Suggested Categories:

XML Databases
XML databases are a type of database that stores, manages, and retrieves data in the XML (Extensible Markup Language) format. These databases are designed to handle semi-structured data, where data is stored in a tree-like structure using tags, making it more flexible than traditional relational databases. XML databases support querying and manipulating XML data using specialized languages such as XPath, XQuery, and XML Schema. They are commonly used in applications that require complex data structures, such as content management systems, document storage, and web services. XML databases allow for efficient handling of large and dynamic datasets while maintaining the hierarchical relationships between elements, making them suitable for applications that need to store and retrieve structured or semi-structured data efficiently.
XML Editors
XML editors are software tools that allow users to create, view, and edit XML (eXtensible Markup Language) files. These tools provide features such as syntax highlighting, validation, auto-completion, and formatting, which make it easier to work with XML data. XML editors also help users ensure that the XML structure is correct and complies with relevant schemas, making them particularly useful for developers working with web services, data exchange, or configuration files. Some XML editors offer advanced features like XPath, XSLT support, and integration with other software development tools.
CAD Viewers
CAD viewers are software tools that enable users to open, view, and interact with CAD (Computer-Aided Design) files without requiring full CAD software for editing or creating designs. These viewers allow users to view 2D and 3D drawings, blueprints, and models in various CAD formats, such as DWG, DXF, or STEP, and often provide features like zooming, rotating, and panning. CAD viewers are commonly used in industries such as engineering, architecture, and manufacturing to review designs, collaborate on projects, and share files with stakeholders. Some CAD viewers also offer markup and annotation tools for commenting on designs.
Photo Viewers
Photo viewers are software applications designed to allow users to view and browse image files in various formats, such as JPEG, PNG, TIFF, GIF, and BMP. These tools typically offer basic features like zooming, rotating, and panning, as well as support for viewing image metadata. Advanced photo viewers may include additional functionalities like slideshow creation, image editing tools, file organization, and batch processing. They are used for personal and professional purposes to manage and display digital images on computers or mobile devices, providing a user-friendly way to interact with visual content.
DICOM Viewers
DICOM viewers are software tools used by healthcare professionals to view, analyze, and interpret medical images in DICOM (Digital Imaging and Communications in Medicine) format. These viewers are designed to handle medical imaging data, such as X-rays, MRIs, CT scans, and ultrasounds, and provide features like zooming, panning, rotation, and annotation for image analysis. DICOM viewers often include advanced functionalities such as multi-frame viewing, 3D rendering, and measurement tools to assist in diagnosis and treatment planning. They also ensure compliance with medical data standards and can integrate with other medical software like Electronic Health Records (EHR) systems and Picture Archiving and Communication Systems (PACS).
BIM Viewers Software
BIM viewers are specialized software tools that allow users to view, explore, and analyze Building Information Models (BIM) without requiring advanced design or modeling skills. These viewers support 3D visualization, enabling stakeholders to inspect architectural, structural, and MEP (mechanical, electrical, plumbing) elements in an intuitive way. Many BIM viewers offer interactive features like section cuts, measurements, and annotation tools, making it easy for project teams to collaborate and provide feedback. They’re essential for sharing project details with clients, contractors, and team members who may not have access to or expertise in full BIM software.
3D Viewers
3D viewers software is used to view and interact with 3D file types and 3D objects on a computer. It provides an intuitive user interface, allowing users to rotate and zoom in on 3D models. Many of these viewers come with collaboration tools, enabling users to work together on the same model. Additionally, they offer advanced features such as simulation, version control, and scripting for more complex usage.
Medical Imaging Software
