
Company News
Socket Has Acquired Secure Annex
Socket has acquired Secure Annex to expand extension security across browsers, IDEs, and AI tools.
@progress/kendo-angular-buttons
Advanced tools
- This package is part of the Kendo UI for Angular—a commercial UI library.
- You must install a license key when adding the package to your project. To receive a license key, either purchase a license or register for a free trial.
- The 30-day free trial gives you access to all the Kendo UI for Angular components and their full functionality. Additionally, for the period of your license, you get access to our legendary technical support provided directly by the Kendo UI for Angular team!
The Kendo UI for Angular Buttons provide a clickable UI functionality which can be set to display arbitrary content.
The Angular Buttons package includes seven built-in components:
Among the many features which the Kendo UI for Angular Buttons deliver are:
For any issues you might encounter while working with the Kendo UI for Angular Buttons, you have the following support channels available:
Copyright © 2025 Progress Software Corporation and/or one of its subsidiaries or affiliates. All rights reserved.
Progress, Telerik, and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries.
FAQs
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Company News
Socket has acquired Secure Annex to expand extension security across browsers, IDEs, and AI tools.

Research
/Security News
Socket is tracking cloned Open VSX extensions tied to GlassWorm, with several updated from benign-looking sleepers into malware delivery vehicles.

Product
Reachability analysis for PHP is now available in experimental, helping teams identify which vulnerabilities are actually exploitable.