Suggested Categories:

Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Load Testing Tools
Load testing tools are used to test and verify the quality and performance of an application under workload in order to get rid of problems.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
View more categories (7) for "java chess"
  • 1
    Jscrambler

    Jscrambler

    Jscrambler

    ...Jscrambler’s Code Integrity product safeguards first-party JavaScript through state-of-the-art obfuscation and exclusive runtime protection. Jscrambler’s Webpage Integrity product mitigates threats and risks posed by third-party tags, while ensuring compliance with PCI DSS v4 requirements 6.4.3 and 11.6.1. Jscrambler serves a range of customers, including top Fortune 500 companies, online retailers, airlines, media outlets, and financial services firms.
    Partner badge
    View Software
    Visit Website
  • 2
    Source Defense

    Source Defense

    Source Defense

    ...The Source Defense Platform provides a simple and effective solution for data security and data privacy compliance – addressing threats and risks originating from the increased use of JavaScript, third-party vendors, and open-source code in your web properties. The Platform provides options for securing your own code, as well as addressing a ubiquitous gap in the management of third-party digital supply chain risk – controlling the actions of the third-party, fourth and nth party JavaScript that powers your site experience. ...
    Partner badge
    View Software
    Visit Website
  • 3
    JSDefender

    JSDefender

    PreEmptive

    Cutting-edge JavaScript obfuscation techniques with control-flow flattening, tamper detection and other in-app protection transforms. We would not send our own unprotected code to a remote service controlled by third parties and we would not expect you to either. JSDefender supports major JavaScript frameworks, runtimes, and bundlers including Angular, Node, React, React Native, Webpack and others.
  • 4
    Imperva Client-Side Protection
    Client-Side Protection provides real-time monitoring of all client-side resources and JavaScript behavior. Gain control over all first and third-party JavaScript code embedded on your website. Actionable insights make it easy to identify risky resources and scripts that should not load on your client side. And if any JavaScript code is compromised, your security team is the first to know. Provides comprehensive inventorying, authorization, dynamic integrity verification, and real-time monitoring, helping streamline regulatory compliance with the new client-side security requirements introduced in PCI DSS 4.0. ...
  • 5
    Feroot

    Feroot

    Feroot Security

    ...The Feroot AI Platform replaces manual compliance work with continuous automation, delivering real-time protection and audit-ready evidence in minutes. Feroot unifies JavaScript behavior analysis, web compliance scanning, third-party script monitoring, consent enforcement, and data privacy posture management to stop Magecart, formjacking, and unauthorized tracking. Trusted by enterprises, healthcare providers, retailers, SaaS platforms, payment service providers, and public sector organizations. ...
  • 6
    Seagence

    Seagence

    Seagence Technologies

    Using Seagence’s unique execution path technology combined with machine learning, receive realtime alerts with root cause when defects occur in your production Java applications. Fix your code without needing any debugging. Attach a lightweight runtime java agent when you start your application. As your users access the application, Seagence agent collects data about how requests are being processed. So give Seagence 24 hours to collect enough sample for analysis. The collected data is fed to Seagence's analytics engine in realtime which finds defects when they occur and alerts. ...
    Starting Price: $52 per month
  • 7
    Loupe

    Loupe

    Loupe

    Know when issues happen in your application with Loupe. A logging and application monitoring solution for .NET and Java, Loupe helps software teams monitor, find, and fix errors in their applications the first time. It also gives users the visibility into events and key metrics for all applications, and offers the ability to dig deeper into specific events, sessions, users, and machines. Loupe can be deployed on-premise or as a cloud hosted solution.
    Starting Price: $25.00/month
  • 8
    Pixee

    Pixee

    Pixee

    ...It triages scanner alerts from tools like Sonar, Snyk, and Semgrep, delivering code fixes and unlocking the velocity of GenAI-driven development. Pixee operates like a trusted specialist teammate, fitting into your workflow and current tooling without being a distraction, supporting languages such as Java, Python, JavaScript, Node.js, .NET/C#, and Go. It provides expert security context on each finding to filter out false positives, elevate true positives, and recommend actions, freeing your team from endless manual review. Pixee turns findings into actionable pull requests that developers can review and merge, enabling auto-remediation at scale without the grind.
    Starting Price: $29 per month
  • 9
    Jsmon

    Jsmon

    Jsmon Inc.

