Best IT Security Software in China - Page 74

Find and compare the best IT Security software in China in 2025

Use the comparison tool below to compare the top IT Security software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    HashiCorp Vault Reviews
    Ensure the protection, storage, and stringent management of tokens, passwords, certificates, and encryption keys that are essential for safeguarding sensitive information, utilizing options like a user interface, command-line interface, or HTTP API. Strengthen applications and systems through machine identity while automating the processes of credential issuance, rotation, and additional tasks. Facilitate the attestation of application and workload identities by using Vault as a reliable authority. Numerous organizations often find credentials embedded within source code, dispersed across configuration files and management tools, or kept in plaintext within version control systems, wikis, and shared storage. It is crucial to protect these credentials from being exposed, and in the event of a leak, to ensure that the organization can swiftly revoke access and remedy the situation, making it a multifaceted challenge that requires careful consideration and strategy. Addressing this issue not only enhances security but also builds trust in the overall system integrity.
  • 2
    Sectigo Reviews
    Sectigo stands as a premier global authority in cybersecurity, dedicated to safeguarding websites, connected devices, applications, and digital identities. This distinguished provider specializes in digital identity solutions, offering a range of products such as SSL/TLS certificates, DevOps support, IoT solutions, and comprehensive enterprise-grade PKI (Public Key Infrastructure) management, alongside robust multi-layered web security. With an impressive track record as the largest commercial Certificate Authority, boasting over 700,000 clients and more than two decades of expertise in fostering online trust, Sectigo collaborates with organizations of varying scales to implement automated public and private PKI solutions that enhance the security of web servers, user access, connected devices, and applications. Renowned for its innovative achievements and top-tier global customer support, Sectigo consistently demonstrates the capability to secure the evolving digital landscape effectively. In addition to its market leadership in SSL/TLS certificates, DevOps, and IoT solutions, Sectigo's commitment to excellence makes it a trusted partner in navigating the complexities of cybersecurity.
  • 3
    Acmetek Reviews
    Acmetek proudly serves as an authorized distributor and platinum partner for DigiCert's website security solutions. We provide a comprehensive range of SSL certificates, including brands such as DigiCert, Thawte, GeoTrust, and RapidSSL. Our reliable security seals instill customer confidence, which in turn boosts online sales and fosters business growth. Established in 2010, Acmetek embarked on its journey into website security solutions with a primary focus on SSL, driven by a simple yet significant observation: while SSL technology has advanced remarkably, many distributors and businesses had yet to fully embrace it. This gap inspired Acmetek's founders to craft a vision for an improved SSL experience and develop a channel enablement model to facilitate its adoption. Through our robust enablement framework, businesses can effortlessly implement SSL solutions. We offer an integrated suite of tools and support, empowering our partners to deliver SSL services effectively to clients around the world. Our unwavering mission is to enhance global security, transforming businesses one at a time while ensuring that the online environment becomes a safer place for everyone.
  • 4
    Akeyless Identity Security Platform Reviews
    Akeyless delivers a fully cloud-native SaaS solution for safeguarding machine identities, credentials, certificates, and keys while eliminating the complexity of vault management. Its patented Distributed Fragments Cryptology (DFC™) ensures zero-knowledge security by splitting secrets into pieces that are never stored together. With rapid deployment, no maintenance requirements, and infinite scalability across clouds, regions, and environments, Akeyless helps organizations cut operational costs by up to 70 percent. A growing number of enterprises also use Akeyless to secure their AI pipelines by consolidating authentication, secrets management, certificate lifecycle control, and policy enforcement, giving AI agents the ability to operate at scale without exposing credentials.
  • 5
    Greenbone Enterprise Reviews
    Greenbone Enterprise Appliances are designed for the purposes of vulnerability assessment and management, available in multiple performance tiers that can accommodate an extensive range of target systems. The number of targets that can be effectively scanned varies based on the chosen scan pattern and the specific targets involved. To assist you in selecting the most suitable model for your needs, we provide recommended values for the number of target IP addresses, based on a typical scenario where scans are conducted every 24 hours. It is crucial to choose the right appliance based on your network size and the frequency with which you intend to conduct scans. Moreover, these appliances can also be found in virtual formats, which cater to the requirements of small to medium-sized businesses and branch locations, as well as specialized situations like training sessions or audits conducted on laptops. Ultimately, understanding your scanning needs will ensure optimal use of the appliance's capabilities.
  • 6
    Sophos Cloud Optix Reviews
    Gain comprehensive visibility into assets and network traffic across AWS, Azure, and Google Cloud, while employing risk-based prioritization to address security concerns with facilitated remediation. Streamline the management of expenses for various cloud services by monitoring them all on one interface. Automatically detect and assess risks related to security and compliance, receiving contextual alerts that categorize affected resources, along with detailed steps for remediation and guided responses. Enhance your oversight by tracking cloud services side by side on a single screen, while also obtaining independent recommendations aimed at minimizing costs and spotting potential indicators of compromise. Automate compliance evaluations to save significant time by quickly mapping Control IDs from broader compliance tools to Cloud Optix, resulting in the generation of audit-ready reports with ease. Additionally, effortlessly integrate security and compliance checks at any phase of the development pipeline to identify misconfigurations, as well as embedded secrets, passwords, and keys that could pose security threats. This comprehensive approach ensures that organizations remain vigilant and proactive in their cloud security and compliance efforts.
  • 7
    TRUSTZONE Reviews

