Best IT Security Software in China - Page 64

Find and compare the best IT Security software in China in 2025

Use the comparison tool below to compare the top IT Security software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Activu Reviews
    Activu makes all information visible, collaborative, proactive, and proactive to those who are responsible for monitoring critical operations or incidents. Our customers can instantly see, share, respond, and discuss events in real time, with context to improve incident response, decision making, and management. Software, systems, as well as services from Activu are a benefit to billions of people all over the globe. Activu was founded in 1983 by the first U.S.-based firm to develop video wall technology. Today, more than 1,000 control rooms rely on it.
  • 2
    Plurilock DEFEND Reviews

    Plurilock DEFEND

    Plurilock Security

    $9 per user per month
    Plurilock DEFEND provides full-time, continuous authentication throughout active computing sessions using behavioral biometrics and your existing employee keyboard and pointer devices. DEFEND relies on an invisible endpoint agent and machine learning techniques to confirm or reject user's identity biometrically based on console input as they work, without visible authentication steps. When integrated with SIEM/SOAR, DEFEND can help to triage and respond to SOC alerts with high-confidence identity threat intelligence. By integrating with login and application workflows, DEFEND provides a just-in-time identity certainty signal behind the scenes, making truly invisible login workflows possible when identity is already confirmed. DEFEND supports Windows, Mac OS, IGEL, Amazon Workspaces VDI clients.
  • 3
    Netwrix Enterprise Auditor Reviews

    Netwrix Enterprise Auditor

    Netwrix

    $10.00/one-time/user
    Netwrix Enterprise Auditor streamlines the gathering and examination of essential data to tackle the most challenging inquiries related to the administration and security of crucial IT assets, which encompass data, directories, and systems. Every organization, big or small, needs effective tools to manage and safeguard the diverse technological resources that drive their operations. Nevertheless, it is impractical for any organization to invest in, efficiently manage, or sustain individual point solutions for every technology they utilize. Instead, they require adaptable solutions that can cater to their specific needs while also offering the flexibility to provide a unified set of functionalities across various platforms in their IT environment. With more than 40 built-in data collection modules, Netwrix Enterprise Auditor supports both on-premises and cloud-based platforms, ranging from Operating Systems to Office 365, ensuring comprehensive coverage and ease of use for organizations. This extensive capability allows businesses to maintain a secure and efficient IT infrastructure.
  • 4
    INETCO Insight Reviews

    INETCO Insight

    INETCO Systems Ltd.

    INETCO Insight is more than just a transaction monitoring tool; it is a critical software platform for financial institutions and payment service providers focused on ensuring operational excellence, enhancing customer experience and mitigating risk in real-time. With a 360-degree view of the customer journey, you can manage the end-to-end experience, optimize decision-making and detect potential issues before they impact customers. By investing in this advanced real-time transaction monitoring platform, you are not only protecting your operations today but also positioning your organization for continued success in an increasingly fast-paced and demanding financial landscape.
  • 5
    OpenText Recover Reviews
    OpenText Recover provides a robust disaster recovery solution that continuously replicates critical business systems and data to the cloud, enabling near-instant failover in the event of ransomware attacks, natural disasters, or other outages. It uses byte-level replication with optimized bandwidth and AES 256-bit encryption to ensure data integrity and security during transfer. The platform offers both self-service and managed service deployment options, allowing organizations to tailor disaster recovery to their specific needs. Failover and failback processes are automated and can be executed with minimal downtime, often measured in minutes, reducing operational disruption. Users can regularly test their recovery plans without impacting production systems, increasing confidence in disaster preparedness. OpenText Recover supports multiple operating systems and virtual environments, including Windows Server, Linux distributions, VMware, and Hyper-V. The solution removes the cost and complexity of managing secondary data centers by handling infrastructure and maintenance in the cloud. Professional support and detailed failover reporting further enhance reliability and ease of management.
  • 6
    Amtel MDM Solution Reviews
    Amtel offers a SaaS platform that is straightforward to implement and provides a seamless rollout for end-users, making it an incredibly user-friendly option. With just a few clicks, you can begin reaping the benefits, and by not actively managing your expenses, you could be overlooking significant savings opportunities! This fully integrated solution allows you to enhance your savings today. Amtel's offering features a mobile and telecom asset management module that empowers IT administrators to build and sustain a dynamic inventory from a central location across the organization. This inventory is automatically updated with any changes made through our eProcurement portal, ensuring its accuracy and relevance. Maintaining an accurate inventory through a mobile asset management solution is crucial for effective billing management, monitoring contract expirations, and eliminating redundant telecom connections. By leveraging Amtel's capabilities, businesses can optimize resource utilization and significantly improve their cost efficiency.
  • 7
    SoftActivity Monitor Reviews

    SoftActivity Monitor

    Deep Software Inc.

