Suggested Categories:

Web Servers
Web servers, also known as HTTP servers, are servers that host websites and web applications. Web servers are the backbone of all sites and web apps on the internet. Many popular web servers are open source. Different web servers have advantages and disadvantages when compared to one another, and selecting the right one depends on use case, deployment, operating system, and more.
Application Server Software
Application server software provides a platform for deploying, managing, and running applications, typically for web or enterprise environments. These servers handle the backend logic of applications, facilitating the connection between client devices and databases or other services. Application servers often provide middleware services such as security, transaction management, and messaging, enabling the smooth execution of applications. They are designed to support multiple users simultaneously and ensure high availability, scalability, and performance of applications. This software is commonly used in environments where complex, data-intensive applications are developed, such as in e-commerce platforms, enterprise resource planning (ERP), and customer relationship management (CRM) systems.
Proxy Servers
Proxy servers act as intermediaries between a user's device and the internet, routing online requests through an external server. They mask the user's IP address, enhancing privacy, anonymity, and security while browsing. Proxy servers are commonly used for web scraping, content access control, and bypassing geo-restrictions on region-locked websites. They can be categorized into different types, including data center proxies, residential proxies, ISP proxies, and mobile proxies, each with distinct features and use cases. By filtering, caching, and encrypting data, proxy servers improve browsing speed, reduce bandwidth usage, and protect users from online threats.
Server Backup Software
Server backup software provides tools for backing up and restoring server data to ensure business continuity in the event of data loss, hardware failure, or disaster. These solutions typically offer automated backup schedules, incremental or full backups, and the ability to store data both locally and in cloud storage for redundancy. Server backup software helps businesses secure critical data, including system configurations, files, applications, and databases, enabling quick recovery. Many solutions include features such as encryption, compression, and deduplication to optimize storage usage and enhance security. With robust disaster recovery options, these tools are essential for maintaining uptime and minimizing the impact of unexpected data loss.
Server Monitoring Software
Server monitoring software helps IT administrators track the performance, health, and availability of servers in real-time. These tools collect and display critical data on server resources such as CPU usage, memory consumption, disk space, and network traffic. By setting alerts for anomalies or performance degradation, server monitoring software helps prevent downtime and ensures servers run optimally. It often includes features like log management, automated reporting, and integration with other IT management tools. These solutions are essential for identifying potential issues early and maintaining the reliability of both on-premises and cloud-based server environments.
Dedicated Server Hosting
Dedicated server hosting provides clients with an entire physical server dedicated solely to their needs, offering full control over hardware resources and configuration. This hosting solution is ideal for high-traffic websites, applications, or services that require significant computing power, stability, and performance. Unlike shared hosting, where multiple users share the same server, dedicated hosting ensures that all resources (such as CPU, RAM, and storage) are allocated to a single user or organization. Clients can often choose between managed or unmanaged hosting, with managed services offering additional support like security updates and monitoring. This type of hosting is often used by businesses, ecommerce sites, or large-scale applications that need maximum uptime and customization.
DNS Servers
DNS servers, short for Domain Name System servers, are public servers that provide a protocol that connects domain names to IP addresses so that web browsers and users are able to navigate to a website using a domain name instead of an IP address. Different free and public DNS servers offer varying degrees of speed and performance. Switching from an ISP's default DNS server to a public DNS server can provide enhanced page load speed and security.
Server Management Software
Server management software provides tools and utilities for managing, monitoring, and maintaining servers in a network environment. These solutions enable administrators to configure servers, track their performance, deploy updates, and troubleshoot issues. Server management software often includes features such as system health monitoring, automated patch management, remote access, and backup solutions. By streamlining administrative tasks and improving the efficiency of server operations, these tools help minimize downtime and ensure optimal performance. They are commonly used by IT professionals to manage both on-premises and cloud-based infrastructure.
Server Virtualization Software
Server virtualization software is a form of technology that allows multiple virtualized operating systems to be hosted on the same physical server. This software helps businesses increase their resource utilization and reduce their operational costs by consolidating their IT infrastructure. It also enables them to better manage their server resources and workloads, as well as quickly deploy new servers in support of specific applications. Additionally, this type of software simplifies the process of maintaining and troubleshooting hardware-related issues.
SQL Server Software
SQL server software is a relational database management system (RDBMS) that allows businesses to store, manage, and retrieve data in structured formats using Structured Query Language (SQL). These platforms provide a robust and scalable solution for handling large volumes of data, enabling users to create, read, update, and delete data within relational databases. SQL server software includes features for data storage, transaction management, data security, backup, and performance optimization, ensuring data integrity and availability. It supports a range of applications from small businesses to enterprise-level solutions, offering integration with other business tools and systems. SQL server software is often used in applications requiring high-performance data storage, reporting, and analytics capabilities.