    TRUSTZONE

    TRUSTZONE

    €299 per user per year
    TRUSTZONE stands as the largest SSL/TLS certificate provider in Scandinavia and excels in delivering scalable PKI and IoT solutions aimed at encryption, authentication, and the efficient management of certificate lifecycles. Our extensive range of compatibility-optimized and fully scalable certificate products is designed to meet the diverse needs of businesses and organizations across various sectors. We accommodate companies of all sizes, from small startups requiring just one or two SSL/TLS certificates to large multinational corporations in search of comprehensive, enterprise-level solutions. With over 15 years of expertise in PKI, SSL/TLS, and certificate management, we have gained the trust of more than 3,000 businesses, with over 80% of the Danish banking sector relying on TRUSTZONE certificates for security. This widespread trust underscores our commitment to providing robust and reliable certificate solutions tailored to meet the evolving demands of our clients.
  • 8
    Comodo MDR Reviews

    Comodo MDR

    Comodo

    $7.50 per user per month
    Enhance your security posture by expanding monitoring and threat detection beyond just endpoints to encompass your network and cloud environments. Our team of security professionals offers remote services tailored to your business needs, allowing you to concentrate on your core operations. With a dedicated security operations center, we provide comprehensive managed solutions that address the most pressing security challenges faced by organizations today. Comodo MDR equips you with cutting-edge software, platforms, and expert personnel to oversee and mitigate threats, enabling you to prioritize your business objectives effectively. As the landscape of cybersecurity threats evolves, increasingly sophisticated attacks target your web applications, cloud resources, networks, and endpoints, leaving unprotected assets vulnerable. Neglecting to secure these critical components can result in severe financial repercussions following a data breach. Our service features a dedicated team of security researchers working alongside your IT department to fortify your systems and infrastructure against potential threats. Your personal security engineer will serve as your primary liaison with Comodo SOC services, ensuring you receive tailored support and expertise. Together, we can build a robust security framework that adapts to the dynamic challenges of the cyber landscape.
  • 9
    NeoSOC Reviews

