Best File Integrity Monitoring Software in China

Find and compare the best File Integrity Monitoring software in China in 2024

Use the comparison tool below to compare the top File Integrity Monitoring software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Paessler PRTG Reviews
    Top Pick

    Paessler PRTG

    Paessler GmbH

    $2149 for PRTG 500
    681 Ratings
    See Software
    Learn More
    Paessler PRTG is an all-inclusive monitoring solution with an intuitive, user-friendly interface powered by a cutting-edge monitoring engine. It optimizes connections and workloads, reduces operational costs, and prevents outages. It also saves time and controls service level agreements (SLAs). This solution includes specialized monitoring features such as flexible alerting, cluster failover, distributed monitoring, maps, dashboards, and in-depth reporting.
  • 2
    ManageEngine ADAudit Plus Reviews
    See Software
    Learn More
    ADAudit Plus provides full visibility into all activities and helps to keep your Windows Server ecosystem safe and compliant. ADAudit Plus gives you a clear view of all changes to your AD resources, including AD objects and their attributes, group policies, and more. AD auditing can help you detect and respond to insider threats, privilege misuse, or other indicators of compromise. You will have a detailed view of everything in AD, including users, computers, groups and OUs, GPOs. Audit user management actions, including deletion, password resets and permission changes. Also, details about who, what, when and where. To ensure that users have only the minimum privileges, keep track of who is added and removed from security or distribution groups.
  • 3
    ManageEngine EventLog Analyzer Reviews
    See Software
    Learn More
    EventLog Analyzer from Manage Engine is the industry's most affordable security information and event management software (SIEM). This cloud-based, secure solution provides all essential SIEM capabilities, including log analysis, log consolidation, user activity monitoring and file integrity monitoring. It also supports event correlation, log log forensics and log retention. Real-time alerting is possible with this powerful and secure solution. Manage Engine's EventLog Analyzer allows users to prevent data breaches, detect the root cause of security issues, and mitigate sophisticated cyber-attacks.
  • 4
    Microsoft Defender for Cloud Reviews

    Microsoft Defender for Cloud

    Microsoft

    $0.02 per server per hour
    2 Ratings
    Microsoft Defender for Cloud is a cloud security posture management (CSPM), and cloud workload protection solution (CWP). It can identify weak points in your cloud environment, strengthen your overall security posture, and protect workloads across multicloud or hybrid environments from evolving threats. Continuous assessment of the security of cloud resources running on AWS, Azure, and Google Cloud. Use the built-in policies and prioritized suggestions to align with key industry and regulatory standards. Or, create custom requirements that suit your organization's specific needs. You can automate your recommendations using actionable insights. This will help you ensure that resources are securely configured and meet your compliance requirements. Microsoft Defender for Cloud allows you to protect yourself against evolving threats in multicloud and hybrid environments.
  • 5
    Varonis Data Security Platform Reviews
    The most powerful way to monitor and protect sensitive data at large scale. The all-in-one data security solution that doesn't slow down will help you reduce risk and detect abnormal behavior. You get a platform, a team, an approach, and a plan that gives you every advantage. Classification, access governance, and behavioral analytics all work together to secure data, prevent threats, and ease the burden of compliance. Our proven method to monitor, protect and manage your data is backed by thousands of successful rollouts. Hundreds of security professionals are able to create advanced threat models, update policies, and assist in incidents, allowing you to concentrate on other priorities.
  • 6
    Datadog Reviews
    Top Pick

    Datadog

    Datadog

    $15.00/host/month
    7 Ratings
    Datadog is the cloud-age monitoring, security, and analytics platform for developers, IT operation teams, security engineers, and business users. Our SaaS platform integrates monitoring of infrastructure, application performance monitoring, and log management to provide unified and real-time monitoring of all our customers' technology stacks. Datadog is used by companies of all sizes and in many industries to enable digital transformation, cloud migration, collaboration among development, operations and security teams, accelerate time-to-market for applications, reduce the time it takes to solve problems, secure applications and infrastructure and understand user behavior to track key business metrics.
  • 7
    CrowdStrike Falcon Reviews
    Top Pick
    The Falcon Platform is flexible, extensible, and adaptable when it comes to your endpoint security requirements. You can choose from the bundles listed above or any of these modules. Additional modules can be added to Falcon Endpoint Protection packages. Individual modules can be purchased without the need for a Falcon Endpoint Protection bundle. Customers who have more stringent compliance requirements or operational requirements will find our specialized products useful.
  • 8
    Fidelis Halo Reviews

    Fidelis Halo

    Fidelis Security

    Free
    Fidelis Halo, a SaaS-based cloud security platform, automates cloud computing security controls. It also provides compliance across containers, servers, and IaaS within any public, private or hybrid cloud environment. Halo's extensive automation capabilities allow for faster workflows between InfoSec (DevOps) and Halo with over 20,000 pre-configured policies and more than 150 policy templates. These templates cover standards like PCI, CIS and HIPAA. The comprehensive, bidirectional Halo API, SDK, and toolkit automate security and compliance controls in your DevOps toolchain. This allows you to identify and correct critical vulnerabilities before they go into production. Free Halo Cloud Secure edition includes full access to the Halo Cloud Secure CSPM Service for up to 10 cloud service account across any mix of AWS and Azure. Get started now to automate your cloud security journey!
  • 9
    Chainkit Reviews

    Chainkit

    Chainkit

    $50 per month
    Move beyond static File Integrity Monitor (FIM). Automate integrity at rest and in motion--in real time. Chainkit offers eXtended Integrity Monitor (XIM) Chainkit detects threats quicker and in real time, which reduces the time it takes for undetected attacks to linger in your data. Chainkit dramatically improves the visibility of attacks in your data. It detects anti-forensic techniques used by attackers to evade detection. Chainkit searches for malware in your data and gives you full transparency about tampered logs. Chainkit protects the integrity and authenticity of artifacts needed by forensic investigators. Chainkit improves the attestation required for ISO, NIST, and related log or audit trail compliance requirements. Chainkit can help ensure compliance with all security regulations. Customers receive a more complete audit-readiness position.
  • 10
    SolarWinds Security Event Manager Reviews
    A lightweight, easy-to-use and affordable solution for event management and security information can help you improve your security posture. Security Event Manager (SEM), will provide additional eyes to monitor suspicious activity 24 hours a day and respond in real-time to minimize its impact. With the intuitive UI and out-of-the box content, virtual appliance deployment is possible. You can get valuable data from your logs quickly and with minimal expertise. Audit-proven reports and tools for HIPAA and PCI DSS, SOX, reduce the time required to prepare and prove compliance. Our licensing is based upon the number of log-emitting source, not log volume. This means that you don't have to be selective about which logs you collect to keep costs down.
  • 11
    Panzura Reviews
    Out of control unstructured data volumes have made your work environment a messy and costly data swamp, where you can't trust or find the files you need. Panzura transforms your storage into the most secure and user-friendly cloud data management platform in the world. You can achieve global data consistency and immediate, efficient performance at scale. Secure data access from the edge to the core to the cloud without any performance penalties. You can create a collaborative work environment that is accessible from anywhere. Cloud mirroring and multi-cloud redundancy provide data protection and data protection. If you are overwhelmed by data, innovation can seem impossible. Panzura consolidates and simplifies your data management, increasing visibility and access, encouraging collaboration and allowing you to achieve better outcomes in less time.
  • 12
    OSSEC Reviews
    OSSEC is completely open source and free. OSSEC's extensive configuration options allow you to customize it for your security requirements. You can add custom alert rules, and write scripts that take action when an alert occurs. Atomic OSSEC can help organizations meet compliance requirements, such as NIST or PCI DSS. It detects and alerts you to malicious behavior and unauthorized file system modifications that could lead to non-compliance. The Atomic OSSEC detection and response system is based on open source and adds thousands enhanced OSSEC Rules, real-time FIM and frequent updates, software integrations and active response. It also has a graphical interface (GUI), compliance and expert professional support. It's a flexible XDR-based security solution that also includes compliance.
  • 13
    AlienVault USM Reviews
    AlienVault®, Unified Security Management®, (USM), is used by hundreds of MSSPs around the world to create successful managed security and compliance services. AlienVault USM provides multiple security capabilities and continuously updated threat intelligence in one platform. It allows MSSPs to centralize threat detection, incident response and compliance management across both cloud and on-premises environments. AlienVault USM was designed to meet the needs of today's dynamic MSSP market. It is highly scalable and cost-effective and easy to deploy and maintain. It allows MSSPs to quickly grow their managed security service offerings to meet customer security goals and minimize their risk and expense.
  • 14
    Rapid7 InsightIDR Reviews
    The cloud architecture and intuitive interface of InsightIDR make it easy to centralize your data and analyze it across logs, network and endpoints. You can find results in hours, not months. Our threat intelligence network provides insights and user behavior analytics that are automatically applied to all your data. This helps you to detect and respond quickly to attacks. Hacking-related breaches involving hacking were responsible for 80% of all hacking-related breaches in 2017. These breaches involved stolen passwords and/or weak passwords. Your greatest asset and greatest threat are your users. InsightIDR uses machine-learning to analyze the behavior of your users and alerts you if there is any suspicious lateral movement or stolen credentials.
  • 15
    Atomicorp Enterprise OSSEC Reviews
    Atomic Enterprise OSSEC, the commercially enhanced version the OSSEC Intrusion Detection System, is brought to you by the sponsors. OSSEC is the most widely used open-source host-based intrusion detection software (HIDS) in the world. It is used by thousands of organizations. Atomicorp adds to OSSEC with a management console, advanced file integrity management (FIM), PCI auditing and reporting, expert assistance and more. - Intrusion Detection - File Integrity Monitoring - Log Management - Active Response OSSEC GUI and Management OSSEC Compliance Reporting – PCI, GDPR and HIPAA compliance Expert OSSEC Support Expert support for OSSEC agents and servers, as well as assistance in developing OSSEC rules. More information about Atomic Enterprise OSSEC can be found at: https://www.atomicorp.com/atomic-enterprise-ossec/
  • 16
    Security Auditor Reviews

    Security Auditor

    Core Security (Fortra)

    Simplified security policy management, file integrity monitoring software. Security Auditor centralizes security administration in your cloud, hybrid, or on-premise environment. Our agentless technology makes it easy to enforce security policies quickly and reduce the risk of security misconfigurations, which are a major cause of data breaches. Security Auditor automatically protects all new systems as they are created and monitors them continuously to identify any configuration settings that do not meet your requirements. An easy-to-use web-based console allows you to make changes and receive notifications about any policy exceptions. This simplifies compliance reporting requirements and simplifies tasks. You can also run the FixIt function to automate the process and let Security Auditor handle the rest. Security Auditor makes it easy to identify and configure security settings for your elastic cloud infrastructure.
  • 17
    Powertech Database Monitor for IBM i Reviews
    Security administrators can virtually eliminate the risk from data corruption by having real-time visibility of every user's actions across all systems. You can see what users are doing across all systems. You can combine data from multiple connected systems to create a centralized view that allows for reporting and archiving. This makes database security management much easier. You can keep an audit trail of any system changes in a secure database to ensure compliance with some of the most stringent security regulations. You can use filters to record and monitor changes to sensitive data. Define which fields should be monitored and the criteria that will trigger a notification. Powertech Database Monitor for IBM i is both powerful and simple to use. It automatically monitors user activity on IBM i databases in real-time. You can process events by exception to reduce the need to monitor file integrity and database security. This helps streamline workflows.
  • 18
    Qualys File Inventory Monitoring (FIM) Reviews
    With a single agent, you can gain real-time file-level control over risks to ensure accurate monitoring and compliance. Monitor critical assets continuously for changes in diverse cloud and on premises environments of all sizes including large global enterprises. Prioritize alerts to reduce noise using threat intelligence from Trusted Sources, and File Reputation context. File Access Management (FAM), which triggers alerts when critical files that are not intended for regular usage are accessed. Agentless network device support is also available to alert on network configuration errors. Pre-configured profiles for compliance with PCI DSS 4.0 and other standards, including NERC CIP 4.0, FISMA 4.0, SOX 4.1, NIST 4.1, HIPAA 2020, CIS18, GDPR and more.
  • 19
    Trustwave Reviews
    A cloud-native platform that provides enterprises unprecedented visibility and control over how security resource provisioning, monitoring and management are done in any environment. Trustwave Fusion is a cloud-based cybersecurity platform which serves as the foundation for Trustwave managed security products, services and other cybersecurity offerings. The Trustwave Fusion platform was designed to meet enterprises where they are in their operations today and in the future, as they embrace digital transformation and deal with an ever-changing security landscape. Connects enterprises and government agencies' digital footprints to a robust security cloud that includes the Trustwave data lake, advanced analysis, threat intelligence, and a wide range security products and Trustwave SpiderLabs. This is the company's elite security team.
  • 20
    CimTrak Integrity Suite Reviews
    Compliance standards and regulations require that you secure your enterprise from both internal and external threats. CimTrak's auditing, change management, and reporting capabilities enable private and public companies alike to meet or exceed the most stringent compliance requirements. CimTrak covers all compliance requirements, including PCI, SOX and HIPAA. CIS, NIST, CIS, and many others. CimTrak's File and System Integrity Monitoring helps protect your important files from accidental or malicious changes that could cause damage to your IT infrastructure, compromise your data, or violate regulations like PCI. IT environments are subject to change. CimTrak provides integrity monitoring, proactive response to incidents, change control, auditing, and auditing capabilities all in one cost-effective file integrity monitoring tool.
