Business Software for Java - Page 21

Top Software that integrates with Java as of October 2025 - Page 21

Java Clear Filters
  • 1
    Riscure True Code
    True Code helps development teams efficiently deliver secure code by automating vulnerability identification in the SDLC and DevSecOps process. True Code enables natural collaboration between security evaluators and the development team to discover vulnerabilities as early as possible and resolve issues with better efficiency to make the shift to the left. Leveraging years of experience in connected device security in many industries to prevent hacks that bring down customer trust, cause revenue loss and costly mitigations after the product release. Up until now the process of software evaluation was a manual task with correspondingly high costs and long lead times. It is also quite common that an evaluation takes place at the end of the development cycle causing higher costs to resolve issues as opposed to when issues would have been found in the development phase.
  • 2
    DashO

    DashO

    PreEmptive

    Professional obfuscation and in-app protection for over 20 years. We invest in threat and protection research so you don't have to, and we constantly update our protection to stay ahead of the arms race. Protecting your app shouldn't require an army of consultants. You can make your first protected build for Android, Web, or Java in just a few minutes, in whatever build environment you use. Our customers love our support, and consistently give it the highest ratings. Whether you're protecting a mature app that's facing new risks or a new app that you haven't released yet, DashO has you covered. Application development teams face an ever-growing set of security threats as apps become more central to business and attackers grow in sophistication. These days, intellectual property theft is just the beginning, apps are also gateways to trade secret theft, customer/user data theft, and to identifying further attack vectors.
  • 3
    GaraSign

    GaraSign

    Garantir

    There are many excellent enterprise security tools to choose from. Some are managed on-premise, others are consumed as a service, and others still use a hybrid model. The challenge enterprises face is not a lack of tools or solutions, but rather a lack of seamless interconnectivity between these privileged access management tools and a single place to manage and audit them. GaraSign is a platform that allows enterprises to securely and efficiently integrate their security systems in a way that does not disrupt existing business processes. By factoring out what’s common, GaraSign is able to centralize and simplify the management of your enterprise’s most sensitive areas, including privileged access management (PAM), privileged identity management, secure software development, code signing, data security, PKI & HSM solutions, DevSecOps, and more. Enterprise security leaders must attend to data security, privileged access management (PAM), privileged identity management, etc.
  • 4
    RunCode

    RunCode

    RunCode

    RunCode offers online developer workspaces, which are environments that allow you to work on code projects in a web browser. These workspaces provide you with a full development environment, including a code editor, a terminal, and access to a range of tools and libraries. They are designed to be easy to use and allow you to get started quickly without the need to set up a local development environment on your own computer.
    Starting Price: $20/month/user
  • 5
    Salience

    Salience

    Lexalytics

    Text analytics and NLP software libraries for on-premise deployment or integration. Integrate Salience into your enterprise business intelligence architecture or white label it inside your own data analytics product. Salience can process 200 tweets per second while scaling from single process cores to entire data centers with a small memory footprint. Use Java, Python, .NET/C# bindings for higher level ease or the native C/C++ interface for maximum speed. Enjoy full access to the underlying technology. Tune every text analytics function and NLP feature, from tokenization and part of speech tagging to sentiment scoring, categorization, theme analysis, and more. Built on a pipeline model of NLP rules and machine learning models. When issues arise, see exactly where they are in the pipeline. Adjust specific features without disrupting the larger system. Salience runs entirely on your servers while staying flexible enough to offload insensitive data to cloud servers.
  • 6
    Equip

    Equip

    Socratease

    Equip is built for recruiters to conduct pre-hiring assessments. Our assessments test multiple skills at different competencies. Using our vast Question Libraries, or creating Custom Tests enables teams to hire developers, designers, sales representatives, and more! We ensure that you spend the least time interviewing only the top prospects. We have conducted over 15 million proctored tests across the world.
    Starting Price: $10 per month
  • 7
    Workflo

