Suggested Categories:

Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
Metadata Management Software
Metadata management software enables users and organizations to manage, identify, fetch, and analyze metadata. Metadata management software streamlines the processes involved with managing metadata.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Data Governance Software
Data governance software helps organizations ensure the quality, consistency, security, and accessibility of their data across the enterprise. These platforms provide tools for defining data policies, standards, and processes, ensuring that data is properly classified, managed, and protected throughout its lifecycle. Data governance software often includes features like data cataloging, lineage tracking, metadata management, and role-based access controls. It supports compliance with data protection regulations such as GDPR and HIPAA, helping businesses maintain regulatory compliance and avoid potential legal risks. By using data governance software, organizations can improve data integrity, enhance decision-making, and foster better collaboration across teams.
Load Testing Tools
Load testing tools are used to test and verify the quality and performance of an application under workload in order to get rid of problems.
Runtime Application Self-Protection (RASP) Software
Runtime Application Self-Protection (RASP) software is a security solution designed to protect applications in real time while they are running, providing active defense against attacks by detecting and mitigating vulnerabilities as they occur. Unlike traditional security tools, which primarily focus on perimeter defense or static scanning, RASP operates within the application itself and monitors its behavior during runtime. It can automatically block malicious activity, such as SQL injection, cross-site scripting (XSS), and unauthorized access, by analyzing both application traffic and the application's internal behavior. RASP is particularly valuable for protecting web applications, mobile apps, and APIs from advanced threats, ensuring the security of applications even if they are deployed in dynamic or cloud environments.
Application Shielding Software
Application shielding software is designed to protect applications from reverse engineering, tampering, and unauthorized access by applying security measures that obfuscate and encrypt critical parts of the application. This software helps prevent attacks like code injection, software cracking, and piracy by adding layers of protection to sensitive data and logic within the application. Application shielding typically includes features such as runtime protection, data encryption, anti-debugging, and obfuscation techniques, making it more difficult for attackers to exploit vulnerabilities. It is commonly used in industries like software development, finance, and gaming, where intellectual property protection is crucial.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
View more categories (11) for "java dictionary"
  • 1
    JSDefender

    JSDefender

    PreEmptive

    Cutting-edge JavaScript obfuscation techniques with control-flow flattening, tamper detection and other in-app protection transforms. We would not send our own unprotected code to a remote service controlled by third parties and we would not expect you to either. JSDefender supports major JavaScript frameworks, runtimes, and bundlers including Angular, Node, React, React Native, Webpack and others.
  • 2
    Jscrambler

    Jscrambler

    Jscrambler

    Jscrambler pioneered and leads the Client-Side Security Platform category. Jscrambler’s Client-Side Security Platform is powered by a Behavioral Enforcement Core that governs how application code, third-party scripts, and sensitive data behave at runtime. By enforcing software integrity and data governance directly in the browser, the platform ensures sensitive data and AI inputs are controlled according to enterprise policy at the point of creation — before they leave the client...
    Partner badge
    View Software
    Visit Website
  • 3
    DashO

    DashO

    PreEmptive

    ...We invest in threat and protection research so you don't have to, and we constantly update our protection to stay ahead of the arms race. Protecting your app shouldn't require an army of consultants. You can make your first protected build for Android, Web, or Java in just a few minutes, in whatever build environment you use. Our customers love our support, and consistently give it the highest ratings. Whether you're protecting a mature app that's facing new risks or a new app that you haven't released yet, DashO has you covered. Application development teams face an ever-growing set of security threats as apps become more central to business and attackers grow in sophistication. ...
  • 4
    SEAP

    SEAP

    XTN Cognitive Security

    SEAP® for Mobile is an SDK integrated into the customer’s app and doesn’t require any special permission. SEAP® for Web is JavaScript based, executed in the web browser application environment and does not require the installation of any agent. SEAP® detects malware activity both in mobile and web apps. Some examples of the malware threats monitored include man-in-the-browser and man-in-the-app-attacks, RAT, web injections, overlay attacks, SMS grabbing, memory tampering, and Injection attacks. ...
  • 5
    DexGuard

    DexGuard

    Guardsquare

    ...It enables you to fully protect your application or SDK without requiring you to share or alter the source code. DexGuard offers built-in support for both native Android (Java, Kotlin) and cross-platform applications (Cordova, Ionic, React Native, Unity). DexGuard’s functionality can be extended with the NDK add-on to process and protect native libraries.
  • 6
    ByteHide

    ByteHide

    ByteHide

    ByteHide is an all-in-one, developer-first application security platform designed to protect code, secrets, data, and runtime environments, while minimizing your dependencies and risk. It integrates seamlessly with your development workflows and communication tools, delivering key security insights and alerts without disrupting productivity. Operating under a zero-knowledge model, ByteHide uses client-side encryption so only you hold the keys, and it never stores your source code. With...
    Starting Price: €39.99 per month
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB