Best IT Security Software in China - Page 66

Find and compare the best IT Security software in China in 2025

Use the comparison tool below to compare the top IT Security software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Cloudnosys Reviews
    Cloudnosys is an AI-powered cloud security, compliance, and automation platform for AWS, Azure, and GCP. It enables organizations to secure their multi-cloud environments through continuous monitoring, intelligent threat detection, and automated remediation of security and compliance risks. The platform scans cloud infrastructure across services such as IAM, VPC, S3, CloudTrail, and GCP-native components to detect misconfigurations, vulnerabilities, and policy violations in real time. Cloudnosys supports key regulatory and industry frameworks including PCI-DSS, HIPAA, FISMA, and AWS CIS Benchmarks, helping organizations meet compliance requirements quickly and efficiently. Cloudnosys is regionally compliant and supports regulatory mandates across the United States, European Union, MENA region, Brazil, and other jurisdictions, making it suitable for organizations operating in multiple geographies with varying data governance and compliance needs. In addition to security and compliance, the platform offers DevOps automation features such as resource scheduling, snapshot management, and policy-based controls to streamline operations. Cloudnosys is designed for security teams, DevOps engineers, and compliance professionals seeking unified visibility, control, and automation across AWS, Azure, and GCP environments.
  • 2
    Sentinel IPS Reviews
    A cost-effective suite of network security solutions features a Managed Network Detection and Response team, the innovative Network Cloaking™ approach, and CINS Active Threat Intelligence. This comprehensive managed security service is tailored for lean IT teams, allowing them to refocus on other important projects. We collaborate with you to thwart external attacks, identify harmful threats, and respond swiftly to critical incidents. Our Autonomous Threat Defense and Active Threat Intelligence extend protection beyond the firewall, offering an additional layer of scrutiny for internal network traffic. Sentinel Outpost delivers sophisticated threat defense at the network edge using Network Cloaking™, successfully preventing malware, exploitation attempts, and various other dangers from breaching the firewall. With our services, you can enhance your overall security posture and ensure your network remains resilient against evolving threats.
  • 3
    EditionGuard Reviews

