Advanced built-in security helps IT prevent breaches before they happen
Defend against security incidents with Chrome Enterprise. Create customizable controls, manage extensions and set proactive alerts to keep your data and employees protected without slowing down productivity.
Download Chrome
Gen AI apps are built with MongoDB Atlas
The database for AI-powered applications.
MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
Spring Security is a powerful and highly customizable authentication and access-control framework. It is the de-facto standard for securing Spring-based applications. Spring Security is a framework that focuses on providing both authentication and authorization to Java applications. Like all Spring projects, the real power of Spring Security is found in how easily it can be extended to meet custom requirements. Spring Security uses a Gradle-based build system. In the instructions, ./gradlew...
Atricore’s JOSSO is an open source and commercially supported Internet Single Sign-On (FSSO) solution for point-and-click and standards-based (SAML2) Internet-scale SSO implementations. For more information contact us at : http://www.josso.org
This project now hosts the third-generation of Java SSH API, Maverick Synergy. This API builds on the Maverick Legacy commercial APIs and delivers a new API in a unified client/server framework. This API is available to the community under the LGPL open source license.
This update includes ed25519 support, support for the new OpenSSH private key file format and stronger key exchange algorithms.
The project continues to host both the original API and legacy applications created around...
HTMF is a Java Hard Token Management Framework used to manage the complete livecycle of an organizations Smartcards and/or USB dongles. It communicates with the tokens through a PKCS11 interface.
Trusted by 150 million+ creators and businesses globally
Unlock Picsart's full editing suite by embedding our Editor SDK directly into your platform. Offer your users the power of a full design suite without leaving your site.
Asimba is an application for managing access, supporting multiple identity provider protocols, like SAML and A-Select, as well as authentication methods, like LDAP, Radius but also One Time Password/SMS and PKI.
Built as J2EE application, it provides a modular framework that can be integrated in many IT systems as access component.
... of MySQL Server. This includes the components, the users, the hosts and the privileges at any level.
The focus is on IT weak configurations, executing environments (malware analysis) and people authorizations.
Reliability and the ability to explain the results are the main objectives. A 80 pages tutorial is provided. A powerful framework allows new simulations to be added.
Access Road simulates and explains, combining complete modeling, visual results and detailed texts.
jGuard is written in java. his goal is to provide a security framework based on jaas (java authentication and authorization security) . this framework is written for web and standalone applications, to resolve simply, access control problems.
JWAIM is a security framework for Java Web Applications. It provides modules and interfaces to add monitoring, firewall and IPS capabilities in the application server.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
BioWebAuth (Biometrics for Web Authentication) is an open source Java framework intended to provide single sign-on web authentication based on BioAPI-compliant biometric software or devices. It uses the JA-SIG Central Authentication Service architecture.
Kasai is a 100% Java based authentication and authorization framework. It allows you to integrate into your application a granular, complete and manageable permission scheme.
Role Manager is a security management framework based on the NIST model for Role Based Access Control (RBAC) and the Java[TM] 2 Platform security standards. The access control policies and the RBAC Model are implemented using the RBAC profile of XACML.
Open3SP is a unique system administration framework that provides a secure administrative infrastructure based on the SSH protocol. The aims of the project are to establish role based access, automated configurations and software/patch deployment.
Nubric (Near-real-time user behaviour and resource interaction control) is a framework for security and authentication-related modules written in Java. Its origin focus lies on network monitoring, dynamic, transparent firewalling and traffic control.