Suggested Categories:

Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Applicant Tracking Systems
An Applicant Tracking System (ATS) is a software tool designed to streamline the hiring process by automating the management of job applications. It allows recruiters and hiring managers to easily track, filter, and organize resumes submitted by candidates, ensuring a more efficient hiring workflow. ATS software typically includes features such as job posting, candidate sourcing, interview scheduling, and communication with applicants. It also helps improve compliance by storing and managing candidate data in an organized manner. By using an ATS, companies can save time, reduce hiring biases, and improve the overall candidate experience.
Application Server Software
Application server software provides a platform for deploying, managing, and running applications, typically for web or enterprise environments. These servers handle the backend logic of applications, facilitating the connection between client devices and databases or other services. Application servers often provide middleware services such as security, transaction management, and messaging, enabling the smooth execution of applications. They are designed to support multiple users simultaneously and ensure high availability, scalability, and performance of applications. This software is commonly used in environments where complex, data-intensive applications are developed, such as in e-commerce platforms, enterprise resource planning (ERP), and customer relationship management (CRM) systems.
Application Development Software
Application development software is a type of software used to create applications and software programs. It typically includes code editors, compilers, and debuggers that allow developers to write, compile, and debug code. It also includes libraries of pre-written code that developers can use to create more complex and powerful applications.
Application Lifecycle Management Software
Application Lifecycle Management (ALM) software is a set of tools that helps manage the entire lifecycle of an application, from initial planning and development through testing, deployment, and maintenance. ALM software typically includes functionalities for project management, version control, requirements management, test management, and continuous integration, allowing teams to track progress, collaborate effectively, and ensure quality throughout the application's life. This software supports methodologies like Agile, DevOps, and Waterfall, helping development teams streamline workflows, improve efficiency, and ensure that the application meets business goals and compliance requirements.
Application Shielding Software
Application shielding software is designed to protect applications from reverse engineering, tampering, and unauthorized access by applying security measures that obfuscate and encrypt critical parts of the application. This software helps prevent attacks like code injection, software cracking, and piracy by adding layers of protection to sensitive data and logic within the application. Application shielding typically includes features such as runtime protection, data encryption, anti-debugging, and obfuscation techniques, making it more difficult for attackers to exploit vulnerabilities. It is commonly used in industries like software development, finance, and gaming, where intellectual property protection is crucial.
Application Virtualization Software
Application virtualization software allows applications to be run on various devices without being installed directly on the host operating system. This technology abstracts the application from the underlying hardware, enabling users to access applications remotely or on different devices while ensuring consistent performance and behavior. Application virtualization software packages applications in a virtual environment, which isolates them from the system, helping improve security, manageability, and compatibility across various platforms. It is commonly used in enterprise environments to reduce software installation conflicts, simplify updates, and provide secure access to critical applications.
Application Control Software
Application control software, sometimes referred to as application whitelisting software, provides organizations with the ability to monitor and manage applications installed on computers. It allows for the automated enforcement of regulatory compliance policies, including restricting user access to specific applications or functions. Application control software can also be used for enforcing cross-platform usage rights and tracking application resource utilization.
Application Performance Monitoring (APM) Software
Application performance monitoring (APM) software, also known as application performance management software, is designed to help organizations track and optimize the performance of their critical applications. Through advanced monitoring and analytics tools, APM software allows teams to identify and resolve performance issues in real-time, ensuring that applications are fast, stable, and reliable. By providing in-depth insights into application performance and user experience, APM software helps organizations deliver a superior customer experience and improve the overall performance of their applications.
Web Application Firewalls (WAF)
Web Application Firewalls (WAFs) are security solutions that protect web applications by filtering and monitoring HTTP traffic between the application and the internet. They detect and block threats such as SQL injections, cross-site scripting (XSS), and other common attacks targeting application vulnerabilities. WAFs analyze incoming requests in real time, applying customizable security rules to distinguish between legitimate and potentially malicious traffic. Many WAFs are cloud-based, enabling flexible and scalable protection without impacting application performance. By acting as a shield between web applications and attackers, WAFs help ensure data security, regulatory compliance, and uninterrupted user access.
Application Portfolio Management Software
Application portfolio management software is a type of software used to manage an organization's entire portfolio of applications. It helps in analyzing the value of applications, identifying risks associated with them, and providing cost management strategies. The software also provides insight into the application utilization and performance, as well as ability to measure return on investments. It can be used to optimize technology spending and reduce business complexity while driving innovation.
Mobile Application Management Software
Mobile Application Management (MAM) software is a tool used by businesses to efficiently manage the various applications on their employees' mobile devices. This type of software allows for easy distribution, updates, and monitoring of apps across multiple devices. It also provides security measures such as data encryption and remote wiping in case of a lost or stolen device. With Mobile Application Management, companies can ensure that their employees have access to the necessary apps while maintaining control over their usage and data protection. Overall, this software helps streamline app management for businesses operating in a highly mobile environment.
Application Dependency Mapping Tools
Application dependency mapping tools are software tools used to analyze and map the relationships between different applications within a system. These tools provide a comprehensive overview of an organization's entire application stack, including web applications, databases, servers, and other components. By visually displaying these dependencies, organizations can better understand how their applications interact with each other and identify potential risks or weaknesses. These tools also allow for easier troubleshooting and identification of issues within complex systems. They are commonly used in IT departments for improving system performance and optimization.
Application Delivery Controllers (ADC)
Application Delivery Controllers (ADCs) are software solutions designed to optimize the performance, security, and availability of applications delivered over the internet. They manage traffic between users and applications by distributing it across multiple servers, ensuring load balancing and preventing overloads. ADCs also provide security features like SSL offloading, DDoS protection, and web application firewalls to safeguard applications from attacks. By improving application response times and ensuring high availability, ADCs enhance user experience and help maintain service continuity. They are commonly used in data centers and cloud environments to ensure efficient and secure application delivery.
Rapid Application Development (RAD) Software
Rapid Application Development (RAD) software is a development methodology and set of tools designed to speed up the process of building applications through iterative development, prototyping, and minimal manual coding. RAD software typically includes features like visual development interfaces, drag-and-drop components, pre-built templates, and automated code generation to accelerate the development lifecycle. It enables developers to create applications quickly by focusing on user feedback and iterative refinement rather than long planning and design phases. RAD is commonly used for developing business applications, mobile apps, and web-based solutions where time-to-market is critical.
Application Release Orchestration (ARO) Tools
Application release orchestration (ARO) tools are software tools designed to streamline the process of deploying and managing applications. These tools automate various tasks such as packaging, testing, and deployment, resulting in increased efficiency and reduced errors. ARO tools also provide visibility into the entire release pipeline, allowing teams to track progress and identify potential bottlenecks. They can work with a variety of platforms and technologies, making them versatile for different types of applications. Overall, Application release orchestration tools help organizations streamline their release processes and improve collaboration between development, testing, and operations teams.
Mobile Application Security Testing Tools
Mobile application security testing (MAST) tools are software tools designed to assess the security vulnerabilities and weaknesses of mobile applications. These tools use a variety of techniques, such as code analysis and penetration testing, to identify potential threats and risks within the app. They can also check for compliance with industry standards and regulations. These tools provide detailed reports on their findings, allowing developers to address any issues before releasing the app to users. As cyber attacks targeting mobile apps continue to rise, these tools play an important role in ensuring the overall security and integrity of mobile applications.
Dynamic Application Security Testing (DAST) Software
Dynamic Application Security Testing (DAST) software is software that identifies and addresses vulnerabilities in web applications during runtime. Unlike static testing, which analyzes source code, DAST evaluates the security of running applications by simulating real-world attacks to detect issues such as SQL injection, cross-site scripting (XSS), and authentication flaws. This software helps security teams identify weaknesses in live applications and prioritize fixes based on the severity of potential threats. DAST tools are typically used during development, staging, or pre-production stages to ensure that applications are secure before being deployed to production.
Runtime Application Self-Protection (RASP) Software
Runtime Application Self-Protection (RASP) software is a security solution designed to protect applications in real time while they are running, providing active defense against attacks by detecting and mitigating vulnerabilities as they occur. Unlike traditional security tools, which primarily focus on perimeter defense or static scanning, RASP operates within the application itself and monitors its behavior during runtime. It can automatically block malicious activity, such as SQL injection, cross-site scripting (XSS), and unauthorized access, by analyzing both application traffic and the application's internal behavior. RASP is particularly valuable for protecting web applications, mobile apps, and APIs from advanced threats, ensuring the security of applications even if they are deployed in dynamic or cloud environments.
Static Application Security Testing (SAST) Software
Static Application Security Testing (SAST) software analyzes the source code, binaries, or bytecode of an application to identify vulnerabilities before the code is run in production. This type of software scans the application at rest to detect issues such as coding errors, security flaws, and weaknesses like SQL injection, cross-site scripting (XSS), and buffer overflows. SAST tools provide developers with early insights into potential security vulnerabilities, allowing them to fix issues before deployment. These tools are typically integrated into the software development lifecycle (SDLC), supporting secure coding practices and helping teams build more secure applications.
View more categories (20) for "application (.exe)"

7 Products for "application (.exe)" with 2 filters applied:

  • 1
    Contrast Security

    Contrast Security

    Contrast Security

    ...Contrast automatically applies the best analysis and remediation technique, dramatically improving efficiencies and efficacy. Separate AppSec tools create silos that obfuscate the gathering of actionable intelligence across the application attack surface. Contrast delivers centralized observability that is critical to managing risks and capitalizing on operational efficiencies, both for security and development teams. Contrast Scan is pipeline native and delivers the speed, accuracy, and integration demanded by modern software development.
    Starting Price: $0
  • 2
    Appvance

    Appvance

    Appvance.ai

    Appvance IQ (AIQ) delivers transformational productivity gains and lower costs in both test creation and execution. For test creation, it offers both AI-driven (fully machine-generated tests) and also 3rd-generation, codeless scripting. It then executes those scripts through data-driven functional, performance, app-pen and API testing — for both web and mobile apps. AIQ’s self-healing technology gives you complete code coverage with just 10% the effort of traditional testing systems. Most...
  • 3
    OWASP ZAP
    OWASP ZAP (Zed Attack Proxy) is a free, open-source penetration testing tool being maintained under the umbrella of the Open Web Application Security Project (OWASP). ZAP is designed specifically for testing web applications and is both flexible and extensible. At its core, ZAP is what is known as a “man-in-the-middle proxy.” It stands between the tester’s browser and the web application so that it can intercept and inspect messages sent between browser and web application, modify the contents if needed, and then forward those packets on to the destination. ...
  • 4
    Acunetix

    Acunetix

    Invicti Security

    As the market leader in automated web application security testing, Acunetix by Invicti is the go-to security tool for Fortune 500 companies. DevSecOps teams can cut through the noise to uncover unseen risks and mitigate dangerous exploits, detecting and reporting on a wide array of vulnerabilities. With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight into an organization's risk posture. ...
  • 5
    Invicti

    Invicti

    Invicti Security

    Application security is noisy and overly complicated. The good news: you can relieve that unnecessary noise and dramatically reduce your risk of attacks with Invicti. Keeping up with security is more manageable with accurate, automated testing that scales as your needs shift and grow. That's where Invicti shines. With a leading dynamic application security testing solution (DAST), Invicti helps teams automate security tasks and save hundreds of hours each month by identifying the vulnerabilities that really matter. ...
  • 6
    MaxPatrol

    MaxPatrol

    Positive Technologies

    ...Penetration testing, system checks, and compliance monitoring are at the core of MaxPatrol. Together, these mechanisms give an objective picture of the security stance across IT infrastructure as well as granular insight at the department, host, and application level, precisely the information needed to quickly detect vulnerabilities and prevent attacks. MaxPatrol makes it a cinch to keep an up-to-date inventory of IT assets. View information about network resources (network addresses, OS, available network applications and services), identify hardware and software in use, and monitor the state of updates. ...
  • 7
    Caido

    Caido

    Caido Labs Inc.

    Caido is a modern web security toolkit designed for pentesters, bug bounty hunters, and security teams who need an efficient and customizable solution for web application testing. Caido features a powerful intercept proxy for capturing and manipulating HTTP requests, replay functionality for testing endpoints, and automation tools for handling large-scale workflows. Its sitemap visualization provides a clear view of web application structures, helping users map and navigate complex targets. ...
    Starting Price: Free
  • Previous
  • You're on page 1
  • Next