Best IT Security Software in China - Page 35

Find and compare the best IT Security software in China in 2025

Use the comparison tool below to compare the top IT Security software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    OSForensics Reviews

    OSForensics

    PassMark Software

    $799 per user per year
    Effortlessly extract forensic data from computers with enhanced speed and simplicity. Reveal all hidden information within a computer system. Accelerate your search for pertinent data through advanced file indexing and high-performance searching capabilities. Quickly and automatically retrieve passwords, decrypt files, and recover deleted data from various operating systems, including Windows, Mac, and Linux. Utilize features like hash matching and drive signature analysis to uncover evidence and detect suspicious activities. Analyze all files with ease and create an automatic timeline of user interactions. Experience a comprehensive Case Management Solution that allows you to oversee your entire digital investigation through the innovative reporting features of OSF. Customize your reports, incorporate narratives, and attach reports from other tools directly into the OSF documentation. The Volatility Workbench provides a user-friendly graphical interface for the Volatility tool. OSForensics also offers training courses tailored to a wide array of users and expertise levels. Additionally, write a disk image simultaneously to multiple USB flash drives for increased efficiency. This robust functionality sets a new standard in digital forensic investigations.
  • 2
    Rawstream Reviews

    Rawstream

    Rawstream

    $2.00/month/user
    Elevate your business's cybersecurity posture with Rawstream, effectively combating threats like ransomware, malware, spyware, and adware! Enjoy swift implementation along with immediate insights for your protection needs. Keep an eye on Rawstream's capabilities or reach out to our specialists to discover how we can assist your organization. Work alongside our team in a cost-effective manner while saving as much as 90% on Microsoft Office licenses. Utilize Rawstream's Usage Analytics to delve into activities and uncover your Excel experts. Foster a high-performing team on Google for Work through informed, data-driven decisions. IT administrators can explore various deployment methods, filter across 80+ categories, and activate Google Safe Search. The setup process is straightforward, supporting both Windows and Linux environments, along with AD, Citrix, and Terminal Services. Our offerings include cloud DNS filtering and SSL filtering. Rawstream's cybersecurity begins at the network's core, safeguarding all connected devices from harmful websites while ensuring continuous updates for uninterrupted protection. This proactive approach guarantees that your cybersecurity measures remain current and effective against evolving threats.
  • 3
    Locklizard Safeguard PDF Security Reviews
    Locklizard protects PDF files from piracy, leakage, and misuse. Unauthorized access to documents is prevented and only authorized users are allowed to use them. Stop the theft of confidential and sensitive information, intellectual properties, training courses, reports, ebooks, and other trade secrets. Securely share and sell documents, prevent data leakage, and enforce compliance. You can lock documents to devices and locations, dynamically add watermarks, control expiry, stop printing and copying, and revoke access at anytime. You can track how your documents are used. Locklizard employs strong encryption, DRM, and licensing controls that are US Gov strength to ensure that your documents remain fully secure regardless of where they are located.
  • 4
    SAFE Reviews

    SAFE

    Tracker Products

    $4300
    Automation and Management of Physical and Digital Evidence Our software platform was designed to meet the needs and functionality of law enforcement. It can be used to manage all aspects of evidence management, from collection to disposition.
  • 5
    UltraDNS Reviews

    UltraDNS

    Vercara

    $49.00 per month
    UltraDNS is a robust, cloud-based authoritative DNS service designed for enterprises, providing reliable and swift query responses for websites and essential online resources. This managed DNS solution guarantees complete website uptime and incorporates advanced security features for enhanced protection. As users around the globe demand uninterrupted and secure digital interactions, the complexities of DNS management have escalated significantly. The rise of Internet of Things (IoT) devices, coupled with various online threats, has made it challenging for organizations to devise an effective DNS strategy tailored to their IT requirements. It is increasingly difficult to maintain a knowledgeable in-house team for DNS management, and securing the necessary resources to establish a coherent strategy that aligns with current Internet challenges is often unfeasible. Ensure your website and digital assets remain accessible at all times with UltraDNS, which is supported by a commitment to 100% uptime and top-tier service-level agreements, all on a worldwide platform. This commitment empowers businesses to focus on their core operations while trusting that their online presence is managed by experts in the field.
  • 6
    Accellion Reviews

