Results for: encryption algorithm java

Suggested Categories:

Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.
Algorithmic Trading Software
Algorithmic trading software enhances and automates trading capabilities for trading financial instruments such as equities, securities, digital assets, currency, and more. Algorithmic trading software, also known as algo trading software or automated trading software, enables the automatic execution of trades depending on occurrences of specified criteria, indicators, and movements by connecting with a broker or exchange.
Email Encryption Software
Email encryption software ensures the confidentiality and integrity of email communications by converting messages into unreadable formats that can only be decrypted by authorized recipients. It uses encryption protocols such as S/MIME and PGP to protect sensitive information from interception, eavesdropping, and unauthorized access. The software helps organizations comply with data privacy regulations like GDPR, HIPAA, and CCPA by securing emails containing personal or financial information. Email encryption can be applied at the message level, attachment level, or entire inbox, providing versatile protection for both internal and external communications. By safeguarding email content, businesses can reduce the risk of data breaches, maintain customer trust, and avoid costly compliance fines.
Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
Encrypted Messaging Software
Encrypted messaging software protects digital communications by encoding messages so that only the intended recipient can read them. It uses sophisticated encryption algorithms to prevent interception, eavesdropping, and unauthorized access. This type of software ensures privacy and security for personal, business, and governmental communications. It supports the safe exchange of text, voice, video, and files over the internet. By maintaining message confidentiality and user anonymity, encrypted messaging software is essential for secure, private communication.
PDF Encryption Software
PDF encryption software is a type of program used to protect documents in the PDF format. With it, users can protect the contents of their documents by setting passwords and restricting certain editing permissions. It can also be configured to set expiration dates for documents, ensuring that they remain secure until a specified time. By encrypting PDFs, users are able to keep their sensitive information safe and secure from unauthorized viewing.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
Encryption Key Management Software
Encryption key management software securely handles the creation, storage, distribution, and lifecycle management of encryption keys used to protect sensitive data. It provides a centralized system that ensures only authorized users and applications can access or decrypt encrypted information, reducing the risk of data breaches. By automating key processes such as generation, rotation, expiration, and backup, this software helps maintain security standards and compliance with regulatory requirements. With features like role-based access, logging, and auditing, it offers transparency and control over key usage. Encryption key management is essential for organizations aiming to secure data across databases, applications, and cloud environments.
Key Tracking Software
Key tracking software, also known as physical key management software, is designed to monitor and manage the physical keys used within an organization, ensuring they are secure and accessible only to authorized individuals. It centralizes the process of assigning, returning, and logging the use of keys, reducing the risk of unauthorized access and lost keys. With features like real-time tracking, user authentication, and detailed reporting, key tracking software provides transparency and accountability over key usage. It often includes alerts and reminders to prevent overdue returns or misuse. This software is essential for organizations managing multiple keys, helping improve security and streamline key control processes.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
Mentoring Software
Mentoring software is a type of software designed to facilitate the mentor-mentee relationship. It provides users with tools for scheduling, tracking progress, providing feedback, and developing plans for growth. The software can be used as a standalone system or integrated into existing enterprise solutions. Mentoring software allows organizations to easily manage and monitor their mentorship programs remotely and efficiently.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Password Management Software
Password management software securely stores, generates, and manages passwords for users across various accounts and systems. It helps individuals and organizations maintain strong, unique passwords for each service while reducing the risk of password fatigue or breaches due to weak or reused passwords. These tools typically offer features like password vaults, automatic password generation, encryption, and multi-factor authentication (MFA) for added security. Password management software is essential in protecting sensitive information from cyber threats by simplifying and securing the process of handling numerous login credentials. For businesses, it also allows for centralized control and auditing of password access, ensuring compliance with security policies and regulations.
Identity Resolution Software
Identity resolution software enables organizations to identify and track the identity of customers, users, or potential customers across multiple devices and services. Identity resolution solutions are very helpful for running personalized campaigns across different channels and devices.
Natural Language Generation Software
Natural language generation software is computer-generated software designed to create natural-sounding output. It can generate text from structured data sources such as databases, or from unstructured sources like audio or video recordings. The output of this software can be used for various tasks such as summarizing information or producing news articles. Natural language generation technology is commonly used in applications that require automated content creation and natural language processing algorithms.
Product Recommendation Engines
Product recommendation engines use algorithms and customer data to suggest personalized products to users based on their browsing behavior, past purchases, or preferences. These platforms analyze large sets of data, such as customer interactions and purchase history, to identify patterns and recommend products that are most likely to interest the individual customer. Product recommendation engines help e-commerce businesses increase sales and customer engagement by offering a more personalized shopping experience. By integrating these engines, businesses can provide relevant suggestions, improve conversion rates, and enhance customer satisfaction.
Load Testing Tools
Load testing tools are used to test and verify the quality and performance of an application under workload in order to get rid of problems.
View more categories (18) for "encryption algorithm java"

31 Products for "encryption algorithm java" with 1 filter applied:

  • 1
    JOpt.TourOptimizer

    JOpt.TourOptimizer

    DNA Evolutions GmbH

    ...It comes as a Java library or in Docker Container utilizing the Spring Framework and Swagger.
    Leader badge
    Starting Price: €995
    Partner badge
    View Software
    Visit Website
  • 2
    IriMaster

    IriMaster

    Iritech, Inc.

