Best IT Security Software in China - Page 36

Find and compare the best IT Security software in China in 2025

Use the comparison tool below to compare the top IT Security software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    ALTOSPAM Reviews

    ALTOSPAM

    OKTEY

    $7 per user per month
    This antivirus and antispam solution serves as a robust online filtering system that swiftly alleviates the time and financial burdens caused by an influx of unwanted emails. ALTOSPAM is a comprehensive SaaS tool that shields your email from spam, viruses, scams, and phishing attempts. It enables businesses with at least one domain to secure their email servers effectively. With a combination of 16 anti-spam technologies, 6 anti-virus mechanisms, and additional security features like anti-relay, anti-scam, anti-phishing, and protections against denial-of-service attacks, ALTOSPAM delivers extensive safeguards. Furthermore, this outsourced antispam and antivirus software guarantees high availability for your email services. As a holistic corporate email protection solution, ALTOSPAM implements various security layers to fortify your emails. Not only does it effectively block the majority of unwanted messages, but its antispam technology is also specifically engineered to reduce false positives significantly, ensuring that legitimate communications are not mistakenly flagged. By utilizing ALTOSPAM, businesses can enhance their email security while maintaining smooth communication.
  • 2
    Vault One Reviews

    Vault One

    VaultOne Software

    $99 per month
    Gain complete oversight and control over who can access your data, systems, applications, infrastructure, and other critical assets, effectively thwarting cyber threats and data breaches. With VaultOne, you can safeguard your organization's resources while ensuring compliance with regulations. This innovative platform is redefining privileged access management (PAM) for modern businesses. It enables you to swiftly and securely manage user access, credentials, and sessions through automation. Our comprehensive solution encompasses a range of powerful features, including a digital vault, password generator, session recording, auditing and reporting tools, customizable policies, disaster recovery options, and multi-factor authentication. If you are in search of a solution to secure shared accounts, certificates, and user access across applications, websites, servers, databases, cloud services, and infrastructure, look no further. By implementing tailored access policies and effectively managing users and their privileges, you bolster your defenses against cyber threats and significantly reduce the risk of data breaches. Moreover, with our user-friendly interface and robust capabilities, maintaining security has never been more efficient.
  • 3
    Acra Reviews

    Acra

    Cossack Labs

    $10000 per year
    Simplifying data leakage prevention in your application is now easier than ever with the Acra encryption suite, which offers robust data protection for distributed systems, as well as web and mobile applications, utilizing PostgreSQL, MySQL, and KV backends through targeted encryption methods. The encryption of sensitive and personal information is not only a regulatory requirement under laws such as GDPR, HIPAA, CCPA, and PCI DSS but also aligns with the best practices established within the industry. Nonetheless, incorporating cryptography into distributed applications can often prove to be a complex endeavor, frequently resulting in limited security benefits and various architectural compromises. Acra aims to transform this landscape by offering a singular solution that encompasses nine essential data security controls, designed to effectively reduce data leakage risks while ensuring comprehensive defense mechanisms throughout the entire data lifecycle in the application. The integration of Acra is straightforward, requiring minimal changes to your existing codebase, and it enhances data security while decreasing mean time to detection (MTTD) and mean time to recovery (MTTR). Additionally, Acra equips developers with an integration library that enables the encryption of any record using keys from AcraServer, further streamlining the security process. Ultimately, Acra is positioned as a vital tool for any organization striving to maintain data integrity and compliance in today's digital landscape.
  • 4
    MediaRights Revolution Reviews
    MediaRights Revolution (MR2) is designed for broadcasting, production, and distribution firms in the film, music, publishing, and merchandising industries. Managing diverse intellectual properties - music, audiovisual content, texts, images, and brands - provides detailed metadata, including rightsholder shares, and securely stores digital content copies with shared access functionality. MR2 enhances licensing processes with real-time control, simplifying deal creation through contract templates. Manage financial reports, including licensee royalties, using intricate fund distribution calculations based on contracts and rights holders' shares. Ensure effective sales management through reports for counterparts and internal analytics. Automation in royalty and licensing payments accelerates workflows, reducing manual efforts and ensuring financial precision, enhancing efficiency, and lowering operational costs. Internal task management automates and guides deal preparation processes. MediaRights Revolution boosts your business with integration. Use API (500+ methods) with your corporate software—from bookkeeping to advanced broadcasting tools. Create an unified environment, providing an optimized operational experience.
  • 5
    Reshift Reviews

