[go: up one dir, main page]

Results for: oracle apex applications

Suggested Categories:

Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Applicant Tracking Systems
An Applicant Tracking System (ATS) is a software tool designed to streamline the hiring process by automating the management of job applications. It allows recruiters and hiring managers to easily track, filter, and organize resumes submitted by candidates, ensuring a more efficient hiring workflow. ATS software typically includes features such as job posting, candidate sourcing, interview scheduling, and communication with applicants. It also helps improve compliance by storing and managing candidate data in an organized manner. By using an ATS, companies can save time, reduce hiring biases, and improve the overall candidate experience.
Application Server Software
Application server software provides a platform for deploying, managing, and running applications, typically for web or enterprise environments. These servers handle the backend logic of applications, facilitating the connection between client devices and databases or other services. Application servers often provide middleware services such as security, transaction management, and messaging, enabling the smooth execution of applications. They are designed to support multiple users simultaneously and ensure high availability, scalability, and performance of applications. This software is commonly used in environments where complex, data-intensive applications are developed, such as in e-commerce platforms, enterprise resource planning (ERP), and customer relationship management (CRM) systems.
Application Development Software
Application development software is a type of software used to create applications and software programs. It typically includes code editors, compilers, and debuggers that allow developers to write, compile, and debug code. It also includes libraries of pre-written code that developers can use to create more complex and powerful applications.
Application Lifecycle Management Software
Application Lifecycle Management (ALM) software is a set of tools that helps manage the entire lifecycle of an application, from initial planning and development through testing, deployment, and maintenance. ALM software typically includes functionalities for project management, version control, requirements management, test management, and continuous integration, allowing teams to track progress, collaborate effectively, and ensure quality throughout the application's life. This software supports methodologies like Agile, DevOps, and Waterfall, helping development teams streamline workflows, improve efficiency, and ensure that the application meets business goals and compliance requirements.
Application Shielding Software
Application shielding software is designed to protect applications from reverse engineering, tampering, and unauthorized access by applying security measures that obfuscate and encrypt critical parts of the application. This software helps prevent attacks like code injection, software cracking, and piracy by adding layers of protection to sensitive data and logic within the application. Application shielding typically includes features such as runtime protection, data encryption, anti-debugging, and obfuscation techniques, making it more difficult for attackers to exploit vulnerabilities. It is commonly used in industries like software development, finance, and gaming, where intellectual property protection is crucial.
Application Virtualization Software
Application virtualization software allows applications to be run on various devices without being installed directly on the host operating system. This technology abstracts the application from the underlying hardware, enabling users to access applications remotely or on different devices while ensuring consistent performance and behavior. Application virtualization software packages applications in a virtual environment, which isolates them from the system, helping improve security, manageability, and compatibility across various platforms. It is commonly used in enterprise environments to reduce software installation conflicts, simplify updates, and provide secure access to critical applications.
Application Control Software
Application control software, sometimes referred to as application whitelisting software, provides organizations with the ability to monitor and manage applications installed on computers. It allows for the automated enforcement of regulatory compliance policies, including restricting user access to specific applications or functions. Application control software can also be used for enforcing cross-platform usage rights and tracking application resource utilization.
Application Modernization Software
Application modernization software helps organizations update legacy applications to meet modern performance, scalability, and security requirements. It supports initiatives such as cloud migration, refactoring, re-platforming, and containerization. The software often includes assessment tools, automation, and dependency mapping to reduce risk during modernization efforts. Many platforms integrate with cloud providers, DevOps pipelines, and infrastructure tools to streamline deployment and management. By modernizing applications, businesses can improve agility, reduce technical debt, and extend the value of existing systems.
Application Performance Monitoring (APM) Software
Application performance monitoring (APM) software, also known as application performance management software, is designed to help organizations track and optimize the performance of their critical applications. Through advanced monitoring and analytics tools, APM software allows teams to identify and resolve performance issues in real-time, ensuring that applications are fast, stable, and reliable. By providing in-depth insights into application performance and user experience, APM software helps organizations deliver a superior customer experience and improve the overall performance of their applications.
Web Application Firewalls (WAF)
Web Application Firewalls (WAFs) are security solutions that protect web applications by filtering and monitoring HTTP traffic between the application and the internet. They detect and block threats such as SQL injections, cross-site scripting (XSS), and other common attacks targeting application vulnerabilities. WAFs analyze incoming requests in real time, applying customizable security rules to distinguish between legitimate and potentially malicious traffic. Many WAFs are cloud-based, enabling flexible and scalable protection without impacting application performance. By acting as a shield between web applications and attackers, WAFs help ensure data security, regulatory compliance, and uninterrupted user access.