    Accellion

    Accellion

    $15.00/month/user
    The Accellion platform for secure content communication effectively safeguards against data breaches and compliance issues related to third-party cyber threats. Chief Information Officers and Chief Information Security Officers trust Accellion for comprehensive oversight, compliance, and control of sensitive information such as intellectual property, personally identifiable information, protected health information, and other critical data shared across various third-party communication channels, including email, file sharing, mobile applications, enterprise software, web portals, SFTP, and automated inter-business processes. Users can confidently click the Accellion button, assured that it represents a secure method for transmitting sensitive information externally. With deployment options that include on-premise, private cloud, hybrid, and FedRAMP solutions, the Accellion platform offers the necessary security measures and governance that CISOs require to safeguard their organizations, reduce risks, and comply with stringent regulations like NIST 800-171, HIPAA, SOX, GDPR, and FISMA among others. Accellion has successfully protected over 25 million users across more than 3,000 organizations, showcasing its effectiveness and widespread adoption in the industry. The platform's robust features continue to evolve, ensuring organizations remain ahead of emerging cyber threats.
  • 7
    Centrifuge Analytics Reviews

    Centrifuge Analytics

    Culmen Internal LLC

    Call
    Centrifuge Analytics™, a big data discovery tool, allows you to connect, visualize, and collaborate without the need for complex data integration or a data science degree. It combines advanced link-analysis, interactive visualizations, and discovery features to simplify data pattern recognition and connection recognition. - A fully integrated solution that empowers analysts without any IT support. - Advanced link-analysis features like pattern identification, intelligent bundling, and other unique interactive visual features - 100% Browser footprint means there is no client-side data storage which simplifies security and client administration Patent-pending server side rendering engine that allows highly scalable network graphs Agile data integration - No need for a fixed ontology to store, stage or apply. Model-based analytics – Setup once and reuse – build on the experience of more experienced analysts
  • 8
    InstantCard Reviews

    InstantCard

    InstantCard

    $5.80 per card
    Acquire the ID cards you require effortlessly and without complications. We won't attempt to sell your organization a printer or any card stock, as our focus is solely on your needs. Our team of skilled designers will craft a bespoke template tailored to your requirements, steering clear of generic options to ensure that your employee ID cards meet your exact specifications. With an unlimited selection of templates available, you can incorporate all necessary identification features precisely where you want them. Enjoy the convenience of same-day shipping for your employee ID badges, which applies even to smaller orders, thanks to the InstantCard system's design that accommodates single-card requests. This approach simplifies the ID card ordering process for businesses of all sizes. You have the flexibility to input each employee's details individually or upload them in bulk through a spreadsheet. Moreover, with no minimum batch size, you will receive the cards you need precisely when you need them, making our service reliable and efficient for every organization. Experience the ease of ordering, knowing that our customer support is always ready to assist with any queries you may have.
  • 9
    beSTORM Reviews

    beSTORM

    Beyond Security (Fortra)

    $50,000.00/one-time
    Without access to source code, discover and certify security weaknesses in any product. Any protocol or hardware can be tested with beSTORM. This includes those used in IoT and process control, CANbus-compatible automotive and aerospace. Realtime fuzzing is possible without needing access to the source code. There are no cases to download. One platform, one GUI to use, with more than 250+ pre-built protocol testing modules, and the ability to create custom and proprietary ones. Identify security flaws before deployment. These are the ones that are most commonly discovered by outside actors after release. In your own testing center, certify vendor components and your applications. Software module self-learning and propriety testing. Scalability and customization for all business sizes. Automate the generation and delivery of near infinite attack vectors. Also, document any product failures. Record every pass/fail and manually engineer the exact command that caused each failure.
  • 10
    modus Reviews