    Jsmon is an advanced JavaScript security platform that continuously scans JS files to detect leaked secrets, sensitive information, and potential vulnerabilities. Trusted by thousands of users, it offers 24/7 JS crawling, automated threat detection, and real-time monitoring to protect your domains. Jsmon’s powerful NodeJS analysis engine identifies hardcoded API keys, credentials, and other security risks across millions of JS files and API paths.
    Starting Price: $25/month/user
  • 10
    Cloudflare Page Shield
    ...Powered by our threat intelligence and machine learning-based detection, it instantly identifies, reports, and blocks threats, before they reach your website. Block browser-based attacks aimed at your users’ personal and financial information. Monitor JavaScript dependencies and block threats with threat intelligence and machine learning.
  • 11
    F5 Distributed Cloud Client-Side Defense
    Protect against Magecart, formjacking, skimming, PII harvesting, and other critical security vulnerabilities. Fill the gap in your security defenses. Gain visibility and control of third-party JavaScript libraries running in your web applications to keep customers’ personal and financial data out of the hands of criminals. Mitigate risk by monitoring JavaScript libraries in real time to identify vulnerabilities and anomalous behavior that could compromise customer data. Avoid customer fraud and compliance fines. Protect against data theft that would undermine customer confidence and damage your brand. ...
  • 12
    SparkView

    SparkView

    beyond SSL

    ...) - No installation on clients or the target systems - One central point for administration, security and authorization - HTML5 technology - Flexible, stable and scalable - Low support and management overhead - Supports common protocols such as RDP, SSH, Telnet, VNC and HTTP(S) - No Java, no Flash, no ActiveX, no plugin, no rollout
    Starting Price: $60 per year
  • 13
    DashO

    DashO

    PreEmptive

    ...We invest in threat and protection research so you don't have to, and we constantly update our protection to stay ahead of the arms race. Protecting your app shouldn't require an army of consultants. You can make your first protected build for Android, Web, or Java in just a few minutes, in whatever build environment you use. Our customers love our support, and consistently give it the highest ratings. Whether you're protecting a mature app that's facing new risks or a new app that you haven't released yet, DashO has you covered. Application development teams face an ever-growing set of security threats as apps become more central to business and attackers grow in sophistication. ...
  • 14
    MoQuality

    MoQuality

    MoQuality

    ...Generates visual test reports to assist with triaging and test maintenance. Enables advanced functionality over Appium open-source. Write your Appium tests in Python, Java, JavaScript (wd/webdriverio). Build and debug your Appium script on the fly with MoQuality. Run the tests locally on real devices, emulators, and simulators. Test reports are the results of test runs that are saved by the user. You can run your Appium tests locally as many times as you wish. MoQuality supports most Android and iOS real devices, emulators and simulators. ...
    Starting Price: $25 per month
  • 15
    PatrOwl

    PatrOwl

    PatrOwl.io

    PatrowlHears supports your vulnerability watch process for your internal IT assets (OS, middleware, application, Web CMS, Java/.Net/Node library, network devices, IoT). Vulnerabilities and related exploitation notes at put at your disposal. Scan continuously websites, public IP, domains and subdomains for vulnerabilities, misconfigurations. Perform the reconnaissance steps, including the asset discovery and the full-stack vulnerability assessment and the remediation checks.
    Starting Price: €49 per month
  • 16
    Voicekey

    Voicekey

    Voicekey

    ...Voicekey is at’ heart’ a computational NN/AI engine that is consumed on-device or server based as part of an identity security application. Voicekey processes involved in enrolment and verification are consumed and accessed on-device or server based using an SDK depending on the platform (Java, iOS, Android, Windows mobile and Windows ) or RESTful API. Voicekey is a user configurable software ‘lock’ that can only be opened by the voice of a registered user.( The lock comes from the NN/AI technology).
  • 17
    Domdog

    Domdog

    Domdog

    ...Every organization has different preferences and constraints regarding what new systems they can integrate into their payment pages. With this in mind, Domdog has been designed to support Remote Scanning, JavaScript Agent, and Content Security Policy. This ensures that no matter what an organization's preferences are, Domdog can help them meet the 6.4.3 and 11.6.1 requirements with the least amount of effort and friction. Domdog offers a range of plans that cover small businesses to large enterprises. While the Business plan focuses on cost-effectiveness and simplified compliance, the Enterprise plan focuses on maximum flexibility and managed onboarding.
  • 18
    Radware Bot Manager
    ...Unlike the DNS re-routing technique used by other bot detection tools in the market, Radware Bot Manager uses an API-based approach, thereby ensuring seamless integration with your existing infrastructure. Radware Bot Manager provides Cloud Connectors and Web server plugins to get started quickly. A lightweight REST API code and JavaScript inserted on your page provides complete bot protection.
  • 19
    Apache Syncope

    Apache Syncope

    Apache Software Foundation

    Apache Syncope is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license. Identity management (or IdM) means managing user data on systems and applications, using the combination of business processes and IT. Computers work with records of data about people. Such records contain technical information needed by the system for which the account is created and managed.
  • 20
    IBM Cloud Data Shield
    ...IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for MySQL, NGINX and Vault. Powered by the Fortanix Runtime Encryption platform and Intel SGX technology, these tools enable organizations with sensitive data to leverage cloud computing with more confidence. IBM Cloud Data Shield helps enable organizations with sensitive data to deploy and benefit from cloud computing. ...
  • 21
    OpenFusion

