Best Cyber Risk Management Software in China

Find and compare the best Cyber Risk Management software in China in 2025

Use the comparison tool below to compare the top Cyber Risk Management software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    UpGuard Reviews

    UpGuard

    UpGuard

    $5,249 per year
    The new standard for third-party risk management and attack surface management. UpGuard is the best platform to protect your organization's sensitive information. Our security rating engine monitors millions upon millions of companies and billions upon billions of data points each day. Monitor your vendors and automate security questionnaires to reduce third- and fourth-party risk. Monitor your attack surface, detect leaked credentials, and protect customer information. UpGuard analysts can help you scale your third-party risk management program and monitor your organization and vendors for potential data leaks. UpGuard creates the most flexible and powerful tools for cybersecurity. UpGuard's platform is unmatched in its ability to protect your most sensitive data. Many of the most data-conscious companies in the world are growing faster and more securely.
  • 2
    NopSec Reviews
    Cyber defenders can now manage the complex processes that make cyber exposure impossible to manage. NopSec's platform provides cyber defenders with an end-to-end way to bring these processes together. It allows them to identify, prioritize, remediate and simulate cyber exposures and then report them. You can't protect what's in your environment if you don't know. To manage cyber risk, adaptive cyber management requires complete visibility of your IT assets. Nopsec helps you avoid potential blind spots caused by unmanaged cyber risk and cyber exposures.
  • 3
    TraceCSO Reviews
    Our TraceCSO software provides a GRC platform for compliance and cybersecurity solutions. Our services are the best way to ensure cybersecurity compliance and compliance via third party review on an annual basis. They are also the perfect starting point for TraceCSO software. TraceCSO has a number of modules that can be combined to give you a complete picture of your cybersecurity environment.
  • 4
    Centraleyezer Reviews

    Centraleyezer

    Sandline

    $599 per month
    Integrates and correlates vulnerability scanner data and multiple exploit feeds with business and IT factors to prioritize cyber security risk. Red Teams, CISOs, and Vulnerability Assessment Teams can reduce time-to fix, prioritize, and report risks. This tool is used by Governments, Military and E-Commerce businesses.
  • 5
    Armis Reviews

    Armis

    Armis Security

    Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California.
  • 6
    Infocyte Reviews
    Security teams can use the Infocyte Managed Response Platform to detect and respond to cyber threats and vulnerabilities within their network. This platform is available for physical, virtual and serverless assets. Our MDR platform offers asset and application discovery, automated threats hunting, and incident response capabilities on-demand. These proactive cyber security measures help organizations reduce attacker dwell time, reduce overall risk, maintain compliance, and streamline security operations.
  • 7
    SD Elements Reviews
    Today, Security Compass is a pioneer in application security that enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows. To better understand the benefits, costs, and risks associated with an investment in SD Elements, Security Compass commissioned Forrester Consulting to interview four decision-makers with direct experience using the platform. Forrester aggregated the interviewees’ experiences for this study and combined the results into a single composite organization. The decision-maker interviews and financial analysis found that a composite organization experiences benefits of $2.86 million over three years versus costs of $663,000, adding up to a net present value (NPV) of $2.20 million and an ROI of 332%. Security Compass is the trusted solution provider to leading financial and technology organizations, the US Department of Defense, government agencies, and renowned global brands across multiple industries.
  • 8
    Titania Nipper Reviews
    Nipper, our network configuration audit tool and firewall software, helps you manage your network risks. Nipper automatically prioritizes risks for your organization by identifying vulnerabilities in routers, switches, and firewalls. Virtual modelling reduces false positives, and identifies the exact solutions to keep you secure. Nipper allows you to spend your time analyzing false positives and non-compliance. It gives you visibility of network vulnerabilities, significantly fewer false negatives to investigate, automated risk prioritization and precise remediation.
  • 9
    SecurityHQ Reviews
    SecurityHQ is a Global Managed Security Service Provider (MSSP) that detects & responds to threats 24/7. Gain access to an army of analysts, 24/7, 365 days a year. Receive tailored advice and full visibility to ensure peace of mind, with our Global Security Operation Centres. Utilize our award-winning security solutions, knowledge, people, and process capabilities, to accelerate business and reduce risk and overall security costs.
  • 10
    Emgage Reviews

    Emgage

    Emgage

    $0.00945 per month per unit
    The perfect business software at a fraction of the cost and speed of pre-made software. You can deploy and build any software you need in a fraction the time and cost, regardless of whether you are a business professional or technology professional. Emgage Application Platform offers a complete managed collection of services that can be used to power almost any functionality you can think of. Emgage Application Platform is the foundation of our applications. It is a solid and integrated collection of technologies that allows you to build and expand your applications while remaining anchored to a common platform. You can use your data and content wherever it is stored. Connect hundreds of data sources to build a rich data infrastructure.
  • 11
    Phylum Reviews
    Phylum defends applications at the perimeter of the open-source ecosystem and the tools used to build software. Its automated analysis engine scans third-party code as soon as it’s published into the open-source ecosystem to vet software packages, identify risks, inform users and block attacks. Think of Phylum like a firewall for open-source code. Phylum can be deployed in front of artifact repository managers, integrate directly with package managers or be deployed in CI/CD pipelines. Phylum users benefit from its powerful, automated analysis engine that reports proprietary findings instead of relying on manually curated lists. Phylum uses SAST, heuristics, machine learning and artificial intelligence to detect and report zero-day findings. Users know more risks, sooner and earlier in the development lifecycle for the strongest software supply chain defense. The Phylum policy library allows users to toggle on the blocking of critical vulnerabilities, attacks like typosquats, obfuscated code and dependency confusion, copyleft licenses, and more. Additionally, the flexibility of OPA enables customers to develop incredibly flexible and granular policies that fit their unique needs.
  • 12
    GRCLens Reviews
    GRCLens can be used on-premise or cloud-based. It is fully developed and scalable to meet current and future risk management requirements.
  • 13
    Zercurity Reviews

    Zercurity

    Zercurity

    $15.01 per month
    Zercurity can help you set up and manage your cybersecurity strategy. You can reduce the time and effort required to monitor, manage, integrate, and navigate your organization through the various cybersecurity disciplines. Get clear data points that you can actually use. Get a quick overview of your current IT infrastructure. Automatically, assets, packages, devices, and applications are analyzed. Our sophisticated algorithms will run queries on your assets and find them. Alerts you in real time to anomalies and vulnerabilities. Expose potential threats to your company. Eliminate the risk. Automated reporting and auditing reduces remediation time and supports handling. Unified security monitoring across your entire organization. You can query your infrastructure like a database. Instant answers to your most difficult questions. Real-time risk assessment. Stop guessing about cybersecurity risks. Get deep insight into every aspect of your company.
  • 14
    Kovrr Reviews
    Quantum is a platform for cyber risk quantification (CRQ). It offers a range of new functionality and services that will allow your business to translate cyber risk into business impact. Quantum was created to assist Chief Risk Officers, CISOs and boards in taking control. Quantum allows them to assess the effectiveness of a cybersecurity programme, determine the potential risk reductions for future cybersecurity investments, as well as formulate a solid risk transfer strategy.
  • 15
    TraceSecurity Reviews

    TraceSecurity

    TraceSecurity

    Free
    The Cybersecurity Assessment Tool (CSAT), is a great tool to assess your organization's cybersecurity posture. Once you have your results, you can identify your next steps and create a roadmap for improving your defense against malicious attackers. Our tool meets the requirements for the Automated Cybersecurity Examination Tool. It can run both our standard report as well as the NCUA ACET report from one place. Our cybersecurity assessment tool provides a step-by–step process to evaluate your organization's cybersecurity preparedness. It is based on NIST's cybersecurity framework and allows you to perform a self assessment to determine your preparedness. The tool also provides detailed reporting along with recommendations to strengthen cybersecurity. You can use our CSAT to determine the cybersecurity maturity level of your organization based on its size and complexity.
  • 16
    RealCISO Reviews

    RealCISO

    RealCISO

    $49.99 per month
    Manage cyber risk and compliance with ease. You can assess, report, and remediate security gaps in a matter of days, rather than months, so that you can focus on your core business initiatives. RealCISO assessments use common compliance frameworks such as SOC2, NIST Cybersecurity Framework, NIST 800-171, HIPAA Security Rules, and Critical Security Controls. You will answer simple questions about your organization's people, processes, and technologies. You will also receive actionable instructions on current vulnerabilities and recommendations on tools to resolve them. Most organizations want to improve their security posture but are unsure how to achieve this. Technology is changing rapidly. Best practices are changing. Standards in the industry are changing. Without a trusted guide to reduce cyber risk and maintain compliance, it can be a constant battle.
  • 17
    HighGround.io Reviews

    HighGround.io

    HighGround.io

    $95 per month
    HighGround.io improves security, reduces risk and increases cyber resilience. Cybersecurity can seem overwhelming, especially if you are tasked with protecting a company without being a cybersecurity expert. HighGround.io removes the uncertainty and complexity by providing clear and user-friendly metrics along with actionable insight to help users understand their security posture and attack surfaces. HighGround.io simplifies your journey by addressing challenges such as tool exhaustion and resource constraints. It also offers a one-size fits all solution. You can use all or some of the features, with in-app guidance or DIY. Everything is conveniently located in one place. HighGround.io understands your challenges and simplifies your mission.
  • 18
    Tenable Lumin Reviews
    Tenable Lumin allows you to quickly and accurately assess your risk. Compare your health and remediation to other Tenable users in your Salesforce industry or the wider population. Tenable Lumin correlates raw data on vulnerabilities with asset business-criticality and threat context data to support faster and more targeted analysis workflows compared to traditional vulnerability management tools. Cyber risk scoring and advanced risk-based analysis are based on a combination of asset criticality, threat data and vulnerability. It provides clear guidance on how to prioritize remediation efforts. Get insights from a single, comprehensive overview of your entire attack surface, including traditional IT, public clouds, web apps and containers, IoT and OT. Watch the evolution of your organization's cyber-risk over time. Manage risk using quantifiable metrics that are aligned with the business.
  • 19
    Whistic Reviews
    This is the best way to share, publish and assess vendor security information. Whistic Vendor Security Network allows you to automate vendor assessments, share security documents, and make trusted connections - all from one place. Whistic makes it easy for companies to manage vendor security assessments and respond to questionnaire requests. Openly sharing security requirements with vendors and publishing profiles will help you avoid the old black box security reviews. Instead of chasing spreadsheets, focus on building trust.
  • 20
    Haystax Reviews