Ad Server Software
Ad server software is a platform that manages and delivers advertisements across various digital properties, such as websites, mobile apps, and other online channels. It allows advertisers and publishers to target specific audiences, optimize ad placement, and track campaign performance. Ad servers facilitate the automation of ad delivery, ensuring that the right ads reach the right users at the right time. These platforms also offer features like real-time bidding, reporting, and analytics to assess the effectiveness of campaigns and maximize revenue. By managing creative assets, user targeting, and performance metrics, ad server software streamlines the ad-serving process for both advertisers and publishers.
Fax Server Software
Fax server software is a solution that allows businesses to send and receive faxes electronically through a network, rather than relying on traditional fax machines. It integrates with existing IT infrastructure, enabling users to send faxes from their computers, email, or other digital devices. Fax server software typically supports features such as document routing, storage, and forwarding, along with features like fax-to-email or email-to-fax capabilities. It helps streamline communication, reduce paper usage, and improve fax management by allowing organizations to centralize and automate fax workflows. Additionally, fax server software can ensure compliance with regulations like HIPAA, where secure transmission of sensitive information is required.
Web to Print Software
Web-to-print software allows businesses and individuals to design, customize, and order printed materials online, streamlining the print procurement process. These platforms provide an interface for customers to upload designs, choose templates, and customize various print products, such as business cards, brochures, banners, and promotional materials. Web-to-print software often integrates with e-commerce platforms, enabling businesses to offer a seamless online ordering experience. It also includes features for managing print jobs, proofing, payment processing, and fulfillment tracking. By using web-to-print software, printing companies can improve workflow efficiency, reduce production errors, and offer a more convenient service to their customers.
Web Conferencing Software
Web conferencing software allows remote users to connect with each other via real-time audio and video. It is usually used to share documents, audio or video chat, or present slideshows during the meeting. Web conferencing software can be used to facilitate remote meetings, training sessions, webinars, and other online collaborations.
Web Design Software
Web design software enables users to create, design, and publish websites without needing extensive coding knowledge. These tools offer visual editors, templates, and drag-and-drop functionality to build attractive and responsive web pages quickly. Many platforms include features like SEO optimization, multimedia integration, and e-commerce support to enhance site performance and user engagement. Web design software often integrates with content management systems to facilitate easy updates and content publishing. Ultimately, it empowers individuals and businesses to establish a professional online presence with less technical effort.
Web Analytics Software
Web analytics software is a type of software that enables businesses track, measure, and analyze the behavior of visitors on their websites. These platforms provide insights into key metrics such as page views, traffic sources, user demographics, conversion rates, and bounce rates. Web analytics software allows organizations to optimize their websites by identifying areas for improvement, understanding user preferences, and measuring the effectiveness of marketing campaigns. It also helps businesses make data-driven decisions to improve user experience, increase website performance, and drive more conversions.
Web Browsers
Web browsers are software applications that enable users to access and interact with websites and other content on the internet. These platforms retrieve, display, and render web pages, allowing users to view text, images, videos, and other multimedia elements. Web browsers typically include features like tabs for managing multiple pages, bookmarking for quick access to favorite sites, browsing history, and privacy options to enhance security. They may also support extensions and plugins to add additional functionality, such as ad-blocking, enhanced security, or content management.
Web Application Firewalls (WAF)
Web Application Firewalls (WAFs) are security solutions that protect web applications by filtering and monitoring HTTP traffic between the application and the internet. They detect and block threats such as SQL injections, cross-site scripting (XSS), and other common attacks targeting application vulnerabilities. WAFs analyze incoming requests in real time, applying customizable security rules to distinguish between legitimate and potentially malicious traffic. Many WAFs are cloud-based, enabling flexible and scalable protection without impacting application performance. By acting as a shield between web applications and attackers, WAFs help ensure data security, regulatory compliance, and uninterrupted user access.
Web Hosting Providers
Web hosting providers are companies that provide online services and technologies necessary to host websites. They offer a wide variety of packages tailored to the needs of different types of customers, from small businesses to large enterprises. These services generally include server maintenance, software updates, customer support, and uptime monitoring.
Bare Metal Server Providers
Bare metal server providers offer physical servers dedicated solely to a client, with no shared resources. These servers are often used for workloads requiring high performance, customization, or full control over hardware configurations. Bare metal servers typically provide greater reliability and performance compared to virtualized environments since they aren't affected by the "noisy neighbor" issue of shared resources. Clients can choose from a variety of configurations and typically have the option to install their preferred operating systems and software. This type of hosting is particularly ideal for resource-intensive applications such as databases, gaming, and large-scale enterprise applications.
View more categories (20) for "web server php perl python"
  • 1
    WebScanner