Application Portfolio Management Software
Application portfolio management software is a type of software used to manage an organization's entire portfolio of applications. It helps in analyzing the value of applications, identifying risks associated with them, and providing cost management strategies. The software also provides insight into the application utilization and performance, as well as ability to measure return on investments. It can be used to optimize technology spending and reduce business complexity while driving innovation.
Mobile Application Management Software
Mobile Application Management (MAM) software is a tool used by businesses to efficiently manage the various applications on their employees' mobile devices. This type of software allows for easy distribution, updates, and monitoring of apps across multiple devices. It also provides security measures such as data encryption and remote wiping in case of a lost or stolen device. With Mobile Application Management, companies can ensure that their employees have access to the necessary apps while maintaining control over their usage and data protection. Overall, this software helps streamline app management for businesses operating in a highly mobile environment.
Application Dependency Mapping Tools
Application dependency mapping tools are software tools used to analyze and map the relationships between different applications within a system. These tools provide a comprehensive overview of an organization's entire application stack, including web applications, databases, servers, and other components. By visually displaying these dependencies, organizations can better understand how their applications interact with each other and identify potential risks or weaknesses. These tools also allow for easier troubleshooting and identification of issues within complex systems. They are commonly used in IT departments for improving system performance and optimization.
Application Delivery Controllers (ADC)
Application Delivery Controllers (ADCs) are software solutions designed to optimize the performance, security, and availability of applications delivered over the internet. They manage traffic between users and applications by distributing it across multiple servers, ensuring load balancing and preventing overloads. ADCs also provide security features like SSL offloading, DDoS protection, and web application firewalls to safeguard applications from attacks. By improving application response times and ensuring high availability, ADCs enhance user experience and help maintain service continuity. They are commonly used in data centers and cloud environments to ensure efficient and secure application delivery.
Rapid Application Development (RAD) Software
Rapid Application Development (RAD) software is a development methodology and set of tools designed to speed up the process of building applications through iterative development, prototyping, and minimal manual coding. RAD software typically includes features like visual development interfaces, drag-and-drop components, pre-built templates, and automated code generation to accelerate the development lifecycle. It enables developers to create applications quickly by focusing on user feedback and iterative refinement rather than long planning and design phases. RAD is commonly used for developing business applications, mobile apps, and web-based solutions where time-to-market is critical.
Application Release Orchestration (ARO) Tools
Application release orchestration (ARO) tools are software tools designed to streamline the process of deploying and managing applications. These tools automate various tasks such as packaging, testing, and deployment, resulting in increased efficiency and reduced errors. ARO tools also provide visibility into the entire release pipeline, allowing teams to track progress and identify potential bottlenecks. They can work with a variety of platforms and technologies, making them versatile for different types of applications. Overall, Application release orchestration tools help organizations streamline their release processes and improve collaboration between development, testing, and operations teams.
Mobile Application Security Testing Tools
Mobile application security testing (MAST) tools are software tools designed to assess the security vulnerabilities and weaknesses of mobile applications. These tools use a variety of techniques, such as code analysis and penetration testing, to identify potential threats and risks within the app. They can also check for compliance with industry standards and regulations. These tools provide detailed reports on their findings, allowing developers to address any issues before releasing the app to users. As cyber attacks targeting mobile apps continue to rise, these tools play an important role in ensuring the overall security and integrity of mobile applications.
Runtime Application Self-Protection (RASP) Software
Runtime Application Self-Protection (RASP) software is a security solution designed to protect applications in real time while they are running, providing active defense against attacks by detecting and mitigating vulnerabilities as they occur. Unlike traditional security tools, which primarily focus on perimeter defense or static scanning, RASP operates within the application itself and monitors its behavior during runtime. It can automatically block malicious activity, such as SQL injection, cross-site scripting (XSS), and unauthorized access, by analyzing both application traffic and the application's internal behavior. RASP is particularly valuable for protecting web applications, mobile apps, and APIs from advanced threats, ensuring the security of applications even if they are deployed in dynamic or cloud environments.
Static Application Security Testing (SAST) Software
Static Application Security Testing (SAST) software analyzes the source code, binaries, or bytecode of an application to identify vulnerabilities before the code is run in production. This type of software scans the application at rest to detect issues such as coding errors, security flaws, and weaknesses like SQL injection, cross-site scripting (XSS), and buffer overflows. SAST tools provide developers with early insights into potential security vulnerabilities, allowing them to fix issues before deployment. These tools are typically integrated into the software development lifecycle (SDLC), supporting secure coding practices and helping teams build more secure applications.
View more categories (20) for "oracle apex applications"

27 Products for "oracle apex applications" with 1 filter applied:

  • 1
    Oracle Web Application Firewall
    Protect applications from malicious and unwanted internet traffic with a cloud-based, PCI-compliant, global web application firewall service. By combining threat intelligence with consistent rule enforcement, Oracle Cloud Infrastructure Web Application Firewall strengthens defenses and protects internet-facing application servers. Adopt an edge security strategy with a web application firewall that aggregates threat intelligence from multiple sources including WebRoot BrightCloud® and more than 250 predefined OWASP, application, and compliance-specific rules. ...
  • 2
    Oracle Data Masking and Subsetting
    ...The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.
    Starting Price: $230 one-time payment
  • 3
    Oracle Log Analytics Cloud Service
    ...Gain real-time operational insight across health and availability of applications.
  • 4
    Oracle Cloud Infrastructure Load Balancing
    Oracle Cloud Infrastructure (OCI) Flexible Load Balancing enables customers to distribute web requests across a fleet of servers or automatically route traffic across fault domains, availability domains, or regions—yielding high availability and fault tolerance for any application or data source. The portfolio comprises two services—Oracle Cloud Infrastructure Flexible Load Balancer (OCI Load Balancer) and Oracle Cloud Infrastructure Flexible Network Load Balancer (OCI Network Load Balancer). ...
    Starting Price: $0.0243 per hour
  • 5
    Oracle CASB
    Gain visibility and detect threats on the entire cloud stack for workloads and applications with Oracle CASB. Leverage real-time threat intelligence feeds and machine learning techniques to establish security baselines, learn behavioral patterns, and identify threats to the cloud stack. Leverage real-time threat intelligence feeds and machine learning techniques to establish security baselines, learn behavioral patterns, and identify threats to the cloud stack.
  • 6
    Oracle Advanced Security
    Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer.
  • 7
    Oracle Identity Management
    Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services. This modern platform helps organizations strengthen security, simplify compliance and capture business opportunities around mobile and social access. Oracle...
  • 8
    Oracle Traffic Director
    ...These APIs are published for use by application developers and are managed and monitored at runtime.
  • 9
    Visual Expert
    Visual Expert is a static code analyzer for Oracle PL/SQL, SQL Server T-SQL, and PowerBuilder. Identify code dependencies to modify your code without breaking your application. Scan your code to improve the security, performance, and quality. Perform Impact analysis to Identify breaking changes. Automatically scan your code to detect and fix security vulnerabilities, bugs and maintenance Issues.
    Starting Price: $495 per year
  • 10
    DigitSec S4

    DigitSec S4

    DigitSec

    ...Securing Salesforce during development reduces risk and accelerates the pace of deployment. S4 for Salesforce™, our patented SaaS Security Scanner™, automatically assesses Salesforce security posture with its full-spectrum continuous application security testing (CAST) platform purpose-built to detect Salesforce vulnerabilities with its four integrated scans for fast and effortless detection. Static Source Code Analysis (SAST), Interactive Runtime Testing (IAST), Software Composition Analysis (SCA), and Cloud Security Configuration Review. Our static application security testing (SAST) engine is a core feature of S4, providing automated scanning and analysis of all custom source code in your Salesforce Org including Apex, VisualForce, Lightning Web Components, and related-JavaScript.
  • 11
    Clonetab

    Clonetab

    Clonetab

    For ERPs like Oracle e-Business Suite, PeopleSoft & Databases Clonetab is the only software which can virtualize and provide true end-to-end on-demand clones of ERPs (like Oracle e-Business Suite, PeopleSoft) or databases. It can also provide an integrated solution for virtualization, cloning, Disaster Recovery, Backups and Oracle EBS Snapshots.
  • 12
    DxEnterprise
    DxEnterprise is multi-platform Smart Availability software built on patented technology for Windows Server, Linux and Docker. It can be used to manage a variety of workloads at the instance level—as well as Docker containers. DxEnterprise (DxE) is particularly optimized for native or containerized Microsoft SQL Server deployments on any platform. It is also adept at management of Oracle on Windows. In addition to Windows file shares and services, DxE supports any Docker container on Windows...
  • 13
    Onapsis

    Onapsis

    Onapsis

    Onapsis is the industry standard for business application cybersecurity. Integrate your SAP and Oracle business applications into your existing security & compliance programs. Assess your attack surface to discover, analyze, & prioritize SAP vulnerabilities. Control and secure your SAP custom code development lifecycle, from development to production. Defend your landscape with SAP threat monitoring, fully integrated into your SOC.
  • 14
    VMware Avi Load Balancer
    Simplify application delivery with software-defined load balancers, web application firewall, and container ingress services for any application in any data center and cloud. Simplify administration with centralized policies and operational consistency across on-premises data centers, and hybrid and public clouds, including VMware Cloud (VMC on AWS, OCVS, AVS, GCVE), AWS, Azure, Google, and Oracle Cloud.
  • 15
    Neverfail Continuity Engine
    ...Increased application support plug-ins for Atlassian, Oracle, PostgreSQL, and Veeam. Maintain Continuous Availability of Critical IT Systems with Instant Failover and Near-Zero Recovery Times (RTO & RPO). Prevent User Downtime with Application-Aware Technology that Monitors the Health and Configuration of Applications.
  • 16
    Randtronics DPM Database Manager
    Randtronics DPM Database Manager is designed to protect column level data in database. The software is able to do this without having to make any application level code changes - it is totally transparent to database users and applications. DPM Database Manager are able to protect data on Oracle, Microsoft SQL Server and IBM DB for iSeries databases. The software can mask the data in protected column, or tokenise the data when integrating with DPM Token Manager. Rules are designed to be extremely flexible, and it does not matter what level of access a user or application has - the software will even protect against database admins (DBAs) viewing sensitive data. ...
  • 17
    Pandora FMS

    Pandora FMS

    Pandora FMS

    ...Thanks to more than 500 plugins available, you can control and manage any application and technology, from SAP, Oracle, Lotus, Citrix or Jboss to VMware, AWS, SQL Server, Redhat, Websphere, etc.
    Leader badge">
    Starting Price: €90/month
  • 18
    NEC EXPRESSCLUSTER

    NEC EXPRESSCLUSTER

    NEC Corporation

    NEC EXPRESSCLUSTER is a high-availability software solution designed to maximize business continuity and disaster recovery while preventing data loss. It supports recovery from hardware, network, and application failures without requiring costly shared storage disks. The software boasts a proven track record with over 17,000 customers worldwide and more than 30,000 cluster systems deployed over 20 years. EXPRESSCLUSTER supports various applications, including major databases like Microsoft SQL Server and Oracle DB, email servers, ERP systems, virtualization platforms, and cloud services such as AWS and Microsoft Azure. ...
  • 19
    Casbin

    Casbin

    Casbin

    Casbin is an open-source authorization library that supports various access control models, including Access Control Lists (ACL), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). It is implemented in multiple programming languages such as Golang, Java, C/C++, Node.js, JavaScript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter), and Elixir, providing a consistent API across different platforms. Casbin...
    Starting Price: Free
  • 20
    SecurEnds