    $189.95/one-time
    Software that monitors user activity to protect organizations from insider threats. This employee monitoring software allows you to view the web browsing history, logs of applications, screen, accessed files, and email addresses of your users. Remote screens can be viewed in real-time and historical logs and reports can be generated.
  • 8
    Activate Reviews

    Activate

    Activate

    $5.00/one-time/user
    Activate serves as a comprehensive solution for enterprise management and automation, focusing on the management of user Identity, Access, and Digital Workspace. It offers full integration with Microsoft Suite products, including Active Directory, Office 365, and Azure AD. With Activate, users have the capability to request, approve, and oversee essential IT systems like Active Directory, Exchange, Office 365, and Azure for themselves and their colleagues within the organization. The combination of Identity Management and Service Management into one product facilitates efficient oversight of a user's Lifecycle, encompassing everything from On-boarding to Off-boarding. Additionally, Activate employs virtual LDAP technology, allowing Azure AD to be managed similarly to Active Directory. This innovative approach ensures that services can transition from on-premise configurations to cloud environments smoothly, maintaining uninterrupted user experiences. By streamlining these processes, Activate enhances operational efficiency and user satisfaction across the organization.
  • 9
    TraceCSO Reviews
    Our TraceCSO software provides a GRC platform for compliance and cybersecurity solutions. Our services are the best way to ensure cybersecurity compliance and compliance via third party review on an annual basis. They are also the perfect starting point for TraceCSO software. TraceCSO has a number of modules that can be combined to give you a complete picture of your cybersecurity environment.
  • 10
    ActiveData Reviews

    ActiveData

    Information Active

    $129 one-time payment
    ActiveData for Excel® enhances Microsoft Excel® by incorporating sophisticated data analysis functionalities along with efficient management features for workbooks and worksheets. With this powerful tool, users can perform a variety of actions on their data, such as joining, merging, matching, querying, summarizing, categorizing, and identifying duplicate or missing entries, as well as combining, splitting, splicing, and dissecting the data. The software boasts over 100 features, many of which are specifically tailored to boost user productivity within Excel. ActiveData for Excel provides an extensive array of functionalities at a significantly lower cost compared to other database-driven analytics and computer-assisted audit tools (CAATS), making it an attractive choice for users. The skills developed while using ActiveData translate seamlessly to other data analysis software like ACL and IDEA, ensuring versatility for users who may work with multiple platforms. This software is particularly user-friendly, catering well to those with less technical expertise, and is available in both Business and Professional editions, compatible with Microsoft Excel versions 2007 through 2019. Moreover, ActiveData for Excel is designed to complement existing data analysis tools, enhancing the overall workflow and efficiency of data management tasks.
  • 11
    Active Wall Reviews

    Active Wall

    Active Network CO

    $10 per user
    Active Wall employs independently developed middle layer drivers as its filter engines, providing a more low-level approach compared to other software that relies on WinPCap. Unlike WinPCap, which is a protocol-type driver limited to monitoring without blocking capabilities, other software utilizing WinPCap can only block TCP communications, leaving UDP, ICMP, and IGMP packets unaddressed. Extensive online usage has demonstrated that Active Wall is more stable, accurate, and effective over time. In contrast to most similar applications that only offer a single Passby monitoring mode, Active Wall provides multiple operational modes, including Gateway, Bridge, and Single modes. Users are advised to utilize either the Gateway or Bridge modes for optimal functionality. While the Passby mode restricts Active Wall's ability to block only TCP packets due to network topology limitations, the Gateway and Bridge modes empower it to block all types of data packets effectively. This versatility makes Active Wall a comprehensive solution for network management and security.
  • 12
    STOPzilla AntiVirus Reviews