    WebScanner

    DefenseCode

    ...Scanner supports major web technologies such as HTML, HTML5, Web 2.0, AJAX/jQuery, JavaScript and Flash. It is designed to execute more than 5000 Common Vulnerabilities and Exposures tests for various web server and web technology vulnerabilities. WebScanner is capable of discovering more than 60 different vulnerability types (SQL Injection, Cross Site Scripting, Path Traversal, etc.), including OWASP Top 10.
  • 2
    OpenText Fortify WebInspect
    Find and fix exploitable web application vulnerabilities with automated dynamic application security testing. Detect exploitable vulnerabilities in web applications and APIs using fast, integrated, and automated dynamic analysis. Support for the latest web technologies and pre-configured policies for major compliance regulations. Powerful scanning integrations that enable API and single-page application testing at scale. Automation and workflow integrations help to meet the needs of Dev...
  • 3
    K2 Security Platform

    K2 Security Platform

    K2 Cyber Security

    Complete Protection for Applications and Container Workloads. Real-time Zero Day Attack Prevention. The K2 Security Platform is highly effective at detecting increasingly sophisticated attacks targeting applications that often go undetected by network and end point security solutions such as web application firewall (WAF) and endpoint detection and response (EDR). K2’s easy to deploy non-invasive agent installs in minutes. Using a deterministic technique of optimized control flow integrity...
  • 4
    Sparrow DAST
    Dynamic application security testing solution that provides powerful analytics and high usability. Web application analysis using the latest technologies including HTML5, and Ajax. Reproduce vulnerability attack process by event. Automatically crawls subdirectories information from a web application’s URL. Detect security vulnerabilities from crawled URLs. Open source web library vulnerability analysis. Interaction with Sparrow’s analytic solutions to overcome the limitation of conventional...
  • 5
    OWASP ZAP
    OWASP ZAP (Zed Attack Proxy) is a free, open-source penetration testing tool being maintained under the umbrella of the Open Web Application Security Project (OWASP). ZAP is designed specifically for testing web applications and is both flexible and extensible. At its core, ZAP is what is known as a “man-in-the-middle proxy.” It stands between the tester’s browser and the web application so that it can intercept and inspect messages sent between browser and web application, modify the contents...
  • 6
    Syhunt Hybrid
    Syhunt dynamically injects data in web applications and analyzes the application response to determine if the application code is vulnerable, automating the web application security testing and proactively guarding your organization's Web infrastructure against several kinds of web application security threats. Syhunt Hybrid follows simple GUI standards, prioritizing ease of use and automation and thus requiring minimal to no user intervention before or during scans despite a large number...
  • 7
    fAST Dynamic

    fAST Dynamic

    Black Duck

    fAST Dynamic is a dynamic application security testing (DAST) solution integrated into the Black Duck Polaris™ Platform, designed to streamline security assessments for modern web applications. It simplifies the execution of comprehensive security scans, eliminating the need for complex setups or in-depth security knowledge. fAST Dynamic intelligently navigates and analyzes web applications, reducing the need for extensive manual input and specialized expertise, ensuring comprehensive coverage...
  • 8
    InsightAppSec
    Highest rated DAST solution by an independent research firm three years in a row. Automatically assess modern web apps and APIs with fewer false positives and missed vulnerabilities. Fast-track fixes with rich reporting and integrations, and inform compliance and development stakeholders. Effectively manage the security assessment of your application portfolio, regardless of its size. Automatically crawl and assess web applications to identify vulnerabilities like SQL Injection, XSS, and CSRF...
    Starting Price: $2000 per app per year
  • 9
    Continuous Dynamic
    Continuous Dynamic™ is a cloud-based dynamic application security testing (DAST) solution that enables organizations to rapidly identify and address vulnerabilities in their web applications. Designed for scalability, it can concurrently assess thousands of websites without impacting performance. The platform offers continuous, authenticated scanning, including support for multifactor authentication, ensuring comprehensive coverage of application security. By combining automated and manual...
  • 10
    Promon INSIGHT
    Take back control of your applications by monitoring and detecting mobile threats. With Promon INSIGHT™ you can securely monitor, detect and respond quickly to known and unknown threats. The data reporting is intended for collecting reports about the app’s runtime environment and specific threats to the security of the application. Promon INSIGHT™ gives you crucial time to react to emerging threats. With the ability to silently report back to servers, hackers performing targeted attacks won...
  • 11
    Invicti

    Invicti

    Invicti Security

    ... the vulnerabilities that really matter. Combining dynamic with interactive testing (DAST + IAST) and software composition analysis (SCA), Invicti scans every corner of an app to find what other tools miss. With asset discovery, it's easier to discover all web assets — even ones that are lost, forgotten, or created by rogue departments. Through tried-and-true methods, Invicti helps DevSecOps teams get ahead of their workloads to hit critical deadlines, improve processes, and communicate more effectively.
  • 12
    Acunetix

