Results for: reference application addons

Suggested Categories:

Reference Management Software
Reference management software helps researchers, students, and academics organize and manage their sources and citations for writing papers, articles, or reports. These tools enable users to collect, store, and categorize references from books, journals, websites, and other sources. They often include features for generating citations and bibliographies in various formats (APA, MLA, Chicago, etc.), saving time and ensuring accuracy. Many reference management tools integrate with word processors, allowing users to easily insert citations and create reference lists directly within their documents. Additionally, these platforms often provide collaboration features, making it easy to share and manage research projects with team members.
Reference Check Software
Reference check software automates the process of contacting a job candidate’s previous employers, colleagues, and supervisors to gather structured feedback and insights. It sends customizable questionnaires and reminders to references, collects responses via web or mobile, and consolidates the feedback into standardized reports. Many platforms include fraud-detection algorithms, analytics dashboards, and integrations with ATS or HRIS systems to boost accuracy, speed, and compliance. This helps hiring teams move faster, reduce bias, and make more informed decisions about candidate fit and performance. Overall, reference check software transforms a traditionally manual and slow step into a scalable, consistent, and data-driven part of the hiring process.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Applicant Tracking Systems
An Applicant Tracking System (ATS) is a software tool designed to streamline the hiring process by automating the management of job applications. It allows recruiters and hiring managers to easily track, filter, and organize resumes submitted by candidates, ensuring a more efficient hiring workflow. ATS software typically includes features such as job posting, candidate sourcing, interview scheduling, and communication with applicants. It also helps improve compliance by storing and managing candidate data in an organized manner. By using an ATS, companies can save time, reduce hiring biases, and improve the overall candidate experience.
Application Server Software
Application server software provides a platform for deploying, managing, and running applications, typically for web or enterprise environments. These servers handle the backend logic of applications, facilitating the connection between client devices and databases or other services. Application servers often provide middleware services such as security, transaction management, and messaging, enabling the smooth execution of applications. They are designed to support multiple users simultaneously and ensure high availability, scalability, and performance of applications. This software is commonly used in environments where complex, data-intensive applications are developed, such as in e-commerce platforms, enterprise resource planning (ERP), and customer relationship management (CRM) systems.
Customer Reference Management Software
Customer reference management software merges sales and marketing tools to automate the tracking of customer reference data and information.
Application Development Software
Application development software is a type of software used to create applications and software programs. It typically includes code editors, compilers, and debuggers that allow developers to write, compile, and debug code. It also includes libraries of pre-written code that developers can use to create more complex and powerful applications.
Application Lifecycle Management Software
Application Lifecycle Management (ALM) software is a set of tools that helps manage the entire lifecycle of an application, from initial planning and development through testing, deployment, and maintenance. ALM software typically includes functionalities for project management, version control, requirements management, test management, and continuous integration, allowing teams to track progress, collaborate effectively, and ensure quality throughout the application's life. This software supports methodologies like Agile, DevOps, and Waterfall, helping development teams streamline workflows, improve efficiency, and ensure that the application meets business goals and compliance requirements.
Application Shielding Software
Application shielding software is designed to protect applications from reverse engineering, tampering, and unauthorized access by applying security measures that obfuscate and encrypt critical parts of the application. This software helps prevent attacks like code injection, software cracking, and piracy by adding layers of protection to sensitive data and logic within the application. Application shielding typically includes features such as runtime protection, data encryption, anti-debugging, and obfuscation techniques, making it more difficult for attackers to exploit vulnerabilities. It is commonly used in industries like software development, finance, and gaming, where intellectual property protection is crucial.
Application Virtualization Software
Application virtualization software allows applications to be run on various devices without being installed directly on the host operating system. This technology abstracts the application from the underlying hardware, enabling users to access applications remotely or on different devices while ensuring consistent performance and behavior. Application virtualization software packages applications in a virtual environment, which isolates them from the system, helping improve security, manageability, and compatibility across various platforms. It is commonly used in enterprise environments to reduce software installation conflicts, simplify updates, and provide secure access to critical applications.
Application Control Software
Application control software, sometimes referred to as application whitelisting software, provides organizations with the ability to monitor and manage applications installed on computers. It allows for the automated enforcement of regulatory compliance policies, including restricting user access to specific applications or functions. Application control software can also be used for enforcing cross-platform usage rights and tracking application resource utilization.
Application Performance Monitoring (APM) Software
Application performance monitoring (APM) software, also known as application performance management software, is designed to help organizations track and optimize the performance of their critical applications. Through advanced monitoring and analytics tools, APM software allows teams to identify and resolve performance issues in real-time, ensuring that applications are fast, stable, and reliable. By providing in-depth insights into application performance and user experience, APM software helps organizations deliver a superior customer experience and improve the overall performance of their applications.
Web Application Firewalls (WAF)
Web Application Firewalls (WAFs) are security solutions that protect web applications by filtering and monitoring HTTP traffic between the application and the internet. They detect and block threats such as SQL injections, cross-site scripting (XSS), and other common attacks targeting application vulnerabilities. WAFs analyze incoming requests in real time, applying customizable security rules to distinguish between legitimate and potentially malicious traffic. Many WAFs are cloud-based, enabling flexible and scalable protection without impacting application performance. By acting as a shield between web applications and attackers, WAFs help ensure data security, regulatory compliance, and uninterrupted user access.
Application Portfolio Management Software
Application portfolio management software is a type of software used to manage an organization's entire portfolio of applications. It helps in analyzing the value of applications, identifying risks associated with them, and providing cost management strategies. The software also provides insight into the application utilization and performance, as well as ability to measure return on investments. It can be used to optimize technology spending and reduce business complexity while driving innovation.
Mobile Application Management Software
Mobile Application Management (MAM) software is a tool used by businesses to efficiently manage the various applications on their employees' mobile devices. This type of software allows for easy distribution, updates, and monitoring of apps across multiple devices. It also provides security measures such as data encryption and remote wiping in case of a lost or stolen device. With Mobile Application Management, companies can ensure that their employees have access to the necessary apps while maintaining control over their usage and data protection. Overall, this software helps streamline app management for businesses operating in a highly mobile environment.
Application Dependency Mapping Tools
Application dependency mapping tools are software tools used to analyze and map the relationships between different applications within a system. These tools provide a comprehensive overview of an organization's entire application stack, including web applications, databases, servers, and other components. By visually displaying these dependencies, organizations can better understand how their applications interact with each other and identify potential risks or weaknesses. These tools also allow for easier troubleshooting and identification of issues within complex systems. They are commonly used in IT departments for improving system performance and optimization.
Application Delivery Controllers (ADC)
Application Delivery Controllers (ADCs) are software solutions designed to optimize the performance, security, and availability of applications delivered over the internet. They manage traffic between users and applications by distributing it across multiple servers, ensuring load balancing and preventing overloads. ADCs also provide security features like SSL offloading, DDoS protection, and web application firewalls to safeguard applications from attacks. By improving application response times and ensuring high availability, ADCs enhance user experience and help maintain service continuity. They are commonly used in data centers and cloud environments to ensure efficient and secure application delivery.
Rapid Application Development (RAD) Software
Rapid Application Development (RAD) software is a development methodology and set of tools designed to speed up the process of building applications through iterative development, prototyping, and minimal manual coding. RAD software typically includes features like visual development interfaces, drag-and-drop components, pre-built templates, and automated code generation to accelerate the development lifecycle. It enables developers to create applications quickly by focusing on user feedback and iterative refinement rather than long planning and design phases. RAD is commonly used for developing business applications, mobile apps, and web-based solutions where time-to-market is critical.
Application Release Orchestration (ARO) Tools
Application release orchestration (ARO) tools are software tools designed to streamline the process of deploying and managing applications. These tools automate various tasks such as packaging, testing, and deployment, resulting in increased efficiency and reduced errors. ARO tools also provide visibility into the entire release pipeline, allowing teams to track progress and identify potential bottlenecks. They can work with a variety of platforms and technologies, making them versatile for different types of applications. Overall, Application release orchestration tools help organizations streamline their release processes and improve collaboration between development, testing, and operations teams.
Mobile Application Security Testing Tools
Mobile application security testing (MAST) tools are software tools designed to assess the security vulnerabilities and weaknesses of mobile applications. These tools use a variety of techniques, such as code analysis and penetration testing, to identify potential threats and risks within the app. They can also check for compliance with industry standards and regulations. These tools provide detailed reports on their findings, allowing developers to address any issues before releasing the app to users. As cyber attacks targeting mobile apps continue to rise, these tools play an important role in ensuring the overall security and integrity of mobile applications.
View more categories (20) for "reference application addons"