    ...Its Web Service API enables scalable, service‑oriented deployments, supporting clients in Java, .NET, or web applications. The software delivers high availability through application server clustering and hardware redundancy, and scales from single‑PC setups to distributed server networks with load balancers.
  • 3
    Yandex Key Management Service
    ...Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. ...
    Starting Price: $0.0230 per month
  • 4
    SSH NQX
    ...Utilizes quantum-resilient algorithms to safeguard data against potential quantum computing threats, ensuring long-term confidentiality and integrity. Designed to manage complex network topologies, NQX allows efficient control over multiple connections and encryption keys, facilitating scalability across large organizations. Provides encrypted links between data centers, ensuring secure data transfer without altering network topology.
  • 5
    Cisco Secure Email Encryption Service
    ...When Envelope Storage is enabled, the key and message are stored temporarily in the Secure Email Encryption Service. The recipient clicks on the link to open the message on any device. Secure Email Encryption Service is based on technology that uses the most reliable email encryption algorithms available.
  • 6
    CryptoSentry

    CryptoSentry

    SentryBay

    ...Because ransomware is an attack on the availability of data, our CryptoSentry solution is designed to prevent it from getting access to data so it can encrypt files. Once installed on your employees’ devices, it will constantly monitor for suspicious encryption activity. If its algorithms determine a threat, it will proactively prevent file encryption.
  • 7
    yFiles

    yFiles

    yWorks

    ...It provides comprehensive features for rendering, editing, and automatically laying out complex diagrams — from organizational charts and flowcharts to IT infrastructures. With advanced layout algorithms, interactive capabilities, and strong performance, yFiles enables developers to integrate scalable and clear graph visualizations into web, desktop, or mobile applications. Supporting multiple platforms like HTML/JavaScript, Java, and .NET, yFiles is used across industries such as telecommunications, finance, and life sciences to make complex processes and relationships easy to understand.
    Starting Price: $17,000/developer
  • 8
    Algolia Places

    Algolia Places

    Algolia Community

    ...Visualize the results at a glance by displaying them on a real-time map. Build unique search experiences with the autocomplete.js & instantsearch.js plugins for Algolia Places. A JavaScript one-liner to turn any HTML <input> into fast & beautiful address auto-complete menus. Backed by Algolia's unique ranking algorithm, Algolia Places mixes intuitively relevant local and famous places. Native support of typing mistakes thanks to the unique way Algolia handles typos and ranks results accordingly.
    Starting Price: $0.40 per 1,000 requests
  • 9
    MLlib

    MLlib

    Apache Software Foundation

    ​Apache Spark's MLlib is a scalable machine learning library that integrates seamlessly with Spark's APIs, supporting Java, Scala, Python, and R. It offers a comprehensive suite of algorithms and utilities, including classification, regression, clustering, collaborative filtering, and tools for constructing machine learning pipelines. MLlib's high-quality algorithms leverage Spark's iterative computation capabilities, delivering performance up to 100 times faster than traditional MapReduce implementations. ...
  • 10
    GLAnalytics

    GLAnalytics

    GLAnalytics

    ...GLAnalytics’ cloud-based analytics software delivers financial reporting that proactively monitors financial data for errors and potential fraud. This risk management solution offers peace of mind through the use of powerful algorithms. These algorithms scan financial data proactively and securely through an easy to use interface rarely seen in other financial reporting software. Algorithms that highlight anomalies and cross review between components. analytics includes highly secure and encrypted access control to make sure data stays private. The application enables both logical and physical separation of client data with tiered certified storage. analytics is cloud-based for added security and scalability, where all data is securely stored, and all access is monitored.
  • 11
    ChainEyes