    Acunetix

    Invicti Security

    As the market leader in automated web application security testing, Acunetix by Invicti is the go-to security tool for Fortune 500 companies. DevSecOps teams can cut through the noise to uncover unseen risks and mitigate dangerous exploits, detecting and reporting on a wide array of vulnerabilities. With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight...
  • 13
    HTTPCS Security
    Whether you have a showcase site, an e-commerce site or a SaaS application, each module will protect you efficiently against the IT threats facing your organization: web vulnerability scanner, website monitoring, threat intelligence platform and web integrity controller. HTTPCS solutions create a powerful shield against hackers. Don't worry anymore about the security of your websites, adopt the Secure Attitude thanks to HTTPCS. The HTTPCS Cybersecurity Toolkit is composed of 4 additional...
    Starting Price: $65 per month
  • 14
    VulnSign

    VulnSign

    VulnSign

    VulnSign is an online vulnerability scanner that is fully automated, customer-orient configurable and has advanced features. VulnSign can scan any type of web application, regardless of the technology it was built with. It uses a Chrome based crawling engine and can identify vulnerabilities in legacy, and custom built, modern HTML5, Web 2.0 applications and Single Page Applications (SPA). It also has vulnerability checks for popular frameworks. The VulnSign vulnerability scanner is very easy...
    Starting Price: $49/month/team
  • 15
    Detectify

    Detectify

    Detectify

    ..., except US-sanctioned countries. It is tech-agnostic, which means you can deploy the scanning engines as long as you are hosted in the cloud. Currently, Detectify is trusted by 1500+ security-conscious companies including popular app-makers King, Trello, Grammarly. No matter how much security knowledge you have, Detectify helps you stay on top of security and build safer web applications.
    Starting Price: $89 per month
  • 16
    AppScan

    AppScan

    HCLSoftware

    HCL AppScan is a suite of application security testing platforms, technologies, and services that help organizations detect and remediate vulnerabilities throughout the software development lifecycle (SDLC). Powerful static, dynamic, interactive, and open-source scanning engines (DAST, SAST, IAST, SCA, API) quickly and accurately test code, web applications, APIs, mobile applications, containers, and open-source components with the help of AI and machine learning capabilities. Centralized...
    Starting Price: $296
  • 17
    Tenable One
    ... to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk.
  • 18
    BlueClosure

    BlueClosure

    Minded Security

    BlueClosure can analyse any codebase written with JavaScript frameworks like Angular.js, jQuery, Meteor.js, React.js and many more. Realtime Dynamic Data Tainting. BlueClosure Detect uses an advanced Javascript Instrumentation engine to understand the code. By leveraging our proprietary technology the BC engine can inspect any code, no matter how obfuscated it is. Scanning Automation. BlueClosure technology can automatically scan an entire website. This is the fastest way to scan and analyse...
  • 19
    Bright Security

    Bright Security

    Bright Security

    Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively. Its approach enables quick and iterative scans to identify critical security vulnerabilities early in the SDLC without compromising on quality or delivery speed. Bright empowers AppSec teams to provide governance for securing APIs and web apps while allowing developers to take ownership of security testing...
  • 20
    SOOS

    SOOS

    SOOS

    Industry-low pricing for SCA, DAST and SBOM management. SOOS SCA gives you everything you need in an SCA solution for one low price. SOOS DAST integrates into your build pipeline and consolidates DAST test results with SCA vulnerability scans in a single powerful web dashboard. Assembling a comprehensive SBOM from third party software or open source components is easy with SOOS SBOM Manager. Ingest, manage, and continually monitor third party SBOMs. Add SBOMs generated by your in house...
    Starting Price: $0 per month
  • 21
    Halborn

    Halborn

    Halborn

    Using deep security inspection and the latest offensive security tactics, we work to find critical vulnerabilities in applications before they are exploited. We use hands-on assessment by our team of dedicated ethical hackers to simulate the latest activities and techniques used by threat actors. We pentest everything from web apps to wallets and layer1 blockchains. Halborn provides an exceedingly thorough analysis of a blockchain application’s smart contracts in order to correct design issues...
  • 22
    ResilientX

    ResilientX

    ResilientX

    Automated discovery and inventory of external assets empowered by passive scanning and view of an organization's digital attack surface, points, vulnerabilities, and risk score. Cyber exposure management is more than just a product, it’s your strategic ally in safeguarding your digital landscape. Going beyond the capabilities of conventional attack surface tools, it offers a panoramic view of an entire internet-facing digital infrastructure. Our meticulous process involves correlating,...
  • 23
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility,...
  • Previous
  • You're on page 1
  • Next