    NeoSOC

    NRI SecureTechnologies

    NeoSOC is a comprehensive managed security solution available around the clock in the cloud, employing a SOC-as-a-Service model that offers a range of services from monitoring and alert notifications to complete managed detection and response solutions tailored to the specific requirements of each organization. By integrating a distinctive combination of practitioner knowledge, state-of-the-art technology, and nearly two decades of experience in managed security services, NeoSOC presents a highly scalable and valuable offering suitable for businesses of any size. In today’s environment, many organizations struggle to identify critical security incidents that can easily be obscured among numerous events. NeoSOC enhances security by supporting over 400 devices and applications as log sources, which enables clear visibility into potential threats facing your organization. The NeoSOC VM log collector can be deployed in just minutes, ensuring that clients can quickly become operational while maintaining strong security oversight. This swift implementation allows companies to focus on their core operations with peace of mind regarding their security posture.
  • 10
    Expel Reviews
    We make it possible for you to do the things you love about security, even if you don't think about it. Managed security: 24x7 detection and response. We detect and respond immediately to attacks. Recommendations can be specific and data-driven. Transparent cybersecurity. No more MSSPs. No "internal analysts console." No curtain to hide behind. No more wondering. Full visibility. You can see and use the exact same interface that our analysts use. You can see how we make critical decisions in real time. You can watch the investigations unfold. We'll provide you with clear English answers when we spot an attack. You can see exactly what our analysts do, even while an investigation is underway. You can choose your security tech. We make it more efficient. Resilience recommendations can significantly improve your security. Our analysts make specific recommendations based upon data from your environment and past trends.
  • 11
    AT&T Managed Threat Detection and Response Reviews
    AT&T Managed Threat Detection and Response ensures your organization’s safety through continuous security monitoring, leveraging the expertise of AT&T Cybersecurity and our award-winning USM platform alongside AT&T Alien Labs™ for advanced threat intelligence. With round-the-clock proactive monitoring and investigation provided by the AT&T Security Operations Center (SOC), our skilled analysts utilize years of managed security experience to safeguard your business from sophisticated threats at all hours. The Unified Security Management (USM) platform combines various security functionalities into a single, cohesive system, surpassing other Managed Detection and Response (MDR) offerings by delivering centralized visibility across your cloud environments, networks, and endpoints. This approach not only facilitates early and effective threat detection but also ensures a swift response time. Enhanced by the unmatched visibility of the AT&T IP backbone and a global network of USM sensors, AT&T Alien Labs continuously supplies tactical threat intelligence to the USM platform, ensuring your organization remains vigilant against evolving risks. As cyber threats become increasingly sophisticated, having access to such comprehensive intelligence is vital in maintaining your organization’s security posture.
  • 12
    GoSecure Reviews
    Organizations looking to stay above the crowd, stop reacting and be in control. Companies looking to enter the continuous improvement process and optimize their investments. Through GoSecure Titan®'s Managed Security Services (which includes our Managed Extended Detection & Response (MXDR) Service) and our Professional Security Services, we are your ally to prevent breaches.
  • 13
    Nexpose Reviews
    Vulnerability management tools are essential for responding effectively at the moment a threat arises. With new vulnerabilities emerging daily, it's crucial to have ongoing intelligence that enables you to identify, locate, and prioritize these risks for your organization while ensuring that your exposure is minimized. Nexpose, the on-premises solution from Rapid7, provides real-time monitoring of vulnerabilities and continuously updates its data to adapt to the latest threats, allowing for immediate action when necessary. For those seeking enhanced features like Remediation Workflow or the universal Insight Agent, InsightVM offers a robust platform for vulnerability management. How current is your information? Is it outdated by days or even weeks? With Nexpose, you can rest assured that you're working with data that is never more than a few seconds old, delivering a dynamic view of your ever-evolving network landscape. This immediacy not only enhances your response capabilities but also strengthens your overall security posture.
  • 14
    AT&T Cybersecurity Reviews
    AT&T Cybersecurity, recognized as one of the largest Managed Security Services Providers (MSSP) globally, offers comprehensive solutions to protect digital assets, empowering organizations to confidently identify cyber threats and minimize their impact on business operations while enhancing the efficiency of cybersecurity practices. Safeguard your endpoints against sophisticated and omnipresent cyber threats, enabling rapid detection and response at machine speed, while also proactively hunting for threats before they can take action. With instant capabilities for threat prevention, detection, and response, your devices, users, and overall business are kept secure. Automatically eliminate harmful processes, isolate and quarantine infected devices, and revert events to maintain endpoints in a consistently clean state. The logic and analysis are conducted via the endpoint agent rather than relying on cloud resources, ensuring real-time protection, even when offline. Alerts are automatically categorized into patented storylines, equipping analysts with immediate actionable insights while reducing their workload. This innovative approach not only enhances security but also streamlines operations, allowing businesses to focus on their core functions.
  • 15
    Azure Front Door Reviews
    Create a reliable and scalable gateway for the swift deployment of your applications worldwide. Seamlessly integrate your dispersed microservices into a unified global application through the use of HTTP load balancing and path-based routing configurations. Streamline the process of launching new regions and scaling operations with API-driven global actions, while ensuring independent fault tolerance for your backend microservices, whether they reside in Azure or elsewhere. Deliver and safeguard your global application near your end users with a robust service supported by Microsoft’s esteemed Global Network infrastructure. Consistently optimize your traffic flow to ensure the most efficient route to your application, enhance service capacity, minimize latency, and boost throughput for users around the globe utilizing edge load balancing and application acceleration techniques. Furthermore, effortlessly oversee domain mapping and manage traffic to your microservice backends through a singular, centralized global dashboard, allowing for greater control and visibility over your distributed architecture. This streamlined approach not only improves performance but also enhances the overall user experience across various regions.
  • 16
    DDoS-GUARD Reviews