    EditionGuard

    Kodelite

    $120 per month
    EditionGuard allows for the secure automation of eBook delivery following an online transaction, while also giving you control over the distribution of your eBook content. You can quickly upload your eBook or select from our sample collection to experience how simple and efficient eBook DRM can be. We accommodate various file formats, including EPUB, MOBI, and PDF. You have the option to choose a DRM type and configure settings, such as limiting access to a single device or imposing restrictions on printing or copying text. Our offerings include Adobe DRM, Readium LCP, and various social DRM options. With EditionGuard, you'll gain access to a complete storefront that features secure payment processing and seamless eBook delivery for each eBook or PDF you upload. The setup process is straightforward, taking only a few minutes, and you can personalize your URL while ensuring that sales revenue is directly deposited into your bank account. Additionally, our plugins allow seamless integration with your website. Moreover, EditionGuard offers comprehensive activity tracking, enabling you to monitor downloads and fulfillment throughout your entire catalog effectively. This robust platform ensures that you maintain control and visibility over your digital content distribution.
  • 4
    TeleSign Reviews
    Provide prompt and tailored communication through international SMS/RCS and voice cloud services. Enhance your customer insights with actionable intelligence derived from global phone numbers and subscriber data. Utilize TeleSign’s Messaging API to code once and effectively reach your audience at scale, leveraging seamless delivery across various channels. The TeleSign Messaging API supports SMS, RCS, and WhatsApp, empowering you to create secure digital interactions that engage customers globally. By integrating a unified Messaging API, you can begin dispatching dependable and secure messages via SMS, RCS, and WhatsApp to your clientele today. Opt for one, two, or all three channels to diversify your programmable messaging approach and broaden your reach. With over 120 optimized points-of-presence and more than 700 direct-to-carrier routes, connect with an even larger customer base effortlessly. This expanded network ensures your messages are delivered efficiently and effectively.
  • 5
    GLAnalytics Reviews
    In the current landscape of business, maintaining data integrity, adhering to internal policies and procedures, minimizing errors, and managing risk are crucial components for driving top-line growth. GLAnalytics offers a cloud-based analytics platform that facilitates financial reporting, actively monitoring financial data for discrepancies and potential fraudulent activities. This comprehensive risk management solution instills confidence by leveraging sophisticated algorithms designed to scan financial information in a proactive and secure manner, all through an intuitive interface not commonly found in other financial reporting tools. These algorithms not only identify anomalies but also conduct cross-reviews between various data components. Additionally, the analytics software incorporates robust encryption and secure access controls to ensure that sensitive information remains confidential. The application provides both logical and physical separation of client data, utilizing tiered certified storage for enhanced security. Furthermore, this cloud-based solution ensures scalability, with all data securely stored and access continuously monitored to maintain high standards of protection. The combination of these features makes GLAnalytics a reliable choice for businesses seeking to fortify their financial reporting processes.
  • 6
    Bravura Pass Reviews
    Bravura Pass offers a comprehensive solution designed to streamline the management of credentials across various systems and applications. It effectively simplifies the handling of passwords, tokens, smart cards, security questions, and biometric data. By utilizing Bravura Pass, organizations can reduce IT support expenses while enhancing the security of their login procedures. The features of Bravura Pass encompass password synchronization, self-service options for password and PIN resets, robust authentication mechanisms, federated access, and the enrollment of security questions and biometrics, as well as the ability for users to self-unlock encrypted drives. Additionally, users may leverage smart cards or tokens secured by PINs, which they may occasionally forget, and in some instances, they might employ security questions or standard passwords to access encrypted drives on their computers. Furthermore, biometric methods such as fingerprints, voice recognition, or facial recognition are also options for logging into various systems and applications, leading to a diverse range of potential login challenges for users across these credential types. Ultimately, the range of authentication methods available means that while security is strengthened, the complexity of managing these various credentials can also lead to confusion and access issues.
  • 7
    Barracuda Sentinel Reviews
    Business email compromise (BEC), spear phishing, and account takeover are emerging as the foremost security threats confronting organizations today. These meticulously crafted attacks utilize socially engineered methods aimed at misleading employees, resulting in potentially catastrophic repercussions for companies and their reputations. Barracuda Sentinel offers a comprehensive cloud-based solution that integrates artificial intelligence, deep connectivity with Microsoft Office 365, and brand protection to effectively counteract business email compromise, account takeover, spear phishing, and various forms of cyber fraud. Central to Barracuda Sentinel is its advanced AI engine, which operates in real-time to detect and thwart socially engineered attacks while pinpointing employees who are most vulnerable. The unique API-driven architecture of Sentinel allows the AI engine to access historical email data, enabling it to understand the distinct communication patterns of each user. Furthermore, the engine employs a variety of classifiers to chart the social networks of every individual within the organization, enhancing its ability to safeguard against these threats. This multifaceted approach not only strengthens security but also fosters a culture of awareness among employees regarding potential cyber risks.
  • 8
    R&S Web Application Firewall Reviews

