Results for: using class net.sourceforge.jtds.jdbc.driver - Page 4

Suggested Categories:

Driver Update Software
Driver update software helps users automatically scan their computer’s hardware to ensure that the most up-to-date drivers are installed. These platforms can detect outdated, missing, or incompatible drivers and allow users to easily download and install the latest versions directly from the manufacturer’s database. By using driver update software, users can optimize system performance, prevent hardware malfunctions, and improve device compatibility. The software typically automates the process of scanning for driver updates and can be set to run on a schedule, ensuring that the system stays up to date with minimal effort. This helps reduce errors and enhances overall system efficiency.
Class Registration Software
Class registration software facilitates the process of scheduling, managing and registering to classes in educational, recreational and training programs.
AI Computer Use Agents (CUA) Software
AI Computer Use Agents (CUAs) are advanced AI systems that enable machines to interact with computer environments in a human-like manner. Unlike traditional AI models that rely on APIs, CUAs can navigate graphical user interfaces (GUIs), perform tasks such as clicking buttons, typing text, and scrolling, effectively operating software applications as a human would. This capability allows CUAs to automate complex workflows across various platforms without the need for specialized integrations.
NPS Software
NPS software helps businesses measure customer loyalty by collecting and analyzing Net Promoter Score (NPS) feedback. It automates the process of sending surveys, tracking responses, and segmenting promoters, passives, and detractors. Many platforms include real-time dashboards, sentiment analysis, and trend reporting to help teams understand customer satisfaction over time. The software also integrates with CRM and support systems to trigger follow-ups and improve customer retention. Overall, NPS software enables companies to monitor customer sentiment, respond to issues quickly, and strengthen long-term relationships.
Driving School Software
Driving school software helps driving schools manage their day-to-day operations, from scheduling lessons and tracking student progress to handling payments and generating reports. These platforms typically include features like booking systems, instructor management, student records, and curriculum tracking to streamline administrative tasks. Driving school software can also assist with managing compliance and certifications, ensuring that students complete the required training and exams. Additionally, many systems offer communication tools to keep students and instructors informed, along with billing and invoicing capabilities. By using driving school software, driving schools can improve efficiency, enhance the learning experience, and provide better customer service.
IoT Software
Internet of Things (IoT) software is a form of technology that allows for connected devices to communicate with each other over the internet. It generally consists of various hardware and software components such as sensors, wireless networks, and databases. With the help of IoT software, data can be collected from multiple sources for further analysis and it can also be used to control devices remotely. IoT software also offers advantages such as improved efficiency and better security for connected devices.
Logbook Software
Logbook software is software to record and track operational activities, such as vehicle usage, maintenance, and employee tasks. It enables users to maintain accurate logs for compliance, efficiency, and record-keeping purposes. The software typically supports features like automated entries, customizable templates, and real-time data entry, making it easier to manage day-to-day operations. It is commonly used in industries like transportation, fleet management, and equipment maintenance. Logbook software helps organizations streamline processes, reduce errors, and improve overall operational oversight.
Gymnastics Software
Gymnastics software is software for gymnastics clubs, coaches, and organizations to manage their operations, training, and competitions. These platforms often include features like scheduling, attendance tracking, athlete management, progress tracking, and score management for competitions. Gymnastics software can help coaches create personalized training plans, monitor skill development, and track individual athlete performance over time. Additionally, the software may offer tools for registration, payment processing, and communication with athletes and parents. It streamlines administrative tasks, improves organization, and enhances the overall experience for athletes and coaches.
Neural Network Software
Neural network software uses algorithms to simulate the human brain's ability to recognize patterns. It can be used for a variety of purposes, such as image and voice recognition, natural language processing, and decision making. The software is typically composed of a number of layers that contain parameters which are adjusted through training. Finally, it can be applied in various areas such as healthcare, finance, engineering and more.
Virtual Classroom Software
Virtual classroom software is designed to provide teachers and students with a virtual platform that serves as an online learning environment for hosting classes remotely.
Yoga Studio Software
Yoga studio software enables yoga studio owners and instructors to manage their studio's day-to-day operations, enhance client engagement, and streamline administrative tasks. These platforms typically include features for class scheduling, client booking, payment processing, membership management, and attendance tracking. Yoga studio software also offers tools for managing instructor schedules, tracking client progress, and sending reminders or promotions to clients. Many platforms integrate with mobile apps to allow clients to book classes, track their attendance, and receive updates directly from their phones. This software helps yoga studios improve efficiency and client satisfaction while simplifying business management.