Medical imaging software is used to capture, store, process, and analyze medical images such as X-rays, MRIs, CT scans, ultrasounds, and other diagnostic images. These tools assist healthcare professionals in interpreting images for the purpose of diagnosis, treatment planning, and monitoring of patient progress. Medical imaging software often includes features such as image enhancement, 3D visualization, measurement tools, and the ability to integrate with electronic health records (EHR) systems. It may also offer tools for image sharing, collaboration, and comparison across different time points or imaging modalities. These software solutions improve the accuracy and efficiency of medical imaging workflows, supporting clinicians in delivering better patient care.
PDF Readers
PDF readers are software applications that enable users to access, open, and read PDFs. PDF readers are essential tools for being able to open and read PDF files. Advanced PDF readers may also support form filling, digital signatures, and interactive features embedded in PDF documents. PDF readers are widely used in both personal and professional settings to view reports, manuals, eBooks, contracts, and other documents that need to preserve formatting across different devices and platforms.
Blockchain Explorers
Blockchain explorers are tools that allow users to view and search blockchain data, including transaction history, blocks, addresses, and other blockchain-related information. These platforms provide transparency and insight into the blockchain, enabling users to track transactions, verify block data, and monitor wallet balances. Blockchain explorers are commonly used to check the status of cryptocurrency transactions, explore the history of addresses or tokens, and verify the details of blocks and smart contract activities. They are essential for maintaining the decentralization and transparency that blockchain networks offer, and are used by both technical users and casual observers.
Dental Imaging Software
Dental imaging software is used by dental professionals to capture, manage, and analyze various types of dental images such as X-rays, 3D scans, and intraoral photographs. This software helps in diagnosing and planning treatments for oral health issues by providing clear, detailed images that are critical for assessment and treatment planning. Features often include image enhancement tools, integration with patient records, digital radiography support, 3D visualization, and measurement tools for accurate diagnosis. Dental imaging software can also improve patient communication by allowing them to view their images and understand their treatment plans more effectively.
Radiology Software
Radiology software is software that assists healthcare professionals in managing, processing, and interpreting medical images, such as X-rays, CT scans, MRIs, and ultrasounds. These tools typically include features for viewing, analyzing, storing, and sharing images, often with advanced functionalities like 3D rendering, image enhancement, and automated measurements to aid in diagnosis. Radiology software integrates with other healthcare systems like PACS (Picture Archiving and Communication Systems) and RIS (Radiology Information Systems) to provide a unified workflow for radiologists, improving efficiency and patient care. It also helps with maintaining patient records, ensuring compliance with healthcare regulations, and improving collaboration between medical professionals.
DJ Software
DJ software is designed for DJs (disc jockeys) and enables them to perform music production, live mixing, and more. DJ software is essential for DJs today that want powerful tools for live shows and music production. Some DJ software is designed purely for a computer only, while other DJ software may integrate with DVS (Digital Vinyl System) and turntables.
Git GUI Clients
Git GUI clients are tools that provide a graphical user interface to interact with Git repositories. They simplify version control tasks, such as committing changes, branching, merging, and resolving conflicts, by offering visual workflows instead of command-line operations. These clients are designed to enhance productivity by making complex Git operations more intuitive, even for users without extensive Git expertise. They support collaboration by visually tracking changes and showing repository history in an organized way. By bridging the gap between Git’s functionality and user accessibility, Git GUI clients are valuable for both novice and experienced developers.
PDF Software
PDF software refers to a range of tools designed for working with PDF (Portable Document Format) files, which are widely used for document sharing and storage. These tools offer a variety of functions, such as creating, viewing, editing, converting, securing, and managing PDF files. PDF software can be used for tasks like merging or splitting documents, adding annotations, filling out forms, applying digital signatures, and securing documents with passwords or encryption. It is commonly utilized across industries for document collaboration, official documentation, and data exchange due to its universal compatibility and ability to maintain formatting across different platforms.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
View more categories (16) for "xml viewer"

