Business Software for Java - Page 21

Top Software that integrates with Java as of July 2025 - Page 21

Java Clear Filters
  • 1
    Teku

    Teku

    Consensys

    Teku is the Ethereum 2.0 client empowering businesses to stake on the next evolution of the Ethereum network. Written in Java and maintained by the same team behind Besu, Teku is equipped to bring staking services to businesses. Consensys Staking enables institutions to capitalize on the revenue opportunity of Ethereum 2.0 without the technical and operational complexities of running an independent validator. External key management for compatibility with enterprise-grade key stores. Built by the team behind Hyperledger Besu, the leading Ethereum client for enterprises. Detailed documentation to help users get started immediately. Metrics and logging for improved functionality and usability. Commercial support for teams upon request. In order to register as a validator on the network, a user must generate Ethereum 2.0 keys by making a one-way deposit of ETH into the official deposit contract.
  • 2
    Everyware Software Framework (ESF)
    Everyware Software Framework (ESF) is an enterprise-ready IoT framework distributed and supported by Eurotech. Based on Eclipse Kura, the open source Java/OSGi middleware for IoT gateways, ESF adds provisioning, advanced security, remote access, and diagnostics monitoring. It supports ready-to-use field protocols (including Modbus, OPC-UA, S7, FANUC, J1939, J1979, BACnet, IEC 60870-5-101, IEC 60870-5-104, DNP3, M-bus), MQTT connectivity, and a web-based visual data flow programming to acquire data from the field, process it at the edge, and publish it to IoT cloud platforms. ESF features full remote device management through its integration with Everyware Cloud, Eurotech’s IoT integration platform. Develop and manage IoT edge computing applications. Easily connect to IoT devices and cloud services using IoT industrial protocols. Visually compose data flows to manage, analyze, and route data.
  • 3
    TotalCross

    TotalCross

    TotalCross

    Less than 5MB of footprint, ensuring high performance even when running in low-end devices. Basic knowledge of Java or Kotlin lets you build performing Apps for Android, Linux Arm, Windows, and iOS. Code once and run on every platform. Responsive User Interfaces provide the same behavior and usability. Tecdet develops systems for traffic control and inspection for the Brazilian government. They decided to rebuild their system for the Linux Arm architecture compatible with Toradex modules and chose TotalCross to develop their GUI.
  • 4
    Offensive 360

    Offensive 360

    Offensive 360

    We’ve spent years researching and developing an all-in-one product that is affordable for any organization, offering the best quality ever seen in the SAST industry. We’ve spent years in research to create an all-in-one product that is affordable to any organization with the best quality ever in the industry. O’360 conducts an in-depth source code examination, identifying flaws in the open-source components used in your project. In addition, it offers malware analysis, licensing analysis, and IaC, all enabled by our “brain” technology. Offensive 360 is developed by cybersecurity researchers, not by investors. It is unlimited, as we don’t charge you based on lines of code, projects, or users. Moreover, O360 identifies vulnerabilities that most SAST tools in the market would never find.
  • 5
    Total Processing

    Total Processing

    Total Processing

    Our expert team will help you avoid complex and unnecessary issues when taking payments. We make processing payments as seamless and secure as possible. Let your customers make payments online when and how they want with a seamless integration of payment methods. Make card payments even easier with our smart checkout solutions. Reduce cart abandonment and increase authorization rates. Manage your merchant account and online business with one seamless, flexible, integrated software. Accept payments on a huge range of ecommerce platforms, in-app services, payment plug-ins, shopping carts and custom solutions to enhance your payment pages.
  • 6
    Cosine Genie
    Whether it’s high-level or nuanced, Cosine can understand and provide superhuman level answers. We're not just an LLM wrapper – we combine multiple heuristics including static analysis, semantic search and others. Simply ask Cosine how to add a new feature or modify existing code and we’ll generate a step by step guide. Cosine indexes and understands your codebase on multiple levels. From a graph relationship between files and functions to a deep semantic understanding of the code, Cosine can answer any question you have about your codebase. Genie is the best AI software engineer in the world by far - achieving a 30% eval score on the industry standard benchmark SWE-Bench. Genie is able to solve bugs, build features, refactor code, and everything in between either fully autonomously or paired with the user, like working with a colleague, not just a copilot.
  • 7
    Prolog