    R&S Web Application Firewall

    Rohde & Schwarz Cybersecurity

    The R&S® Web Application Firewall (WAF), when paired with a network firewall, greatly enhances your organization's security posture. This combination ensures that your IT infrastructure meets contemporary standards for resilience and protection. Drawing on decades of expertise and development, our web application firewall effectively shields the corporate network from common threats, including zero-day vulnerabilities, SQL injection attacks, cross-site scripting, and Distributed Denial of Service (DDoS) incidents at the application level. It provides robust safeguards for essential enterprise applications, encompassing both legacy systems and tailored APIs, while adhering to data protection laws. As businesses increasingly depend on web-based solutions, the significance of web applications within organizations continues to rise, leading to a growing exploitation of their weaknesses by cybercriminals. Consequently, implementing a comprehensive security strategy is vital to combat these evolving threats.
  • 9
    Atomicorp Enterprise OSSEC Reviews
    Atomic Enterprise OSSEC is a commercially enhanced iteration of the OSSEC Intrusion Detection System, developed by the original sponsors of the OSSEC initiative. As the leading open-source host-based intrusion detection system (HIDS), OSSEC is utilized by countless organizations globally. Atomicorp enhances OSSEC by offering a comprehensive management console (OSSEC GUI), advanced file integrity management (FIM), and tools for PCI compliance auditing and reporting, along with expert support and additional features. Key functionalities include: - Intrusion Detection - File Integrity Monitoring - Log Management - Active Response - OSSEC GUI and Management - Compliance Reporting for PCI, GDPR, HIPAA, and NIST - Dedicated OSSEC Expert Support Users can access specialized assistance for OSSEC servers and agents, as well as guidance in crafting OSSEC rules. For more details about Atomic Enterprise OSSEC, visit the official website at: https://www.atomicorp.com/atomic-enterprise-ossec/. With this robust suite of tools and support, organizations can significantly enhance their security posture and compliance readiness.
  • 10
    Armis Centrix Reviews
    Armis Centrix™ unifies cybersecurity operations by delivering continuous discovery, monitoring, and protection of every asset across complex hybrid networks. Its AI-powered intelligence engine enables security teams to detect unmanaged devices, assess vulnerabilities, and mitigate risks before attackers can exploit them. Organizations can manage IT systems, industrial OT environments, medical IoMT fleets, and IoT devices from a single platform with zero blind spots. The platform supports both on-premises and SaaS deployments, making it flexible for industries like healthcare, utilities, manufacturing, and critical infrastructure. VIPR Pro enhances the platform with automated remediation workflows, helping teams prioritize issues based on real-world threat activity. Early Warning intelligence provides insight into vulnerabilities actively being weaponized, ensuring organizations can act ahead of threats. Armis Centrix™ also improves business outcomes by increasing operational efficiency, supporting compliance, and strengthening resilience. Trusted by global enterprises and recognized by Gartner and GigaOm, Armis Centrix™ is built to meet the cybersecurity demands of modern digital environments.
  • 11
    Querona Reviews
    We make BI and Big Data analytics easier and more efficient. Our goal is to empower business users, make BI specialists and always-busy business more independent when solving data-driven business problems. Querona is a solution for those who have ever been frustrated by a lack in data, slow or tedious report generation, or a long queue to their BI specialist. Querona has a built-in Big Data engine that can handle increasing data volumes. Repeatable queries can be stored and calculated in advance. Querona automatically suggests improvements to queries, making optimization easier. Querona empowers data scientists and business analysts by giving them self-service. They can quickly create and prototype data models, add data sources, optimize queries, and dig into raw data. It is possible to use less IT. Users can now access live data regardless of where it is stored. Querona can cache data if databases are too busy to query live.
  • 12
    Cynet All-in-One Cybersecurity Platform Reviews
    Cynet equips MSPs and MSSPs with a fully managed, all-in-one cybersecurity platform that brings together essential security functions in a single, user-friendly solution. By consolidating these capabilities, Cynet simplifies cybersecurity management, reduces complexity, and lowers costs, eliminating the need for multiple vendors and integrations. With multi-layered breach protection, Cynet delivers robust security for endpoints, networks, and SaaS/Cloud environments, ensuring comprehensive defense against evolving threats. Its advanced automation enhances incident response, enabling swift detection, prevention, and resolution. Supported by a 24/7 Security Operations Center (SOC), Cynet’s CyOps team provides continuous monitoring and expert guidance to keep client environments secure. Partnering with Cynet allows you to deliver cutting-edge, proactive cybersecurity services while improving operational efficiency. See how Cynet can redefine your security offerings and empower your clients today.
  • 13
    MailList King Reviews