    modus

    Vircom

    $12 per user per month
    ModusCloud offers clients access to enterprise security technology and infrastructure used by some the most secure companies in the world. This is combined with our expert knowledge and understanding of smaller businesses' needs. We offer a hosted email security solution that includes email threat protection, email continuity with Emergency Inbox and policy-enforced encryption. All of this is managed with an intuitive and simple user interface. ModusCloud is a cloud-based email security solution. The message filtering activities, including detection of suspicious mail, take place at an external data centre. This protects users from external threats and is managed by highly skilled personnel. Following a simple setup wizard, organizations can register their mail servers, domains and users.
  • 11
    GFI LanGuard Reviews

    GFI LanGuard

    GFI Software

    $32 per year
    GFI LanGuard allows for the effective management and maintenance of endpoint security throughout your network. It offers comprehensive insights into every component within your network, assisting you in identifying possible vulnerabilities and enabling you to address them promptly. This user-friendly patch management and network auditing tool is straightforward to implement. The software automatically detects all devices on your network, ranging from computers and laptops to mobile phones, tablets, printers, servers, virtual machines, routers, and switches. You can organize your devices into groups for enhanced management efficiency. Furthermore, you can distribute management responsibilities across various teams while monitoring everything from a centralized dashboard. By utilizing an updated database of over 60,000 known vulnerabilities, GFI LanGuard helps uncover non-patch vulnerabilities, along with details like open ports and system information regarding users, shared directories, and services. It effectively highlights deficiencies in popular operating systems and identifies missing patches in web browsers and third-party applications, ensuring robust network security. Ultimately, GFI LanGuard streamlines the process of maintaining a secure and efficient network environment for your organization.
  • 12
    Blesk Reviews

    Blesk

    Prival

    $1300.00/year
    blësk stands out as the sole all-in-one solution on the market capable of handling every facet of network monitoring from a single device. This platform boasts rapid, adaptable deployments while delivering impressive returns on investment. Notably, it is the first application in the industry to seamlessly integrate prominent Open Source monitoring technologies widely utilized globally into a single, user-friendly interface. The additional layers of blësk enhance its functionality and provide a cohesive graphical layout. Users can efficiently pinpoint and rectify the issues leading to application downtime, with rapid identification of network, protocol, and service failures, as well as alerts triggered by SNMP traps. It allows tracing of serial data, including CPU load and bandwidth usage, while gathering, analyzing, and assessing performance metrics for SNMP-compliant devices in near real-time. Additionally, it offers predictive capabilities for saturation, classifies interface ports based on usage, and computes the losses and latencies associated with various equipment, contributing to a more reliable network environment. Ultimately, blësk’s comprehensive features empower organizations to maintain optimal performance and minimize disruptions effectively.
  • 13
    Relution Reviews

    Relution

    Relution

    $2 per month
    Oversee devices running iOS, Android, and Windows 10/11 with a focus on security through tailored restrictions and configurations. Utilize tools such as Apple DEP & VPP, Android Enterprise, and Samsung Knox for comprehensive management. Maintain an inventory of both native and public apps across Apple, Android, and Windows platforms, while also reviewing, approving, and publishing applications for mobile device usage. Facilitate access to enterprise applications for employees, partners, and external stakeholders by creating a customized app store that reflects your corporate branding. Streamline the management of Apple iOS and Android tablets to ensure secure deployment of the appropriate educational apps. Organizations of all sizes, including companies, authorities, and teams, reap the benefits of Relution's Mobile Device and App Management services. Resellers, educational institutions, and IT retailers rely on Relution to enhance their service offerings to clients. Renowned as a vital IT solution in the realm of digital education, Relution has established itself as the go-to mobile device management platform for over a decade, ensuring privacy compliance and facilitating cross-platform device management. With its user-friendly interface and robust features, Relution not only simplifies device management but also empowers educational environments to thrive in a digital age.
  • 14
    Logz.io Reviews

