Suggested Categories:

Component Libraries
Component libraries are preconfigured sets of components, designs, styles, and code that enable developers and designers to build and design applications in a more efficient and streamlined way. A component library, also known as a UI component library, can be used across programming languages and frameworks to speed up and simplify design and development.
Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
Component Content Management Systems (CCMS)
Component content management systems, abbreviated "CCMS", are similar to traditional content management systems (CMS), but offer a higher level of detail and structured data capabilities. Instead of managing freeform content, CCMS software allows content to managed at a deeper level, such as assets, paragraphs, words, topics, and more. Component content management systems often use XML data architecture such as DITA (Darwin Information Typing Architecture) or DocBook. CCMS suites allow for robust search functionality due to the granularity of the content being managed.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
ERP Software
ERP (enterprise resource planning) software is a type of business management system that integrates internal and external management information across an entire organization. It typically includes modules related to finance, human resources, sales, inventory, operations and more. ERP systems are designed to help organizations optimize their processes and connect them with customers, vendors and partners. They provide real-time insights into data so companies can make better decisions quickly.
Smart City Software
Smart city software, also known as smart cities software, enables municipal governments and city planners to integrate IoT monitoring, tracking, and management into the infrastructure of a city. The goal of smart city software is to improve all aspects of a city, including safety, city management, resident wellbeing, traffic reduction, and more.
Succession Planning Software
Succession planning software helps organizations identify and develop internal talent to fill key leadership and critical roles in the future. These tools support businesses in mapping out their workforce's potential, ensuring that there is a pipeline of qualified candidates ready for promotion or transition when needed. Succession planning software typically includes features like skill gap analysis, talent assessments, and career path planning to help identify high-potential employees and prepare them for leadership positions. The software also assists with tracking employee performance, monitoring development goals, and aligning succession plans with the overall business strategy. By streamlining the succession planning process, these tools help organizations minimize the risk of leadership gaps and ensure business continuity.
Load Testing Tools
Load testing tools are used to test and verify the quality and performance of an application under workload in order to get rid of problems.
View more categories (12) for "java component"

16 Products for "java component" with 3 filters applied:

  • 1
    ManageEngine Applications Manager
    ManageEngine Applications Manager is an enterprise-ready platform designed to monitor an entire application ecosystem of a business organization. Our platform helps IT and DevOps teams get visibility into all the dependent components within their application stack. With Applications Manager, it becomes easier to monitor the performance of mission-critical web applications, web servers, databases, cloud services, middleware, ERP systems, messaging components, and more. It has tons...
    Leader badge
    Starting Price: $395.00/Year
  • 2
    MoQuality

    MoQuality

    MoQuality

    MoQuality is a sandbox that enables end-to-end UI testing for your Android and iOS apps. Helps build robust Appium tests. No more flaky tests. Integrates with your continuous testing workflow. Stores all test artifacts (tests, builds and reports) under one dashboard. Generates visual test reports to assist with triaging and test maintenance. Enables advanced functionality over Appium open-source. Write your Appium tests in Python, Java, JavaScript (wd/webdriverio). Build and debug your Appium...
    Starting Price: $25 per month
  • 3
    DashO

    DashO

    PreEmptive

    Professional obfuscation and in-app protection for over 20 years. We invest in threat and protection research so you don't have to, and we constantly update our protection to stay ahead of the arms race. Protecting your app shouldn't require an army of consultants. You can make your first protected build for Android, Web, or Java in just a few minutes, in whatever build environment you use. Our customers love our support, and consistently give it the highest ratings. Whether you're protecting...
  • 4
    4identity
    4identity is the technological solution developed by Bit4id that empowers web applications with Digital Signature and Authentication processes. 4identity does not use Java Applets or any other third party add-on. It is simple, its is compatible with any web browser and works under the most used operating systems. The “integration-less” Engine to add Digital Signature and Strong Authentication to web applications through a simple API. 4identity means usability, providing a “1-click signing” user...
  • 5
    LoginID

    LoginID

    LoginID

    ... a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPPA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
    Starting Price: Free
  • 6
     ThumbmarkJS