    MailList King

    Xequte Software

    $99.50 one-time payment
    MailList King provides a robust mailing list server solution right on your PC, making it simple to create, oversee, and engage with individuals who are interested in your website, products, or organization. This software seamlessly integrates with widely used email applications like Outlook and Gmail, or it can connect directly to your mail servers to manage mailing list communications, including subscriptions, unsubscriptions, and undeliverable messages, while also sending processing confirmations and double opt-in verifications along with the customized rich text messages you design. If you're currently juggling a mailing list using Excel or Outlook Contacts, MailList King can significantly streamline your process by automatically managing the addition and removal of contacts, allowing you to focus more on crafting engaging newsletters and impactful sales communications. There's no need for advanced computer skills to utilize MailList King, making it an accessible choice for anyone looking to enhance their email marketing efforts. Moreover, its user-friendly interface ensures that even those with minimal technical knowledge can benefit from its powerful features.
  • 14
    AttackTree Reviews
    Evaluate the vulnerabilities in a model system, pinpoint weaknesses, and enhance security through comprehensive threat analysis and attack tree methodologies. Create visual diagrams that illustrate strategies aimed at minimizing the impacts of successful breaches using mitigation trees. The AttackTree tool enables users to specify outcomes and link them to any node within the attack tree, facilitating the modeling of repercussions from successful attacks on the designated system. Furthermore, mitigation trees can be employed to assess how various countermeasures influence the potential consequences of these successful attacks. Our software, which has evolved continuously since the 1980s, is widely acknowledged as the benchmark for professionals focused on safety and reliability. Conduct threat assessments in line with established standards, including ISO 26262, ISO/SAE 21434, and J3061, to pinpoint areas of vulnerability within your systems. By doing so, you can strengthen the security of your assets and IT infrastructure while effectively modeling and mitigating potential consequences. This proactive approach allows for ongoing adjustments and improvements in security strategies as new threats emerge.
  • 15
    Cortado Reviews

    Cortado

    Cortado Mobile Solutions

    $5.40 per device per month
    Quickly configure and secure smartphones and tablets with ease. Whether the device belongs to an organization or is personally owned, Cortado MDM allows you to manage mobile devices effortlessly and securely through a centralized MDM console. Once you register, you can dive right into managing your devices. With templates available for various deployment methods like BYOD, COPE, and kiosk mode, you can implement mobile device management in just a matter of minutes. Distribute applications from both public app stores and your own developed software seamlessly. You can either make selected apps accessible in your private app store or push them directly to devices with minimal effort. Safeguard sensitive information effectively, as Cortado MDM maintains a clear distinction between business and personal data, especially when devices serve dual purposes. Additionally, you can configure email, Wi-Fi, and VPN settings from a single location, effortlessly transferring profiles and updates to the devices with just a click. This streamlined approach not only enhances productivity but also ensures that your organization's data remains protected.
  • 16
    Intellock LMS Reviews
    Intellock serves as a tailored Digital Rights Management solution designed specifically for various segments of content owners, addressing their unique challenges in sales and distribution management. Regardless of whether content is in analog or digital format, it remains vulnerable to unauthorized duplication and redistribution, which can occur with relative ease. While analog media deteriorates in quality with each successive copy and even during routine use, digital files can be replicated indefinitely without any loss in quality. Moreover, the widespread availability of digital devices like laptops, smartphones, and tablets, coupled with the Internet and popular file-sharing platforms, has facilitated the rampant unauthorized sharing of digital materials, commonly known as digital piracy, which has become both feasible and lucrative. Over time, numerous methods have been developed to regulate access to digital content, adapting to the changing landscape of content distribution. The evolution of these techniques highlights the ongoing need for effective solutions to protect intellectual property in the digital age.
  • 17
    Fortra Event Manager Reviews
    A platform for real-time cybersecurity insight and response is crucial in today's landscape. As cyber threats evolve in complexity, acting swiftly becomes vital to mitigate potential damage. It is imperative to recognize and resolve risks before they escalate into serious issues. Fortra's SIEM tool, Event Manager, efficiently prioritizes security threats in real time, facilitating an immediate response. By automating escalation and enhancing incident management, the platform accelerates both response times and resolutions. In an era where organizations generate unprecedented volumes of security data, distinguishing between trivial alerts and serious threats is essential. Many events require minimal attention, yet significant issues demand a prompt response. Amidst this overwhelming influx of data, critical information can easily be missed. Event Manager alleviates alert fatigue by filtering out less important events and focusing on escalating critical incidents, allowing security teams to act swiftly and efficiently. Furthermore, beyond the default settings that filter out trivial information or minor threats, users have the flexibility to customize their data views and establish specific inclusion or exclusion rules, ensuring that the most relevant information is always front and center. This level of customization empowers organizations to enhance their cybersecurity posture significantly.
  • 18
    Barracuda PhishLine Reviews
    Barracuda Phishline offers a comprehensive solution for email security awareness and phishing simulation aimed at safeguarding organizations from targeted phishing threats. This program educates employees on the most recent social engineering tactics, helping them identify subtle signs of phishing attempts and thereby mitigating risks like email fraud, data breaches, and harm to the brand's reputation. By participating in PhishLine, employees evolve from being potential vulnerabilities into a formidable first line of defense against harmful phishing schemes. The tool provides protection against various types of threats through patented and highly adaptable attack simulations, including Phishing (Email), Smishing (SMS), Vishing (Voice), and Found Physical Media (USB/SD Card). Users benefit from an extensive library of SCORM-compliant training materials, along with a wide array of customizable email templates, landing pages, and domains to enhance the learning experience. The built-in workflow engine simplifies the process of directing training and assessments, ensuring a seamless user experience. Additionally, the Phish Reporting Button streamlines the reporting of suspicious emails, making it easy for employees to act promptly against potential threats. Overall, Barracuda Phishline equips organizations with the tools necessary to foster a vigilant and informed workforce.
  • 19
    SecurePIM Reviews