    ChainEyes

    ChainEyes

    ChainEyes is a global services crypto business compliance and security technology services provider, registered in Singapore and incubated by Chainup Group, a famous professional cryptocurrency exchange cloud system, and crypto multi-solution provider. 1. Identify address risks Based on the artificial intelligence model stack, it combines algorithms with encrypted on-chain data and off-chain information through cloud computing to help you better understand your investments and transactions, thus transacting freely and safely. 2. Analyze and calculate transaction risks Through real-time transaction data on the chain + AI semantic algorithm real-time modeling, it analyzes transaction risks, tracks capital flow, and provides transaction risk monitoring. 3. ...
  • 12
    iText

    iText

    Apryse

    Now part of the Apryse family, iText is one of the best-documented and most versatile PDF SDKs in the world. The open-source iText Core library features a powerful layout engine and intuitive high-level APIs for document creation and manipulation, digital signing and validation, and much more. It has built-in support for PDF 2.0, all variants of PDF/A and PDF/UA, FIPS-140-2 and the very latest ISO standards for digital signatures and encryption. You can extend iText's capabilities...
  • 13
    NSFOCUS NGFW
    ...It provides NGFW capabilities and collaborates with other security devices to proactively defend against cyber threats, and improve user and application experience while lowering the total cost of ownership. A dedicated AI-based content moderation module effectively recognizes content in texts, images, and videos. Use honeypots and AI algorithms to trap attacks. AI algorithms recognize attacks and apps in encrypted traffic. Scalable AI-based AV engine increases virus detection rate.
  • 14
    Dynamic Web TWAIN
    Dynamic Web TWAIN is an enterprise-grade, browser-based document scanning SDK built for speed, security, and scale. It enables developers to create robust capture applications with minimal JavaScript. It supports all major browsers on Windows, macOS, Linux, and mobile, along with TWAIN, WIA, ICA, SANE, and eSCL drivers. Key features include high-volume scanning with disk caching and a 64-bit service, async APIs for faster workflows, and a built-in viewer with editing tools like annotation, zoom, and de-skew. Documents can be exported to PDF, TIF, JPG, BMP, or PNG and uploaded via chunked or multi-threaded transfer. ...
  • 15
    Vanillatech Labs

    Vanillatech Labs

    Vanillatech

    We developed a neuro-bio inspired generic deep learning algorithm that works as simple as an intelligence test. It automatically detects and predicts patterns and allows you to build intelligent apps easily. Our software is easy to use because it offers a straightforward and well defined REST api which allows you to build intelligent apps from any environment. This way you can connect e.g.
  • 16
    Coding Blocks

    Coding Blocks

    Coding Blocks

    ...At Coding Blocks, we strive to increase student interest by providing hands on practical training on every concept taught in the classroom. Learn Data structures and Algorithms right from the basics and become an accomplished programmer using Java, one of the most popular programming languages in the world and brighten your chances of making it to the Top Tech organisations as an Intern or SDE. Having been a standalone field for a long time, the software industry has now come neck to neck with most of the other industries by close coordination and easy integration. ...
    Starting Price: $20.09 per course
  • 17
    IBM Guardium Quantum Safe
    IBM Guardium Quantum Safe, delivered on the IBM Guardium Data Security Center, monitors, uncovers, and prioritizes cryptographic vulnerabilities to help protect your data from both conventional and quantum-enabled risks. As quantum computing advances, traditional encryption algorithms that would take centuries to break using conventional computers may be cracked within hours, potentially leaving all sensitive information secured by today's encryption standards vulnerable. IBM, a leader in the quantum-safe space, developed two recently published NIST post-quantum cryptographic standards in collaboration with industry partners. ...
  • 18
    IBM Cloud Data Shield
    ...IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for MySQL, NGINX and Vault. Powered by the Fortanix Runtime Encryption platform and Intel SGX technology, these tools enable organizations with sensitive data to leverage cloud computing with more confidence. IBM Cloud Data Shield helps enable organizations with sensitive data to deploy and benefit from cloud computing. ...
  • 19
    Crystal Ball Markets

    Crystal Ball Markets

    Crystal Ball Markets

    ...Our platform is available on all electronic (Windows, Linus, Mac) and mobile devices (Apple Appstore, Google Play store). Our platform also offers automation capabilities for traders to deploy artificial intelligence (AI) powered algorithms coded in Java(script). All trades are executed at lightning speed with zero slippage, with no dealing desk, no freeze levels, no routing rules, and a no-nonsense approach to service delivery and satisfaction of our clients.
    Starting Price: $0
  • 20
    Nanobase AI