    Reshift

    Reshift Security

    $99 per month
    Reshift is the ultimate solution designed specifically for Node.js developers to enhance the security of their custom code. By utilizing this tool, developers are four times more likely to resolve issues before their code is committed. It seamlessly integrates security into the development process by detecting and addressing security vulnerabilities at compile time. This innovative security tool collaborates with developers without hindering their workflow. Reshift's integration with developers’ IDE allows for real-time identification of security concerns, enabling fixes prior to code merging. For those who are new to the world of security, Reshift simplifies the incorporation of security measures into the development pipeline. Tailored for expanding software companies aiming to advance their security, this tool is particularly suited for small to medium-sized businesses that may not have extensive security knowledge. With Reshift, you can enhance code security while simultaneously gaining insights into secure coding practices. Furthermore, Reshift offers comprehensive resources and best practices, empowering developers to learn about security as they write their code. This dual focus on education and practical application makes Reshift an invaluable asset for any development team.
  • 6
    Bacula Enterprise Reviews
    Bacula Enterprise offers a single platform that provides cloud backup and recovery software for the Modern Data Center. Bacula Enterprise backup & recovery software is ideal for medium and large businesses. It offers unique innovation, modern architecture and business value benefits, as well as low cost of ownership. Bacula Enterprise corporate backup software solution uses unique technologies that increase the interoperability of Bacula Enterprise into many IT environments, such as managed service providers, software vendors, cloud providers, enterprise data centers, and cloud providers. Bacula Enterprise is used by thousands of organizations around the world in mission-critical environments such as NASA, Texas A&M University and Unicredit. Bacula offers more security features than other vendors and advanced hybrid Cloud connectivity to Amazon S3, Google, Oracle, and many others.
  • 7
    ITBoost Reviews

    ITBoost

    ConnectWise

    $17.00/month/user
    ITBoost is the comprehensive IT documentation software that consolidates everything you need in one platform. It simplifies the management of documentation, KPIs, and client feedback, making the process straightforward. Developed by ConnectWise, ITBoost features a dynamic dashboard that offers the most sophisticated documentation tools available, showcasing the critical metrics from your external systems. With ITBoost, you can effortlessly access all your MSP business applications, including PSAs and RMMs. This solution empowers you to manage your tasks efficiently, all from a single, user-friendly interface. Enjoy the convenience of having all your essential tools in one place for maximum productivity.
  • 8
    HTTPCS Security Reviews

    HTTPCS Security

    Ziwit

    $65 per month
    Regardless of whether you're managing a showcase site, an online store, or a SaaS application, each component will effectively shield your organization from various IT threats: web vulnerability scanner, website monitoring, threat intelligence platform, and web integrity controller. The solutions provided by HTTPCS form a robust defense against cybercriminals. With HTTPCS, you can finally put your mind at ease regarding the safety of your websites and embrace a Secure Attitude. The HTTPCS Cybersecurity Toolkit includes four additional modules designed to protect against hackers every single day of the year. You can monitor your website's response times in real-time, and if there's ever an outage, you'll receive alerts through SMS and email. Our service guarantees a remarkable 99.999% continuity in monitoring, making it more reliable than typical ping solutions. Furthermore, we provide a unique Monitoring scenario system that ensures your sites remain functional for your users, giving them peace of mind as well. By implementing these measures, you will significantly enhance your overall cybersecurity posture.
  • 9
    Axis GatePass Visitor Management System Reviews
    The software oversees the management of activities at both Entry and Exit points within an organization. It systematically keeps track of Visitors, contract labor, Vehicles, assets, and materials. The authorization workflow is designed to validate and grant permissions for all transactions occurring within the application. Additionally, the software establishes a robust access-control framework for visitors, contract workers, and employees alike. It includes a visitor management component that issues visitor passes (badges) for the authorized entry and exit of visitors, vehicles, and materials. These passes can be customized to include photographs and barcodes for enhanced security. Axis Gatepass employs cutting-edge technologies and devices, such as facial recognition, fingerprint scanning, GSM modems, OCR-enabled visiting card scanners, digital pens, time and attendance devices, and HID tags, to deliver a comprehensive and forward-thinking solution. Furthermore, Axis Gatepass is a unified web-based visitor management system that offers various versions and modules compatible with Desktop, Web, and Android mobile platforms, ensuring flexibility and accessibility for users. This adaptability allows organizations to tailor the system to meet their specific operational needs.
  • 10
    CB Exchange Server Sync Reviews