    DDoS-GUARD

    DDoS-GUARD

    $30/month
    DDoS-GUARD has been a leader in the DDoS protection and content delivery market since 2011. We offer services using our own network, which includes scrubbing centers with sufficient computing and channel capacity to process large volumes of traffic. This is a departure from most other companies. We don't resell services from other companies and claim them as our own. Cyber threats are increasing in today's digital world. The number of DDoS attacks is also increasing in line with the latest trends. The attacks become more complex, volumetric, and diverse. We are constantly changing traffic scrubbing algorithms, increasing channel capacities, and adding computational resources to traffic processing centres. This allows us to not only protect our customers from all known DDoS attacks but also detect and block any anomalous network activity that was previously unknown.
  • 17
    EfficientIP DNS Blast Reviews
    The rapid escalation in the scale, frequency, and complexity of volumetric DNS attacks is significantly driven by the widespread use of unsecured IoT devices, along with trends like mobility and BYOD. Hackers are increasingly targeting DNS services, particularly for layer 7 DDoS attacks, making it one of the most vulnerable application layers. Although many organizations recognize the security threats posed by DDoS attacks, a substantial number have yet to implement modern DNS DDoS protection measures, often relying on outdated enterprise network security solutions like firewalls that are ill-suited for the DNS protocol. It is crucial for companies to adopt innovative DDoS mitigation strategies to address these evolving threats effectively. To ensure robust business continuity, safeguard data confidentiality, and enhance user experience, organizations must invest in specialized DNS protection solutions that offer both high performance and advanced analytics, thereby achieving the security standards their businesses require and deserve.
  • 18
    Prolexic Routed Reviews
    DDoS attacks can vary significantly in scale, from minor and intricate to substantial, overwhelming traffic surges. The financial implications of unplanned outages are severe, necessitating rapid and efficient DDoS defense solutions. Prolexic Routed offers comprehensive, managed DDoS protection tailored for online enterprises. Supported by a top-tier service level agreement (SLA), Prolexic merges anticipatory mitigation strategies with Akamai’s renowned security operations center (SOC) to combat current and future threats. By mitigating DDoS attacks in the cloud, Prolexic Routed establishes a proactive defense that can neutralize even the most formidable assaults while filtering out malicious traffic before it impacts your applications and data centers. With both on-demand and continuous options available, you can effectively manage your mitigation strategy. Furthermore, the proactive controls are engineered to thwart attacks immediately at the network's edge, delivering the quickest and most efficient response available in the market today, ensuring your business remains secure. This combination of technology and expertise positions Prolexic Routed as a leader in the defense against DDoS threats.
  • 19
    Bekchy Reviews

    Bekchy

    Bekchy

    $9.99 per month
    Safeguarding websites, the system operates in front of web application servers, establishing firewalls to thwart incoming threats. Ensure Your Website's Security. Available 24/7, it defends against various attack vectors such as SQL Injection, XSS, File Upload, JS Injection, Tamper Data, and more. With instant reporting and straightforward management, users can easily navigate the BEKCHY Panel from their computer, tablet, or smartphone to monitor the status of their website. It secures all input fields—including login, password recovery, and coupon codes—through its Smart Brute Force protection. Additionally, it guards against single-use emails, blacklisted IP addresses, fraudulent redirects, and all forms of deceit. Utilizing 67 distinct antivirus solutions, Bekchy identifies malicious code that may have been injected into the site. This comprehensive protection also guards against any attempts to mislead visitors and search engine crawlers. Thanks to its user-friendly design, accessing the BEKCHY Panel is seamless across various devices, ensuring that users remain informed and in control of their website's security.
  • 20
    F5 BIG-IP DDoS Hybrid Defender Reviews
    Ensure your network is safeguarded against DDoS threats at both the network and application layers with a solution that offers flexibility and scalability suitable for inline, out-of-band, and hybrid configurations. Conventional DDoS mitigation strategies tend to address only a limited array of attack vectors, which leads to several shortcomings: methods like black-holing or rate-limiting often hinder legitimate users during network layer (or flood) attacks. Additionally, these solutions fail to recognize SSL traffic and are susceptible to their positioning within the network during application layer onslaughts. On-premises protective measures become ineffective when WAN bandwidth saturation disrupts Internet access. Thankfully, the F5 BIG-IP DDoS Hybrid Defender delivers a more robust defense mechanism. It stands out as the sole multi-layered protection that effectively counters combined network and sophisticated application attacks while offering complete SSL decryption, anti-bot functionalities, and advanced detection techniques, all integrated into a single appliance. This comprehensive approach ensures not only enhanced security but also seamless user experiences even amidst evolving threat landscapes.
  • 21
    F5 Distributed Cloud DDoS Mitigation Service Reviews
    Cloud-based DDoS protection provides a powerful solution that identifies and neutralizes attacks prior to impacting your network infrastructure. In these unpredictable times, it's essential to ensure your organization remains secure with this proactive defense that intercepts threats before they can reach you. The F5 Distributed Cloud DDoS Mitigation Service offers a comprehensive, managed protection option that addresses large-scale, SSL, or application-specific assaults in real time, safeguarding your business from attacks that can surpass even hundreds of gigabits per second. Additionally, the F5 Security Operations Center (SOC) stands ready to defend your enterprise, constantly monitoring and responding to potential threats to maintain your security. With such robust measures in place, you can focus on your core business activities without the looming fear of cyber disruptions.
  • 22
    Azure DDoS Reviews