23 Products for "reference application addons" with 1 filter applied:

  • 1
    Barracuda Web Application Firewall
    ...By combining signature-based policies and positive security with robust anomaly-detection capabilities, Barracuda Web Application Firewall can defeat today’s most sophisticated attacks targeting your web applications. Barracuda Active DDoS Prevention, an add-on service for the Barracuda Web Application Firewall, filters out volumetric DDoS attacks before they ever reach your network and harm your apps.
  • 2
    ManageEngine Browser Security Plus
    Browser Security software is a tool that helps protect sensitive enterprise data from security breaches associated with cyberattacks. Browser Security Plus is an enterprise browser security tool that helps IT administrators manage and secure browsers across networks. It enables them to gain visibility on browser usage trends, harden browsers settings, control browser extensions and plug-ins, lock down enterprise browsers, and ensure compliance with stipulated browser security standards. All...
  • 3
    Hitex SafeTpal
    SafeTpal from Hitex GmbH is a modular Safety & Security Suite for the AURIX TC3xx microcontroller family designed to simplify embedded safety and security development. It supports applications up to ISO 26262 ASIL-D and IEC 61508 SIL-3, as well as security standards such as ISO 21434, CERT-C, and MISRA-C. It combines qualified software components (drivers, HAL, bootloader/OTA packages) with reference designs, training, documentation, and flexible service packages to cover every stage of the V-model: concept & architecture, development, test & validation, and production. ...
  • 4
    open-appsec