    STOPzilla AntiVirus

    RealDefense

    $39.95 per year
    Active scanning swiftly eliminates malware while also safeguarding against new infections as they happen. With hourly updates for virus definitions, the software ensures it addresses the most recent threats effectively. The enhanced smart web filter is adept at blocking harmful websites that may attempt to compromise your personal data. Functioning discreetly in the background, it does not hinder your computer's performance. STOPzilla AntiVirus 8.0 identifies viruses and malware in real-time, intercepting them before they can be saved onto the hard drive. Its improved detection speed surpasses earlier versions, providing optimal antivirus protection. Many malicious programs are engineered to disrupt the effectiveness of antivirus and anti-malware solutions, but STOPzilla AntiVirus 8.0 is specifically formulated to counteract such interferences, guaranteeing continuous protection. Our advanced Web Filter operates as a cloud-based URL scanning tool, refreshed with newly identified threats every five seconds, thus shielding users from deceptive sites that could harvest sensitive information. This relentless vigilance is crucial in today’s digital landscape, where threats evolve rapidly and require robust defenses.
  • 13
    Polar Crypto Component Reviews

    Polar Crypto Component

    Polar Software

    $239.00/one-time/user
    The Polar Crypto Component provides robust encryption capabilities for Windows applications, allowing developers to create their own security systems quickly or seamlessly integrate it into pre-existing setups to bolster security and efficiency. With cutting-edge encryption technology and the complete source code available in MS Visual C++, it serves as an ActiveX and DLL component that can be utilized in scenarios requiring secure information handling, authenticity, and data integrity. This component is essential for applications engaged in business transactions that demand the highest level of confidentiality, as well as for generating and validating digital signatures. Additionally, it proves invaluable for e-commerce websites that manage sensitive client data, such as credit card information, and for desktop applications designed to encrypt private files on individual computers or across networks. Furthermore, Polar Crypto not only enhances security but also ensures compliance with industry standards for data protection.
  • 14
    Net Monitor for Employees  Reviews

    Net Monitor for Employees

    EduIQ.com

    $99.95 one-time payment
    Monitoring software for employees has emerged as a crucial resource for overseeing their activities and enhancing productivity within workplaces. Often, team members waste valuable time engaged in browsing irrelevant content online or using company resources for personal endeavors, which detracts from their work. Many organizations have adopted employee monitoring as a proven strategy to identify and avert data breaches that could financially harm their operations. This approach not only fosters increased worker engagement but also streamlines operational processes. Through computer monitoring, companies gain a comprehensive view of work activities, both in-office and remote. By implementing surveillance software, an organization can mitigate risks and improve its profitability. The data collected can also aid in identifying inefficiencies, unusual behaviors, and other potential challenges that may arise. Ultimately, this technology empowers businesses to create a more focused and efficient work environment.
  • 15
    AgenaRisk Reviews
    AGENARISK leverages cutting-edge advancements in Bayesian artificial intelligence and probabilistic reasoning to address intricate, high-stakes challenges and enhance decision-making processes. By utilizing AgenaRisk models, users can forecast outcomes, conduct diagnostics, and make informed decisions by integrating data and insights regarding complex causal relationships and dependencies present in the real world. Our clientele employs AgenaRisk to tackle a wide range of issues associated with risk and uncertainty, such as operational risk, actuarial studies, intelligence analysis, system safety and reliability, health-related risks, cybersecurity threats, and strategic financial planning. AgenaRisk is committed to designing and promoting innovative products that utilize Bayesian Network technology. The effectiveness of our technology and methodology has been recognized and published in leading academic journals spanning AI, machine learning, actuarial science, decision science, and cognitive science. As we continue to evolve, we aim to remain at the forefront of risk modeling and decision-making solutions, directly impacting various industries.
  • 16
    602LAN SUITE Reviews

    602LAN SUITE

    Software602

    $299.95/one-time/user
    We utilize the Sofa application for digitization, offering electronic signatures along with a streamlined approval workflow and secure document storage. Whether in the office or working remotely, our solution makes the process easy and digital. This online application facilitates the swift digitization of businesses and workspaces, allowing for effective management of documents, data communications, and workflows through electronic signatures, an intuitive interface, and organized archiving. You can access it from the cloud, whether you're in the workplace or at home. Stay informed about essential topics such as circulation, approvals, document management via DMS systems, reliable digital archiving, professional services, eIDAS compliance, electronic signatures and seals, timestamps, and the optimization of business processes and workflows. Discover how to eliminate unnecessary paperwork and maximize your efficiency. An informative eBook on the paperless office is available, providing insights not only on effective digitization strategies but also on a wide range of related subjects. With just a single click, you can access everything you need, all in a straightforward and digital format. Embrace the future of work with convenience and clarity.
  • 17
    Max Secure Spyware Detector Reviews