  • 21
    Netwrix Change Tracker Reviews
    Netwrix Change Tracker is a fundamental and critical cyber security prevention and detection tool. This is achieved by combining the best practices of security, such as system configuration and integrity assurance, with the most comprehensive change control solution. Netwrix's Change Tracker ensures that your IT systems are always in a secure, compliant and known state. Netwrix's Change Tracker features context-based File Integrity monitoring and File Whitelisting, which ensure that all change activity will be automatically analyzed and verified. Complete and certified CIS STIG configuration hardening assures that all systems remain secure at all times.
  • 22
    Symantec Data Center Security Reviews
    Server monitoring and protection for private cloud environments. Security hardening and monitoring of private cloud and physical data centers, with support for Docker container. Agentless Docker container protection that integrates application control and management. Application whitelisting, granular intrusion prevention and real-time file integrity monitoring are some of the ways to block zero-day exploits. Secure OpenStack deployments using the full hardening Keystone identity service module. Monitoring of data center security. Monitoring the security of data centers in private clouds and on-premises environments.
  • 23
    Tripwire Reviews
    Cybersecurity for Industrial and Enterprise Organizations. The industry's most trusted foundational security controls will protect you from cyberattacks. Tripwire is able to detect threats, identify vulnerabilities, and harden configurations instantly. Tripwire Enterprise is trusted by thousands of organizations as the heart of their cybersecurity programs. You can join them and have complete control of your IT environment using sophisticated FIM/SCM. Reduces the time required to detect and limit damage caused by anomalies, threats, and suspicious behavior. You have a clear, unrivalled view of your security system status and can assess your security posture at any time. Integrates with existing toolsets of both IT and security to close the gap between IT & security. Policies and platforms that go beyond the box enforce regulatory compliance standards.
  • 24
    Samhain Reviews

    Samhain

    Samhain Design Labs

    Samhain, an open-source, host based intrusion detection software (HIDS), provides file integrity checking, log file monitoring/analysis, port monitoring, detection and detection of rogue executables and hidden processes. Samhain is designed to monitor multiple hosts, with potentially different operating system, and provide centralized logging and maintenance. However, it can also be used on a single host. Beltane, a web-based central management console, is used to manage the Samhain file integrity/intrusion detection systems. It allows the administrator to access client messages, to acknowledge them, as well as to update centrally stored file signature database.
  • 25
    VMware Carbon Black App Control Reviews
    To prevent unwanted changes and ensure compliance with regulatory mandates, lock down servers and critical systems to protect them. Protect corporate systems and protect legacy and new systems from unwanted change. VMware Carbon Black®, App Control™, is one of the most reliable and scalable applications control solutions available. Unify multiple endpoint security capabilities and work faster and more efficiently with one cloud-native platform. Stop ransomware, malware, zero-day, and other malicious attacks. File-integrity monitoring, device control, and memory protection can prevent unauthorized changes. To assess risk and protect the system, monitor critical activity. Secure EOL systems using powerful change-control policies and application control policies. Management overhead is kept low with out-of-the box templates.
  • Previous
  • You're on page 1
  • 2
  • Next