Results for: swing based visual query builder java code

Suggested Categories:

No-Code Development Platforms
No-code development platforms provide a way for users to design, build, and develop software applications without the need for traditional coding. They are built in such a way that users can rely on simple visual interfaces with drag and drop type tools, allowing them to rapidly develop applications with minimal technical knowledge. This makes no-code development platforms ideal for any user regardless of programming experience, from hobbyists to entrepreneurs. Furthermore, modern no-code platforms allow complex mobile apps or web projects to be created more quickly than ever before.
QR Code Generators
QR code generators are tools that allow users to create quick response (QR) codes, which are machine-readable barcodes that store information such as URLs, text, contact details, or Wi-Fi credentials. These tools typically allow users to customize QR codes by changing their size, color, and design while ensuring the code remains scannable. QR code generators are commonly used for marketing, event registration, payments, product packaging, and contactless interactions. They help businesses and individuals provide an easy way for users to access digital content or services through their smartphones or other scanning devices.
Code Collaboration Tools
Code collaboration tools are platforms that enable developers to work together on software projects by facilitating real-time collaboration, version control, and code sharing. These tools allow multiple developers to edit and review code simultaneously, track changes, and manage different versions of code through branches and commits. Key features typically include code reviews, pull requests, conflict resolution, issue tracking, and integration with version control systems like Git. Code collaboration tools are essential for team-based development environments, ensuring smooth coordination and improving productivity in software projects.
Visual Configuration Software
Visual configuration software allows users to create and customize products by visually selecting options and features, making it ideal for industries like manufacturing, retail, and custom products. These platforms provide an interactive interface where customers or users can configure products by choosing colors, sizes, materials, and other specifications, all in real time. The software typically includes 3D models or visual representations of the product to give users an accurate view of their customizations. Visual configuration software often integrates with e-commerce platforms, product management systems, and order fulfillment processes, ensuring a seamless experience from design to delivery.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Coding Challenge Platforms
Coding challenge platforms, also known as code assessment and technical skills testing platforms, enable developers and organizations to test their coding skills to see what skills need to be improved, or to determine the coding skills of a potential hire. Many coding challenge platforms also offer features like coding competitions, mock interviews, and collaboration opportunities for learning with others. These platforms are popular among job seekers, developers, and coding enthusiasts looking to enhance their problem-solving abilities.
Data Visualization Software
Data visualization software helps converting numeric and textual data into visual tools and performance dashboards in order to identify and analyze possible patterns.
Home Builder Software
Home builder software facilitates the monitoring of home-building projects, their progress, scheduling and costs, while providing customer management tools.
Website Builder Software
Website builders are tools that allow users to create websites without coding. These platforms provide a range of features and tools, such as drag-and-drop design elements, hosting, and domain registration. Website builders have become popular due to their ease-of-use and cost savings compared to hiring a professional web developer or designer. They are also typically well supported with step-by-step tutorials and customer service options for those who need help getting started.
Code Editors
Code editors are software tools that allow developers to write, edit, and debug source code for programming and web development. These editors provide essential features like syntax highlighting, code completion, auto-indentation, and error detection to enhance productivity and reduce coding errors. Many code editors also offer integrations with version control systems (like Git), debuggers, and build tools, allowing developers to manage their code and workflows efficiently. While some code editors are lightweight and focused solely on text editing, others offer extensive features and customization options through plugins and extensions. By providing a streamlined environment for coding, code editors are essential for software development, web development, and scripting tasks.
Risk-Based Authentication Software
Risk-based authentication (RBA) software are authentication tools that take into account informational and behavioral risk when authenticating users attempting to access systems or identity verification.
Visual Project Management Software
Visual project management software enables teams and project managers to visually plan and track progress of projects.
Infrastructure as Code Software
Infrastructure as Code (IaC) tools are software solutions that enable developers and IT teams to automate the provisioning, configuration, and management of infrastructure using code. These tools allow users to define and manage infrastructure components like servers, databases, and networking resources through configuration files, ensuring consistency and repeatability in infrastructure setups. IaC tools typically support version control, enabling teams to track changes and collaborate on infrastructure management.
Code Search Engines
Code search engines are specialized search tools that allow developers to search through codebases, repositories, or libraries to find specific functions, variables, classes, or code snippets. These tools are designed to help developers quickly locate relevant parts of code, analyze code quality, and identify reusable components. Code search engines often support various programming languages, providing search capabilities like syntax highlighting, filtering by file types or attributes, and even advanced search options using regular expressions. They are particularly useful for navigating large codebases, enhancing code reuse, and improving overall productivity in software development projects.
Online Form Builders
Online form builders enable the creation of fillable forms through a drag-and-drop interface in order to be embedded or shared on web pages.
Code Enforcement Software
Code enforcement software is software that helps local government agencies and municipalities manage and enforce building codes, zoning laws, and other regulatory compliance requirements. These platforms typically provide features for tracking violations, issuing citations, managing inspections, and automating the code enforcement process. Code enforcement software can also include tools for scheduling inspections, documenting findings, generating reports, and managing case histories. It helps ensure that properties comply with local laws and ordinances, improving efficiency and accountability in enforcement processes. Additionally, it allows for better communication between enforcement officers, residents, and other stakeholders.
Revenue-Based Financing Companies
Revenue-based financing companies, also known as royalty-based financing companies, are companies that provide financing to businesses with predictable revenue streams. Revenue-based financing firms provide upfront capital in exchange for a percentage of top line revenue, or a fixed percentage of each contract. Revenue-based financing solutions are ideal for companies with predictable, recurring revenue such as SaaS companies, ecommerce retailers, subscription businesses, and more.
Account-Based Advertising Software
Account based advertising software is used by businesses and marketers to improve customer engagement through the use of targeted and personalized digital ads.
Usage-Based Billing Software
Usage-based billing software, also known as metered billing software, enables companies to charge their clients and customers based on their usage, rather than one-time fees or flat subscription rates. Usage-based billing systems provide companies with the ability to offer pricing models based on metered billing, and also offer usage and consumption statistics.
Account Based Marketing Software
Account based marketing software is a technology solution that enables businesses to target and engage specific accounts or customer segments. This software typically provides features such as segmentation, personalized content, account profiles and customer intelligence. It helps marketers identify the right audiences and deliver relevant messages to boost brand awareness and increase sales.
View more categories (20) for "swing based visual query builder java code"