    Workflo

    Workflo

    The Workflo system is specifically designed to help you manage the challenges of providing surface engineering and thermal processing services to your aerospace, Nadcap, and high-technology customers. This is an amazing software tool that will transform your planning and quality system. It probably sounds too good to be true. But, it is true. What makes it work is that, in addition to the software that creates the planning, we provide thousands of hours of data entry to define the requirements of the specifications. Workflo is our complete solution for your company’s work flow management. The program takes your parts door to door through your shop with accurate, real-time information and documentation. Workflo accounts for sales and quoting, certifications, shipping and receiving, vendor tracking, accounts receivable, and much more. The Workflo systems are built with industrial-strength open technologies, such as Java®, MySQL®, and BIRT® (Business Intelligence Report Tool).
  • 8
    Quarkus

    Quarkus

    Quarkus

    Quarkus tailors your application for GraalVM and HotSpot. Amazingly fast boot time, incredibly low RSS memory (not just heap size!) offering near-instant scale up and high-density memory utilization in container orchestration platforms like Kubernetes. We use a technique we call compile time boot. Quarkus provides a cohesive, fun-to-use, full-stack framework by leveraging a growing list of over fifty best-of-breed libraries that you love and use. A cohesive platform for optimized developer joy with unified configuration and no hassle native executable generation. Zero configs, live reload in the blink of an eye, and streamlined code for the 80% common usages, flexible for the remainder 20%. The combination of Quarkus and Kubernetes provides an ideal environment for creating scalable, fast, and lightweight applications. Quarkus significantly increases developer productivity with tooling, pre-built integrations, application services, and more.
  • 9
    Kodezi

    Kodezi

    Kodezi

    Let Kodezi auto-summarize your code in seconds. Kodezi is Grammarly for programmers. Generate, ask, search, and code anything in your codebase with KodeziChat. Your personal AI coding assistant! Kodezi doesn't just fix your code for you, it tells you why it’s wrong and how to prevent future bugs. Reduce unnecessary lines of code and syntax to ensure clean end results. Optimize your code for optimum efficiency. Debug code with detailed explanations. Swap from one framework or language to another in an instant, without losing context. When writing code, commenting and explanations are crucial for future maintenance. Generate code from text, input a project question or create an entire function all in seconds! Generate your code documentation. Translate code to another language. Optimize your code for optimum efficiency. Use our extension within your own IDE, never have to rely on opening up new tabs ever again.
  • 10
    SourceAI

    SourceAI

    SourceAI

    Open to all (even for non-developers), straightforward and simple to use, clear and intuitive interface. Save time in development, generate your code in one click and use your time more efficiently. Powered by GPT-3 and Codex, the most advanced AI technology, and next-generation development. Sometimes SourceAI will have trouble understanding what you want, so you'll have to explain it in more detail. At SourceAI, we are a close-knit team of empathetic and optimistic developers who care deeply about accelerating human progress by making programming accessible to all. Our mission is to give everyone the opportunity to create valuable customized software. We build a self-contained system that can create software at the level of the world's most skilled engineers. We have developed a stand-alone system based on the GPT-3 language model. SourceAI is a tool that can generate code for you in any language from a plain text description.
  • 11
    CodeSign Secure

    CodeSign Secure

    Encryption Consulting LLC

    Our platform guarantees unmatched security and high performance for all your cryptographic needs, ensuring the integrity and authenticity of your software. CodeSign Secure provides advanced insights, cloud-based HSM key management, and policy enforcement for robust practices. Experience seamless integration with Dev Ops CI/CD and streamlined workflows for hands-free code signing.
  • 12
    Keyfactor Signum
    With Keyfactor Signum, sensitive keys are protected, policy is automated, and signing is integrated with your tools and build processes. Generate and store sensitive private signing keys in a centralized, FIPS 140-2 certified hardware security module (HSM) in the cloud. Define granular access and usage policies for private signing keys, and authenticate users and build servers for signing with a full audit trail. Integrate with platform-native signing tools to protect access to private signing keys, without changing workflows. Integrate with signing tools via lightweight Windows and Linux agents that are quick to install on build servers or developer workstations. Generate key attestation to comply with CA/B forum requirements to verify that keys are stored and generated in an HSM.
  • 13
    VisualVM