    Azure DDoS

    Microsoft

    $2,944 per month
    Distributed denial of service (DDoS) attacks present significant challenges regarding availability and security for customers transitioning their applications to cloud platforms. These attacks aim to overwhelm an application's resources, rendering it inaccessible to genuine users. Any endpoint that is publicly accessible via the internet can be subjected to a DDoS attack. Fortunately, every asset within Azure benefits from Azure's infrastructure DDoS (Basic) Protection at no extra cost. The vast scale and capability of Azure's globally distributed network offer robust defense mechanisms against prevalent network-layer attacks, utilizing continuous traffic monitoring and immediate mitigation strategies. Importantly, DDoS Protection Basic does not necessitate user configuration or alterations to the application. This level of protection extends to all Azure services, including platform-as-a-service (PaaS) offerings like Azure DNS, ensuring comprehensive security across the board. Moreover, businesses can operate with increased confidence, knowing that their services are safeguarded against these disruptive threats.
  • 23
    CodeGuard Reviews

    CodeGuard

    CodeGuard

    $39 per month
    Discover the ultimate solution for safeguarding your website with our top-tier backup service that meticulously monitors all changes on a daily basis. CodeGuard not only offers rapid and dependable website backup options but also scales seamlessly alongside your business and your clients' requirements. By utilizing CodeGuard, you can ensure your clients enjoy peace of mind through regular backups and comprehensive website maintenance. With features such as Malware Monitoring & Remediation, easy enterprise-grade backups, a white-label interface, customizable billing, and client access, we provide an all-in-one management solution for WordPress. Partner with us to deliver the robust security of CodeGuard backup solutions to your clientele, simplifying the complexities of website management while enhancing the security of their online presence. Our MalwareGone feature proactively eliminates malware from your site without delay, ensuring you remain unaware of any threats until they are resolved. Furthermore, we handle automatic updates for your plugins, and in the rare event of a malfunction, we'll revert to the previous version for you. Say goodbye to the headaches of challenging website migrations and transfers, as we streamline the entire process for you!
  • 24
    Qualys WAF Reviews
    Qualys Web Application Firewall (WAF) is a service based on virtual appliances designed to streamline application security while minimizing operational costs and complexity. Utilizing a cohesive platform, it consistently identifies threats using proprietary inspection logic and rulesets, and can provide virtual patches for web application vulnerabilities as necessary. Its straightforward, scalable, and flexible methodology enables rapid blocking of web application attacks, safeguarding sensitive information from exposure, and regulating access to your applications. Qualys WAF can function independently or in conjunction with Qualys Web Application Scanning (WAS), which enhances the process of discovering and addressing web application vulnerabilities efficiently, regardless of whether you manage a few applications or many. By employing Qualys WAS for scanning and enabling one-click virtual patches for any identified vulnerabilities in the WAF, users can oversee everything from a centralized cloud portal, ensuring seamless management. Moreover, the deployment of Qualys WAF can be completed in just minutes, and it offers support for SSL/TLS, further enhancing its security capabilities. This combination of features makes it a robust solution for protecting web applications in today’s ever-evolving threat landscape.
  • 25
    Sangfor Athena NGFW Reviews
    Sangfor Athena NGFW is an advanced next-generation firewall designed to deliver robust, AI-driven security across network perimeters. Utilizing cloud-based AI malware inspection, it blocks over 99% of threats, combining network and web application firewalls in a single, unified device. The built-in SOC Lite module enables swift threat detection and incident response, enhancing organizational cybersecurity posture. Athena NGFW integrates seamlessly with a broader security ecosystem including endpoint protection (EPP), secure web gateways (SWG), and extended detection and response (XDR and MDR) platforms. The firewall has earned top industry accolades, such as AAA ratings in CyberRatings tests and recognition in Gartner’s Magic Quadrant. It provides cost-effective, scalable protection ideal for enterprise environments facing evolving cyber threats. Sangfor’s collaboration with global threat intelligence platforms keeps its defenses up to date against emerging vulnerabilities. This solution empowers organizations to maintain secure, high-performing networks with comprehensive visibility and control.