32 Products for "swing based visual query builder java code" with 3 filters applied:

  • 1
    It'sMe

    It'sMe

    Acceptto

    ... and continues authenticating post-authorization. We prevent account takeovers, even if hackers have already acquired passwords. ItsMe™ Intelligent Multi Factor Authentication (MFA) increases your security by authorizing access attempts to a registered device in real-time, be it through a push notification or verification code (SMS, TOTP, email, and etc.). With our timed based one-time password (TOTP), security key, or biometric options, you can authenticate access even when offline.
  • 2
    Strivacity

    Strivacity

    Strivacity

    Strivacity adds secure customer identity and access management (CIAM) capabilities to your online properties fast so you can grow your revenue, stay compliant with fast-changing privacy regulations and personalize your service with the insights you’ll get into how your customers interact with you. We can plug into your existing app, let your customers self-service their accounts and scale as fast as your business can grow. It's OK if you've outgrown your CIAM solution. We use clicks (not code...
    Starting Price: $500 per month
  • 3
    LiveEnsure

    LiveEnsure

    LiveEnsure

    ... users across multiple factors with a single call. Developers can offer their users strong but private authentication by simply mashing up a few lines of code with their site or embed our mobile libraries for iOS and Android in your own app. Get rid of traditional passwords, 2FA and captcha altogether with a single API. There are no confusing tokens, certs or push messages. Just a simple call, present and poll API to our cloud authentication service.
  • 4
    Ionic Machina
    ... organization. Deliver context-aware dynamic authorization for each access request to maintain least privilege. Abstract access logic from app code to orchestrate policy enforcement across multiple environments. Implement and enforce consistent access policies in real-time across applications, repositories, workloads, and services. Monitor and analyze data handling and policy enforcement across your enterprise, and generate audit-ready proof of compliance.
  • 5
    GateKeeper Enterprise

    GateKeeper Enterprise

    Untethered Labs, Inc.