    VisualVM

    VisualVM

    VisualVM monitors and troubleshoots applications running on Java 1.4+ from many vendors using various technologies including jvmstat, JMX, Serviceability Agent (SA) and Attach API. VisualVM perfectly fits all the requirements of application developers, system administrators, quality engineers, and end users. For each process VisualVM shows basic runtime information: PID, main class, arguments passed to java process, JVM version, JDK home, JVM flags and arguments and System properties. VisualVM monitors application CPU usage, GC activity, heap and metaspace / permanent generation memory, number of loaded classes and running threads. VisualVM provides basic profiling capabilities for analyzing application performance and memory management. Both sampling and instrumentation profilers are available.
  • 14
    Javalin

    Javalin

    Javalin

    You never extend classes and you rarely implement interfaces. Javalin is just a few thousand lines of code on top of Jetty, and its performance is equivalent to raw Jetty code. Due to its size, it's very easy to reason about the source code. Other Java and Kotlin web frameworks usually offer one version for each language. Javalin is being made with inter-operability in mind, apps are built the same way in both Java and Kotlin. Javalin runs on top of Jetty, one of the most used and stable web servers on the JVM. You can configure the Jetty server fully, including SSL and HTTP3 and everything else that Jetty offers. Many lightweight Java and Kotlin web frameworks don't support OpenAPI, but Javalin does.
  • 15
    Benerator

    Benerator

    Benerator

    Describe your data model on an abstract level in XML. Involve your business people as no developer skills are necessary. Use a wide range of function libraries to fake realistic data. Write your own extensions in Javascript or Java. Integrate your data processes into Gitlab CI or Jenkins. Generate, anonymize, and migrate with Benerator’s model-driven data toolkit. Define processes to anonymize or pseudonymize data in plain XML on an abstract level without the need for developer skills. Stay GDPR compliant with your data and protect the privacy of your customers. Mask and obfuscate sensitive data for BI, test, development, or training purposes. Combine data from various sources (subsetting) and keep the data integrity. Migrate and transform your data in multisystem landscapes. Reuse your testing data models to migrate production environments. Keep your data consistent and reliable in a microsystem architecture.
  • 16
    Howdy

    Howdy

    Howdy

    We help companies hire product-oriented developers at unparalleled rates, available to work in your time zone with the highest retention rate in the industry. Say goodbye to spoon-feeding contractors and hello to product-oriented devs who live and breathe the full product life cycle. From discovery to development, they sweat the small stuff to deliver a top-notch user experience.Hiring top developers shouldn’t feel like pinching pennies. Our squad has the chops to tackle any biz or industry challenge, all while keepin' your budget in check. Keeping your dev team happy, satisfied, and sticking around for the long haul is our specialty. And we've got the secret sauce and super special retention strategies to make it happen.
  • 17
    Granica

    Granica

    Granica

    The Granica AI efficiency platform reduces the cost to store and access data while preserving its privacy to unlock it for training. Granica is developer-first, petabyte-scale, and AWS/GCP-native. Granica makes AI pipelines more efficient, privacy-preserving, and more performant. Efficiency is a new layer in the AI stack. Byte-granular data reduction uses novel compression algorithms, cutting costs to store and transfer objects in Amazon S3 and Google Cloud Storage by up to 80% and API costs by up to 90%. Estimate in 30 mins in your cloud environment, on a read-only sample of your S3/GCS data. No need for budget allocation or total cost of ownership analysis. Granica deploys into your environment and VPC, respecting all of your security policies. Granica supports a wide range of data types for AI/ML/analytics, with lossy and fully lossless compression variants. Detect and protect sensitive data even before it is persisted into your cloud object store.
  • 18
    Editor.do