    Max Secure Spyware Detector

    Max Secure Software

    $31.83 per user per year
    The most advanced multi-layer security systems integrate various engines such as whitelists, blacklists, antivirus solutions, anti-adware measures, heuristic detection, pattern recognition, gibberish identification, and artificial intelligence alongside dynamic emulation and debugging techniques to effectively combat sophisticated malware. The threat intelligence community utilizes behavioral analytics to detect the latest and most active malware affecting users' devices. Users can categorize and block harmful websites according to their preferences, all while employing this tool to prevent ransomware from encrypting important files. With a multi-threaded scanning engine that enhances detection capabilities, the system features an Advanced Active Monitor designed to shield against all forms of malware. Anti-phishing mechanisms are incorporated to safeguard against various online threats, while application whitelisting guarantees that only trusted applications can run. Additionally, it includes an advanced USB management feature and dedicated ransomware protection, leveraging artificial intelligence with machine learning for proactive Zero Day malware detection. Furthermore, the anti-theft functionality provides users with a lost laptop tracking option, ensuring comprehensive security for their devices. This thorough approach guarantees a robust defense against ever-evolving cyber threats.
  • 18
    BlueTie Reviews

    BlueTie

    BlueTie

    $19.99 per month
    BlueTie serves as a comprehensive solution for dependable cloud-based software and services, ensuring your business remains operational from any location. Choose from a wide selection of cost-effective options designed to evolve alongside your needs, all supported by a seasoned leader in the industry. Since its inception in 1999, BlueTie has offered virtual IT services that prioritize communication and security for enterprises around the globe. The company transformed the Software as a Service market by launching the inaugural hosted suite of business email and collaboration tools. Established by serial entrepreneur David Koretz alongside Tom Golisano, the founder and Chairman of Paychex, BlueTie has established itself as a premier provider of swift and reliable technology services tailored for businesses. In the present day, BlueTie continues to offer flexible email and calendar solutions for Internet Service Providers and organizations of all sizes, catering to millions of users across the globe. This commitment to innovation and customer service solidifies BlueTie’s reputation as a trusted partner for businesses seeking to navigate the digital landscape effectively.
  • 19
    FastStats Log Analyzer Reviews

    FastStats Log Analyzer

    Mach5 Development

    $99.95 one-time payment
    Your log files hold a treasure trove of insights not just about your website, but also about your overall business operations. Gaining a clear understanding of your website's traffic trends—viewing it from the perspective of potential customers—is essential for enhancing your business performance. Web server log files provide a glimpse into customer behaviors, enabling you to optimize your website for attracting new clientele. FastStats Log Analyzer offers an efficient, cost-effective solution to analyze vast amounts of log data and generate intuitive summaries regarding your website's traffic. If you're investing $0.75 per click in Google ads but only earning $0.56 per click in revenue, FastStats can assist you in analyzing your revenue per click, which is crucial for setting your advertisement pricing. Additionally, you can utilize FastStats' Hyperlink Tree View to visually track the paths that customers take through your website. Remarkably, FastStats can process logs at a speed that is 40 times faster than that of WebTrends, which is regarded as the leading software in the industry. This efficiency makes it an invaluable tool for any business looking to maximize their online presence and profitability.
  • 20
    Log2Stats Reviews