Emissions Management Software
Emissions management software helps organizations monitor, track, and report their greenhouse gas emissions and environmental impact to comply with regulations and support sustainability goals. It collects data from various sources such as energy use, transportation, and industrial processes, providing analytics to identify emission trends and reduction opportunities. The software often includes tools for regulatory reporting, carbon accounting, and scenario modeling to help businesses plan and implement emission reduction strategies. By automating data collection and reporting, it improves accuracy, transparency, and decision-making. Ultimately, emissions management software supports organizations in minimizing their carbon footprint and enhancing environmental responsibility.
Camp Management Software
Camp management software is software designed to streamline the administration and operations of camps, including summer camps, day camps, and specialized retreats. It helps organizers manage registrations, payments, scheduling, and communication with campers and staff in one centralized platform. Many systems offer features like camper check-in/check-out, health record tracking, and automated billing to enhance efficiency and safety. Integrated communication tools allow for easy updates and notifications to parents, staff, and campers. By automating repetitive tasks, camp management software saves time, reduces errors, and improves the overall experience for both administrators and attendees.
Virtual Fitting Software
Virtual fitting software allows apparel and fashion retailers and ecommerce stores to offer online shoppers with a virtual fitting room so that the customer can try on clothing and accessories virtually, to see how they might look, and so that they can choose the correct size. eCommerce retailers that use virtual fitting rooms get more conversions and sales, and less returns, because customers are more confident in their size and purchase.
Parks and Recreation Software
Parks and recreation software helps municipalities, community centers, and parks departments manage facilities, programs, and public services. It supports scheduling for classes, camps, sports leagues, and events while handling registrations, payments, and waitlists. Many platforms include facility booking, membership management, and staff scheduling to streamline daily operations. The software often provides online portals for residents to register for activities, reserve spaces, and access community updates. Overall, parks and recreation software improves efficiency, enhances community engagement, and helps local agencies deliver better recreational services.
Land Management Software
Land management software helps organizations, governments, and landowners efficiently manage property assets, land use, and related data throughout the land lifecycle. It centralizes information on ownership, leases, boundaries, zoning, resources, and environmental factors in one digital platform. These systems often integrate with GIS (Geographic Information Systems), mapping tools, and satellite data for visualization and spatial analysis. Land management software supports decision-making in areas such as real estate, agriculture, mining, utilities, and conservation by improving accuracy, compliance, and resource allocation. By digitizing land records and automating administrative workflows, it enhances transparency, sustainability, and long-term land stewardship.
Route Planning Software
Route planning software helps businesses and individuals create the most efficient routes for transportation or delivery purposes. These systems analyze variables such as distance, traffic conditions, time windows, vehicle capacity, and stop locations to generate optimal routes, reducing fuel costs and improving overall efficiency. Many route planning tools also offer real-time tracking, allowing fleet managers to adjust routes based on live data or unforeseen circumstances. In addition to logistical uses, this software can enhance customer satisfaction by ensuring timely deliveries and improved service. Industries such as delivery, field services, and public transportation commonly use route planning software to streamline operations and improve productivity.
Delivery Management Software
Delivery management software helps businesses and restaurants streamline and automate the process of managing deliveries, from dispatch to final delivery. It provides real-time tracking, route optimization, and communication tools, enabling efficient coordination between drivers, dispatchers, and customers. The software often includes features like electronic proof of delivery, delivery status updates, and performance analytics, ensuring timely deliveries and improved customer satisfaction. By reducing manual processes and improving delivery logistics, businesses can optimize fuel usage, reduce delays, and increase overall operational efficiency. Ultimately, delivery management software enhances service quality, reduces costs, and provides greater visibility and control over the delivery process.
School Bus Routing Software
School bus routing software helps schools optimize and manage the transportation of students by creating efficient bus routes. These systems use various data inputs such as student locations, school zones, traffic patterns, and time constraints to generate routes that minimize travel time and costs. In addition to route planning, the software often includes features like real-time bus tracking, automated notifications for parents and schools, and integration with student databases for better organization. It can also help reduce fuel consumption and improve overall fleet management by optimizing the number of buses needed. This software ensures that students are safely and efficiently transported to and from school while maintaining regulatory compliance.
Continuing Education Software
Continuing education software provides a learning management system (LMS) designed for continuous education, and tools to streamline the tracking and management of post-secondary continuing education programs and credits.
View more categories (20) for "using class net.sourceforge.jtds.jdbc.driver"