26 Products for "xml viewer" with 2 filters applied:

  • 1
    AppXML

    AppXML

    Radware

    ...By adding a layer of infrastructure between the network layers and applications, it simplifies, secures and accelerates XML and web service gateway security deployments, helping you achieve a higher ROI. Improves the speed of XML document processing and secure XML-based communications by offloading tasks to dedicated hardware. Business-level protection from both unintended and malicious attacks without modifying web services or altering and rewriting applications.
  • 2
    PiaSoft Flow Logs Viewer
    ...Pia Software Flow Logs Viewer provides clarity into your logs, with enriched data, useful conversions, and filtering and sorting. The Flow Logs Viewer enriches your logs with vital information. It answers your questions and lets you dive deeper into the data. Enriches your data with information about your VPC, so you get to the log stream you are looking for quicker.
    Starting Price: $0.03 per hour
  • 3
    m0n0wall

    m0n0wall

    m0n0wall

    ...m0n0wall is based on a bare-bones version of FreeBSD, along with a web server, PHP and a few other utilities. The entire system configuration is stored in one single XML text file to keep things transparent. m0n0wall is probably the first UNIX system that has its boot-time configuration done with PHP, rather than the usual shell scripts, and that has the entire system configuration stored in XML format.
    Starting Price: Free
  • 4
    NINJIO

    NINJIO

    NINJIO

    ...The proprietary NINJIO Risk Algorithm™ identifies users’ social engineering vulnerabilities based on phishing simulation data and informs content delivery to provide a personalized experience that changes individual behavior. With NINJIO you get: - NINJIO AWARE attack vector-based training that engages viewers with Hollywood style, micro learning episodes based on real hacks. - NINJIO PHISH3D simulated phishing identifies the specific social engineering tricks most likely to fool users in your organization. - NINJIO SENSE is our new behavioral science-based training course that shows employees what it “feels like” when hackers are trying to manipulate them.
  • 5
    VdoCipher

    VdoCipher

    VdoCipher Media Solutions

    ...Amazon AWS for Servers + CDN. Transcoding, Analytics, API, Dashboard, Plugins, Custom workflows. Customizable player with subtitles, speed change, forward rewind options. Option for viewer to download secure in android app and play offline. DRM encrypted video streaming technology ensures that no downloader, plugin can grab your content. Highest security from video piracy with Widevine DRM. Viewer specific moving/static watermark with email, user id, IP, time stamp. Customize color, speed, transparency, size for watermark.
    Starting Price: $129 per user, per year
  • 6
    TextCaptcha

    TextCaptcha

    TextCaptcha

    The TextCaptcha service provides access to textual CAPTCHA challenges via a simple JSON or XML API over HTTP. The question is the textual challenge that should be presented to the user. The answers are the MD5 hashes of correct lower cased answers: you should be able to check responses from real users you challenge with the question against these checksums. A text CAPTCHA is more accessible to visually impaired users than their image-based alternatives like ReCAPTCHA.
    Starting Price: Free
  • 7
    ISEEK

    ISEEK

    XtremeForensics

    ...Once ISEEK has been used to pinpoint the required data and reduce the volume for further review it enables multiple encrypted results containers to have their contents extracted in a number of different formats (with optional XML metadata) for ingesting by a review tool. These formats include generic load files and a Relativity-specific load file.
  • 8
    IBM DataPower Gateway
    ...DataPower Gateway offers content introspection at wire speeds, service request and response monitoring to support a centralized management and control platform. DataPower appliances deliver a robust XML firewall for the enterprise, using sophisticated checks. The DataPower appliance enables the classification of data requests based on service and application-level information. Enterprise-grade security with the highest level of security assurance certification for critical enterprise apps.
  • 9
    jsObf

    jsObf

    jsObf

    jsObf is a powerful, web-based JavaScript encryption and obfuscation tool that enables users to transform readable JavaScript code into obfuscated, secure versions via direct input or file uploads (up to 5 MB). It also serves developers through its API, offering two endpoints, one for raw code and another for file uploads, with configurable output formats (JSON or XML) and adjustable complexity levels. It simplifies protection workflows with intuitive, drag-and-drop interfaces and backend API support, empowering users to quickly mask logic, thwart reverse engineering, and secure proprietary scripts without complex setup or tooling.
    Starting Price: $49.99 per month
  • 10
    Cerber Security

    Cerber Security

    Cerber Tech

    ...Mitigates brute force and code injection attacks. Restricts access with GEO country rules. Prevents both REST API and ordinary user enumerations. Restricts access to REST API and XML-RPC. Uses a global list of IP addresses known for malicious activity. Detects bots by using heuristic and content-based algorithms. Checks IP against a real-time database of IP addresses known for disseminating spam, phishing attacks and other forms of malicious activity. Thoroughly scans every file and folder on your website for malware, trojans, and viruses. ...
  • 11
    Loginizer

    Loginizer

    Loginizer

    ...All differences of WordPress Core will be reported to the Admin. An email with a temporary login URL. Users can set secondary challenge questions. Two-factor auth using Google Authenticator, Authy, etc. Simply disable XML-RPC with Loginizer. Check logs of failed login attempts. Blacklist an IP or IP range from login. Loginizer has been integrated as a WordPress plugin so you can simply install the plugin from your WordPress dashboard and get started.
    Starting Price: $24 per year
  • 12
    API Critique

    API Critique

    Entersoft Information Systems

    ...Your development and operations teams can now prioritize on the vulnerabilities without any hassle. View all the results of your scans in various reporting formats such as PDF and HTML for your stakeholders and technical teams. We also provide XML & JSON formats for your automation tools to generate customized reports. Development and Operations teams can learn from our exclusive Knowledge Base about the possible attacks and countermeasures with remediation steps to mitigate the risks to your APIs.
    Starting Price: $199 per month
  • 13
    Xplico

    Xplico

    Xplico

    ...For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT). At each data reassembled by Xplico is associated a XML file that uniquely identifies the flows and the pcap containing the data reassembled.
  • 14
    DOT Anonymizer

    DOT Anonymizer

    DOT Anonymizer

    ...Consistency of anonymizations across all DBMS and platforms. Preserve relations between tables to guarantee realistic data. Anonymize all database types and files like CSV, XML, JSON, etc.
    Starting Price: €488 per month
  • 15
    OnDMARC

    OnDMARC

    Red Sift

    ...Red Sift is an open cloud platform that makes cybersecurity accessible to everyone to prevent cyber attacks. OnDMARC makes implementing and maintaining a secure DMARC policy easy. OnDMARC not only processes complex XML reports for you but, combined with machine learning and excellent customer support, gets users to full protection quickly but sustainably. Some of our unique features include: - Investigate - View changes to your DNS live instead of waiting 24 hours - Dynamic SPF - Overcome the 10 DNS lookup limit - Threat Intelligence - Automatically classify IP Sources - External Accreditation - ISO27001 certified - Dedicated support - Live Chat & 750+ Knowledge Base Articles Our partnerships with Verified Mark Certificate (VMC) Providers also supports customers to deploy BIMI.
    Starting Price: $35.00/month
  • 16
    Curity

    Curity

    Curity

    ...Curity's architecture is built on the principle of separation of concerns, enhancing security, flexibility, and scalability. It provides advanced configuration management with transaction-based changes, rollbacks, and backups, accessible through a web UI, CLI, RESTCONF API, and XML config files.
  • 17
    ProDiscover

    ProDiscover

    ProDiscover

    ...ProDiscover helps in efficiently uncovering files and data of interest. Wizards, dashboards and timeline views help in speedily discovering vital information. Investigators are provided with a wide range of tools and integrated viewers to explore the evidence disks and extract artifacts relevant to the investigation. ProDiscover combines speed and accuracy, with ease of use and is available at an affordable price. Launched in 2001, ProDiscover has a rich history. It was one of the first products to support remote forensic capabilities.
  • 18
    Corner Bowl Event Log Manager

    Corner Bowl Event Log Manager

    Corner Bowl Software Corporation

    ...Compliance Reporting Software for JSIG, NIST, CJIS, PCI/DSS, HIPAA, SOX, GDPR and CIS Microsoft 365 Security & Compliance with 80+ pre-built reports. An enhanced Windows Event Log Viewer with advanced search and filter capabilities. Supports Windows Event Logs, Syslogs, text based Application Logs on Windows and Linux, and cloud based Azure Active Directory Audit Logs. Once harvested, log entries are saved to either a local or offsite log repository. Event Log Manager provides you with 5 different methods to centralize your log entries including MySQL, Microsoft SQL Server, elasiticsearch and CosmosDB.
    Starting Price: $84
  • 19
    Errsole

