Best Cloud Compliance Software in China

Find and compare the best Cloud Compliance software in China in 2025

Use the comparison tool below to compare the top Cloud Compliance software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    nOps Reviews

    nOps

    nOps.io

    $99 per month
    FinOps on nOps We only charge for what we save. Most organizations don’t have the resources to focus on reducing cloud spend. nOps is your ML-powered FinOps team. nOps reduces cloud waste, helps you run workloads on spot instances, automatically manages reservations, and helps optimize your containers. Everything is automated and data-driven.
  • 2
    Uptycs Reviews
    Uptycs presents the first unified CNAPP and XDR platform that enables businesses to take control of their cybersecurity. Uptycs empowers security teams with real-time decision-making driven by structured telemetry and powerful analytics. The platform is designed to provide a unified view of cloud and endpoint telemetry from a common solution, and ultimately arm modern defenders with the insights they need across their cloud-native attack surfaces. Uptycs prioritizes responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates across modern attack surfaces—all from a single UI and data model. This includes the ability to tie together threat activity as it traverses on-prem and cloud boundaries, delivering a more cohesive enterprise-wide security posture. With Uptycs you get a wide range of functionality, including CNAPP, CWPP, CSPM, KSPM, CIEM, CDR, and XDR. Shift up with Uptycs.
  • 3
    Akku Reviews

    Akku

    CloudNow Technologies

    $5.00/year/user
    Simplified user lifecycle for corporate users. Akku is a flexible, robust identity and access management system that can help you manage each stage of your user lifecycle. Akku's versatile features help improve data security, standards compliance and efficiency, as well as productivity. Akku is a cloud SSO solution that integrates easily with any cloud or in-house applications. It also includes a range security and access control features that allow for seamless user provisioning, management, access control, and deprovisioning. Akku is an agentless IAM solution that does not require the installation of a user agent on your infrastructure. You can see exactly which parts of your sensitive user data Akku can access so you have transparency and control.
  • 4
    Runecast  Reviews

    Runecast

    Runecast Solutions

    Runecast is an enterprise IT platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. Your team can do more with less via a single platform that checks all your cloud infrastructure, for increased visibility, security, and time-saving. Security teams benefit from simplified vulnerability management and regulatory compliance, across multiple standards and technologies. Operations teams are able to reduce operational overheads and increase clarity, enabling you to be proactive and return to the valuable work you want to be doing.
  • 5
    Lacework Reviews
    Data and automation can be used to protect multi-cloud environments, prioritize risks with pinpoint accuracy, innovate with confidence, and identify and manage risk. Secure your code from the beginning to enable faster innovation. You can gain valuable security insights and build apps faster and more confidently. Our platform uses patented machine learning and behavioral analysis to automatically detect abnormal behavior and determine what is normal in your environment. 360o visibility shows you the entire environment, detecting vulnerabilities and unusual activity. Unmatched fidelity is achieved through data and analytics. Automatedly identify the most important information and eliminate unnecessary alerts. Monolithic rules are no longer necessary with an adaptive platform that is constantly learning.
  • 6
    Riva CRM Integration Reviews

    Riva CRM Integration

    Riva International

    $25/month/user
    As the missing piece that connects Salesforce to Outlook (and other communications stacks like GSuite) Riva delivers curated customer data to your teams where and when it's needed—informing AI, creating reliable insights, and ensuring relevant engagement. We enable seamless data flow between applications such as email, calendar, contacts, tasks, and CRM. This synchronizes relationship data and eliminates the need to switch between applications, data entry duplication, and application toggling. Our intelligent sync gives you real-time access and meaningful details so that every customer interaction is important. Smarter exchanges lead to greater efficiency, shorter sales cycles and better relationships. Our unbroken streak of over 1100 successful security reviews demonstrates our commitment to protecting our clients' reputations as well as their customers' privacy. Riva solutions exceed regulatory compliance and security standards. We live in our inboxes and calendars at work. These applications collect information about the relationships that are key to business success. Everyone loses when data about customer expectations and needs is lost.
  • 7
    Securiti Reviews
    Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized as Gartner "Cool Vendor in Data Security", Forrester "Privacy Management Wave Leader", and RSA "Most Innovative Startup".
  • 8
    VGS Platform Reviews

    VGS Platform

    Very Good Security

    The VGS Vault allows users to securely store their tokenized data. This secures your most sensitive data. There is nothing to be stolen in the event of a breach. It's impossible to hack what isn't there. VGS is the modern approach in data security. Our SaaS solution allows you to interact with sensitive and regulated data while avoiding the responsibility of protecting it. You can see the interactive example of how VGS transforms data. You can choose to hide or show data by choosing Reveal or Redact. VGS can help you, whether you're a startup looking for best-in-class security or an established company seeking to eliminate compliance as a barrier to new business. VGS assumes the responsibility of protecting your data, eliminating any risk of data breaches, and reducing compliance overhead. VGS layers protection on the systems for companies that prefer to vault their data. This prevents unauthorized access and leakage.
  • 9
    Tenable Cloud Security Reviews
    The cloud security platform that is actionable. Reduce risk by quickly exposing and closing security gaps caused by misconfigurations. CNAPP solutions replace a patchwork product that can cause more problems than it solves, such as false positives or excessive alerts. These products are often only partially covered and create friction and overhead with the products that they're meant to work with. CNAPPs are the best way to monitor cloud native applications. They allow businesses to monitor cloud infrastructure and application security as a group, rather than monitoring each one individually.
  • 10
    Tenacity Reviews

    Tenacity

    Tenacity

    $100 per month
    Tenacity is a cloud security posture management platform (CSPM) that is easy to implement and use. A secure cloud is built on visibility. A consolidated view of all assets and services across all your cloud accounts and subscriptions. You can avoid costly cloud breaches by prioritizing cloud misconfigurations. Your unique business context will allow you to perform detailed spending analysis and devise cost-saving strategies. Tenacity's CTRL can take your cloud environment to the next step. From cost recommendations and forecasts, to manifest visualization, robust compliance checks across all levels, and deep cross-provider governance, Tenacity's CTRL can help you take your cloud environment to the next level. Tenacity is a public cloud that allows companies to thrive. It protects every budget and security profile, without limiting growth. Tenacity was designed for companies that move quickly. Our platform is easy to implement and manage without the need for dedicated staff.
  • 11
    IBM Cloud Activity Tracker Reviews

    IBM Cloud Activity Tracker

    IBM

    $1.725 per GB per month
    IBM Cloud Activity Tracker allows you to record your IBM Cloud activities. Hosted event search offers a way to search for activity events and alert you about them. Financial Services Validated Users should visit the About tab to find out more. IBM Cloud Activity Tracker provides a source for activity events within IBM Cloud. Activity events are records that record API calls to IBM Cloud services. They provide evidence to support compliance with corporate policies and specific regulations. Cloud activity events can be used to detect security issues and problems with application performance. IBM Cloud Activity Tracker provides ready-to-run event searches to simplify configuration and speed up your time to gain greater insight.
  • 12
    SafeBase Reviews

    SafeBase

    SafeBase

    $100 per month
    Easy way to share your security program. Smart trust center simplifies compliance and security reviews. Reduce time spent on questionnaires, NDAs, and other administrative tasks by 90% Display completed questionnaires that meet most needs. Fill out custom questionnaires faster. Automate NDA signing and streamline approvals Increase your security knowledge and reduce the number of repetitive questions. Instant access to security information for sales or CS. You can search your database and get click-to-copy answers. You can easily update your public trust centre. Increase sales cycle speed by 7 days Impress potential customers right away. Accounts can now easily procure products. Your security page can help you get new leads. You can save time for buyers, security and sales. Customers can access their information via self-service. You will have fewer tasks. Reports, requests and much less manual work. You will save time and build better customer relationships.
  • 13
    Sprinto Reviews
    You can replace the slow, laborious, and error-prone process of obtaining SOC 2, ISO 27001 and GDPR compliance with a quick, hassle-free and tech-enabled experience. Sprinto is not like other compliance programs. It was specifically designed for cloud-hosted businesses. Different types of companies have different requirements for SOC 2, ISO 27001 and HIPAA. Generic compliance programs can lead to more compliance debt and less security. Sprinto is designed to meet the needs of cloud-hosted companies. Sprinto is not just a SaaS platform, but also comes with compliance and security expertise. Live sessions with compliance experts will help you. Designed specifically for you. No compliance cruft. Well-structured, 14-session implementation program. The head of engineering will feel more confident and in control. 100% compliance coverage. Sprinto does not share any evidence. All other requirements, including policies and integrations, can be automated to ensure compliance.
  • 14
    Check Point Security Compliance Reviews
    A dynamic security compliance solution monitors your security infrastructure, gateways and blades, policies and configuration settings in real time to increase security. You can monitor policy changes in real time, and receive instant alerts and remediation tips. Detects bad configurations against 300+ Check Point security best practice. Transforms thousands of complex regulatory requirements into actionable security practices. It is easy to get started with security compliance. SmartEvent can be activated for enhanced reporting capabilities. You can view your security status based on security best practices and regulatory standards in one pane. Do you have your own best practice? You can create your own security compliance. You can fine-tune and monitor what you want. You can easily optimize your security best practice.
  • 15
    Boman.ai Reviews
    Boman.ai is easy to integrate into your CI/CD pipeline. It only requires a few commands and minimal configuration. No planning or expertise required. Boman.ai combines SAST, DAST and SCA scans into one integration. It can support multiple development languages. Boman.ai reduces your application security costs by using open-source scanners. You don't have to purchase expensive application security tools. Boman.ai uses AI/ML to remove false positives, correlate results and help you prioritize and fix. The SaaS platform provides a dashboard that displays all scan results at one time. Correlate results and gain insights to improve application security. Manage vulnerabilities reported by scanner. The platform helps prioritize, triage and remediate vulnerabilities.
  • 16
    Stream Security Reviews

    Stream Security

    Stream Security

    $8,000 per year
    Stay ahead of threat actors and exposure risks with real-time detection and automated threat investigation of all postures and activities. Track all changes and detect toxic exposures and combinations before attackers. AI can be used to address and fix problems using your preferred methods. Use any of your favorite SOAR tools or our code snippets to respond in real-time. Focus on the risks that can be exploited. Harden and prevent external movement & exposure risks. Detect toxic postures and vulnerabilities. Detect gaps in segmentation intentions and implement zero-trust. Answer any cloud question quickly with context. Maintain compliance and prevent deviations from taking root. We integrate with existing investments. We can provide more information about our security policies, and we can work with your security team to meet any specific requirements that your organization may have.
  • 17
    Microsoft Purview Compliance Manager Reviews
    Discover new capabilities to transform the way you secure data in your organization across devices, clouds, and platforms. Compliance Manager helps you meet multi-cloud compliance standards and regulations across global, industrial or regional regulations. Get complete compliance management capabilities, including easy onboarding, workflow, control implementation and evidence cataloging. Reduce compliance risks by using in-product features such as compliance score and control mapping. Versioning and continuous control assessments can also be used. Choose from more than 320 customizable and ready-to-use regulatory assessment templates to help meet multicloud compliance requirements for Microsoft 365 products or services. As the Compliance Manager scans your environment, it will automatically credit technical controls.
  • 18
    AWS Audit Manager Reviews

    AWS Audit Manager

    Amazon

    $1.25 per assessment
    Map your AWS use and controls using prebuilt and customized frameworks. Save time by automating evidence collection and focusing on confirming your controls are working properly. With read-only permissions, you can streamline collaboration between teams and ensure the integrity your audits. AWS Audit Manager allows you to map compliance requirements with AWS usage data using pre-built and customized frameworks, and automate evidence collection. The transition from manual evidence collection to automated evidence. Automated evidence collection eliminates the need to collect and manage evidence. Automated evidence collection, monitoring your compliance posture and proactively reducing risk by fine-tuning controls. Upload manual evidence to your hybrid environment. AWS Audit Manager simplifies the assessment of risk and compliance by helping you to continuously audit your AWS use. The Audit Manager will perform resource assessments when you define and launch a assessment based on a framework.
  • 19
    Compaas Reviews

    Compaas

    Compaas

    $900.00/year
    Compaas allows you to track activity and create policies for all files, regardless of where they are stored. It can be difficult to identify who has access corporate data. Compaas ensures that your files are protected against malicious activity, employee negligence, or the unknow. Filter events to examine user and file activity. You can create custom policies to restrict specific activities, such as sharing outside the organization or exposing CC & SSN data. You will receive real-time notifications when a threat is detected, or compliance is breached. To ensure compliance and protection, you should continue to monitor your data with Companies. Hackers are not as dangerous as your employees. Protect your cloud data from employee negligence
  • 20
    Cloud Raxak Reviews
    Businesses want to take advantage the flexibility, scalability and speed of cloud computing. Lack of automated and proactive cloud management processes can cause problems such as higher costs, higher residual risks, and impediment to DevOps. Cloud Raxak helps businesses transform their cloud environments with consistency and compliance. This allows them to reduce risk, time and costs. Raxak Protect, a SaaS-based security solution, empowers IT and application developers by simplifying and automating security compliance across private clouds and public clouds. Creating edge security profiles based upon industry and government standards (CIS, DISA & NISTSTIGs, PCI–DSS, HIPAA. FFIEC, FISMA. etc. Cloud apps can be deployed quickly, efficiently, and without human error through automatic integration and application security profiles.
  • 21
    Sysdig Secure Reviews
    Kubernetes, cloud, and container security that closes loop from source to finish Find vulnerabilities and prioritize them; detect and respond appropriately to threats and anomalies; manage configurations, permissions and compliance. All activity across cloud, containers, and hosts can be viewed. Runtime intelligence can be used to prioritize security alerts, and eliminate guesswork. Guided remediation using a simple pull request at source can reduce time to resolution. Any activity in any app or service, by any user, across clouds, containers and hosts, can be viewed. Risk Spotlight can reduce vulnerability noise by up 95% with runtime context. ToDo allows you to prioritize the security issues that are most urgent. Map production misconfigurations and excessive privileges to infrastructure as code (IaC), manifest. A guided remediation workflow opens a pull request directly at source.
  • 22
    AlienVault USM Reviews
    AlienVault®, Unified Security Management®, (USM), is used by hundreds of MSSPs around the world to create successful managed security and compliance services. AlienVault USM provides multiple security capabilities and continuously updated threat intelligence in one platform. It allows MSSPs to centralize threat detection, incident response and compliance management across both cloud and on-premises environments. AlienVault USM was designed to meet the needs of today's dynamic MSSP market. It is highly scalable and cost-effective and easy to deploy and maintain. It allows MSSPs to quickly grow their managed security service offerings to meet customer security goals and minimize their risk and expense.
  • 23
    Aqua Reviews

    Aqua

    Aqua Security

    Full lifecycle security for container and serverless applications. This includes everything from your CI/CD pipeline through to runtime production environments. Aqua can run on-prem and in the cloud at any scale. You can prevent them from happening, and stop them once they do. Aqua Security's Team Nautilus is focused on identifying new threats and attacks that target cloud native stack. We are constantly researching cloud threats and developing tools to help organizations stop them. Aqua protects applications from production to development, across VMs and containers, as well as serverless workloads up and down the stack. With security automation, you can release and update software at DevOps speeds. Detect and fix vulnerabilities early, and let them go. Protect cloud native apps by minimizing their attack surface and detecting vulnerabilities, embedded secrets, or other security issues throughout the development cycle.
  • 24
    Apptega Reviews
    Secure compliance and cybersecurity are simplified with the platform that is highly rated by customers.
  • 25
    Flexera One Reviews
    Software as a Service (SaaS), one of the fastest-growing areas of cloud computing, is in some cases expected to outpace infrastructure and platform services. Gartner projects strong growth in SaaS technologies to reach revenue figures of $85billion by 2019. This growth is 17.8 percent higher than previous years and accounts to a large portion of the public cloud revenues that will reach $278 billion in 2021. Despite the rapid adoption of SaaS, most enterprise IT departments do not know what SaaS applications are running in their environments and how they are being used. It's high time to get a grip on your SaaS usage. Flexera's software spend optimization solutions have helped clients save hundreds of millions of dollar. Now we're bringing that expertise into the rapidly-growing SaaS market.