Suggested Categories:

Firewall Software
Firewall software is a security tool that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between a trusted internal network and untrusted external networks, firewalls help prevent unauthorized access and protect against cyber threats. They work by analyzing data packets and determining whether they should be allowed through based on set policies, blocking potentially harmful traffic. Modern firewalls often incorporate advanced features like intrusion prevention, application filtering, and deep packet inspection to strengthen security further. By providing this critical layer of protection, firewall software safeguards sensitive data and ensures the integrity of networked systems.
Web Application Firewalls (WAF)
Web Application Firewalls (WAFs) are security solutions that protect web applications by filtering and monitoring HTTP traffic between the application and the internet. They detect and block threats such as SQL injections, cross-site scripting (XSS), and other common attacks targeting application vulnerabilities. WAFs analyze incoming requests in real time, applying customizable security rules to distinguish between legitimate and potentially malicious traffic. Many WAFs are cloud-based, enabling flexible and scalable protection without impacting application performance. By acting as a shield between web applications and attackers, WAFs help ensure data security, regulatory compliance, and uninterrupted user access.
Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
Firewall Security Management Software
Firewall security management software is software to monitor, configure, and control firewall systems to protect networks from unauthorized access and cyber threats. It provides administrators with a centralized interface to manage firewall policies, monitor traffic, and detect potential vulnerabilities. The software helps ensure compliance with security protocols by automating rule updates, generating alerts for suspicious activities, and offering detailed analytics. It supports both hardware-based and software firewalls, facilitating secure communication between internal and external networks. By streamlining firewall management, this software plays a critical role in maintaining a strong network security posture.
Next-Generation Firewall (NGFW) Solutions
A Next-Generation Firewall (NGFW) is an advanced network security solution designed to provide comprehensive protection by integrating traditional firewall capabilities with modern security features. Unlike standard firewalls, NGFWs offer deep packet inspection, allowing them to analyze and filter traffic at the application level. They include features such as intrusion prevention systems (IPS), application control, and advanced threat protection, including malware detection. NGFWs are highly customizable and can enforce granular policies based on user identity, device, and behavior, making them a vital tool in defending against evolving cyber threats. By combining robust performance, scalability, and real-time threat intelligence, NGFWs help organizations safeguard their networks in increasingly complex IT environments.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Load Testing Tools
Load testing tools are used to test and verify the quality and performance of an application under workload in order to get rid of problems.
Endpoint Protection Software
Endpoint protection software is a software platform that provides the solution to secure endpoints—such as laptops, desktops, smartphones, and tablets—against cyber threats and attacks. These platforms provide real-time monitoring and defense mechanisms to protect devices from malware, ransomware, phishing, and other types of threats. Endpoint protection software typically includes antivirus, anti-malware, firewall, encryption, and intrusion prevention features to prevent unauthorized access and ensure data security. It also allows for centralized management, enabling IT teams to enforce security policies, update software, and monitor the health of all devices in the network. By using endpoint protection software, organizations can safeguard their devices and networks from cyber risks while maintaining compliance with security standards.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
View more categories (14) for "java firewall"

78 Products for "java firewall" with 2 filters applied:

  • 1
    TruGrid

    TruGrid

    TruGrid

    TruGrid SecureRDP secures access to Windows desktops and applications from any location. It is a DaaS solution that employs a Zero Trust model without firewall exposure. Key Benefits of TruGrid SecureRDP: - No Firewall Exposure & No VPN Required: Secure remote access without exposing inbound firewall ports - Zero Trust Security Model: Ensures that only pre-authenticated users can connect, mitigating ransomware risks - Cloud-Based Authentication: Eliminates the need for RDS gateways, SSL certificates, or third-party MFA solutions - Optimized Performance: Built-in fiber-optic mesh technology reduces latency - Simple Deployment & Multi-Tenant Management: Implements in less than an hour and includes a multi-tenant dashboard - Integrated MFA & Azure AD Support: Includes built-in MFA and integrates with Azure MFA & AD - Cross-Platform Support: Works on Windows, Mac, iOS, Android, and Chrome - 24x7 Support & Free Setup: Includes 24x7 support and free setup assistance
    Leader badge
    Starting Price: $12/month/user
  • 2
    1Password