    Errsole

    Errsole

    1) Minimal Setup: Just include the Errsole package in your code—no need for dedicated servers, software installations, or complicated configurations. 2) Logger++: Errsole automatically collects all logs from the Node.js console. Additionally, it provides advanced logging functions that support multiple log levels and the ability to attach metadata to logs. 3) Log Viewer: View, filter, and search through your logs using the built-in Web Dashboard. Secure authentication and team management features ensure that only you and your team can access the logs. 4) Critical Error Notifications: Get immediate notifications when your app crashes or encounters critical errors. The notification includes the error message, the app name, the environment, the server name, and a direct link to view the error in your logs.
    Starting Price: 0
  • 20
    ESET Endpoint Security
    ...Provides quick analysis and remediation of any security issue in the network. ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning. New rules can be created to match the needs of specific enterprise environments, including SIEM integrations. Utilize ESET’s endpoint detection and response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
    Starting Price: $38 per user per year
  • 21
    Dotcom-Monitor

    Dotcom-Monitor

    Dotcom-Monitor

    Website monitoring and performance testing solutions. Combined with powerful monitoring features such as real-time dashboards and performance reporting options, and nearly 30 global monitoring network locations, you can quickly identify where performance issues are occurring. Quickly and easily record custom scripts to monitor interactive websites and web application elements and user scenarios with the EveryStep Web Recorder. Dotcom-Monitor makes it easy to ensure performance,...
    Starting Price: $19.99/month
  • 22
    IRI DarkShield

    IRI DarkShield

    IRI, The CoSort Company

    ...DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. ...
    Starting Price: $5000
  • 23
    Webz.io

    Webz.io

    Webz.io

    ...With data already stored in repositories, machines start consuming straight away and easily access live and historical data. Webz.io translates the unstructured web into structured, digestible JSON or XML formats machines can actually make sense of. Never miss a story, trend or mention with real-time monitoring of millions of news sites, reviews and online discussions from across the web. Keep tabs on cyber threats with constant tracking of suspicious activity across the open, deep and dark web. Fully protect your digital and physical assets from every angle with a constant, real-time feed of all potential risks they face. ...
  • 24
    ConfigOS

    ConfigOS

    SteelCloud

    ...ConfigOS scans endpoint systems and remediates hundreds of STIG controls in under 90 seconds. Automated remediation rollback as well as comprehensive compliance reporting and STIG Viewer Checklist output are provided. ConfigOS was designed to harden every CAT 1/2/3 STIG control around an application baseline in about 60 minutes - typically eliminating weeks or months from the RMF accreditation timeline. ConfigOS addresses Microsoft Windows workstation and server operating systems, SQL Server, IIS, IE, Chrome, and all of the Microsoft Office components. ...
  • 25
    Skycloak

    Skycloak

    Skycloak

    Many developers don’t realize Keycloak, a free and open-source IAM tool, offers powerful user management, authentication, and custom login features. However, managing and scaling Keycloak can be complex. Skycloak simplifies this by providing a managed Keycloak service, eliminating maintenance overhead, cutting costs, and ensuring compliance—giving you enterprise-grade IAM without the hassle.
    Starting Price: $25/month
  • 26
    Paessler PRTG

    Paessler PRTG

    Paessler GmbH

    ...All important technologies are supported: • SNMP: ready-to-use and custom options • WMI and Windows Performance Counters • SSH: for Linux/Unix and macOS systems • Traffic analysis using flow protocols or packet sniffing • HTTP requests • REST APIs returning XML or JSON • Ping, SQL, and many more
    Leader badge
    Starting Price: $2149 for PRTG 500
  • Previous
  • You're on page 1
  • Next