Build innovative business apps powered by process automation
Connect workflows, teams and systems within one digital business transformation platform
Manage your business as a unified system of interacting processes. Use BPMN 2.0 for low-code process modeling by business people. Follow your strategic goals with process architecture that always corresponds to the structure of an actual business.
Learn More
DriveStrike: Remote Wipe | Data Breach Protection
. From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.
DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
lanupdate is a application to hold a hole LAN up-to-date. lanupdate get from the server all update-infos and syncronize this with local update-infos(wich program with which version is installed).Shows a window with requiered updates.
pam_mobtok is a PAM module together with a J2ME midlet to realize authentification. A password is entered into the J2ME capable mobile device which then generates a token that is valid for a short time.
This is a JavaScript library which gives the ability to use cryptographic functionality abstracted of available technologies on the browser side. It executes a cryptographic function with the fastest technology including Java, JavaScript and Flash.
The PKI Framework (PKIF) is a cross-platform library for performing PKIX-compliant certificate processing. It includes support for SCVP, OCSP, CMS and Timestamps. It uses Windows CAPI, NSS or Crypto++ for cryptographic services and hardware support.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
IdentityTrust is a library that allows you to express trust criteria for identity providers and the attributes that they can assert in a fine granular and customizable way.
A library help for signing data with PKCS11 token (certificates with SHA1withRSA Sign Algorithm) and create CMS packages.
It uses Bouncy Castle Crypto API and SUNPKCS11.
Also it verify the signed data and verify signing certificate's OCSP control.
Commons-SSH is a thin bridge between different Java SSH implementations libraries. It doesn't contain any crypto-related code and created to be used by projects who doesn't want to care about export control regulations (let client to decide)
Powerful Website Security | Continuous Web Threat Platform
Continuously detect, prioritize, and validate web threats to quickly mitigate security, privacy, and compliance risks.
Reflectiz is a comprehensive web exposure management platform that helps organizations proactively identify, monitor, and mitigate security, privacy, and compliance risks across their online environments. Designed to address the growing complexity of modern websites, Reflectiz provides full visibility and control over first, third, and even fourth-party components, such as scripts, trackers, and open-source libraries that often evade traditional security tools.
This is a JavaScript library which gives the ability to use cryptographic functionality abstracted of available technologies on the browser side. It executes a cryptographic function with the fastest technology including Java, JavaScript and Flash.
JConfigura is a library usable in java environments for sharing configuration parameters between different java applications. Moreover it exculpates developers of aspects like property file reading and securing property files with rsa encryption.
DotNetSSH is a pure .NET implementation of the SSH2 client protocol suite. DotNetSSH development is alive and active. DotNetSSH is a fork of Tamir's excellent SharpSSH, itself is a port of JCraft's java Jsch.
A simple Java based XML Encryption tool for education propose. Uses Apache Santuario Libraries. Ideal to understand the implementation of the XML Security Library of Java. Ravi Dontharaju, Utkarsh Sengar, Ramanuj Mishra, Sukhbir Walia, Jaspreet Singh
ToolME provides J2ME mobile application developers with a set of API utilities (tools) that aim to solve many of the common problems a J2ME developer will face when developing mobile software.
OpenRCA is a highly flexible and modular Certificate management and Registration Authority based on J2EE technology. OpenRCA is designed to be a very flexible, extensible and low cost enterprise PKI solution.
Open WS-Policy,an Open Source Web Services Policy Framework implementation,is a set of open source Javalibraries that implement the ws-policy specifications.
The aim of this project is to provide convenient ways for a rapid development of java enterprise applications.
To achieve this goal the project provides a collection of libraries which carry out commonly used tasks and/or ease technological implications
Project Identity aims to develop an Open source Biometric Solution i.e. complete set of tools and libraries for Biometric identifiction systems.
This project has intial code done by students as their summer project at Echo IT Labs Pvt. Ltd.
Cryptix is an international volunteer effort to produce robust, open-source cryptographic software libraries. Cryptix products are free, both for commercial and non-commercial use and are being used by developers all over the world.
Java Access control list library.
Pow2ACL is a package useful to keep track of application users roles and permissions.
User can be authenticated:
- directly using the package API;
- using custom JSP tag libraries;