    1Password

    1Password

    ...Once 1Password is part of their workflow, good security habits will become second nature. 1Password Advanced Protection is now available with 1Password Business. Set Master Password policies, enforce two-factor authentication team-wide, restrict access with firewall rules, review sign-in attempts and require your team to use the latest version of 1Password. Our award-winning apps are available for Mac, iOS, Linux, Windows, and Android. 1Password syncs seamlessly across devices, so your employees always have access to their passwords. When everyone uses 1Password, your risk goes down — and your productivity goes up.
    Leader badge
    Starting Price: $3.99/month/user
    View Software
    Visit Website
  • 3
    OPNsense

    OPNsense

    OPNsense

    ...They protect against known and new threats to computers and networks. A firewall offers the highest level of protection if its functions are known, its operation is simple, and it is ideally positioned in the surrounding infrastructure. OPNsense accepts the challenge and meets these criteria in different ways. This book is the ideal companion for understanding, installing and setting up an OPNsense firewall.
    Starting Price: Free
  • 4
    NetScaler

    NetScaler

    Cloud Software Group

    Application delivery at scale can be complex. Make it simpler with NetScaler. Firmly on-prem. All-in on cloud. Good with hybrid. Whichever you choose, NetScaler works the same across them all. NetScaler is built with a single code base using a software-based architecture, so no matter which ADC form factor you choose — hardware, virtual machine, bare metal, or container — the behavior will be the same. Whether you are delivering applications to hundreds of millions of consumers, hundreds...
  • 5
    Loadbalancer.org

    Loadbalancer.org

    Loadbalancer.org

    Since 2003, Loadbalancer.org has provided reliable, versatile and cost-effective load balancers engineered to improve the availability of your most critical IT applications. We have extensive experience of solving application delivery challenges, so you can expect honest advice and outstanding support from the load balancer experts. Working closely with leading technology providers in medical, object storage and print, our ADC solutions are specifically tailored to ensure seamless...
    Starting Price: $95 per month
  • 6
    Bitrise

    Bitrise

    Bitrise

    Bitrise is a CI/CD platform built for mobile development, helping teams speed up builds, automate testing, and deliver high-quality apps faster. It supports native languages like Swift, Objective-C, Java, and Kotlin, as well as cross-platform frameworks including React Native, Flutter, Xamarin, Cordova, and Ionic. Setup takes minutes, with customizable workflows that adapt to any project. Bitrise integrates with GitHub, GitLab, and other industry-standard tools, while its cloud infrastructure removes the need for manual processes or maintenance overhead. ...
    Starting Price: $89/month
  • 7
    Thinfinity Workspace

    Thinfinity Workspace

    Cybele Software, Inc.

    ...With its proprietary reverse gateway technology, Thinfinity® Remote Workspace 7 ensures secure reverse connections over SSL with TLS 1.3 encryption. This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business. The platform ensures all browser-based connections are secured over HTTPS, offering a wide variety of authentication options, from straightforward User/Password to sophisticated Active Directory authentication.
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 8
    ORMIT™-OpenJava
    ORMIT™-OpenJava will convert your PL-SQL code into Java backend source code automatically.
  • 9
    EvoSuite

    EvoSuite

    EvoSuite

    EvoSuite is an open source tool that automatically generates JUnit test suites for Java classes, utilizing search-based software testing (SBST) techniques to optimize code coverage and detect potential defects. By analyzing Java bytecode, EvoSuite creates executable unit tests with assertions, aiming to achieve high structural coverage such as branch, line, and mutation coverage. It employs a hybrid approach that combines evolutionary algorithms with mutation testing to produce effective and minimal test suites. ...
    Starting Price: Free
  • 10
    Tailscale

    Tailscale

    Tailscale

    Create a secure network between your servers, computers, and cloud instances. Even when separated by firewalls or subnets, Tailscale just works. A frustratingly complex and brittle collection of firewalls, rules, and holes while wondering if your network is secure enough. Devices connect directly, working from any physical location or networking environment. All without poking holes in your firewall. Devices only connect after signing in through your existing identity provider. ...
    Starting Price: $5 per user per month
  • 11
    Zulu Embedded