    Editor.do

    Editor.do

    Editor.do is an all-in-one online IDE and hosting platform that allows you to create, code, host and deploy stunning & fast static websites in seconds. You can easily deploy your site files or a zip containing all your project files to our NVMe SSD storage servers, ensuring the fastest possible loading speed for your site. Our IDE supports over 150 programming languages with real-time code rendering and a panel of shortcuts and tools to search, replace, cut, select, and quickly manipulate your code. Editor.do offers over 1000 free and open-source templates covering a wide range of categories and libraries that can be imported directly from GitHub. Plus, ChatGPT is integrated and is always close at hand to help you correct, complete, or improve your code or text. Editor.do is an ideal platform for developers and designers of all skill levels who want to create stunning, fast, and secure websites in a fraction of the time.
    Starting Price: $3 per month
  • 19
    SpotBugs

    SpotBugs

    SpotBugs

    It is free software, distributed under the terms of the GNU Lesser General Public License. SpotBugs is a fork of FindBugs (which is now an abandoned project), carrying on from the point where it left off with the support of its community. Please check the official manual for details. SpotBugs requires JRE (or JDK) 1.8.0 or later to run. However, it can analyze programs compiled for any version of Java, from 1.0 to 1.9. SpotBugs checks for more than 400 bug patterns.
  • 20
    PMD

    PMD

    PMD

    PMD is a source code analyzer. It finds common programming flaws like unused variables, empty catch blocks, unnecessary object creation, and so forth.
  • 21
    StableCode

    StableCode

    Stability AI

    StableCode offers a unique way for developers to become more efficient by using three different models to help in their coding. The base model was first trained on a diverse set of programming languages from the stack-dataset (v1.2) from BigCode and then trained further with popular languages like Python, Go, Java, Javascript, C, markdown and C++. In total, we trained our models on 560B tokens of code on our HPC cluster. After the base model had been established, the instruction model was then tuned for specific use cases to help solve complex programming tasks. ~120,000 code instruction/response pairs in Alpaca format were trained on the base model to achieve this result. StableCode is the ideal building block for those wanting to learn more about coding, and the long-context window model is the perfect assistant to ensure single and multiple-line autocomplete suggestions are available for the user. This model is built to handle a lot more code at once.
  • 22
    ExoCoding

    ExoCoding

    ExoCoding

    ExoCoding is a code generation online platform that empowers software developers to build better software faster. It uses model-based AI-powered assistants to generate boilerplate code and streamline repetitive tasks. Developers can create apps containing modules with Database Management, Logic Building, and Interface Design. There are also more features like sharing prototypes, task planning, and a marketplace with pre-built templates that enhance the developer’s experience. After generating code (backend and frontend), everything is business as usual with the same IDE and other dev tools, but with much work already accomplished.
  • 23
    Teku

    Teku

    Consensys

    Teku is the Ethereum 2.0 client empowering businesses to stake on the next evolution of the Ethereum network. Written in Java and maintained by the same team behind Besu, Teku is equipped to bring staking services to businesses. Consensys Staking enables institutions to capitalize on the revenue opportunity of Ethereum 2.0 without the technical and operational complexities of running an independent validator. External key management for compatibility with enterprise-grade key stores. Built by the team behind Hyperledger Besu, the leading Ethereum client for enterprises. Detailed documentation to help users get started immediately. Metrics and logging for improved functionality and usability. Commercial support for teams upon request. In order to register as a validator on the network, a user must generate Ethereum 2.0 keys by making a one-way deposit of ETH into the official deposit contract.
  • 24
    Everyware Software Framework (ESF)
    Everyware Software Framework (ESF) is an enterprise-ready IoT framework distributed and supported by Eurotech. Based on Eclipse Kura, the open source Java/OSGi middleware for IoT gateways, ESF adds provisioning, advanced security, remote access, and diagnostics monitoring. It supports ready-to-use field protocols (including Modbus, OPC-UA, S7, FANUC, J1939, J1979, BACnet, IEC 60870-5-101, IEC 60870-5-104, DNP3, M-bus), MQTT connectivity, and a web-based visual data flow programming to acquire data from the field, process it at the edge, and publish it to IoT cloud platforms. ESF features full remote device management through its integration with Everyware Cloud, Eurotech’s IoT integration platform. Develop and manage IoT edge computing applications. Easily connect to IoT devices and cloud services using IoT industrial protocols. Visually compose data flows to manage, analyze, and route data.
  • 25
    TotalCross