    Passwordless, proximity login to PCs, Macs, websites, and desktop applications. Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key. Once a user walks away, the computer will lock, blocking...
    Starting Price: $3/user/month
  • 6
    TeleSign

    TeleSign

    TeleSign

    Deliver timely, personalized information through global SMS/RCS and voice cloud communications. Gain a deeper understanding of your customers from actionable global phone number and subscriber data intelligence. Code once and message your customers at scale using TeleSign’s Messaging API - complete with waterfall delivery between channels. TeleSign Messaging API includes SMS, RCS, and WhatsApp to help you build secure digital communications that connect you with your customers anywhere...
  • 7
    FusionAuth

    FusionAuth

    FusionAuth

    ..., framework, or architecture. Every capability is API-first and built for extensibility, so you can tailor authentication workflows without getting locked into rigid, inflexible systems. FusionAuth supports all the key use cases — user registration, multi-factor authentication (MFA), passwordless login, role-based access control, and more — while helping you stay compliant with GDPR, HIPAA, PCI, and other regulatory standards.
    Leader badge
    Starting Price: $0
    Partner badge
  • 8
    Ondato

    Ondato

    Ondato

    Ondato is a tech company that streamlines KYC and AML-related processes. We're providing advanced technological solutions for digital identity verification, business customer onboarding, data validation, fraud detection, and more. All of them meet the highest quality standards available for KYC online or offline onboarding for all business and customer types orchestrated from a single interface. We're turning compliance into a business benefit by creating a safer environment for...
    Starting Price: €149.00/month
  • 9
    HYPR

    HYPR

    HYPR | The Passwordless Company

    HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and...
    Starting Price: $4.00 per user/month
  • 10
    UserLock

    UserLock

    IS Decisions

    Secure Active Directory user logins with Multi-Factor Authentication, Single Sign-On, contextual access controls, and real-time monitoring and reporting. UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.
    Starting Price: $2.00/month/user
  • 11
    Trusona

    Trusona

    Trusona

    Trusona, the pioneering leader of passwordless authentication for digital businesses, provides a phishing-resistant alternative to passwords and SMS OTPs. Trusona Authentication Cloud is a passkey-as-a-service platform, offering the simplest, quickest and least expensive way to add passkeys to your website. It improves business growth and profitability with sign-ins that delight your customers, mitigating top threats like phishing and account takeovers (ATOs) while providing a UX...
  • 12
    RSA ID Plus

    RSA ID Plus

    RSA Security

    Powerful cloud solutions to support your digital transformation at your own pace — tailored to fit every identity and access management requirement. ID Plus also includes the new, multi-functional DS100 hardware authenticator. All plans can be flexibly deployed in the cloud, on-prem or hybrid. And all can be easily adjusted as your needs change. Try ID Plus cloud multi-factor authentication (MFA) solution — one of the most secure products on the market, and the world’s most deployed MFA....
  • 13
    BioCatch

    BioCatch

    BioCatch

    BioCatch delivers advanced behavioral insights to provide global organizations with actionable intelligence so you can create a secure customer journey. BioCatch analyzes a user's physical and cognitive digital behaviors to generate insights that distinguish between legitimate applicants and cybercriminals. BioCatch detects behavioral anomalies indicative of human and non-human cyberthreats such as Remote Access Tools attacks, Bots, malware and manual account takeover methods. BioCatch...
  • 14
    NuDetect

    NuDetect

    NuData Security

    Our solution combines the power of our four integrated layers of security to verify users based on their inherent behavior. Used by major global brands, this solution protects online environments from login to logout. Don’t miss anything during a session. NuDetect is placed at different points across the environment to monitor users from the moment they enter your website until they leave. Find anomalous activity before it results in fraud. With our real-time solution, threats get blocked...
  • 15
    MonoCloud

    MonoCloud

    MonoCloud

    MonoCloud is a developer-focused platform designed to streamline authentication, authorization, and user management for applications across multiple environments, including web, mobile, IoT devices, and more. It enables developers to easily integrate secure and customizable login processes, supporting a range of authentication methods such as passwords, magic links, one-time passcodes, and social logins like Google, Facebook, and Apple. Built with a strong emphasis on reducing user...
    Starting Price: $0
  • 16
    Privakey

    Privakey

    Privakey

    Privakey’s transaction intent verification provides a secure channel to streamline high risk exchanges between services and their users. Now available as a cloud service. Fraud is everywhere yet so is your competition. Enterprises are constantly seeking to delight their customers while balancing experience and security. It’s a challenging problem that’s getting tougher every year. So how can you securely engage with your customers, and gain their trust of you during sensitive exchanges, in...
  • 17
    OpenText NetIQ Advanced Authentication
    Using the NetIQ Risk Service engine, you have the option to consume both static and behavior risk metrics to adapt your users’ authentication experience and access security level. This enables you to keep access as simple as possible for your users while protecting your private information. Beyond Azure AD’s base set of multi-factor authentication options, the NetIQ Advanced Authentication framework gives you the freedom to adopt a wide variety of additional authentication types. It also...
  • 18
    AuthControl Sentry