    SecurEnds

    SecurEnds

    ...Load employee data from a Human Resources Management System (e.g., ADP, Workday, Ultipro, Paycom) using built-in SecurEnds connectors or files. Use built-in connectors and flex connectors to pull identities across enterprise applications (e.g., Active Directory, Salesforce, Oracle), databases (e.g., SQL Server, MySQL, PostreSQL), and cloud applications (e.g., AWS, Azure, Jira). Perform user access reviews by role or attribute as frequently as needed. Application owners can use delta campaigns to track any changes since the last campaign. Send remediation tickets directly to application owners to perform access updates. ...
  • 21
    iSecurity DB-Gate

    iSecurity DB-Gate

    Raz-Lee Security

    ...From interactive STRSQL and from any standard program in RPG, Cobol, C, or other languages, access is now easier and more natural than ever. DB-Gate has been proven to be a full, successful replacement for OAM, the Oracle Access Manager, which has not been supported since IBM i release 7.3. As your enterprise applications expand in database requirements and complexity, so does the need to access multiple databases from your main application server. Current methods of accessing specific files on a remote database from within the IBM i require considerable time and resources.
  • 22
    HPE Aruba Networking SSE

    HPE Aruba Networking SSE

    HPE Aruba Networking

    ...Continuous monitoring ensures that policies automatically adapt based on changes in identity, location, and device health, making it easier to ensure Zero Trust for every access event. Enable seamless and secure access for every user, device, and application from anywhere. The SSE service auto-routes traffic through the fastest path across a multi-cloud backbone comprised of 500+ edges (AWS, Azure, Google, and Oracle) for less latency for users, and more redundancy for IT. The SSE service integrates with EdgeConnect SD-WAN to help transform secure access, and networking, with a single unified SASE platform.
  • 23
    Webscale

    Webscale

    Webscale

    Webscale is the world's leading expert in enabling e-commerce storefronts in the cloud. We host and manage a wide range of digital commerce and web applications. We work with popular platforms like Magento, Woo Commerce, SAP Hybris, Oracle Commerce, IBM WebSphere, Drupal, Rails, PHP, and more. The public cloud is the natural home for e-commerce, but with no support from your existing provider, and a lack of expertise internally, it can seem daunting. Your sales are anything but predictable, and relying on fixed-size infrastructure that isn’t capable of delivering uptime at peak demand is losing you both revenue and corporate reputation. ...
  • 24
    XBOW

    XBOW

    XBOW

    XBOW is an AI-powered offensive security platform that autonomously discovers, verifies, and exploits vulnerabilities in web applications without human intervention. By executing high-level commands against benchmark descriptions and reviewing outputs it solves a wide array of challenges, from CBC padding oracle and IDOR attacks to remote code execution, blind SQL injection, SSTI bypasses, and cryptographic exploits, achieving success rates up to 75 percent on standard web security benchmarks. ...
  • 25
    ScaleGrid

    ScaleGrid

    ScaleGrid

    ...Supported databases include: - MySQL - PostgreSQL - Redis™ - MongoDB® database - Greenplum™ (coming soon) The ScaleGrid platform supports both public and private clouds, including AWS, Azure, Google Cloud Platform (GCP), DigitalOcean, Linode, Oracle Cloud Infrastructure (OCI), VMware and OpenStack. Used by thousands of developers, startups, and enterprise customers including Atlassian, Meteor, and Accenture, ScaleGrid handles all your database operations at any scale so you can focus on your application performance.
    Starting Price: $8 per month
  • 26
    ConfigOS

    ConfigOS

    SteelCloud

    ...Automated remediation rollback as well as comprehensive compliance reporting and STIG Viewer Checklist output are provided. ConfigOS was designed to harden every CAT 1/2/3 STIG control around an application baseline in about 60 minutes - typically eliminating weeks or months from the RMF accreditation timeline. ConfigOS addresses Microsoft Windows workstation and server operating systems, SQL Server, IIS, IE, Chrome, and all of the Microsoft Office components. The same instance of ConfigOS addresses Red Hat 5/6/7, SUSE, Ubuntu, and Oracle Linux. ...
  • 27
    Saviynt

    Saviynt

    Saviynt

    Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates with leading IaaS, PaaS, and SaaS applications including AWS, Azure, Oracle EBS, SAP HANA, SAP, Office 365, SalesForce, Workday, and many others. Our innovative IGA 2.0 advanced risk analytics platform won the Trust Award and was named an industry leader by Gartner.
  • Previous
  • You're on page 1
  • Next