Best IT Security Software for Java - Page 3

Compare the Top IT Security Software that integrates with Java as of July 2025 - Page 3

This a list of IT Security software that integrates with Java. Use the filters on the left to add additional filters for products that have integrations with Java. View the products that work with Java in the table below.

  • 1
    Checkmarx

    Checkmarx

    Checkmarx

    The Checkmarx Software Security Platform provides a centralized foundation for operating your suite of software security solutions for Static Application Security Testing (SAST), Interactive Application Security Testing (IAST), Software Composition Analysis (SCA), and application security training and skills development. Built to address every organization’s needs, the Checkmarx Software Security Platform provides the full scope of options: including private cloud and on-premises solutions. Allowing a range of implementation options ensures customers can start securing their code immediately, rather than going through long processes of adapting their infrastructure to a single implementation method. The Checkmarx Software Security Platform transforms the standard for secure application development, providing one powerful resource with industry-leading capabilities.
  • 2
    Contrast Assess

    Contrast Assess

    Contrast Security

    A new kind of security designed for the way software is created. Resolve security issues minutes after installation by integrating security into your toolchain. Because Contrast agents monitor code and report from inside the application, developers can finally find and fix vulnerabilities without requiring security experts. That frees up security teams to focus on providing governance. Contrast Assess deploys an intelligent agent that instruments the application with smart sensors. The code is analyzed in real time from within the application. Instrumentation minimizes the false positives that slow down developers and security teams. Resolve security issues minutes after installation by integrating security into your toolchain. Contrast Assess integrates seamlessly into the software life cycle and into the tool sets that development and operations teams are already using, including native integration with ChatOps, ticketing systems and CI/CD tools, and a RESTful API.
  • 3
    CyberSiARA

    CyberSiARA

    CyberSiARA

    When it comes to fraud, prevention is more cost-effective than cure. By deploying intuitive traffic testing, the CyberSiARA system provides a proactive approach to cyber-security that stops fraud in its tracks. The traffic classification capability differentiates between genuine users and potential attackers in real-time using interactive enforcement challenges – quickly halting both automated and human-driven attacks before a breach can be made. CyberSiARA uses powerful traffic analysis processes to determine user intent. By identifying fraud signifiers in traffic behavior, the system deploys interactive challenges to test activity classified as suspicious. This allows genuine users to enjoy a seamless access experience, while attacks from a broad range of origins are defeated. Traffic designed to overcome authentication challenges is stopped with innovative challenge strategies.
  • 4
    Levo.ai

    Levo.ai

    Levo.ai

    Levo.ai gives enterprises unparalleled visibility into their APIs while continuously discovering and documenting internal, external and partner/third-party APIs. Enterprises can then see the risk from their apps and prioritize it based on the sensitive data flows, AuthN/AuthZ usage and several other criteria. Levo.ai then continuously security tests all apps and APIs to find vulnerabilities in the SDLC as early as possible.
  • 5
    Codebashing

    Codebashing

    Checkmarx

    Codebashing is Checkmarx’s in-context eLearning platform that sharpens the skills developers need to fix vulnerabilities and write secure code. Expanding on the learn-by-doing concept, Codebashing teaches developers the principles of secure coding and helps them sharpen application security skills in the most efficient way. Give your developers the skills they need to increase security and reduce risk right from the start. Transform developer security training into an ongoing experience that integrates seamlessly into daily workflows, making learning continuous, personalized, and directly aligned with developers’ evolving needs. Personalized secure code training journeys are carefully crafted to equip developers with role-specific knowledge, making security training both relevant and effective. This custom learning path includes 85 lessons, covering all SDLC aspects, designed to help security-minded developers become security champions for your enterprise.
  • 6
    OpenPMF

    OpenPMF

    ObjectSecurity

    OpenPMF captures policies in generic terms rather than specific technical rules, reducing the need for frequent updates. For example, in dynamic IoT/IIoT environments, it automatically generates security enforcement rules by analyzing these generic policies alongside changes in applications and their interactions. This method ensures policies remain manageable in large, evolving IT/OT landscapes, leading to significant maintenance cost savings. OpenPMF’s patented technology makes policy management both efficient and adaptable. In its most basic form, OpenPMF’s policy automation steps involve importing, authoring, and generating: OpenPMF is customizable for your particular business and IT landscape. While it comes with its own (optional) policy enforcement features, we currently offer pre-developed 3rd integrations and support for a wide range of technologies right out of the box, and other technologies supported upon request.