    Zulu Embedded

    Azul Systems

    Zulu Embedded™ is the only fully certified, completely customizable 100% open source Java platform for embedded systems plus IoT and IIoT edge devices, gateways and dedicated applications. Across a wide variety of devices and operating systems. Zulu Embedded™ meets all Java SE standards and requires no coding changes to your application. Leverage industry-standard Java tools for development and profiling. As a pure, 100% open source offering there are no license fees. ...
  • 12
    MarathonITE

    MarathonITE

    Jalian Systems

    ...MarathonITE provides excellent ROI for your test teams. Some of the powerful features of MarathonITE include: Intelligent recording and replay, flexible and configurable object map, selenium/WebDriver bindings for Java™ applications. MarathonITE is a professional tool for creating and executing automated tests through GUI for applications developed using Java/Swing™, Java/Fx™ and Web technologies. MarathonITE provides Selenium/WebDriver bindings for Java application runtime to provide flexible and powerful API to interact with the applications and create GUI tests. ...
    Starting Price: $ 1480 per 1 unit
  • 13
    Zoho Assist
    ...Zoho Assist is entirely cloud-based, so you can set up unattended remote access and keep tabs on your remote PCs, laptops, mobile phones, and servers effortlessly. Zoho Assist is compatible with all major firewalls and traverses smoothly through proxies. Start your technical support today with industry-standard, best-in-class SSL with 256-bit AES data security to protect your data from phishing and other malicious activities. 
    Leader badge
    Starting Price: $10.00/month/user
  • 14
    Introviz

    Introviz

    Introviz

    ...Anti-Virus, VPN, Firewalls and Phishing Site protection protects against known phishing sites and viruses – not browser content. The browser has become the new gateway to phishing and malware. And the malware can spread from employee device to your network.
  • 15
    Apache Log4j

    Apache Log4j

    Apache Software Foundation

    ...It can automatically reload its configuration upon modification and will do so without losing log events while reconfiguration occurs. When configured correctly, Log4j can deliver excelling performance without almost any burden on the Java garbage collector, and it will do so without sacrificing reliability.
    Starting Price: Free
  • 16
    QF-Test

    QF-Test

    Quality First Software

    ...QF-Test is a low-code GUI test tool that allows to efficiently create test cases, e.g. using Capture/Replay, without any programming knowledge across platforms on Windows, Linux and macOS. For software developers, Jython, Groovy or JavaScript offer advanced scripting possibilities. Tests can be run automatically via continuous integration tools such as Jenkins and generate detailed reports. Robust & stable regression tests for various UI technologies can be created. QF-Test supports all types of Java GUIs, ranging from Swing (including ULC, JIDE components, CaptainCasa), its successor JavaFX, as well as the Standard Widget Toolkit (SWT) and Eclipse, including plugins and RCP applications. ...
    Starting Price: $2435.00/one-time
  • 17
    ManageEngine EventLog Analyzer
    ...The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options. With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports. EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. ...
    Starting Price: $595
  • 18
    Loupe

    Loupe

    Loupe

    Know when issues happen in your application with Loupe. A logging and application monitoring solution for .NET and Java, Loupe helps software teams monitor, find, and fix errors in their applications the first time. It also gives users the visibility into events and key metrics for all applications, and offers the ability to dig deeper into specific events, sessions, users, and machines. Loupe can be deployed on-premise or as a cloud hosted solution.
    Starting Price: $25.00/month
  • 19
    yFiles

    yFiles

    yWorks

    ...With advanced layout algorithms, interactive capabilities, and strong performance, yFiles enables developers to integrate scalable and clear graph visualizations into web, desktop, or mobile applications. Supporting multiple platforms like HTML/JavaScript, Java, and .NET, yFiles is used across industries such as telecommunications, finance, and life sciences to make complex processes and relationships easy to understand.
    Starting Price: $17,000/developer
  • 20
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.
  • 21
    XRebel

    XRebel

    Perforce

    XRebel does things traditional profiling tools can’t. It allows developers to trace the impact of their code from beginning to end — even in distributed applications. This, combined with real-time Java performance metrics, makes XRebel is a must-have tool for any Java developer. With XRebel, developers can create better-performing applications that lead to better end user experience. Unlike traditional profilers, XRebel takes a request-based approach to performance – making performance issues clearer and more actionable. Follow your request across all XRebel-enabled services, seeing performance data for each. ...
  • 22
    Zulu Enterprise