    CB Exchange Server Sync

    Connecting Software

    $4.99 per user/per month
    CB Exchange Server Sync allows for secure synchronization of data and data migration between Exchange Servers. It allows for easy synchronization between multiple Outlook accounts hosted on Exchange Server or Office 365. You can customize it to meet your business's needs. It can be used for synchronization of emails, calendars, tasks, contacts, public folders, and other information. This solution allows seamless migration of your entire Exchange / Outlook models to Office 365 or other Exchange versions starting with Exchange 2010 SP1 or later. It's great when combined with: * CB Super Secure Exchange Server is the solution to stop hackers from using Exchange Server to gain access to a secure network. * Outlook Content Censor - Access your Exchange account from outside the company without revealing sensitive information. You can restrict attachments, address and signatures.
  • 11
    Defencebyte Reviews

    Defencebyte

    Defencebyte

    $39 per year
    Get our antivirus software along with various PC security and optimization tools to enhance both the performance and safety of your system. Revitalize your computer by eliminating unnecessary files and applications. Purchasing our antivirus online will ensure your PC remains free from unwanted programs. With defencebyte, you can confidently browse the internet, knowing you are safe from potential threats. Should you encounter any issues with your online antivirus purchase, our support team is available 24/7 to assist you. By installing antivirus for Windows, you will significantly elevate your computer's protection level. Given that Windows computers are often the primary targets for hackers and malware, it is essential to safeguard your system and vital data from ransomware attacks. Create a secure digital landscape for your systems and networks with defencebyte security, which not only scans for but also eliminates ransomware traces. Additionally, our solution protects not just individual devices, but entire networks as well, ensuring comprehensive coverage against cyber threats.
  • 12
    dmarcian Reviews
    Founded in 2012 by a primary author of the DMARC specification, dmarcian is dedicated to upgrading the entire world’s email by making DMARC accessible to all with superior tooling, educational resources, and knowledgeable support. Used by thousands and recommended by support teams around the globe, our DMARC Management Platform grants you visibility into and control over how your email domains are used. Our platform provides actionable insights and alerts for organizations of any size to deploy DMARC and its supporting technologies of SPF and DKIM, visualize email delivery data, and manage a secure domain services infrastructure. Rectify email security vulnerabilities, improve domain and brand reputation, and meet the growing demand of DMARC compliance requirements with our best-in-class offerings.
  • 13
    NTFS Permissions Auditor Reviews

    NTFS Permissions Auditor

    Albus Bit

    $199 one-time payment
    NTFS permissions serve as a means to regulate access to files and folders within NTFS file systems. The NTFS Permissions Auditor facilitates the quick analysis, validation, and review of any NTFS folder permissions. With our complimentary version, users receive comprehensive audit results, while the Pro version enhances the experience with features like advanced, customizable filtering and the capability to export results in multiple formats. You can choose or import the directories you wish to audit, or even search for additional shares to include in your audit criteria. If desired, you can adjust further audit settings, or simply proceed with the default configurations. Once you hit ‘Audit,’ the tool will scan all folders along with their NTFS permissions. After the audit is completed, the results can be easily viewed or exported to a file. Installation is straightforward and requires no additional configuration, allowing users to get started immediately. The filtering system is robust, allowing for various conditions—utilize ‘And’ and ‘Or’ operators to refine your queries and obtain the precise information required. This makes the auditing process not only efficient but also highly customizable, catering to diverse user needs.
  • 14
    Fluid Mobility Reviews