    Prolog

    Prolog

    Prolog is a logic programming language associated with artificial intelligence and computational linguistics. Prolog has its roots in first-order logic, a formal logic, and unlike many other programming languages, Prolog is intended primarily as a declarative programming language, the program logic is expressed in terms of relations, represented as facts and rules. A computation is initiated by running a query over these relations. Prolog was one of the first logic programming languages and remains the most popular such language today, with several free and commercial implementations available. The language has been used for theorem proving, expert systems, term rewriting, type systems, and automated planning, as well as its original intended field of use, natural language processing. Modern Prolog environments support the creation of graphical user interfaces, as well as administrative and networked applications.
  • 8
    OneEntry

    OneEntry

    OneEntry

    Ready-made solutions and tools for implementing any E-commerce project. Easy project scaling without unnecessary time and financial costs. One system incorporates all necessary tools used by developers, content managers and marketing experts. Familiar interfaces without limitations in technologies and programming languages. Easy connection of applications or websites through REST API. Easy export of products and services from YML or CSV files. Issuance of let's encrypt certificates. Daily backups and multiple servers will ensure the preservation of content. OneEntry combines the ease of use of a traditional website and application management system with the flexibility of a Headless CMS that includes all the necessary features for the successful operation of any business project.
    Starting Price: $29.99 per month
  • 9
    TrustLink

    TrustLink

    AarateK

    TrustLink™ is a high-performance biometric identity authentication platform that supports large-scale facial and fingerprint recognition. It is a powerful platform that includes multi-biometric identification technologies and can be used to capture, register, identify, and authenticate fingerprints and faces. It also provides the APIs on the server and client for fast development and deployment into a wide range of applications. TrustLink™ is equipped with Aratek Bione® dynamic optimization algorithm and TrustFace™ face recognition algorithm, it's specialized in the field of large-scale fingerprint and face recognition applications. TrustLink™ is an ideal biometric identity authentication platform for software developers.
  • 10
    Selenic

    Selenic

    Parasoft

    Selenium tests are often unstable and difficult to maintain. Parasoft Selenic fixes common Selenium problems within your existing projects with no vendor lock. When your team is using Selenium to develop and test the UI for your software applications, you need confidence that your testing process is identifying real issues, creating meaningful and appropriate tests, and reducing test maintenance. While Selenium offers many benefits, you want to get more out of your UI testing while leveraging your current practice. Find the real UI issues and get quick feedback on test execution so you can deliver better software faster with Parasoft Selenic. Improve your existing library of Selenium web UI tests, or quickly create new ones, with a flexible Selenium companion that integrates seamlessly with your environment. Parasoft Selenic fixes common Selenium problems with AI-powered self-healing to minimize runtime failures, test impact analysis to dramatically reduce test execution time, etc.
  • 11
    Code to Flowchart

    Code to Flowchart

    Code to Flowchart

    Turn code into interactive flowcharts with AI, and simplify complex logic instantly.
    Starting Price: Free
  • 12
    Tumult Analytics

    Tumult Analytics

    Tumult Analytics

    Built and maintained by a team of differential privacy experts, and running in production at institutions like the U.S. Census Bureau. Runs on Spark and effortlessly supports input tables containing billions of rows. Supports a large and ever-growing list of aggregation functions, data transformation operators, and privacy definitions. Perform public and private joins, filters, or user-defined functions on your data. Compute counts, sums, quantiles, and more under multiple privacy models. Differential privacy is made easy, thanks to our simple tutorials and extensive documentation. Tumult Analytics is built on our sophisticated privacy foundation, Tumult Core, which mediates access to sensitive data and means that every program and application comes with an embedded proof of privacy. Built by composing small, easy-to-review components. Provably safe stability tracking and floating-point primitives. Uses a generic framework based on peer-reviewed research.
  • 13
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 14
    TrueZero Tokenization
    TrueZero’s vaultless data privacy API replaces sensitive PII with tokens allowing you to easily reduce the impact of data breaches, share data more freely and securely, and minimize compliance overhead. Our tokenization solutions are leveraged by leading financial institutions. Wherever PII is stored, and however it is used, TrueZero Tokenization replaces and protects your data. More securely authenticate users, validate their information, and enrich their profiles without ever revealing sensitive data (e.g. SSN) to partners, other internal teams, or third-party services. TrueZero minimizes your in-scope environments, speeding up your time to comply by months and saving you potentially millions in build/partner costs. Data breaches cost $164 per breached record, tokenize PII & protect your business from data loss penalties and loss of brand reputation. Store tokens and run analytics in the same way you would with raw data.
  • 15
    Apache SkyWalking
    Application performance monitor tool for distributed systems, specially designed for microservices, cloud-native and container-based (Kubernetes) architectures. 100+ billion telemetry data could be collected and analyzed from one SkyWalking cluster. Support log formatting, extract metrics, and various sampling policies through script pipeline in high performance. Support service-centric, deployment-centric, and API-centric alarm rule setting. Support forwarding alarms and all telemetry data to 3rd party. Metrics, traces, and logs from mature ecosystems are supported, e.g. Zipkin, OpenTelemetry, Prometheus, Zabbix, Fluentd.
  • 16
    Helios

    Helios

    Helios

    Helios provides security teams with context and actionable runtime insights that significantly reduce alert fatigue by enabling real-time visibility into app behavior. We provide precise insights into the vulnerable software components in active use and the data flow within them, delivering an accurate assessment of your risk profile. Save valuable development time by strategically prioritizing fixes based on your application’s unique context – focusing on the real attack surface. Armed with applicative context, security teams can determine which vulnerabilities really require fixing. With proof in hand, there is no need to convince the dev team that a vulnerability is real.
  • 17
    Lime2

    Lime2

    Lime Software

    Our tools provide an intuitive and simple approach to discovering risks within your Oracle Licensing. They were developed to assist our customers, ensuring they are compliant with their licenses. We have a track record, with over 15 years experience delivering accurate and timely Oracle licensing data for customers and partners. Oracle licensing is a complex and time-consuming task. Not knowing your environment can lead to serious financial penalties. Our tool can recognize over 4000 licensing terms, and if we don't have what you need, our experienced team can design a plug-in specifically for your needs.
  • 18
    Gemma

    Gemma

    Google

    Gemma is a family of lightweight, state-of-the-art open models built from the same research and technology used to create the Gemini models. Developed by Google DeepMind and other teams across Google, Gemma is inspired by Gemini, and the name reflects the Latin gemma, meaning “precious stone.” Accompanying our model weights, we’re also releasing tools to support developer innovation, foster collaboration, and guide the responsible use of Gemma models. Gemma models share technical and infrastructure components with Gemini, our largest and most capable AI model widely available today. This enables Gemma 2B and 7B to achieve best-in-class performance for their sizes compared to other open models. And Gemma models are capable of running directly on a developer laptop or desktop computer. Notably, Gemma surpasses significantly larger models on key benchmarks while adhering to our rigorous standards for safe and responsible outputs.
  • 19
    Syhunt Hybrid
    Syhunt dynamically injects data in web applications and analyzes the application response to determine if the application code is vulnerable, automating the web application security testing and proactively guarding your organization's Web infrastructure against several kinds of web application security threats. Syhunt Hybrid follows simple GUI standards, prioritizing ease of use and automation and thus requiring minimal to no user intervention before or during scans despite a large number of customization options. Compare past scan sessions to determine new, unchanged or removed vulnerabilities. Generate a comparison report that displays the evolution of vulnerabilities over time by automatically comparing previous scan session data related to a specific target.
  • 20
    Yandex Object Storage
    Objects in Object Storage are stored in multiple geographically distributed availability zones. Each replica is updated when you edit, create, or delete an object. To manage Object Storage, you can use tools that are compatible with Amazon S3, including the API, CLI, WinSCP, Java SDK, or Python SDK. To get started with Object Storage, go to the Yandex Cloud management console. Create and configure your first bucket. Drag files to the bucket screen to upload them. Physical media is located in Yandex data centers, which are highly secure facilities. Data is stored in an encrypted format and no one with access to the physical media can read the data.
  • 21
    Yandex Managed Service for YDB
    Serverless computing is ideal for systems with unpredictable loads. Storage scaling, query execution, and backup layers are fully automated. The compatibility of the service API in serverless mode allows you to use the AWS SDKs for Java, JavaScript, Node.js, .NET, PHP, Python, and Ruby. YDB is hosted in three availability zones, ensuring availability even if a node or availability zone goes offline. If equipment or a data center fails, the system automatically recovers and continues working. YDB is tailored to meet high-performance requirements and can process hundreds of thousands of transactions per second with low latency. The system was designed to handle hundreds of petabytes of data.
  • 22
    BlueFlag Security