    TotalCross

    TotalCross

    Less than 5MB of footprint, ensuring high performance even when running in low-end devices. Basic knowledge of Java or Kotlin lets you build performing Apps for Android, Linux Arm, Windows, and iOS. Code once and run on every platform. Responsive User Interfaces provide the same behavior and usability. Tecdet develops systems for traffic control and inspection for the Brazilian government. They decided to rebuild their system for the Linux Arm architecture compatible with Toradex modules and chose TotalCross to develop their GUI.
  • 26
    Offensive 360

    Offensive 360

    Offensive 360

    We’ve spent years researching and developing an all-in-one product that is affordable for any organization, offering the best quality ever seen in the SAST industry. We’ve spent years in research to create an all-in-one product that is affordable to any organization with the best quality ever in the industry. O’360 conducts an in-depth source code examination, identifying flaws in the open-source components used in your project. In addition, it offers malware analysis, licensing analysis, and IaC, all enabled by our “brain” technology. Offensive 360 is developed by cybersecurity researchers, not by investors. It is unlimited, as we don’t charge you based on lines of code, projects, or users. Moreover, O360 identifies vulnerabilities that most SAST tools in the market would never find.
  • 27
    Total Processing

    Total Processing

    Total Processing

    Our expert team will help you avoid complex and unnecessary issues when taking payments. We make processing payments as seamless and secure as possible. Let your customers make payments online when and how they want with a seamless integration of payment methods. Make card payments even easier with our smart checkout solutions. Reduce cart abandonment and increase authorization rates. Manage your merchant account and online business with one seamless, flexible, integrated software. Accept payments on a huge range of ecommerce platforms, in-app services, payment plug-ins, shopping carts and custom solutions to enhance your payment pages.
  • 28
    Prolog

    Prolog

    Prolog

    Prolog is a logic programming language associated with artificial intelligence and computational linguistics. Prolog has its roots in first-order logic, a formal logic, and unlike many other programming languages, Prolog is intended primarily as a declarative programming language, the program logic is expressed in terms of relations, represented as facts and rules. A computation is initiated by running a query over these relations. Prolog was one of the first logic programming languages and remains the most popular such language today, with several free and commercial implementations available. The language has been used for theorem proving, expert systems, term rewriting, type systems, and automated planning, as well as its original intended field of use, natural language processing. Modern Prolog environments support the creation of graphical user interfaces, as well as administrative and networked applications.
  • 29
    OneEntry

    OneEntry

    OneEntry

    Ready-made solutions and tools for implementing any E-commerce project. Easy project scaling without unnecessary time and financial costs. One system incorporates all necessary tools used by developers, content managers and marketing experts. Familiar interfaces without limitations in technologies and programming languages. Easy connection of applications or websites through REST API. Easy export of products and services from YML or CSV files. Issuance of let's encrypt certificates. Daily backups and multiple servers will ensure the preservation of content. OneEntry combines the ease of use of a traditional website and application management system with the flexibility of a Headless CMS that includes all the necessary features for the successful operation of any business project.
    Starting Price: $29.99 per month
  • 30
    TrustLink

    TrustLink

    AarateK

    TrustLink™ is a high-performance biometric identity authentication platform that supports large-scale facial and fingerprint recognition. It is a powerful platform that includes multi-biometric identification technologies and can be used to capture, register, identify, and authenticate fingerprints and faces. It also provides the APIs on the server and client for fast development and deployment into a wide range of applications. TrustLink™ is equipped with Aratek Bione® dynamic optimization algorithm and TrustFace™ face recognition algorithm, it's specialized in the field of large-scale fingerprint and face recognition applications. TrustLink™ is an ideal biometric identity authentication platform for software developers.