227 Products for "using class net.sourceforge.jtds.jdbc.driver" with 2 filters applied:

  • 1
    GlitchSecure

    GlitchSecure

    GlitchSecure

    ...Our dedicated team of experts works with you to properly scope and review your applications, APIs, and networks to ensure in-depth testing coverage all year. Let us help you sleep better at night.
    Starting Price: $6,600 per year
  • 2
    SpamTitan

    SpamTitan

    TitanHQ

    ...SpamTitan email security blocks spam as well as phishing and day-zero attacks, viruses, malware, ransomware, and other email threats. Helps control mail flow, clean it, and protect against unwanted email. We provide easy-to-use yet advanced email security for businesses, smbs and MSPs that are Office365 friendly. SpamTitan - Premium functionality included: • CEO Impersonation protection • Phishing/ Spear phishing protection • Link analysis • Full Sandboxing • Zero Day Attacks protection • Mail Spooling • Spoofing protection • Malware and Ransomware protection • SPF/DKIM/DMARC checking • Encryption • Fully multitenant environment • Ability to rebrand the entire UI • Full REST API: • Comprehensive support and set up docs Try a FREE, fully supported trial of SpamTitan Email Security today.
    Leader badge
    Starting Price: $2.14/user/month
  • 3
    Spambrella

    Spambrella

    Spambrella

    ...Leverage big-data analysis to accurately classify bulk mail. All within a single service that connects with Microsoft 365 and Google Workspace. Spambrella’s Email Security and User Awareness Training technology is used by some of the World’s largest and most successful security-conscious companies in a multitude of continents and environments. Delivered on a global scale, Spambrella is ready to unify your email security and user awareness training requirements. Think of us as your outsourced email security team! We have deep technical expertise of all other service providers such as MxLogic, Mimecast, Symantec.cloud and know how to migrate you effortlessly. ...
    Starting Price: $1.00
  • 4
    CyberStrong

    CyberStrong

    CyberSaint Security

    CISOs of the Fortune 500 rely on CyberSaint's CyberStrong platform to achieve real-time cyber and IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, and executive reports to build cyber resilience through measurement and improved communication. Patented AI and ML automation eliminate manual effort, saving enterprises millions annually. The platform aligns cyber and business risk for faster, informed decision-making. Enterprises use CyberStrong as a competitive differentiator, mitigating even the most unprecedented risks while automating assessments across frameworks. ...
  • 5
    IRI DarkShield

    IRI DarkShield

    IRI, The CoSort Company

    ...DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.
    Starting Price: $5000
  • 6
    Enigma Vault

    Enigma Vault

    Enigma Vault

    ...Enigma Vault takes care of all of the heavy liftings for you. Turn your lengthy and costly PCI audit into a simple SAQ. By storing tokens instead of sensitive card data, you greatly mitigate your security risk and PCI scope. Using modern methods and technologies, searching millions of encrypted values takes just milliseconds. Fully managed by us, we built a solution to scale with you and your needs. Enigma Vault encrypts and tokenizes data of all shapes and sizes. Enigma Vault offers true field-level protection; instead of storing sensitive data, you store a token. ...
  • 7
    SecureStack

    SecureStack

    SecureStack

    ...We help you decompose your web application so you are aware of all the resources your app is using behind the scenes.
    Starting Price: $500/mo
  • 8
    Defendify

    Defendify

    Defendify

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers of protection, Defendify provides an easy-to-use platform designed to strengthen cybersecurity across people, process, and technology, continuously. Defendify streamlines cybersecurity assessments, testing, policies, training, detection, response, and containment in one consolidated and cost-effective cybersecurity solution. 3 layers, 13 solutions, 1 platform, including: • Managed Detection & Response • Cyber Incident Response Plan • Cybersecurity Threat Alerts • Phishing Simulations • Cybersecurity Awareness Training • Cybersecurity Awareness Videos • Cybersecurity Awareness Posters & Graphics • Technology Acceptable Use Policy • Cybersecurity Risk Assessments • Penetration Testing • Vulnerability Scanning • Compromised Password Scanning • Website Security Scanning
    Starting Price: $0
  • 9
    Vectra AI
    ...Today’s cyberattacks will use any means of entry, so we provide a single platform to cover cloud, data center, enterprise networks, and IoT devices, not just critical assets. The Vectra NDR platform is the ultimate AI-powered cyberattack detection and threat-hunting platform.
  • 10
    Stream Security

    Stream Security

    Stream Security

    Stay ahead of exposure risks & threat actors with real-time detection of config change impacts and automated threat investigations fused to posture and all activities. Track all changes, and detect critical exposure and toxic combinations before attackers do. Leverage AI to effectively address and fix issues using your preferred methods. Utilize any of your preferred SOAR tools to respond in real time or use our suggested code snippets. Harden and prevent external exposure & lateral movement risks, focus on risks that are truly exploitable. Detect toxic combinations of posture and vulnerabilities. Detect gaps from segmentation intent and implement zero-trust. ...
    Starting Price: $8,000 per year
  • 11
    Securiti