    BlueFlag Security

    BlueFlag Security

    BlueFlag Security provides multi-layer defense, protecting developer identities and their tools throughout the software development lifecycle (SDLC). Don't let uncontrolled developer and machine identities become the Achilles' heel of your software supply chain. Weaknesses in these identities create a backdoor for attackers. BlueFlag seamlessly integrates identity security across the SDLC safeguarding your code, tools, and infrastructure. BlueFlag automates the rightsizing of permissions for developer and machine identities, enforcing the principle of least privilege throughout the dev environment. BlueFlag enforces strong identity hygiene by deactivating off-boarded users, managing personal access tokens, and restricting direct access to developer tools and repositories. BlueFlag's ensures early detection and prevention of insider threats and unauthorized privileged escalation by continuously monitoring behavior patterns across the CI/CD.
  • 23
    CI Fuzz

    CI Fuzz

    Code Intelligence

    CI Fuzz ensures robust and secure code with test coverage up to 100%. Use CI Fuzz from the command line or in the IDE of choice to generate thousands of test cases automatically. CI Fuzz analyzes code as it runs, just like a unit test, but with AI support to efficiently cover all paths through the code. Uncover real bugs in real-time and say goodbye to theoretical issues and false positives. Find real issues with all the information needed to quickly reproduce and fix them. Test your code with maximum code coverage and automatically detect typical security-relevant bugs like injections and remote code executions automatically in one go. Get fully covered to deliver the highest quality software. Conduct real-time code analysis with CI Fuzz. Take unit tests to the next level. It employs AI for comprehensive code path coverage and the automatic generation of thousands of test cases. Maximize pipeline performance that doesn't compromise software integrity.
    Starting Price: €30 per month
  • 24
    EmpoweredNEXT

    EmpoweredNEXT

    Empowered Systems

    With over a million global users and a deep understanding of different industries, our purpose-built, no-code platform is designed to scale with your organization’s present and future needs. By integrating data and domain expertise, it empowers stakeholders and IT leaders to make risk-aware decisions in real-time and contribute to a holistic view of the organization’s needs, rather than it being siloed. Plus, our intuitive user experience ensures that everyone can contribute to developing an application that fits all of your GRC needs. Don’t let complex software and elongated implementation times slow down your business growth; switch to EmpoweredNEXT and simplify your risk management needs with a no-code platform built just for you. Our groundbreaking platform boasts a unique no-code application framework that sets it apart from anything else in the market. With intuitive modeling tools, every aspect of an application can be defined and managed with ease.
  • 25
    AppSec Labs

    AppSec Labs

    AppSec Labs

    AppSec Labs is a dedicated application security organization, positioned in the top 10 application security companies worldwide. Our mission is to share our hands-on experience, by providing cutting-edge penetration tests, training/academy & consulting. Full cycle application security consulting services, from design to production. Penetration testing and security assessment services for web, desktop, and mobile applications. High-end, hands-on, training in secure coding and penetration testing on a variety of platforms. We work with a multitude of clients from different industry vectors. In addition to our high-profile customers, we work with small companies and young start-ups. Working with a diverse range of companies from the fields of technology, finance, commerce, HLS, and many more, enables us to allocate the best-suited, experienced, and most naturally-inclined team member to each client, guaranteeing the highest level of service.
  • 26
    Security Compass SSP