    Logz.io

    Logz.io

    $89 per month
    Open source is a passion for engineers. We supercharged the top open-source monitoring tools, including Jaeger, Prometheus and ELK, and combined them into a scalable SaaS platform. You can collect and analyze all your logs, metrics, traces and other data on one platform for end to end monitoring. You can visualize your data using customizable and easy-to-use monitoring dashboards. Logz.io's AI/ML human-coach automatically detects and corrects any errors or exceptions in your logs. Alerting to Slack and PagerDuty, Gmail and other endpoints allows you to quickly respond to new events. Centralize your metrics at any scale on Prometheus-as-a-service. Unified with logs, traces. Just three lines of code are required to add to your Prometheus config file to start forwarding your metrics and data to Logz.io.
  • 15
    SolarWinds Papertrail Reviews

    SolarWinds Papertrail

    SolarWinds

    $7 per month
    Logging into servers to manually check log files is a practice of the past. SolarWinds® Papertrail™ centralizes log management by gathering logs from various applications, devices, and platforms into one accessible location. With Papertrail, users can effortlessly view, search, and monitor events in real time through a unified interface, eliminating the need for traditional tools like grep or AWK. This innovative tool examines incoming logs for irregularities and provides instant alerts and summaries, offering immediate insights into both system activity and application performance. Discover how Papertrail can unlock the potential of the logs you've been collecting all along. Additionally, SolarWinds® Papertrail™ offers a robust cloud-based log management solution that easily consolidates logs from a multitude of sources, including applications, servers, network devices, and services. The platform includes features such as rapid search capabilities, customizable system groups, collaborative access for teams, long-term archiving options, as well as charts and analytics exports, along with monitoring webhooks to ensure you stay informed. Embrace the future of log management and enhance your operational efficiency with Papertrail’s comprehensive features.
  • 16
    IBM NS1 Connect Reviews
    IBM NS1 Connect offers premium, authoritative DNS & advanced traffic steering to deliver the high-performance, reliable, secure network connectivity that businesses need to meet increasingly sophisticated customer expectations through our: Global anycast network: Providing massive capacity & scale needed to keep users reliably connected across the world. API-first Architecture: Easily integrate & automate all NS1 Connect function. HTTPS Redirects: Manage every element of your HTTPS redirects from one platform. GSLB and RUM-based traffic steering: Balance loads at a global scale & reduce latency with near-real-time device performance data DDoS Attack Protection: Ensuring sufficient capacity to absorb traffic spikes & controls in place to guard against automated “junk” queries. NS1 Connect offers add-on options to suite your business needs including: DNS Insights: Providing the data you need to quickly identify & deal with misconfigurations impacting application performance. Dedicated DNS: Stay up & running with a native secondary DNS resolution infrastructure for seamless continuity of operations. DNS Traffic Steering: Optimize connections to applications, services & content based on geography, RUM data, load and more.
  • 17
    DNS Manager Reviews
    DNS Manager is a versatile automation tool tailored for multiple tenants, aimed at providing sophisticated DNS services to businesses and hosting providers while streamlining the management of DNS records. It is incredibly fast, intuitive, and facilitates seamless virtualization, making it an ideal solution for today's digital landscape.
  • 18
    xSecuritas Reviews

    xSecuritas

    xSecuritas, Inc

    $39
    xSecuritas provides advanced screen watermarking solutions to protect sensitive data from unauthorized access or leakage. The platform supports visible and invisible watermarks, allowing businesses to track and secure content by embedding metadata like user IDs, IP addresses, and sensitivity labels. It is compatible with VDI environments, remote desktops, and video conferencing tools, providing a comprehensive data protection strategy across all devices. xSecuritas also includes features to block screen captures and monitor printing activities, ensuring that all digital actions are logged and safeguarded. With customizable policies that can be enforced globally or per user group, xSecuritas offers flexible, secure protection for all business content.
  • 19
    WipeDrive Reviews