    Securiti

    Securiti

    ...For more information, please follow us on LinkedIn and visit Securiti.ai.
  • 12
    CyberEasy
    ...Your IT and Information security team are under enormous pressure to protect the Network from external attack and prevent your data from being stolen because of internal/staff errors. CyberEasy puts the power in your hands to be in control of your environment and reduce the cost. We want to democratize Cyber Security by making it simple to use and affordable for literally any budget.
    Starting Price: $7 per user per month
  • 13
    Polymorphing

    Polymorphing

    Polyverse

    Polyverse is a leading provider of zero-trust software cybersecurity solutions. Its Polymorphing technology protects against the most sophisticated attacks, even on unpatched and legacy systems. Used by governments and security-conscious organizations worldwide, Polyverse protects against memory exploits, script injections, supply-chain attacks and the like anywhere Linux runs, from devices to the cloud. CNBC has named Polyverse as one of the world’s top 100 startups. For more information, contact info@polyverse.com.
  • 14
    Jericho Security

    Jericho Security

    Jericho Security

    ...Run hyper-realistic, scarily personalized attack simulations in just a few clicks. Phishing attacks are responsible for more than 80% of reported security incidents an about 90% of data breaches. Replicate techniques used by today's attackers to help your people spot and stop AI-generated threats, With tests and training materials tailored to each team member we help you increase cyber security efficiency.
  • 15
    Hysolate

    Hysolate

    Hysolate

    ...Hysolate is a software platform that enables locally deploying and remotely managing virtual, secured, environments on a single endpoint, with a unified and seamless user experience. Using Hysolate, organizations can implement strong OS-based isolation to secure corporate access, while unlocking user productivity. Allow employees to browse the web, install apps, and download files without compromising corporate security. Enable employees and 3rd parties to securely access corporate applications and data on unmanaged devices. ...
  • 16
    Prophaze WAF

    Prophaze WAF

    Prophaze Technologies

    Prophaze Cloud WAF protects organizations from malicious hackers who are trying to attack and steal data from Web Applications or Mobile App Gateways or APIs. Unlike traditional firewalls, Prophaze WAF exclusively protects web and mobile APIs from security breach using its Adaptive Profiling and Behavioral-based machine learning algorithms. The product is built natively on Kubernetes Platform and secures customers Kubernetes clusters and cloud infrastructure from various attack vectors.
    Starting Price: $299 per month
  • 17
    Cyclops

    Cyclops

    Cyclops Security

    Prioritizing risk is one of the biggest challenges in cyber security, our innovative solution creates a business context for your security operations, allowing you to validate the effectiveness of your security controls in the context of your unique business requirements. Cyclops integrates with your existing security tools using the CSMA approach to gather metadata on threats, vulnerabilities, cloud instances, SaaS apps, and more. It then enriches this data with context and insights by looking at the same entities in different products that are integrated. By providing this contextualized approach to risk validation, our cybersecurity mesh product helps you make intelligent decisions and focus on what really matters.
  • 18
    Code42

    Code42

    Code42

    Welcome to data security for the collaborative and remote enterprise. Validate proper use of sanctioned collaboration tools, such as Slack and OneDrive. Uncover Shadow IT applications that may indicate gaps in corporate tools or training. Gain visibility into off-network file activity, such as web uploads and cloud sync apps. Quickly detect, investigate and respond to data exfiltration by remote employees. Receive activity alerts based on file type, size or count.
  • 19
    Oleria

    Oleria

    Oleria Security

    ...With Oleria, the right people get access to what they need, when they need it, and only for as long as they need it. By operators, for operators. Our founders have led security at some of the world’s largest tech companies, developing security platforms used by billions of people every day. We’re at the forefront of emerging security trends. Oleria frees organizations to pursue their best ideas, removing the barriers that keep team members from collaborating easily and securely. With Oleria, your business thrives as you protect the data and people you connect with.
  • 20
    Quantum Armor

    Quantum Armor

    Silent Breach

    Your attack surface is the sum of every attack vector that can be used to breach your perimeter defenses. In other words, it is the total quantity of information you are exposing to the outside world. Typically, the larger the attack surface, the more opportunities hackers will have to find a weak link which they can then exploit to breach your network. Professional hackers typically follow the cyber kill chain when attacking a target, and surveying the target's attack surface is normally the very first step in this process; what is known as advanced reconnaissance. ...
    Starting Price: From $49/asset/month
  • 21
    Amazon Macie
    Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS. As organizations manage growing volumes of data, identifying and protecting their sensitive data at scale can become increasingly complex, expensive, and time-consuming. Amazon Macie automates the discovery of sensitive data at scale and lowers the cost of protecting your data.
  • 22
    Sevren