    Log2Stats

    BitStrike Software

    $299.95 one-time payment
    Log-to-Stats offers a contemporary approach to retrieving website statistics from web server log files. This software efficiently organizes all your web log files, transforming them into a comprehensive statistics database. Users can access their website statistics through interactive, detailed reports or export them in formats such as HTML. With Log-to-Stats, monitoring the evolution of statistics over time becomes straightforward, allowing comparisons of web traffic reports across various date ranges or specific conditions. This user-friendly solution enhances your ability to analyze and understand your website's performance effectively.
  • 21
    Mvine Reviews
    Delivering a secure and tailored mobile application for your client necessitates the integration of both on-premises and cloud-based systems. Achieving this goal demands overcoming several challenges, including implementing single-sign-on solutions, managing federated user profiles, automating context provisioning, and ensuring seamless integration across multiple APIs, all while maintaining near-real-time performance. Mvine possesses the necessary technology and expertise to design mobile applications that connect with diverse directory services, location services, and systems of record, thereby crafting deeply personalized customer interactions. Their advanced context provisioning engine functions in near-real time, enabling the creation of experiences that reflect the customers' current locations, their known preferences, and their ongoing activities. This capability not only enhances user engagement but also helps businesses build stronger relationships with their clients.
  • 22
    IAM Cloud Reviews

    IAM Cloud

    IAM Cloud

    $2.40 per month
    IAM Cloud offers a leading-edge drive management solution for cloud storage, enabling secure and direct access to OneDrive for Business, MS Teams, and SharePoint Online without the need for synchronization, making it ideal for both desktop and VDI settings. Our platform boasts an intuitive and secure sign-on experience, featuring single sign-on (SSO), multi-factor authentication (MFA), Surp4ss! password management, along with basic identity synchronization and provisioning from Active Directory, ensuring you have all the essentials of an SSO solution without exorbitant costs. At its core, IAM Cloud is dedicated to identity management, and with IDx, you can effortlessly connect and synchronize identities across various systems, fully automating the processes for Joiners, Movers, and Leavers. IDx seamlessly integrates with on-premises, cloud, and custom-built HR, ERP, CRM, MIS, and directory systems, enhancing overall operational efficiency. Additionally, our cloud-based data migrator facilitates smooth migrations to and from the cloud for Office 365, allowing for the consolidation of multiple Office 365 tenancies into a single tenant or the division of tenancies when necessary. This comprehensive solution caters to diverse organizational needs, making IAM Cloud an invaluable asset for modern enterprises.
  • 23
    Black Duck Reviews
    Black Duck, a segment of the Synopsys Software Integrity Group, stands out as a prominent provider of application security testing (AST) solutions. Their extensive array of offerings encompasses tools for static analysis, software composition analysis (SCA), dynamic analysis, and interactive analysis, which assist organizations in detecting and addressing security vulnerabilities throughout the software development life cycle. By streamlining the identification and management of open-source software, Black Duck guarantees adherence to security and licensing regulations. Their solutions are meticulously crafted to enable organizations to foster trust in their software while effectively managing application security, quality, and compliance risks at a pace that aligns with business demands. With Black Duck, businesses are equipped to innovate with security in mind, delivering software solutions confidently and efficiently. Furthermore, their commitment to continuous improvement ensures that clients remain ahead of emerging security challenges in a rapidly evolving technological landscape.
  • 24
    DBHawk Reviews

    DBHawk

    Datasparc

    $99.00/month/user
    With DBHawk, clients have successfully adhered to various regulations, including GDPR, HIPAA, SOX, and GLBA, while also implementing Segregation of Duties (SOD). This self-service business intelligence and ad-hoc reporting tool offers the ability to establish data access policies, connect to a variety of data sources, and create dynamic SQL charts and data dashboards. The advanced SQL editor within DBHawk enables users to seamlessly construct, modify, and execute database queries via a user-friendly web interface. Additionally, the DBHawk Query Builder is compatible with all major databases, including Oracle, Microsoft SQL Server, PostgreSQL, Greenplum, MySQL, DB2, Amazon Redshift, Hive, and Amazon Athena. It serves as a web-based centralized tool for automating database SQL tasks and batch jobs, ensuring secure access to SQL, NoSQL, and cloud databases through a comprehensive data platform. Our customers trust DBHawk to safeguard and manage their data effectively, benefiting from centralized security, auditing, and insights into user activity. Furthermore, the platform's capabilities enable organizations to improve their analytical processes and make data-driven decisions with ease.
  • 25
    Centraleyezer Reviews

    Centraleyezer

    Sandline

    $599 per month
    Integrates and correlates vulnerability scanner data and multiple exploit feeds with business and IT factors to prioritize cyber security risk. Red Teams, CISOs, and Vulnerability Assessment Teams can reduce time-to fix, prioritize, and report risks. This tool is used by Governments, Military and E-Commerce businesses.