    Fluid Mobility

    Fluid Mobility

    $5.00/month/user
    Enhance your organization’s capabilities with FLUID’s innovative Location Intelligence solutions. Generate geospatial data on-the-fly to gain deeper insights into your business operations. Discover and address inefficiencies within your business ecosystem, digitally label assets for easy tracking and theft prevention, oversee workflows, and much more using FLUID's Location Intelligence services. With FLUID's indoor Real-time Location System, ensure that your organization can monitor critical equipment instantaneously. Foster a more effective workplace while protecting against losses and theft through the use of wireless tags. Additionally, establish mobile device permissions throughout your facilities to safeguard trade secrets and confidential information while effectively managing asset movement. This comprehensive approach not only streamlines operations but also enhances security measures, ensuring your organization thrives in a competitive landscape. Experience the transformative power of FLUID’s Location Intelligence services today.
  • 15
    Famoco Reviews

    Famoco

    Famoco

    $1 per month/device
    Famoco specializes in delivering trusted, secure mobile solutions that empower businesses across the globe to run operations smoothly and securely. Their robust hardware lineup features professional-grade devices built to withstand demanding environments, including barcode scanners, biometric identification systems, and mobile terminals—all supported by a secure, Android-based operating system enhanced for data sovereignty and embedded connectivity. The company’s device management suite offers a comprehensive SaaS platform that facilitates zero-touch enrollment, remote management, and real-time device monitoring, allowing businesses to maintain full control of their fleets from anywhere. Famoco’s solutions cater to industries such as telecommunications, logistics, healthcare, retail, and government, providing tools for contactless payments, identity management, and data collection. Additionally, their integrated software ecosystem and developer tools enable seamless app deployment and integration with existing business systems. Customers benefit from 24/7 support, fast replacement services, flexible device rentals, and expertise in project deployment to ensure operational success. With a presence in over 160 countries and a strong global customer base, Famoco leverages 15 years of experience to help organizations scale securely and efficiently. Their commitment to service and innovation makes them a leading partner for businesses seeking reliable mobile technology.
  • 16
    Enginsight Reviews

    Enginsight

    Enginsight

    $12.99 per month
    Enginsight is a comprehensive cybersecurity solution crafted in Germany, adept at unifying threat identification and protection measures. Incorporating automated security audits, penetration testing, IDS/IPS, micro-segmentation, vulnerability assessments, and risk analysis, Enginsight equips businesses across scales to seamlessly establish and supervise potent security approaches via a user-friendly dashboard. Automatically examine your systems to instantly discern the security posture of your IT assets. Entirely self-engineered with security by design principles, Enginsight operates independently of third-party tools. Continuously scour your IT landscape to detect devices, generating a real-time depiction of your IT framework. With automatic detection and endless inventory of IP network devices, including categorization, Enginsight serves as an all-encompassing monitor and security shield for your Windows and Linux servers, and endpoint devices such as PCs. Start your 15 day free trial now.
  • 17
    MyDiamo Reviews

    MyDiamo

    Penta Security Systems Inc.

    MyDiamo was developed by Penta Security Systems (APAC leader in encryption technology) and is available to all for noncommercial use. Enterprises and organizations who require additional features can obtain a commercial license. Index searching is possible with column-level encryption or partial encryption - Minimal system performance changes guaranteed - Compatible with open-source DBMS such as MySQL, MariaDB and Percona - GDPR/PCI DSS/HIPAA compliant - Code modification is not required, it works parallel at the engine level
  • 18
    MemberSpace Reviews

    MemberSpace

    MemberSpace

    $25 per month
    Easily restrict access to specific pages on your website and set the pricing for entry. You can create memberships for a variety of offerings such as courses, video tutorials, member directories, and much more, all while maintaining complete control over the aesthetics and user experience. We believe everyone has the potential to establish and operate a membership site without needing to hire a developer or possess technical expertise. That’s why we’ve made MemberSpace user-friendly and straightforward, allowing those without tech skills to effortlessly launch and grow a membership business on any website. With MemberSpace, you retain full control over the design and the overall member experience since everything takes place directly on your site. Members can easily sign up, log in, access your content, and manage their accounts—all without leaving your existing platform, ensuring a smooth and integrated user experience. This approach empowers you to create a unique and engaging community for your members.
  • 19
    Prot-On Reviews

