/month
  • 19
    Lightspin

    Lightspin

    Lightspin

    ...It correlates between the Kubernetes layer to the cloud layer and integrates seamlessly with your existing workflow. Get a rapid visual assessment of your cloud environment using known cloud vendor APIs, from the infrastructure level down to the single microservice level.
  • 20
    Cequence Security

    Cequence Security

    Cequence Security

    Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ...
  • 21
    Radiant Security

    Radiant Security

    Radiant Security

    ...Radiant’s AI-powered SOC co-pilot streamlines and automates tedious tasks in the SOC to boost analyst productivity, uncover real attacks through investigation, and enable analysts to respond more rapidly. Automatically inspect all elements of suspicious alerts using AI, then dynamically selects & performs dozens to hundreds of tests to determine if an alert is malicious. Analyze all malicious alerts to understand detected issues’ root causes and complete incident scope with all affected users, machines, applications, and more. Stitch together data sources like email, endpoint, network, and identity to follow attacks wherever they go, so nothing gets missed. ...
  • 22
    Netacea Bot Management
    At Netacea we understand bot behaviour better than anyone else, thanks to a pioneering server-side approach to detection and mitigation. Our approach guarantees quick and easy implementation of our technology and enables us to support a wide range of integrations. This ensures comprehensive coverage against malicious bots across your website, mobile apps and APIs, without detriment to your website infrastructure, reliance on hardware or disruptive code changes. We quickly distinguish automated bots from humans to prioritize genuine users, with our team of experts and revolutionary, machine learning powered Intent Analytics™ engine at the heart of the solution. ...
  • 23
    BooleBox

    BooleBox

    Boole Server

    ...Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability. With boolebox solutions, we protect your data wherever it is, at work, in the cloud, in transit via e-mail, in shared projects, and in the most commonly used platforms, such as Windows, Outlook, Gmail, OneDrive, and SharePoint. We understand your potential digital vulnerabilities, and we protect them like no one else can because our protection is the bodyguard of your data. It never abandons it and follows it everywhere! We protect large amounts of data in different types of business sectors. ...
  • 24
    FlashStart

    FlashStart

    FlashStart Group Srl

    FlashStart is a global, cloud-based cyber security platform that specializes in DNS filtering with the support of artificial intelligence. It protects against malware and unwanted contents by classifying domains into eighty-five categories, using machine learning with high predictive capability and incorporating government blacklists and warnings for high-risk sites. It offers global coverage, thanks to Anycast Network, which is among the fastest and most stable in the world. It presents advanced and exclusive features, like geographically based protection. Easy installation, centralized multi-tenant management, filter customization, and maximum cost-effectiveness make FlashStart the optimal cloud solution for businesses, PAs, schools, households, etc.
    Starting Price: $0.90/month
  • 25
    Sentra

    Sentra

    Sentra

    ...Sentra's data-centric approach is focused on securing your company's most valuable data. Automatically detect all managed and unmanaged cloud-native data stores. Sentra uses both existing and custom data recognition tools to identify sensitive cloud data. By leveraging data scanning technologies that are based on smart metadata clustering and data sampling, users can reduce cloud costs by three orders of magnitude compared to existing solutions. Sentra’s API-first and extensible classification easily integrates with your existing data catalogs and security tools. ...
  • 26
    Quadrant XDR

    Quadrant XDR

    Quadrant Information Security

    ...Hassle-free, fully-guided implementations allow your team to focus on other priorities. Experts, with years of experience, ready to serve as an extension of your team. Thorough investigation and analysis of the cause of the incident enable us to enhance your security with customized recommendations. We work closely with you from threat detection through validation, remediation, and post-incident management. We don't wait for trouble to emerge, actively hunting for threats and working to stay ahead. Quadrant's diverse security experts work relentlessly on your behalf, moving from better hunting to faster response and recovery, always communicating and collaborating.
  • 27
    Kaspersky Security Cloud
    ...Plus get personalized alerts & warnings sent straight to your devices to keep you safe. Take advantage of cloud-based security that keeps your devices fast and easy to use. Predict & fix issues with your hard drive by viewing metrics that report on its health. Manage storage space and battery life on your Android devices with specially built tools.
    Starting Price: $53.99 per year
  • 28
    Datto SaaS Protection

    Datto SaaS Protection

    Datto, a Kaseya company

    Reliably and securely backup Microsoft 365 and Google Workspace (formerly G Suite) to ensure critical programs used for business, email and docs are protected from every day downtime events and cyber threats. Datto SaaS Protection is a cloud-to-cloud backup solution built exclusively for MSPs, protecting thousands of businesses today. Datto SaaS Protection offers comprehensive backup, recovery and overall cyber resiliency for critical cloud data that lives in Microsoft 365 and Google Workspace applications. ...
  • 29
    Tricent

    Tricent

    Tricent

    ... 🔍 Unparalleled Insights: From day one, gain a comprehensive overview of all files shared and permissions granted—across both personal drives and shared drives. ⭕️ Bulk Remediation Made Simple: Our admin-friendly cleanup tools allow you to tackle file sprawl efficiently. 😇 Empowering End-Users Responsibly: We use automation to involve your employees in the cleanup process. . 💪🏼 Customizable Governance Policies: Set different cycles for different user groups 🔮 Stay Ahead with Abnormality Detection: Our machine learning feature keeps you informed, detecting anomalies before they escalate *Only Google Workspace
    Starting Price: €18/year/user
  • 30
    Intruder

    Intruder

    Intruder

    ...Intruder’s cloud-based vulnerability scanner discovers security weaknesses across your digital estate. Offering industry-leading security checks, continuous monitoring and an easy-to-use platform, Intruder keeps businesses of all sizes safe from hackers. Receive actionable results prioritised by context. Intruder interprets raw data received from leading scanning engines, so you can focus on the issues which truly matter, such as exposed databases.‍ Intruder's high-quality reports help you sail through customer security questionnaires, and make compliance audits like SOC2, ISO27001, and Cyber Essentials a breeze.
  • Previous
  • You're on page 1
  • 2
  • Next