    WipeDrive

    WipeDrive

    $19.95/one-time/drive
    WipeDrive is a tool that allows individuals, businesses, and government agencies to securely and permanently erase data off hard drives, removable media, mobile devices, and other storage devices. It's a cost-effective and secure way to recycle and retire computer storage. WipeDrive is the global leader in secure data destruction.
  • 20
    ditno Reviews

    ditno

    ditno

    $25/endpoint/year
    Data is the most valuable asset of your company, so it is important to protect it. Network security is about zero trust. You should never trust anyone outside or within your network perimeter. Network security is becoming more difficult because network perimeters are blurring and endpoints continue proliferating. Cyberattacks are also being launched using machine learning and automation. Organizations are shifting to the cloud to protect their data in a hybrid cloud/on premises environment. This is without adding cost or complexity. A huge step towards secure environments is the combination of micro-segmentation and real-time network governance. You can improve your security posture through automation and data by choosing the right software solution. ditno is a cybersecurity management platform that offers a zero trust network approach to simplify and improve security.
  • 21
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 22
    MindBridge Reviews
    Take control of your financial and audit awareness. No programming knowledge is required. MindBridge's machine learning speaks for itself. You can analyze data trends and focus on unusual or risky transactions. MindBridge AI can be used to provide more value to your business audit and finance data, whether you are using it as an early warning system or a last line of defense. During a time when more companies are reporting misstatements than ever before, and CFOs need precise situational awareness, our AI platform gives you a deeper understanding of your financials. MindBridge analyzes all financial data and presents a summary of potential risks for your team to examine and take action on. MindBridge allows you to import data from your ERP and create visual trends. Schedule a demo to learn how enterprise companies are using MindBridge AI.
  • 23
    Akku Reviews

    Akku

    CloudNow Technologies

    $5.00/year/user
    The corporate user lifecycle is made more efficient with Akku, a dynamic and adaptable identity and access management solution designed to enhance the management of every phase of the user journey. Its extensive array of features not only bolsters data security but also ensures compliance with standards while increasing operational efficiency and productivity. Akku provides a powerful cloud Single Sign-On (SSO) solution that seamlessly integrates with virtually any cloud-based or on-premises application, offering a comprehensive suite of security and access control functionalities that simplify user provisioning, management, access control, and deprovisioning. What sets Akku apart from many other identity and access management solutions is its agentless architecture, which eliminates the need for a user agent installation within your system. This design promotes a high level of transparency and control, allowing you to understand precisely which components of your sensitive user data Akku can access. Consequently, users can have greater confidence in the security and management of their information throughout the entire user lifecycle.
  • 24
    EncryptRIGHT Reviews
    EncryptRIGHT simplifies the application-level data protection by separating data protection policies and application programming. This allows for a complete separation between information security, application programming, and data security. EncryptRIGHT uses a Data Security Governance approach to define and enforce how data is protected. It also determines who can access the data and what format it will take once access is granted. The unique Data-Centric Security Architecture allows information security professionals to create an EncryptRIGHT Data Protect Policy (DPP) and bind it to data, protecting it no matter where it is stored, used, moved, or stored. Programmers don't need to be experts in cryptography to protect data at the application level. They simply configure authorized applications to call EncryptRIGHT to request that data be appropriately secured or unencrypted according to its policy.
  • 25
    MonoSign Reviews

    MonoSign

    MonoFor

    $4/month/user
    MonoSign is a complete Identity & Access Management Solution for Enterprise Level Companies. Get Universal Directory, Single-Sign-On, Adaptive Multi-Factor Authentication, Lifecycle Management, and many other features. MonoFor is here today with MonoSign, one of the most powerful and easy-to-deploy Identity & Access Management Software for enterprise-level companies.