    open-appsec

    open-appsec

    automatic web application & API security using machine learning open-appsec is an open-source initiative that builds on machine learning to provide pre-emptive web app & API threat protection against OWASP-Top-10 and zero-day attacks. It can be deployed as add-on to Kubernetes Ingress, NGINX, Envoy and API Gateways. open-oppsec simplifies maintenance as there is no threat signature upkeep and exception handling, like common in many WAF solutions.
  • 5
    DexGuard

    DexGuard

    Guardsquare

    ...It hardens apps' code and enables them to defend themselves at runtime. DexGuard is a command-line tool that processes, optimizes and protects Android applications and libraries. It enables you to fully protect your application or SDK without requiring you to share or alter the source code. DexGuard offers built-in support for both native Android (Java, Kotlin) and cross-platform applications (Cordova, Ionic, React Native, Unity). DexGuard’s functionality can be extended with the NDK add-on to process and protect native libraries.
  • 6
    OWASP ZAP
    OWASP ZAP (Zed Attack Proxy) is a free, open-source penetration testing tool being maintained under the umbrella of the Open Web Application Security Project (OWASP). ZAP is designed specifically for testing web applications and is both flexible and extensible. At its core, ZAP is what is known as a “man-in-the-middle proxy.” It stands between the tester’s browser and the web application so that it can intercept and inspect messages sent between browser and web application, modify the contents if needed, and then forward those packets on to the destination. ...
  • 7
    Aerobase

    Aerobase

    Aerobase

    Aerobase is an open-source Identity and access management (IAM) platform that specializes in identity federation, SSO, strong & adaptive authentication, access control, account management & identity provisioning, API & microservices security and privacy regulation. This guide helps you get started with Aerobase. It covers server configuration and use of the default database. Advanced deployment options are not covered. For a deeper description of features or configuration options, consult...
    Starting Price: $690 per month
  • 8
    VMware vSphere
    ...Boost workload performance, improve security and speed up innovation for your business. vSphere delivers essential services for the modern hybrid cloud. The new vSphere has been rearchitected with native Kubernetes to run existing enterprise applications alongside modern containerized applications in a unified manner. Transform on-premises infrastructure with cloud integration. Boost productivity with central management, global insights and automation. Power up with add-on cloud services. Meet the throughput and latency needs of distributed workloads by accelerating networking functions on the DPU. ...
  • 9
    Chkk

    Chkk

    Chkk

    Prioritize your top business-critical risks with clear and actionable insights. Continuously harden your Kubernetes availability. Learn from others and avoid repeating their mistakes. Eliminate risks before they cause incidents. Stay up to date with visibility across all your infrastructure layers. Catalog containers, clusters, add-ons, and dependencies. Consolidate insights across clouds, on-prem, and more. Get alerted about all EOL and incompatible versions. Never use spreadsheets or...
  • 10
    GitHub Advanced Security for Azure DevOps
    GitHub Advanced Security for Azure DevOps is an application security testing service that is native to the developer workflow. It empowers Developer, Security, and Operations (DevSecOps) teams to prioritize innovation and enhance developer security without sacrificing productivity. Detect and prevent secret leaks from your application development processes with secret scanning. Take advantage of a partner program of more than 100 service providers and scanning for more than 200 token types. ...
    Starting Price: $2 per GiB
  • 11
    LDAP

    LDAP

    LDAP

    ​LDAP is a comprehensive resource dedicated to the Lightweight Directory Access Protocol (LDAP), a mature, flexible, and well-supported standards-based mechanism for interacting with directory servers. Often utilized for authentication and storing information about users, groups, and applications, an LDAP directory server serves as a general-purpose data store applicable in various scenarios. Provides basic information about directory services and the LDAP protocol.​ Assists in finding the appropriate directory server, client API, or LDAP-based tools suitable for different environments.​ Offers links to various standards documents and reference guides for in-depth exploration of the protocol.​ ...
  • 12
    Fortanix Data Security Manager
    ...It is protected by FIPS 140-2 Level 3 confidential computing hardware and delivers the highest security and performance standards. The DSM accelerator is an optional add-on to achieve the highest performance for latency-sensitive applications. A Single System of Record and Pane of Glass for Crypto Policy, Key Lifecycle Management, and Auditing in a Scalable SaaS Solution That Makes Data Security a Breeze.
  • 13
    4identity
    4identity is the technological solution developed by Bit4id that empowers web applications with Digital Signature and Authentication processes. 4identity does not use Java Applets or any other third party add-on. It is simple, its is compatible with any web browser and works under the most used operating systems. The “integration-less” Engine to add Digital Signature and Strong Authentication to web applications through a simple API. 4identity means usability, providing a “1-click signing” user experience. ...
  • 14
    HPE Serviceguard