    Haystax

    Haystax Technology

    Our platform analyzes threats and prioritizes risks, allowing leaders and operators to take action when it is most important. Instead of mining a vast amount of data to generate threat intelligence, we first create a system that transforms human expertise into models capable of evaluating complex security problems. We can then automatically score high-priority threats and quickly deliver them to the right people by using analytics. To enable our users to manage critical assets and respond to incidents, we have built a tightly integrated ecosystem of web and mobile apps. Our Haystax Analytics Platform, which can be used on-premises or in the cloud, is a platform for early threat detection and situational awareness. It also allows information sharing. Continue reading to learn more.
  • 21
    SISA RA Reviews

    SISA RA

    SISA Information Security

    Cyber-attacks are on the rise and organizations need to look ahead to see what lies ahead. An official Risk Assessment is a tool that helps organizations to identify vulnerabilities and create a strong security architecture. Automated risk assessment tools make it easier for businesses to assess risks and gain insight into evolving cyber threats. Organizations can save 70-80% on risk assessment and focus on more important tasks by using the right tool. SISA, a PCI Risk and Compliance expert, has identified the challenges organizations face in anticipating risks and created SISA Risk Assessor, an intuitive Risk Assessment tool. SISA's Risk Assessor, a PCI Risk Assessment tool, is the first on the market. It was built using world-renowned security methods, including OCTAVE, ISO 27001 and PCI DSS risk assessment guidelines.
  • 22
    IRIS Intelligence Reviews
    SaaS and On Premise solutions are available to help you identify risk, communicate with others and foster a culture of risk awareness. IRIS Intelligence Risk Management software can help you deliver your company's strategy more effectively. Our tool improves risk communication, visibility of both mitigations and risks, and improves decision making through automated reporting and return on investment calculations. Best Practice Risk Management Processes Quickly embed ISO 31000, PMBoK, ISO 27001, or government risk guidance. The International Risk Governance Council recommends that you have access to checklists and brainstorming prompts. The criteria are flexible enough that they can be used in any environment, but consistent enough to ensure consistency within each register. For those who need it, use robust statistical techniques to quantify your risk exposure rather than simple estimation methods.
  • 23
    FireMon Reviews
    Comprehensive visibility across your entire network is essential for maintaining strong security and compliance. Learn how to gain real-time visibility into and control over complex hybrid network infrastructure, policies, and risk. Security Manager gives you real-time visibility, control and management of network security devices in hybrid cloud environments. It is a single pane. Security Manager offers automated compliance assessment capabilities that validate configuration requirements and alert when violations occur. Security Manager allows you to create customized reports or get audit reports right out of the box. This reduces the time spent configuring policies and gives security to ensure you are ready to meet regulatory or internal compliance audit requirements.
  • 24
    MetricStream Reviews
    Forward-looking risk visibility helps to reduce losses and prevent future events. Modern integrated risk management with real-time aggregated data on risk and their impact on investments and business objectives. Protect brand reputation, reduce compliance costs, and gain the trust of regulators and boards. Keep up-to-date with evolving regulatory requirements and proactively manage compliance risk, policies, cases, controls assessments. By aligning audits with strategic imperatives, business goals and risks, you can drive risk-awareness and accelerate business performance. Provide timely insights into risks and improve collaboration between different functions. Reduce third-party risk exposure and make better sourcing decisions. Continuous third-party compliance, performance monitoring and continuous third-party risks monitoring can help prevent third-party incidents. All aspects of third-party risk management can be simplified and streamlined.
  • 25
    STREAM Integrated Risk Manager Reviews
    STREAM Integrated Risk Manager, an award-winning GRC platform, allows organizations to centralize and automate, quantify, report on, and report on risk. It can be used in a variety of applications, including cyber / IT and enterprise risk management, BCM, and vendor risk management. STREAM is available as a SaaS and on-premise deployment. It has been around for more than 10 years. It has been adopted worldwide by organizations in many industries, including finance, energy and healthcare, legal, and IT. For more information, please contact us.