    ThumbmarkJS

    ThumbmarkJS

    ThumbmarkJS is a fair, privacy-friendly fingerprinting library built by developers for developers. Offered under an MIT license, it can be installed via NPM or loaded from jsDelivr, and with just a few lines of JavaScript, importing the UMD bundle and calling tm.get(), it returns a consistent 32-character thumbmark fingerprint. For small projects requiring higher accuracy, a free API version is available, while the Pro version scales indefinitely and cost-efficiently for large
    Starting Price: €15 per month
  • 7
    OpaqueVEIL
    ... predecessor is a standards-based and patented cryptographic key management technology that provides information security and access control through cryptography. OpaqueVEIL®, as the underlying technology of all CKM Enabled® products, is comprised of a collection of software components that are required to utilize CKM technology. OpaqueVEIL® masks the detailed inner workings of cryptography and key management, making the results simple and programmer-friendly.
  • 8
    Intertrust ExpresssPlay
    ...-down. The emergence of streaming as a crucial component of pay-TV business models has spawned unprecedented online piracy. Reversing this worrisome trend requires a new, innovative approach that goes well beyond legacy security platforms optimized for traditional broadcasting and streaming services. To ensure robust content protection in this new era, Intertrust offers the ExpressPlay Media Security Suite, comprising cloud-based multi-DRM service, anti-piracy and forensic watermarking services, and more.
  • 9
    Super Gluu
    ..., and remote workforce. Super Gluu is supported by the Gluu Server out-of-the-box -- simply turn it on! Make strong access security as easy as approving a push notification. Make strong access security as easy as approving a push notification. The Gluu Server and Super Gluu can work in the same network, without a DNS server hostname and with a self-signed certificate. There is only one limitation: both components should belong to the same network.
  • 10
    DoubleClue

    DoubleClue

    DoubleClue

    ...). On premises or in the cloud. DoubleClue protects the component of your business that is not covered by firewalls and virus scanners – the human factor, the most vulnerable part in any IT security. All digital accesses and applications, passwords and confidential data protected by a strong all-in-one platform. In the digital working world, employees demand maximum flexibility. Enable them to work from anywhere with any device without compromising their IT security.
  • 11
    FacePhi

    FacePhi

    FacePhi Biometria

    ... to choose which components to activate providing a better and seamless experience for the end user. Face recognition allows us to determine the identity of a person by analyzing the face. Unlike other types of biometry like iris or fingerprint, face recognition is non-intrusive; it does not require cooperation from the user. It just needs to capture the face of the person with a web cam.
  • 12
    WithSecure Elements Infinite
    ..., cloud, and network activities. The primary service components cover the environments external attack surface(s), identity management systems (Entra ID), physical endpoints, corporate networks and cloud environments (AWS, Azure). WithSecure is a premier European cyber security company dedicated to helping our customers achieve compliance and effectiveness the European way.
  • 13
    DexProtector
    Instant protection for iOS and Android apps from static and dynamic attacks. A global leader in app and SDK defense with over ten billion installations. DexProtector’s approach to defending your apps is unique. Its Runtime Application Self Protection (RASP) native engine works at a system level deep within the app. From there, it interacts directly with the OS components. This helps it to control key processes and secure the most sensitive parts of your apps and libraries. DexProtector builds...
  • 14
    ARCON | Endpoint Privilege Management
    The ARCON | Endpoint Privilege Management solution (EPM) grants endpoint privileges ‘just-in-time’ or ‘on-demand’ and monitors all end users for you. The tool detects insider threats, compromised identities, and other malicious attempts to breach endpoints. It has a powerful User behavior Analytics component that takes note of the normal conduct of end users and identifies atypical behavior profiles and other entities in the network. A single governance framework enables you to blacklist...
  • 15
    Q-mast

    Q-mast

    Quokka

    ... (SBOM), including embedded libraries, to surface vulnerable components and dependencies with pinpoint accuracy. Designed to fit into modern pipelines, Q-mast automates mobile app testing within CI/CD workflows like GitHub, GitLab, and Jenkins.
  • 16
    ManageEngine AD360
    AD360 is an integrated identity and access management (IAM) solution for managing user identities, governing access to resources, enforcing security, and ensuring compliance. From user provisioning, self-service password management, and Active Directory change monitoring, to single sign-on (SSO) for enterprise applications, AD360 helps you perform all your IAM tasks with a simple, easy-to-use interface. AD360 provides all these functionalities for Windows Active Directory, Exchange Servers,...
    Starting Price: $595.00 / year
  • Previous
  • You're on page 1
  • Next