    AuthControl Sentry

    Swivel Secure

    .... Patented PINsafe® technology for ultimate security. Supports on-premise and cloud for changeable architecture. A single tenancy and single-tiered cloud solution ensures optimised customization. Risk-based authentication and single sign-on as standard. Integrates seamlessly with hundreds of applications. Ensures maximum adoption with an extensive range of authenticators.
  • 19
    Cisco Duo
    Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity...
    Leader badge
    Starting Price: $3 per user per month
  • 20
    Accops HyID

    Accops HyID

    Accops Systems

    ... based on OTP delivered via SMS, email and app, biometrics, and device hardware ID & PKI. Single sign-on (SSO) feature provides better security and convenience. Organizations can monitor security posture of the endpoints, including BYOD devices, and grant or deny access based on real-time risk assessment.
  • 21
    IBM Verify
    Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business...
  • 22
    UnifyID

    UnifyID

    UnifyID

    Use UnifyID's authentication platform to remove passwords and one-time passcodes (OTP) from your user experience while improving security and consumer convenience. UnifyID offers Multi-Factor Authentication services that combine deterministic, behavioral biometric and environmental attributes using machine learning to uniquely identify users. Applies advanced machine learning to behavioral biometrics and environmental factors to create a secure digital fingerprint of the user. Passive...
  • 23
    Axiom Protect

    Axiom Protect

    Axiom Protect

    ... authentication more flexible and stronger. Multiple users on a single device or multiple devices for a single user is a business need. It's not hard if you have a good platform. Everything is DATA. Data at rest & at transit security at mobile, web, iOT device, Server, files / DB. Customised security grades with varied key lengths & algorithms. No expensive VPN. SDK and APIs available. 99%+ accuracy to build your EKYC or remote access authentication comes by pure 100% AI/DL based facial biometrics.
  • 24
    BeyondCorp Enterprise
    ...S protection, low-latency connections, and elastic scaling. A layered approach to security across users, access, data, and applications that helps protect every click from malware, data loss, and fraud. Integrates posture information and signals from leading security vendors, for extra protection. Easily configure policies based on user identity, device health, and other contextual factors to enforce granular access controls to applications, VMs, and Google APIs.
    Starting Price: $6 per user per month
  • 25
    Sift

    Sift

    Sift

    Sift’s Digital Trust & Safety suite is every fraudster's nightmare. We secure your business at scale support explosive growth. Proactively stop account takeover, payment fraud, and scam content from destroying your brand's integrity. So: what’s your goal?
  • 26
    LastPass

    LastPass

    LastPass

    LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing...
    Leader badge
    Starting Price: $4 per user per month
  • 27
    TWOSENSE.AI

    TWOSENSE.AI

    TWOSENSE.AI

    Quickly catch unauthorized users and get a better understanding of your organization's highest risks with our dynamic dashboard, whether that be password reuse, credential sharing, unmanaged device use and more. Integrate with your SIEM to keep alerts in one place. TWOSENSE invisibly authenticates users throughout a session and automatically responds to 95% of MFA challenges for your users reducing MFA friction. Find out exactly how much security fatigue is costing your organization. Our...
  • 28
    Pindrop

    Pindrop

    Pindrop

    Fraud in the contact center is a multi-billion dollar problem. With 1 out of every 770 fraudulent calls getting to agents. It is an arms race between fraudsters and call center teams to outsmart and outmaneuver each other. In the IVR, one out of 390 accounts being accessed in the IVR will be the victim of a fraud attack. Fraud loss directly impacts a company’s bottom line, customer experience, and brand perception. Pindrop® is a multifactor, real-time, fraud prevention solution that analyzes...
  • 29
    Castle

    Castle

    Castle

    Feed Castle any user event for real-time scoring and threat detection. Receive synchronous decisions to block spam registrations and account takeover attempts. Less friction means higher conversion. Our invisible APIs let you simplify your registration flow while keeping the spam out of your system. Get advanced credential stuffing protection straight out of the box with Castle's industry leading account takeover protection. Whether it’s at registration, login, or anywhere in-app, Castle can...
    Starting Price: $33 per month
  • 30
    Airlock

    Airlock

    Airlock

    Airlock's Secure Access Hub protects applications, APIs and data from identity theft and the most common attacks on Web applications. Security meets convenience, Airlock offers your customers a customer journey without media breaks with single sign-on, social registration, comprehensive user self-services and consent management. Acting in line with the market means reacting quickly. The Airlock Secure Access Hub therefore provides all important security functions such as registration,...
  • Previous
  • You're on page 1
  • 2
  • Next