Business Software for Java - Page 22

Top Software that integrates with Java as of October 2025 - Page 22

Java Clear Filters
  • 1
    Tumult Analytics

    Tumult Analytics

    Tumult Analytics

    Built and maintained by a team of differential privacy experts, and running in production at institutions like the U.S. Census Bureau. Runs on Spark and effortlessly supports input tables containing billions of rows. Supports a large and ever-growing list of aggregation functions, data transformation operators, and privacy definitions. Perform public and private joins, filters, or user-defined functions on your data. Compute counts, sums, quantiles, and more under multiple privacy models. Differential privacy is made easy, thanks to our simple tutorials and extensive documentation. Tumult Analytics is built on our sophisticated privacy foundation, Tumult Core, which mediates access to sensitive data and means that every program and application comes with an embedded proof of privacy. Built by composing small, easy-to-review components. Provably safe stability tracking and floating-point primitives. Uses a generic framework based on peer-reviewed research.
  • 2
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 3
    TrueZero Tokenization
    TrueZero’s vaultless data privacy API replaces sensitive PII with tokens allowing you to easily reduce the impact of data breaches, share data more freely and securely, and minimize compliance overhead. Our tokenization solutions are leveraged by leading financial institutions. Wherever PII is stored, and however it is used, TrueZero Tokenization replaces and protects your data. More securely authenticate users, validate their information, and enrich their profiles without ever revealing sensitive data (e.g. SSN) to partners, other internal teams, or third-party services. TrueZero minimizes your in-scope environments, speeding up your time to comply by months and saving you potentially millions in build/partner costs. Data breaches cost $164 per breached record, tokenize PII & protect your business from data loss penalties and loss of brand reputation. Store tokens and run analytics in the same way you would with raw data.
  • 4
    Apache SkyWalking
    Application performance monitor tool for distributed systems, specially designed for microservices, cloud-native and container-based (Kubernetes) architectures. 100+ billion telemetry data could be collected and analyzed from one SkyWalking cluster. Support log formatting, extract metrics, and various sampling policies through script pipeline in high performance. Support service-centric, deployment-centric, and API-centric alarm rule setting. Support forwarding alarms and all telemetry data to 3rd party. Metrics, traces, and logs from mature ecosystems are supported, e.g. Zipkin, OpenTelemetry, Prometheus, Zabbix, Fluentd.
  • 5
    Helios

    Helios

    Helios

    Helios provides security teams with context and actionable runtime insights that significantly reduce alert fatigue by enabling real-time visibility into app behavior. We provide precise insights into the vulnerable software components in active use and the data flow within them, delivering an accurate assessment of your risk profile. Save valuable development time by strategically prioritizing fixes based on your application’s unique context – focusing on the real attack surface. Armed with applicative context, security teams can determine which vulnerabilities really require fixing. With proof in hand, there is no need to convince the dev team that a vulnerability is real.
  • 6
    Lime2

    Lime2

    Lime Software

    Our tools provide an intuitive and simple approach to discovering risks within your Oracle Licensing. They were developed to assist our customers, ensuring they are compliant with their licenses. We have a track record, with over 15 years experience delivering accurate and timely Oracle licensing data for customers and partners. Oracle licensing is a complex and time-consuming task. Not knowing your environment can lead to serious financial penalties. Our tool can recognize over 4000 licensing terms, and if we don't have what you need, our experienced team can design a plug-in specifically for your needs.
  • 7
    Gemma

    Gemma

    Google

    Gemma is a family of lightweight, state-of-the-art open models built from the same research and technology used to create the Gemini models. Developed by Google DeepMind and other teams across Google, Gemma is inspired by Gemini, and the name reflects the Latin gemma, meaning “precious stone.” Accompanying our model weights, we’re also releasing tools to support developer innovation, foster collaboration, and guide the responsible use of Gemma models. Gemma models share technical and infrastructure components with Gemini, our largest and most capable AI model widely available today. This enables Gemma 2B and 7B to achieve best-in-class performance for their sizes compared to other open models. And Gemma models are capable of running directly on a developer laptop or desktop computer. Notably, Gemma surpasses significantly larger models on key benchmarks while adhering to our rigorous standards for safe and responsible outputs.
  • 8
    Syhunt Hybrid
    Syhunt dynamically injects data in web applications and analyzes the application response to determine if the application code is vulnerable, automating the web application security testing and proactively guarding your organization's Web infrastructure against several kinds of web application security threats. Syhunt Hybrid follows simple GUI standards, prioritizing ease of use and automation and thus requiring minimal to no user intervention before or during scans despite a large number of customization options. Compare past scan sessions to determine new, unchanged or removed vulnerabilities. Generate a comparison report that displays the evolution of vulnerabilities over time by automatically comparing previous scan session data related to a specific target.
  • 9
    Yandex Object Storage
    Objects in Object Storage are stored in multiple geographically distributed availability zones. Each replica is updated when you edit, create, or delete an object. To manage Object Storage, you can use tools that are compatible with Amazon S3, including the API, CLI, WinSCP, Java SDK, or Python SDK. To get started with Object Storage, go to the Yandex Cloud management console. Create and configure your first bucket. Drag files to the bucket screen to upload them. Physical media is located in Yandex data centers, which are highly secure facilities. Data is stored in an encrypted format and no one with access to the physical media can read the data.
  • 10
    Yandex Managed Service for YDB
    Serverless computing is ideal for systems with unpredictable loads. Storage scaling, query execution, and backup layers are fully automated. The compatibility of the service API in serverless mode allows you to use the AWS SDKs for Java, JavaScript, Node.js, .NET, PHP, Python, and Ruby. YDB is hosted in three availability zones, ensuring availability even if a node or availability zone goes offline. If equipment or a data center fails, the system automatically recovers and continues working. YDB is tailored to meet high-performance requirements and can process hundreds of thousands of transactions per second with low latency. The system was designed to handle hundreds of petabytes of data.
  • 11
    BlueFlag Security

    BlueFlag Security

    BlueFlag Security

    BlueFlag Security provides multi-layer defense, protecting developer identities and their tools throughout the software development lifecycle (SDLC). Don't let uncontrolled developer and machine identities become the Achilles' heel of your software supply chain. Weaknesses in these identities create a backdoor for attackers. BlueFlag seamlessly integrates identity security across the SDLC safeguarding your code, tools, and infrastructure. BlueFlag automates the rightsizing of permissions for developer and machine identities, enforcing the principle of least privilege throughout the dev environment. BlueFlag enforces strong identity hygiene by deactivating off-boarded users, managing personal access tokens, and restricting direct access to developer tools and repositories. BlueFlag's ensures early detection and prevention of insider threats and unauthorized privileged escalation by continuously monitoring behavior patterns across the CI/CD.
  • 12
    CI Fuzz

    CI Fuzz

    Code Intelligence

    CI Fuzz ensures robust and secure code with test coverage up to 100%. Use CI Fuzz from the command line or in the IDE of choice to generate thousands of test cases automatically. CI Fuzz analyzes code as it runs, just like a unit test, but with AI support to efficiently cover all paths through the code. Uncover real bugs in real-time and say goodbye to theoretical issues and false positives. Find real issues with all the information needed to quickly reproduce and fix them. Test your code with maximum code coverage and automatically detect typical security-relevant bugs like injections and remote code executions automatically in one go. Get fully covered to deliver the highest quality software. Conduct real-time code analysis with CI Fuzz. Take unit tests to the next level. It employs AI for comprehensive code path coverage and the automatic generation of thousands of test cases. Maximize pipeline performance that doesn't compromise software integrity.
    Starting Price: €30 per month
  • 13
    EmpoweredNEXT

    EmpoweredNEXT

    Empowered Systems

    With over a million global users and a deep understanding of different industries, our purpose-built, no-code platform is designed to scale with your organization’s present and future needs. By integrating data and domain expertise, it empowers stakeholders and IT leaders to make risk-aware decisions in real-time and contribute to a holistic view of the organization’s needs, rather than it being siloed. Plus, our intuitive user experience ensures that everyone can contribute to developing an application that fits all of your GRC needs. Don’t let complex software and elongated implementation times slow down your business growth; switch to EmpoweredNEXT and simplify your risk management needs with a no-code platform built just for you. Our groundbreaking platform boasts a unique no-code application framework that sets it apart from anything else in the market. With intuitive modeling tools, every aspect of an application can be defined and managed with ease.
  • 14
    AppSec Labs

    AppSec Labs

    AppSec Labs

    AppSec Labs is a dedicated application security organization, positioned in the top 10 application security companies worldwide. Our mission is to share our hands-on experience, by providing cutting-edge penetration tests, training/academy & consulting. Full cycle application security consulting services, from design to production. Penetration testing and security assessment services for web, desktop, and mobile applications. High-end, hands-on, training in secure coding and penetration testing on a variety of platforms. We work with a multitude of clients from different industry vectors. In addition to our high-profile customers, we work with small companies and young start-ups. Working with a diverse range of companies from the fields of technology, finance, commerce, HLS, and many more, enables us to allocate the best-suited, experienced, and most naturally-inclined team member to each client, guaranteeing the highest level of service.
  • 15
    Security Compass SSP

    Security Compass SSP

    Security Compass

    Improve your security posture with targeted training and earn ISC2 certification for your software security practitioners. Train your entire development team, including software developers, security champions, software architects, QA engineers, and project managers on fundamental elements of software security and language-specific secure coding practices. Once you’ve successfully completed all modules and passed the course exam, you’ll receive an industry-recognized certificate from Security Compass and ISC2. You can then share your certification through a social media badge. Deepen your understanding of common security risks by diving into real-world exploit scenarios. Target and close your team’s knowledge gaps with the right training delivered exactly where and when you need it. Reduce or eliminate inconsistencies and help your team perform its best. Measure success from module to module, and paint a clear, real-time picture of the skills and expertise of your team.
  • 16
    Gemma 2

    Gemma 2

    Google

    A family of state-of-the-art, light-open models created from the same research and technology that were used to create Gemini models. These models incorporate comprehensive security measures and help ensure responsible and reliable AI solutions through selected data sets and rigorous adjustments. Gemma models achieve exceptional comparative results in their 2B, 7B, 9B, and 27B sizes, even outperforming some larger open models. With Keras 3.0, enjoy seamless compatibility with JAX, TensorFlow, and PyTorch, allowing you to effortlessly choose and change frameworks based on task. Redesigned to deliver outstanding performance and unmatched efficiency, Gemma 2 is optimized for incredibly fast inference on various hardware. The Gemma family of models offers different models that are optimized for specific use cases and adapt to your needs. Gemma models are large text-to-text lightweight language models with a decoder, trained in a huge set of text data, code, and mathematical content.
  • 17
    Oracle Reports
    Oracle Reports, a component of Oracle Fusion Middleware is Oracle's award-winning, high-fidelity enterprise reporting tool. It enables businesses to provide instant access to information to all levels within and outside of the organization in a scalable and secure environment. Oracle Reports consists of Oracle Reports Developer, a powerful, declarative WYSIWYG reports design tool, and a JEE 5-based Oracle Reports Server with multi-tier architecture to access any data sources, generate reports in any popular format for web and paper, and burst and distribute reports to any destination. Oracle remains committed to the development of this technology and to the ongoing release as a component of the Oracle Fusion Middleware platform.
  • 18
    AirMDR

    AirMDR

    AirMDR

    AI-powered virtual analysts automate 80-90% of routine tasks, delivering faster, higher-quality, and more affordable alert triage, investigation, and response, all supported by human experts. Say no to expensive, slow, poor quality, and inconsistent investigations. Say hello to precision investigations at blazing-fast speed. Traditional MDRs rely on human analysts for case triage, but at AirMDR, our intelligent virtual analyst processes these cases 20 times faster with greater consistency and depth. At AirMDR, human analysts have to manually triage over 90% fewer cases. Experience high-quality investigation, triage, and response for every alert, with 90% of alerts investigated in under five minutes. Every alert is automatically enriched, investigated, and triaged by our virtual analyst, serving as the first responder. This process is continuously supervised and enhanced by our team of human security experts, ensuring a seamless and efficient security operation.
  • 19
    ModelOp

    ModelOp

    ModelOp

    ModelOp is the leading AI governance software that helps enterprises safeguard all AI initiatives, including generative AI, Large Language Models (LLMs), in-house, third-party vendors, embedded systems, etc., without stifling innovation. Corporate boards and C‑suites are demanding the rapid adoption of generative AI but face financial, regulatory, security, privacy, ethical, and brand risks. Global, federal, state, and local-level governments are moving quickly to implement AI regulations and oversight, forcing enterprises to urgently prepare for and comply with rules designed to prevent AI from going wrong. Connect with AI Governance experts to stay informed about market trends, regulations, news, research, opinions, and insights to help you balance the risks and rewards of enterprise AI. ModelOp Center keeps organizations safe and gives peace of mind to all stakeholders. Streamline reporting, monitoring, and compliance adherence across the enterprise.
  • 20
    KaneAI

    KaneAI

    LambdaTest

    Advanced AI-powered platform built on modern Large Language Models (LLMs). A unique approach to create, debug, and evolve end to end tests using natural language. Test generation & evolution effortlessly using natural language inputs, simplifying the testing process with intelligent automation. Intelligent test planner automatically generates and automates test steps using high-level objectives. Multi-language code export converts your automated tests in all major languages and frameworks. Convert your actions into natural language instructions to generate bulletproof tests. Express sophisticated conditions and assertions in natural language. As easy as conversing and communicating with your team. Convey the same instructions to KaneAI and watch it automate your tests. Generate your tests with just high-level objectives. Develop tests across your stack on both web and mobile devices for extensive test coverage.
  • 21
    StackGen

    StackGen

    StackGen

    Generate context-aware, secure IaC from application code without code changes. We love infrastructure as code, but that doesn’t mean there isn’t room for improvement. StackGen uses an application’s code to generate consistent, secure, and compliant IaC. Remove bottlenecks, liabilities, and error-prone manual processes between DevOps, developers, and security to get your application to market faster. Allow developers a better, more productive experience without becoming infrastructure experts. Consistency, security, and policy guardrails are incorporated by default when IaC is auto-generated. Context-aware IaC is auto-generated, with no code changes required, supported, and rightsized with least-privileged access controls. No need to rebuild your pipelines. StackGen works alongside your existing workflows to remove silos between teams. Enable developers to auto-generate IaC that complies with your provisioning checklist.
  • 22
    Rainforest

    Rainforest

    Rainforest

    Achieve higher cyber security protection with the Rainforest platform. Trust Rainforest to safeguard your innovations and provide you with the confidence to navigate the digital world securely, with quick implementation, and faster results. Traditional solutions are too complex to implement for companies that don't waste time and money. Frictionless integration, so you can use your time more fixing than implementing our solutions. Our trained models use AI to suggest fixes, empowering your team to resolve issues easily. 7 different application analyses with comprehensive application security, local code analysis, and AI-driven fix suggestions, ensure seamless integration, rapid vulnerability detection, and effective remediation for robust application protection. Continuous cloud security posture management, identifying misconfigurations and vulnerabilities in real-time enhancing cloud security effortlessly.
  • 23
    Actian Ingres
    Ultra-reliable SQL-standard transactional database with X100 operational analytics. Actian Ingres has long been known as an ultra-reliable enterprise transactional database. Today Actian Ingres is a hybrid transactional/analytical processing database with record-breaking performance. Ingres supports both row-based and columnar storage formats using its ultra-reliable enterprise transactional database, and Vector’s X100 analytics engine. This combination allows organizations to perform transaction processing and operational analytics easily and efficiently within a single database. The most trusted and time-tested transactional database with a low total cost of ownership, 24/7 global support, and industry-leading customer satisfaction. It has a proven track record, with thousands of enterprises running billions of transactions over decades of deployment, upgrades, and migrations.
  • 24
    Exegy Axiom
    Axiom, Exegy’s market data-as-a-service offering, delivers high-quality, low-latency normalized market data that allows firms to access major markets across the globe. Axiom is built for ease of use, stability, and consistent performance, utilizing Exegy’s high-capacity FPGA appliance technology to deliver reliable and consistent performance under stressful market conditions. Accessible via data centers or public cloud providers, Axiom scales to allow your business to grow and change as required. As a fully managed direct feed service, Axiom is Exegy’s preferred solution for cost-conscious firms, retail brokers, and expanding businesses that need fast access to global markets. Through the Axiom Feed, customers can gain access to over 300 data sources, including all major US and European exchanges with a growing number of APAC venues. These feeds cover multiple asset classes including equities, derivatives, and cryptocurrencies.
  • 25
    Algoreus

    Algoreus

    Turium AI

    All your data needs are delivered in one powerful platform. From data ingestion/integration, transformation, and storage to knowledge catalog, graph networks, data analytics, governance, monitoring, and, sharing. ​ An AI/ML platform that lets enterprises, train, test, troubleshoot, deploy, and govern models at scale to boost productivity while maintaining model performance in production with confidence. A dedicated solution for training models with minimal effort through AutoML or training your case-specific models from scratch with CustomML. Giving you the power to connect essential logic from ML with data. An integrated exploration of possible actions.​ Integration with your protocols and authorization models​. Propagation by default; extreme configurability at your service​. Leverage internal lineage system, for alerting and impact analysis​. Interwoven with the security paradigm; provides immutable tracking​.
  • 26
    Timbr.ai

    Timbr.ai

    Timbr.ai

    The smart semantic layer integrates data with business meaning and relationships, unifies metrics, and accelerates the delivery of data products with 90% shorter SQL queries. Easily model data using business terms to give it common meaning and align business metrics. Define semantic relationships that substitute JOINs so queries become much simpler. Use hierarchies and classifications to better understand data. Automatically map data to the semantic model. Join multiple data sources with a powerful distributed SQL engine to query data at scale. Consume data as a connected semantic graph. Boost performance and save compute costs with an intelligent cache engine and materialized views. Benefit from advanced query optimizations. Connect to most clouds, datalakes, data warehouses, databases, and any file format. Timbr empowers you to work with your data sources seamlessly. When a query is run, Timbr optimizes the query and pushes it down to the backend.
  • 27
    Vi-Pro Broker MIS

    Vi-Pro Broker MIS

    Virtuoso IT Solutions

    Our Vi-Pro Broker MIS broker management software system is developed for sales and marketing support to track customers for the purchasing process of property for their development site. Broker management software system is also helpful for users in relevant alerts. Broker MIS software would be designed to understand most of the facets involved in the purchase process, availability of property information, commission, etc. SMS & email shoot through the system for payment reminder notices with interest alerts to the customer. Broker MIS is the real estate industry's rapidly growing brokerage management system chosen by more brokerages to optimize their real estate business as well. With more than 14 + years of experience, we provide brokerage management solutions. Our brokerage management software allows real estate business to address their goals as follows. Broker MIS software gives your business the freedom to go further.
  • 28
    Objective 3Sixty

    Objective 3Sixty

    Objective Corporation

    No matter where your data is, you should be able to use it to drive better outcomes. Deliver better outcomes by connecting, discovering, and enriching your data. Transform your data into actionable information and insights. Make data accessible for all of your use cases. Connect all your siloed data (structured and unstructured) to gain unified visibility and control over your organizational data landscape. Innovate with no-code and low-code interfaces, making data manipulation accessible for all. Deliver services to your organization. Create a network of information that might otherwise remain hidden in isolated data silos. The data fabric acts as a conduit, allowing data to flow freely and securely between different departments, databases, and platforms, irrespective of their underlying technology. Control costs and ensure security. Don't let your applications decide where your data is processed. Objective 3Sixty can be deployed either on-premises or in the cloud.
  • 29
    Oracle University
    Oracle University provides a comprehensive portfolio of training, certification, and digital adoption solutions to empower organizations to gain the skills and expertise they need to be successful with Oracle Cloud Infrastructure (OCI), Oracle Database, and Oracle Fusion Cloud and Industry Applications. Through personalized learning paths, role-specific courses, and hands-on labs, Oracle MyLearn provides extensive training to help you implement, administer, and leverage the full power of your Oracle Cloud technologies. Grow your expertise with Oracle Cloud technologies and enhance your career prospects by obtaining an official Oracle Certification. Oracle’s training and certification preparation courses allow you to develop in-demand skills, validate your knowledge, and showcase your expertise to boost your professional credibility. Empower your team to gain more confidence in the cloud with private customized training that can be tailored to your specific requirements.
  • 30
    Oracle MyLearn
    MyLearn is a customizable, personalized training portal that enhances and speeds your learning of Oracle Cloud. Find the training you want, fast. Easily track your progress. Get course recommendations that best match your learning goals. Get it all, and more, on any device, from any location. Oracle MyLearn is a personalized learning platform offering a comprehensive suite of resources to help individuals and organizations enhance their skills with Oracle products and technologies. The platform provides access to digital courses, hands-on labs, live classes, and certifications, enabling users to accelerate cloud adoption, increase productivity, and transform their businesses. Courses are designed and developed to cover each topic in depth, using a microlearning format to ensure training is both comprehensive and easy to digest. With each product release, new courses are added so users can learn exactly how to use the latest enhancements.