    Sevren

    Sevren

    AppSec Policy as Code. Sevren programmatically consolidates all available development-environment data and uses this to provide visibility-into and automatic orchestration-of the SecDLC with a next generation ‘policy-as-code solution. AppSec Visibility at Scale. Without visibility, you have no data; without good data, good security decisions cannot be made - making intelligent-automation a non-starter. Severn enables and maintains scalable visibility into the development environment, in real time. ...
  • 23
    HEROIC Unified Cybersecurity Platform
    Protect your organization from credential-stuffing attacks and third-party data breaches. Hundreds of billions of records, including email addresses, user credentials, and passwords, have been breached. Hackers use these records to brute-force their way into organizations’ systems and networks to carry out targeted attacks. HEROIC EPIC is an Identity Breach Intelligence Platform™ that discovers and prevents credential stuffing and account takeover attacks
  • 24
    Modat Magnify
    Founded in 2024, Modat is a European, research-driven, privacy-aware cybersecurity company focused on strengthening resilience for individuals, companies, and governments. Our flagship platform, Modat Magnify, accelerates threat intelligence by precisely identifying, monitoring, and tracking internet-connected infrastructure. Using the world’s largest Internet device dataset, we fingerprint and catalog devices, creating unique profiles that enable proactive security. Designed for both offensive and defensive operations, Magnify combines speed, accuracy, and usability through an intuitive interface built on real-world security expertise. By delivering contextualized data and predictive insights, Modat empowers the security community to outpace threats and close the growing gap between attacks and resilience. ...
    Starting Price: €18
  • 25
    BeyondTrust Password Safe
    ...Store, manage and rotate privileged account passwords, eliminating embedded credentials and ensuring password strength. Log and monitor all privileged credential activity and sessions for compliance and forensic review. Use Password Safe to get finely-tuned and automatic password management and privilege approval controls, detailed session management (including real-time monitoring), and all the audit trail information and forensics needed to meet compliance requirements. Automatically discover and onboard accounts. Store, manage and rotate privileged passwords, eliminating embedded credentials in scripts and code. ...
  • 26
    Kaymera

    Kaymera

    Kaymera Technologies

    ...Backed by talented security researchers, developers, and devoted team members, we create a great environment for professional and personal growth, as well as build a solid product. Protecting companies & individuals, and securing their private and business assets from damaging cyber attacks to keep their daily operations running smoothly. We use data-driven and innovative approach to mobile security, and ensure secure communications to protect our clients’ business interests. Our success lies in the trust and long-term reliable business relationships we build with our partners.
  • 27
    Splunk SOAR
    ...The platform also offers advanced analytics, real-time threat intelligence, and collaboration tools to enhance decision-making and improve overall security posture. By automating routine tasks and enabling more efficient use of resources, Splunk SOAR helps organizations respond to threats with greater speed and accuracy, minimizing risks and enhancing cybersecurity resilience.
  • 28
    FortiAnalyzer
    ...In addition, the challenges of complex and fragmented infrastructures continue to enable a rise in cyber events and data breaches. Assorted point security products in use at some enterprises typically operate in silos, obscuring network and security operations teams from having clear and consistent insight into what is happening across the organization. An integrated security architecture with analytics and automation capabilities can address and dramatically improve visibility and automation. As part of the Fortinet Security Fabric, FortiAnalyzer provides security fabric analytics and automation to provide better detection and response against cyber risks.
  • 29
    MetaDefender Vault
    Transferring files into and out of any environment exposes systems to breach and infection. Portable media are often used to conduct these transfers, bypassing security protocols. MetaDefender Vault is a secure file storage and retrieval solution that protects critical data and keeps threats at bay. It limits access within an organization and provides important tracking and auditing information. Prevent zero-day attacks and ensure your organization can handle false negatives through a variety of options. ...
  • 30
    Cyberoo

    Cyberoo

    CYBEROO

    ...Cyber Security A new multi-layer security model to defend your business perimeter at 360°. A competent and specialized I-SOC, active 24/7/365. A simple and clear service. Smart monitoring We use artificial intelligence in order to automate the detection of anomalies and to identify their cause. We prevent the inefficiencies in your infrastructure, your services and applications. We reduce the management cost of the above mentioned. Managed Services We offer a vast selection of managed services, in order to let our clients compose their personal offer, based on the needs of their IT infrastructure. ...