    SecurePIM

    Virtual Solution

    Smartphones and tablets have become essential tools for daily operations in both government organizations and private enterprises. SecurePIM, available for iOS and Android, integrates essential features like email, messaging, telephony, calendar management, document handling, and more, all within a single application. Utilizing advanced container technology, it upholds the highest security protocols, ensuring data is encrypted and providing genuine end-to-end encryption. This solution safeguards the personal information of citizens, customers, and employees, significantly reducing the risk of incurring hefty fines due to GDPR non-compliance. Moreover, it facilitates a rapid onboarding process with minimal training and administrative demands for both staff and IT managers. By reducing hardware expenses and boosting employee morale, it supports the use of personal devices for professional communication through a BYOD policy. This approach not only minimizes operational burdens but also enhances flexibility, making SecurePIM accessible across different platforms and devices. With its comprehensive functionality, SecurePIM ultimately streamlines workflow while prioritizing security and user satisfaction.
  • 20
    Voxility DDoS Protection Reviews
    Our solution offers 1 Tbps+ Acclaimed DDoS Protection that works with almost any application. It is used frequently to protect online games, DNS, TCP services, HTTPS and HTTP websites. Attackers will not be able to put your services down regardless of the type of attack. The Anti-DDoS Tunnel is the quickest way for an entire Network and its downstream customers to be protected against volumetric or application specific DDoS attacks. It is a completely automated solution that filters the traffic only when an attack is detected. It is compatible with all edge routers supporting GRE or L2TP and gives the Network total control of which subnets are advertised through this tunnel via BGP advertisements. The Secure Uplink is the most efficient way for an Internet Service Provider (ISP) to protect its network and its downstream customers against volumetric or application specific DDoS attacks of up to 1 Tbps. By just adding a new upstream provider in its current list of peers, the ISP obtains immediately a completely automated solution that filters DDoS attacks for all subnets advertised through BGP to this line. Our DDoS protection is a guarantee that the customer services connected to Voxility are not affected by DDoS attacks.
  • 21
    Outpost24 Reviews
    Gain a comprehensive understanding of your attack surface by implementing a unified approach that minimizes cyber risks from the perspective of potential attackers through ongoing security assessments across various platforms including networks, devices, applications, clouds, and containers. Simply having more data isn't sufficient; even the most skilled security teams can struggle with the overwhelming number of alerts and vulnerabilities they face. Utilizing advanced threat intelligence and machine learning, our solutions deliver risk-oriented insights that help you prioritize which issues to address first, ultimately decreasing the time required for patching vulnerabilities. Our predictive, risk-based vulnerability management tools are designed to enhance your network security proactively, expediting remediation processes and improving patching efficiency. Moreover, we offer the most comprehensive methodology in the industry for the continuous identification of application weaknesses, ensuring that your Software Development Life Cycle (SDLC) is safeguarded for quicker and safer software deployments. Additionally, secure your cloud migration efforts with our cloud workload analytics, CIS configuration assessments, and container inspections tailored for multi-cloud and hybrid environments, ensuring a fortified transition. This holistic strategy not only protects your assets but also contributes to overall organizational resilience against evolving cyber threats.
  • 22
    Lacework Reviews