    Prot-On

    Cognicase Management Consulting

    €10 per month
    Every version of the document will be secured with robust encryption no matter where it is kept, whether on devices, cloud services, or USB drives. Each time users attempt to open the secured document, Prot-On will verify their authorization and the level of access granted. Additionally, users can review the activity log to track who has accessed their document and adjust permissions at any point, even after the file has been shared with others. This ensures that document security is maintained throughout its lifecycle.
  • 20
    Shufti Pro Reviews
    Shufti Pro, an easy-to-use identity verification software, bridges the gap between clients and consumers. It provides end-to-end identity verification services for businesses. It gives them a safe and hassle free platform to verify the identities of their users or consumers in less than a minute. This is all done to prevent and deter fraudulent activities, online theft and identity scams and ultimately provide a reliable market. Shufti Pro lets you use your mobile phone's camera in real-time to take a selfie and upload it to your supported identity document. The OCR technology extracts data from the image and compares it with our systems. Both data sets are carefully analyzed, correlated, and analyzed to produce results. All this takes less than a minute.
  • 21
    InterGuard Employee Monitoring Reviews

    InterGuard Employee Monitoring

    Awareness Technologies

    $8.00/month/user
    As more companies embrace the trend of allowing employees to work remotely, the use of employee monitoring software on company-provided devices has become a common business practice. Remote work is not a standard practice. It is up to the organization to decide if it is best for them to keep their workers at home. Many companies have made the switch to working from home years ago. There are many benefits to having employees work remotely. Remote work could become the new norm, regardless of how the Coronavirus affects the global workforce. Remote work-from-home presents new challenges that are not present in the workplace. Telecommuting is attractive to employees because it allows them to have more flexibility, which allows them to maintain a better balance between work and life.
  • 22
    WaZa MDM Reviews

    WaZa MDM

    WaZa MDM

    $1.25/month/user
    High-tech Device Management and Tracking platform. WaZa MDM lets you remotely manage your enterprise mobile devices. You can get up and running quickly with our simple-to-use WaZa Management console. Our mobile device management console is easy to use and allows you to track your mobile device and enforce Geofences. Try WaZa MDM mobile device management platform and tracking platform for 30 Days.. No credit card needed.
  • 23
    Dhound Reviews

    Dhound

    IDS Global

    $30 per month
    If your business is associated with vital infrastructure or sensitive information, you recognize the potential repercussions of a security breach that a malicious actor could exploit. Adhering to legal security standards such as SOC2, HIPAA, and PCI DSS, you are obligated to arrange penetration tests conducted by an external firm. Your clientele insists on collaborating solely with trustworthy and secure solutions, and you fulfill this commitment by ensuring the security of your systems through the outcomes of penetration testing. A penetration test simulates an actual hacking attempt, but it is carried out by skilled professionals dedicated to safeguarding your web security for the right reasons. We at Dhound perform penetration testing—also referred to as pen tests or ethical hacking—so you can relax, knowing your systems are protected. Unlike a straightforward vulnerability assessment, our ethical hacking approach at Dhound goes beyond merely identifying weaknesses; we adopt the mindset and strategies of hackers to stay one step ahead of those who wish to cause harm. This proactive stance ensures that your security measures are continually evolving and improving.
  • 24
    Sheetgo Reviews

    Sheetgo

    Sheetgo Europe

    $20/user/month
    Sheetgo is a no-code automation tool that teams can use. You can create custom workflows to collect and manage data, as well as share it with others -- all from a spreadsheet. You can create an automated system that automates any business process, from inventory management and financial forecasting to sales tracking or student attendance monitoring. Sheetgo can be used with Google Sheets, Excel, and CSV files. Sheetgo.com makes it easy to automate your work.
  • 25
    ManageEngine DataSecurity Plus Reviews
    ManageEngine DataSecurity Plus lets you take control of sensitive data. Take a look at the most recent user activity, file activity, as well as access trends. The four Ws of every access are who accessed it, when and from where. The most important events, such as sudden permissions changes, file deletions and renaming events, are those that matter the most. Identify the most active users, most frequently accessed files, as well as the most modified files within your file system. You can set up instant alerts to notify you of sudden spikes in folder or file access or modification events. Receive real-time notifications when multiple attempts are made to access critical files. After business hours, monitor changes to sensitive files. Monitor only critical files, folders and shares. Receive real-time alerts when files are modified in an unauthorized manner. To detect unusual activity and misuse of privileges, configure threshold-based alerts that monitor user-generated events.