    Zulu Enterprise

    Azul Systems

    Azul Zulu is a 100% open source, fully standards-compliant Java Development Kit (JDK) and runtime platform with flexible pricing and support plans, no proprietary licenses or field of use restrictions, timely security updates, and the industry’s best support from Azul’s globally-distributed support team. The level of support is extremely important to many customers, as one survey respondent, a VP of Global Information Security, explained: “One of the big benefits of Zulu is its strong support and the optionality of the level of support you want to receive. ...
    Starting Price: Up to 5 Desktops $112.5 USD/year
  • 23
    RabbitMQ

    RabbitMQ

    RabbitMQ

    ...RabbitMQ runs on many operating systems and cloud environments and provides a wide range of developer tools for most popular languages. Deploy with Kubernetes, BOSH, Chef, Docker and Puppet. Develop cross-language messaging with favorite programming languages such as Java, .NET, PHP, Python, JavaScript, Ruby, Go, etc.
    Starting Price: Free
  • 24
    Squish

    Squish

    Qt Group

    Squish GUI Tester automates testing of graphical user interfaces across platforms and technologies such as Qt, Java, Web, .NET/WPF, iOS, Android, and embedded systems. Test scripts can be written in Python, JavaScript, Perl, Tcl, or Ruby, and its object-based recognition ensures tests remain reliable even as UIs change. With features like record/replay, keyword-driven and data-driven testing, test suite management, and CI/CD integration, Squish helps teams reduce manual testing, accelerate testing cycles, and ensure consistent performance, usability, and reliability. ...
  • 25
    Omnis Studio

    Omnis Studio

    Omnis Software Ltd

    ...Omnis Studio allows application developers and programmers to write application code and business logic once, and deploy their applications on virtually any platform or device, including desktop PCs on Windows and macOS, as well as tablets and phones on iOS, Android and Windows. Support for a large range of client devices is enabled using the Omnis JavaScript Client, a unique JavaScript based technology for rendering the application UI and web forms in a standard web browser on desktops and mobile devices. The integration of data and services is available in Omnis Studio via REST based Web Services, and functionality can be extended within Omnis Studio by utilizing its powerful and flexible external components API. ...
  • 26
    Bird Eats Bug

    Bird Eats Bug

    Bird Eats Bug

    ...You can also get much better bug reports if non-technical people in your company start using Bird as well. ⏳Quick setup Takes quite literally 5 minutes. No coding or technical knowledge needed. ⚠️ JavaScript error tracker Bird automatically notifies you about JavaScript errors on the pages of your choice.
    Starting Price: $15/user/month
  • 27
    UTunnel VPN and ZTNA
    ...SITE-TO-SITE VPN: The Access Gateway solution lets you easily set up secure Site-to-Site tunnels (IPSec) between UTunnel's VPN servers and hardware network gateways, firewalls & UTM systems.
    Leader badge
    Starting Price: $6/user/month
    Partner badge
  • 28
    RPort

    RPort

    RPort

    ...Monitor internet based servers and their services like websites and email servers from different locations around the globe. Network monitoring of intranets, routers, switches, IP-cameras, printers, and other IP-devices behind a firewall. Stop spending more time configuring your monitoring solution than actually monitoring your network. CloudRadar's simple UX, preconfigured checks and default alerts are designed to get your monitoring running in minutes. No matter if you replace your previous tool or set up a new monitoring.
    Starting Price: $1.50 per host per month
  • 29
    Perimeter 81

    Perimeter 81

    Check Point Software Technologies

    Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race". ...
    Starting Price: $8 per user per month
  • 30
    Touch VPN

    Touch VPN

    Touch VPN

    Bypass geo-restrictions to unblock any website wherever you are! Get access to sites that are blocked or censored by the government, school or workplace. Evade firewalls to unblock Facebook, watch youtube, and circumvent VOIP limitations. TouchVPN unblocks it all with its free VPN app. Avoid being snooped by your ISP and prevent websites from ad tracking and targeting. TouchVPN changes your IP address, so your online identity is anonymous and your internet activity is inaccessible to prying eyes and businesses. ...
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB