Suggested Categories:

Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
JavaScript Libraries
JavaScript libraries are sets of code, components, and code snippets that enable developers to build JavaScript (JS) applications in a simpler and more efficient way.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Load Testing Tools
Load testing tools are used to test and verify the quality and performance of an application under workload in order to get rid of problems.
View more categories (6) for "lisp java"
  • 1
    SparkView

    SparkView

    beyond SSL

    ... and servers - Access from any device with browser (e.g. Chrome, Firefox, Edge, Opera, Safari, etc.) - No installation on clients or the target systems - One central point for administration, security and authorization - HTML5 technology - Flexible, stable and scalable - Low support and management overhead - Supports common protocols such as RDP, SSH, Telnet, VNC and HTTP(S) - No Java, no Flash, no ActiveX, no plugin, no rollout
    Starting Price: $60 per year
  • 2
    Loupe

    Loupe

    Loupe

    Know when issues happen in your application with Loupe. A logging and application monitoring solution for .NET and Java, Loupe helps software teams monitor, find, and fix errors in their applications the first time. It also gives users the visibility into events and key metrics for all applications, and offers the ability to dig deeper into specific events, sessions, users, and machines. Loupe can be deployed on-premise or as a cloud hosted solution.
    Starting Price: $25.00/month
  • 3
    Siwenoid

    Siwenoid

    Siwena

    SIWENOID is a JAVA application and runs under Windows, Linux or Mac OS X. It is flexible, reliable, user, and engineer friendly. SIWENOID can integrate many types of subsystems and unify the operation of all. Supports SIEMENS, Bosch, Dahua, Texecom, Paradox systems and many more. Control everything on one (or more) screen with a unified user interface for every subsystem. Siwenoid is built on open-source foundations to keep the cost of the product lower. To keep up with the constant firmware...
  • 4
    Secure My Files
    Secure My Files Mini, or SMF is a JavaScript library for securing documents using end-to-end encryption in the browser. SMF is using symmetric encryption algorithms (AES with a 256-bit cypher) to encrypt and decrypt files. As an application Secure My Files can be used as an application. You can deploy the sources available here on your own server. Everything is static, so any web server will do. As a library It's simple to use SMF as a library. You first need to include the JavaScript script...
    Starting Price: $14.99 one-time payment
  • 5
    Vega

    Vega

    Subgraph

    Vega can help you find and validate SQL Injection, cross-site scripting, inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows. Vega can help you find vulnerabilities such as: reflected cross-site scripting, stored cross-site scripting, blind SQL injection, remote file include, shell injection, and others. Vega also probes for TLS / SSL security settings and identifies opportunities for improving...
  • 6
    Nxt

    Nxt

    Jelurida Swiss

    Nxt is an open source blockchain platform and the first to rely entirely on a proof-of-stake consensus protocol. Launched in November 2013 and written from scratch in Java, Nxt is proof that blockchain technology is not only about simple transfer of value but also has the potential to revolutionize many aspects of our lives with the various decentralized applications that can be built with it. Today, Nxt remains one of the most tested and reliable platforms in the industry, influencing numerous...
  • 7
    Revenera Usage Intelligence
    ... software applications doesn’t just provide a better foundation for Product Management decisions. Technical and environment data gives insights for Development teams trying to plan for infrastructure and support requirements. Usage Intelligence, the first software usage analytics solution designed for distributed C/C++, .NET, Obj-C and native Java applications on Windows, Macintosh, and Linux, provides deep insight into application usage. See which features are used most and least.
  • 8
    RDS-Shield

    RDS-Shield

    Marty Soft Conception

    RDS-Shield is a standalone Windows Service managing a lot of server events, and an intuitive Administration interface. No need to install Java, update PHP, download MS C++ libraries or .NET. All is included and so powerful. Just download it, install it, and discover. Forget the complexity of GPO & AD. Simply say: Now, all users of this group are in the Highly secured user environment, but in this same group, this account will be in a Secured user session, while others will work in Kiosk Mode...
    Starting Price: $299 one-time payment
  • 9
    4identity
    4identity is the technological solution developed by Bit4id that empowers web applications with Digital Signature and Authentication processes. 4identity does not use Java Applets or any other third party add-on. It is simple, its is compatible with any web browser and works under the most used operating systems. The “integration-less” Engine to add Digital Signature and Strong Authentication to web applications through a simple API. 4identity means usability, providing a “1-click signing” user...
  • 10
    Apache Syncope

    Apache Syncope

    Apache Software Foundation

    Apache Syncope is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license. Identity management (or IdM) means managing user data on systems and applications, using the combination of business processes and IT. Computers work with records of data about people. Such records contain technical information needed by the system for which the account is created and managed. Have you ever been hired...
  • 11
    Acunetix

    Acunetix

    Invicti Security

    As the market leader in automated web application security testing, Acunetix by Invicti is the go-to security tool for Fortune 500 companies. DevSecOps teams can cut through the noise to uncover unseen risks and mitigate dangerous exploits, detecting and reporting on a wide array of vulnerabilities. With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight...
  • 12
    Arachni

    Arachni

    Arachni

    ... command line scanner utility, to a global high performance grid of scanners, to a Ruby library allowing for scripted audits, to a multi-user multi-scan web collaboration platform. In addition, its simple REST API makes integration a cinch. Finally, due to its integrated browser environment, it can support highly complicated web applications which make heavy use of technologies such as JavaScript, HTML5, DOM manipulation and AJAX.
  • 13
    LoginID

    LoginID

    LoginID

    ... a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPPA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
    Starting Price: Free
  • 14
    Maltego

    Maltego

    Maltego Technologies

    Maltego is a Java application that runs on Windows, Mac and Linux. Maltego is used by a broad range of users, ranging from security professionals to forensic investigators, investigative journalists, and researchers. Easily gather information from dispersed data sources. View up to 1 million entities on a graph​. Access over 58 data sources in the Maltego transform hub. Connect public (OSINT), commercial and own data sources. Write your own Transforms. Automatically link and combine all...
    Starting Price: €5000 per user per year
  • 15
    IPQS Device Fingerprinting
    ..., & other high-confidence signals that the user is likely to engage in fraudulent behavior. Deploy JavaScript device fingerprinting for web devices or use our SDKs for mobile devices on iOS or Android. Robust risk scoring will accurately identify fake accounts, chargebacks, credential stuffing, bot behavior, and similar abuse. IPQS Device Fingerprinting can reveal advanced fraud techniques including the latest emulator software.
  • Previous
  • You're on page 1
  • Next