    Leverage data and automation to safeguard your multi-cloud setup, accurately assess risks, and foster innovation with assurance. Accelerate your development process by integrating security from the very beginning of your coding journey. Acquire actionable security insights to efficiently build applications while proactively addressing potential issues before they enter production, all seamlessly integrated into your current workflows. Our advanced platform harnesses patented machine learning and behavioral analytics to intuitively understand the typical behavior of your environment, flagging any anomalies that arise. With comprehensive visibility, you can monitor every aspect of your multi-cloud ecosystem, identifying threats, vulnerabilities, misconfigurations, and any irregular activities. Data and analytics enhance precision to an unmatched degree, ensuring that only the most critical alerts are highlighted while eliminating unnecessary noise. As the platform continuously evolves, rigid rules become less necessary, allowing for more flexibility in your security approach. This adaptability empowers teams to focus on innovation without compromising safety.
  • 23
    Humio Reviews
    Capture all logs and respond to inquiries in real-time with cutting-edge log management that includes streaming observability and cost-effective Unlimited Plans. Humio is designed to quickly ingest and preserve streaming data as it arrives, no matter the quantity. Alerts, scripts, and dashboards reflect updates instantly, while both live tail and searches of retained data experience nearly zero latency. With an index-free architecture, Humio accommodates any format, whether structured or unstructured. Users can formulate any question regarding live or archived data without the need to define fields in advance, ensuring rapid response times. Humio’s pricing is competitive, featuring top-tier Unlimited Plans that cater to various needs. Its sophisticated compression techniques and bucket storage approach can reduce compute and storage expenses by up to 70%. Moreover, Humio can be deployed in just a few minutes and requires minimal upkeep. By ingesting unlimited data at any throughput, Humio ensures you have access to the complete dataset necessary for timely incident detection and response, making it a robust solution for modern data management. Its user-friendly interface and efficient architecture position it as a leader in the log management space.
  • 24
    Humming Heads Reviews
    To thwart attacks, it is essential to secure all authorized actions and ensure that leaked or stolen data remains unreadable, all done seamlessly and reliably. The Shinobi Defense System (SDS) enables you to concentrate your endpoint security efforts on areas you can effectively manage, rather than endlessly pursuing the latest malware threats or attempting to educate users on security practices. For the first time in the USA, SDS offers a distinctive and integrated portfolio of established technologies. It provides covert protection against the three most significant and common endpoint security challenges that lead to financial losses for businesses. By merging DeepWhite, a robust whitelist-based protection technology, with Evolution DLP, an automatic and seamless data loss prevention solution, SDS creates a cohesive system powered by our innovative Active Intercept engine and the Shinobi Forensics logging and reporting platform. This comprehensive approach ensures that any leaked or stolen files are automatically rendered unreadable, requiring no rules or interactions from end users, thus simplifying security management. With SDS, organizations can confidently safeguard their data without burdening their employees.
  • 25
    Barracuda Web Security Gateway Reviews
    The Barracuda Web Security Gateway enables organizations to take advantage of online applications and tools while safeguarding against threats such as web-based malware and viruses, productivity loss, and bandwidth misuse. This all-encompassing web security and management solution integrates industry-leading spyware, malware, and virus protection with an advanced policy and reporting framework. Its sophisticated features help organizations address evolving needs such as regulating social media usage, filtering remote connections, and gaining insights into SSL-encrypted traffic. Additionally, it offers unlimited remote user licenses to implement content and access policies for mobile devices operating outside the corporate environment. The Barracuda Web Security Gateway can also be deployed as a virtual appliance, providing flexibility in security infrastructure. For those seeking hosted web security options, Barracuda Content Shield is available, ensuring comprehensive protection across various platforms.