    HPE Serviceguard

    Hewlett Packard Enterprise

    HPE Serviceguard for Linux (SGLX) is a high‑availability (HA) and disaster‑recovery (DR) clustering solution designed to maximize uptime for critical Linux workloads, on‑premises, in virtualized environments, or across hybrid and public clouds. It continuously monitors applications, services, databases, servers, networks, storage, and processes; upon detecting faults, it performs fast, automated failover, often within four seconds, without compromising data integrity. SGLX supports both shared‑storage and shared‑nothing architectures (via its Flex Storage add‑on), enabling highly available SAP HANA, NFS, or other services even where SAN isn’t available. ...
    Starting Price: $30 per month
  • 15
    Waverley Labs SDP
    Waverley Labs then worked closely with CSA and DHS to develop the industry’s first Open Source reference implementation for version 1 specification for DDoS. Federal organizations, critical infrastructure providers, and businesses that rely on cloud delivery are able use these open source software releases to develop cloud services that are resistant to DDoS attacks and more. Removing access to business applications on the internet is reducing attacks.
  • 16
    Zenmap

    Zenmap

    Zenmap

    ...You can download Zenmap (often packaged with Nmap itself) from the Nmap download page. Zenmap is quite intuitive, but you can learn more about using it from the Zenmap User's Guide or check out the Zenmap man page for some quick reference information.
  • 17
    Proofpoint Cloud App Security Broker (CASB)
    Proofpoint Cloud App Security Broker (Proofpoint CASB) helps you secure applications such as Microsoft Office 365, Google G Suite, Box, and more. Our solution gives you people-centric visibility and control over your cloud apps, so you can deploy cloud services with confidence. Our powerful analytics help you grant the right levels of access to users and third-party add-on apps based on the risk factors that matter to you.
  • 18
    Bit Guardian Firewall
    ...For enhanced security, it offers add-on protection with Avira's malware databases, providing an impenetrable layer against online and offline threats. The firewall is compatible with Windows operating systems and is developed by Bit Guardian GmbH, a leading software development company based in Gräfelfing, Germany.
    Starting Price: Free
  • 19
    Nagios XI

    Nagios XI

    Nagios Enterprises, LLC

    Provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure. Hundreds of third-party addons provide for monitoring of virtually all in-house applications, services, and systems. Provides a central view of your entire IT operations network and business processes. Powerful dashboards provide at-a-glance access to powerful monitoring information and third-party data. ...
    Starting Price: $1995.00/one-time
  • 20
    Ostia Portus

    Ostia Portus

    Ostia Software Solutions

    ...It tackles the challenge of making complex IT test systems available quickly and on demand by creating simulations of the required links to the back office IT systems. This enables test systems to be made available sooner thus reducing the test timeline from months (according to our reference customers) to weeks or even days. This converts to earlier delivery of new or enhanced applications with less risk and at reduced cost. Portus test systems can be created in days, on cost effective commodity hardware and software.
  • 21
    Inspectiv

    Inspectiv

    Inspectiv

    ...Reports provide high level translation of risk to execs, detail to your engineers, and auditable references that integrate with ticketing systems.
  • 22
    Fidelis Halo

    Fidelis Halo

    Fidelis Security

    Fidelis Halo is a unified, SaaS-based cloud security platform that automates cloud computing security controls and compliance across servers, containers, and IaaS in any public, private, hybrid, and multi-cloud environment. With over 20,000 pre-configured rules and more than 150 policy templates that cover standards such as PCI, CIS, HIPAA, SOC, and DISA STIGs for IaaS services, Halo’s extensive automation capabilities streamline and accelerate workflows between InfoSec and DevOps. The...
    Starting Price: Free
  • 23
    Socure

    Socure

    Socure

    ...Socure ID+ supports automated machine-learning identity fraud risk management, as well as data-centric Know Your Customer (KYC) and Global Watchlist compliance tools, all returned with reason codes for decision transparency. DevHub is a central hub for developers to easily integrate and quickly build identity verification applications on the Socure ID+ Platform. DevHub contains documentation for all product modules, an API Reference Guide, a support ticketing system, and the latest communication updates in a self-service model for developers.
  • Previous
  • You're on page 1
  • Next