    Security Compass SSP

    Security Compass

    Improve your security posture with targeted training and earn ISC2 certification for your software security practitioners. Train your entire development team, including software developers, security champions, software architects, QA engineers, and project managers on fundamental elements of software security and language-specific secure coding practices. Once you’ve successfully completed all modules and passed the course exam, you’ll receive an industry-recognized certificate from Security Compass and ISC2. You can then share your certification through a social media badge. Deepen your understanding of common security risks by diving into real-world exploit scenarios. Target and close your team’s knowledge gaps with the right training delivered exactly where and when you need it. Reduce or eliminate inconsistencies and help your team perform its best. Measure success from module to module, and paint a clear, real-time picture of the skills and expertise of your team.
  • 27
    Gemma 2

    Gemma 2

    Google

    A family of state-of-the-art, light-open models created from the same research and technology that were used to create Gemini models. These models incorporate comprehensive security measures and help ensure responsible and reliable AI solutions through selected data sets and rigorous adjustments. Gemma models achieve exceptional comparative results in their 2B, 7B, 9B, and 27B sizes, even outperforming some larger open models. With Keras 3.0, enjoy seamless compatibility with JAX, TensorFlow, and PyTorch, allowing you to effortlessly choose and change frameworks based on task. Redesigned to deliver outstanding performance and unmatched efficiency, Gemma 2 is optimized for incredibly fast inference on various hardware. The Gemma family of models offers different models that are optimized for specific use cases and adapt to your needs. Gemma models are large text-to-text lightweight language models with a decoder, trained in a huge set of text data, code, and mathematical content.
  • 28
    Oracle Reports
    Oracle Reports, a component of Oracle Fusion Middleware is Oracle's award-winning, high-fidelity enterprise reporting tool. It enables businesses to provide instant access to information to all levels within and outside of the organization in a scalable and secure environment. Oracle Reports consists of Oracle Reports Developer, a powerful, declarative WYSIWYG reports design tool, and a JEE 5-based Oracle Reports Server with multi-tier architecture to access any data sources, generate reports in any popular format for web and paper, and burst and distribute reports to any destination. Oracle remains committed to the development of this technology and to the ongoing release as a component of the Oracle Fusion Middleware platform.
  • 29
    AirMDR

    AirMDR

    AirMDR

    AI-powered virtual analysts automate 80-90% of routine tasks, delivering faster, higher-quality, and more affordable alert triage, investigation, and response, all supported by human experts. Say no to expensive, slow, poor quality, and inconsistent investigations. Say hello to precision investigations at blazing-fast speed. Traditional MDRs rely on human analysts for case triage, but at AirMDR, our intelligent virtual analyst processes these cases 20 times faster with greater consistency and depth. At AirMDR, human analysts have to manually triage over 90% fewer cases. Experience high-quality investigation, triage, and response for every alert, with 90% of alerts investigated in under five minutes. Every alert is automatically enriched, investigated, and triaged by our virtual analyst, serving as the first responder. This process is continuously supervised and enhanced by our team of human security experts, ensuring a seamless and efficient security operation.
  • 30
    ModelOp

    ModelOp

    ModelOp

    ModelOp is the leading AI governance software that helps enterprises safeguard all AI initiatives, including generative AI, Large Language Models (LLMs), in-house, third-party vendors, embedded systems, etc., without stifling innovation. Corporate boards and C‑suites are demanding the rapid adoption of generative AI but face financial, regulatory, security, privacy, ethical, and brand risks. Global, federal, state, and local-level governments are moving quickly to implement AI regulations and oversight, forcing enterprises to urgently prepare for and comply with rules designed to prevent AI from going wrong. Connect with AI Governance experts to stay informed about market trends, regulations, news, research, opinions, and insights to help you balance the risks and rewards of enterprise AI. ModelOp Center keeps organizations safe and gives peace of mind to all stakeholders. Streamline reporting, monitoring, and compliance adherence across the enterprise.