    Nanobase AI

    Bumu Technologies

    ...With an intuitive drag-and-drop flow builder, users can visually design backend workflows, define triggers, and manage data operations — all without writing repetitive code. Using advanced AI algorithms, Nanobase automatically generates clean, production-ready Java code that is fully deployable. Whether you’re integrating databases like PostgreSQL, MySQL, or Redis, or connecting to external APIs, Nanobase ensures your backend projects are fully functional from day one. Unlike traditional low-code platforms, Nanobase doesn’t lock you into proprietary templates. ...
    Starting Price: Free
  • 21
    Google Cloud Artifact Registry
    Artifact Registry is Google Cloud’s unified, fully managed package and container registry designed for high-performance artifact storage and dependency management. It centralizes host­ing of container images (Docker/OCI), Helm charts, language packages (Java/Maven, Node.js/npm, Python), and OS packages, offering fast, scalable, reliable, and secure handling with built-in vulnerability scanning and IAM-based access control. Integrated seamlessly with Google Cloud CI/CD tools like Cloud Build, Cloud Run, GKE, Compute Engine, and App Engine, it supports regional and virtual repositories with granular security via VPC Service Controls and customer-managed encryption keys. ...
  • 22
    Maltego

    Maltego

    Maltego Technologies

    Maltego is a Java application that runs on Windows, Mac and Linux. Maltego is used by a broad range of users, ranging from security professionals to forensic investigators, investigative journalists, and researchers. Easily gather information from dispersed data sources. View up to 1 million entities on a graph​. Access over 58 data sources in the Maltego transform hub.
    Starting Price: €5000 per user per year
  • 23
    SMACC

    SMACC

    Arab Sea Information Systems

    ...Human Resource Management covers all administrative essentials to manage employees, employees' salaries, vacations, pay slips etc. SMACC secures your crucial information with the best-encrypted algorithms to keep your accounts, data and personal information safe. SMACC gives you the freedom to access the application from anywhere, any time and from any device because SMACC is cloud-based.
    Starting Price: $99 per user per month
  • 24
    TalentSearch
    ...Use our predictive analytics to see which candidates would be most interested in learning about a new opportunity. Uncover candidates you didn’t even know you were missing. Our breakthrough algorithm knows, for example, how Java is related to J2EE and will include similar skills and titles in your search. Search for candidates for the same role across multiple cities, states or provinces across a single search.
    Starting Price: $6000 per year
  • 25
    iFormBuilder

    iFormBuilder

    Zerion Software

    ...Work faster and smarter, building custom integrations for data processing, connecting with other applications, and automatically managing your iFormBuilder account. Push the boundaries of mobile data collection with JavaScript-enabled formulas, skip logic, and data validation. The only limit is your imagination! Protect your data with device passwords, encryption, and private environments. iFormBuilder supports GDPR, HIPAA, FISMA, and ISO 9001 project needs. There’s no substitute for experience. We have over a decade of experience working belly-to-belly to help teams of all sizes reach their enterprise goals. ...
  • 26
    OpsVeda

    OpsVeda

    OpsVeda

    The OpsVeda Operations Management System is powered by an AI infused and automation capable platform. The platform uses algorithms and rules to monitor business events in real-time and alerts users to risks and opportunities in the context of customer relationships and financial outcomes. It is the engine powering the rich content of the OpsVeda Solution Factory. The platform enables a quick and low-risk way for companies to enjoy the benefits of an Operational Intelligence solution. ...
  • 27
    SmartFlow

    SmartFlow

    Solana Networks

    ...Smartflow is an appliance based solution and targeted for medium and large enterprises. SmartFlow utilizes patent-pending anomaly detection techniques and network behaviour analysis to identify security threats in a network. It applies Solana algorithms on flow data such as Netflow to detect address scans, DDoS attacks, Botnets, port scans, malware etc. Zero day threats and encrypted malicious traffic (such as Botnet Command & Control) may escape detection by signature-based security monitoring tools. However, they will not escape detection by SmartFlow. SmartFlow distills network traffic and flow data into more than 20 different statistical measures which it continuously analyzes for early warnings of cyber threats.
    Starting Price: $5000 per year
  • 28
    ChemInventory

    ChemInventory

    Antipodes Scientific

    ...ChemInventory can be accessed from any device - including PCs and Macs. You no longer need to have your inventory tied to a single computer. All data stored on our servers is encrypted using the industry standard AES-256 algorithm. To protect against data loss, we backup our databases daily. Unique barcodes can be assigned to each container, enabling simple and fast stocktaking procedures with a barcode scanner.
    Starting Price: $56 per year
  • 29
    Getscreen.me

    Getscreen.me

    Getscreen.me

    ...You can call a customer or ask a question in the chat window during a session - this saves time. And if you have a large company - create teams and work together under one account! Getscreen.me is absolutely safe. All transmitted data is encrypted by default with 128-bit AES algorithm inside WebRTC and SSL protocols. Integration with popular platforms like Google Chrome Extension, Telegram and Jira Service Desk, as well as with HTTP API.
    Starting Price: $5
  • 30
    Protegrity

    Protegrity

    Protegrity

    ...Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • Previous
  • You're on page 1
  • 2
  • Next