    OpenFusion

    Rocket Software

    The Rocket OpenFusion CORBA Products Suite provides a comprehensive set of CORBA-based tools designed for large enterprise environments that rely on distributed, mission-critical applications. It includes fully supported ORBs for Java (JacORB), C++ (TAO), and real-time systems through specialized RTOrb editions. The suite enables high-performance communication, predictable QoS, scalability, and strong security across industries such as telecom, aerospace, financial services, and defense. OpenFusion delivers enterprise enhancements—including load balancing, failover, streamlined deployment, and advanced naming and trading services—that go far beyond standard open-source implementations. ...
  • 22
    SEAP

    SEAP

    XTN Cognitive Security

    SEAP® for Mobile is an SDK integrated into the customer’s app and doesn’t require any special permission. SEAP® for Web is JavaScript based, executed in the web browser application environment and does not require the installation of any agent. SEAP® detects malware activity both in mobile and web apps. Some examples of the malware threats monitored include man-in-the-browser and man-in-the-app-attacks, RAT, web injections, overlay attacks, SMS grabbing, memory tampering, and Injection attacks. ...
  • 23
    Halo Security

    Halo Security

    Halo Security

    ...Developers add new websites, services, and software. Old assets are forgotten and new acquisitions are brought into the fold. Every website, server, certificate, or third-party JavaScript creates another way for attackers looking to steal customer data. Our agentless and recursive discovery engine discovers the assets you’re not aware of, so you can prioritize your efforts from a single pane of glass. From firewall monitoring to penetration testing, you can easily apply the right resources to every asset from our centralized dashboard. ...
    Starting Price: $399 per month
  • 24
    IriMaster

    IriMaster

    Iritech, Inc.

    ...As a middleware component, IriMaster supports secure transactions and data exchange using SSL and WS‑Security standards, and ensures device‑level encryption via a PKI‑based security infrastructure. Its Web Service API enables scalable, service‑oriented deployments, supporting clients in Java, .NET, or web applications. The software delivers high availability through application server clustering and hardware redundancy, and scales from single‑PC setups to distributed server networks with load balancers.
  • 25
     ThumbmarkJS

    ThumbmarkJS

    ThumbmarkJS

    ThumbmarkJS is a fair, privacy-friendly fingerprinting library built by developers for developers. Offered under an MIT license, it can be installed via NPM or loaded from jsDelivr, and with just a few lines of JavaScript, importing the UMD bundle and calling tm.get(), it returns a consistent 32-character thumbmark fingerprint. For small projects requiring higher accuracy, a free API version is available, while the Pro version scales indefinitely and cost-efficiently for large-scale applications. Without complex setup or invasive tracking, ThumbmarkJS has been integrated into over 60,000 websites, handling more than 1 billion identifications and 200 thousand downloads per month. ...
    Starting Price: €15 per month
  • 26
    4identity
    4identity is the technological solution developed by Bit4id that empowers web applications with Digital Signature and Authentication processes. 4identity does not use Java Applets or any other third party add-on. It is simple, its is compatible with any web browser and works under the most used operating systems. The “integration-less” Engine to add Digital Signature and Strong Authentication to web applications through a simple API. 4identity means usability, providing a “1-click signing” user experience. ...
  • 27
    Cequence Security

    Cequence Security

    Cequence Security

    ...A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool.
  • 28
    Crashtest Security

    Crashtest Security

    Crashtest Security

    Crashtest Security is a SaaS-based security vulnerability scanner allowing agile development teams to ensure continuous security before even hitting Production. Our state-of-the-art dynamic application security testing (DAST) solution integrates seamlessly with your dev environment and protects multi-page and JavaScript apps, as well as microservices and APIs. Set up Crashtest Security Suite in minutes, get advanced crawling options, and automate your security. Whether you want to see vulnerabilities within the OWASP Top 10 or you want to go for deep scans, Crashtest Security is here to help you stay on top of your security and protect your code and customers.
    Starting Price: €35 per month
  • 29
    Oracle Web Application Firewall
    ...Protect applications deployed in Oracle Cloud Infrastructure, on-premises, and in multicloud environments with access controls based on geolocation data, whitelisted and blacklisted IP addresses, HTTP URL, and HTTP header. Identify and block malicious bot traffic with an advanced set of verification methods, including JavaScript, CAPTCHA, device fingerprinting, and human interaction algorithms.
  • 30
    LoginID

    LoginID

    LoginID

    ...Additionally, LoginID offers Transaction Confirmation, where a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPAA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
    Starting Price: Free
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB