Best IT Security Software in China - Page 105

Find and compare the best IT Security software in China in 2025

Use the comparison tool below to compare the top IT Security software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    FraudGuard Reviews

    FraudGuard

    First American Data & Analytics

    FraudGuard® stands out as the premier decision-making tool available in today's market, utilizing sophisticated analytics, comprehensive reporting, defect trend analysis, and audit trails that are crucial for a compliant loan origination process. No other automated system can rival the extensive array of data sources and functionalities that FraudGuard integrates into a singular quality assurance platform. Lenders can rely on FraudGuard for superior analytics supported by experienced product support and development teams. By harnessing a mix of public, private, and proprietary data, the FraudGuard platform assists lenders in detecting potential fraud risks and inaccuracies in mortgage applications, ensuring adherence to regulations while enhancing the efficiency and speed of the application review process, ultimately leading to improved loan quality. The platform's advanced reporting capabilities deliver actionable insights and tailored recommendations that are essential for informed loan decision-making, reinforcing its value in the lending process. Thus, FraudGuard not only streamlines operations but also promotes greater trust and reliability in the entire mortgage lending ecosystem.
  • 2
    DriveCrypt Reviews

    DriveCrypt

    Securstar

    $59.95
    DRIVECRYPT offers a robust and effortless solution for safeguarding all sensitive data on laptops and desktop computers continuously, ensuring that users don’t need to worry about security measures. This disk encryption tool is suitable for organizations of any size, whether a small startup or a large multinational corporation with numerous remote users, allowing them to shield vital information such as business strategies, customer databases, product details, private corporate documents, financial data, and more. As data is accessed from the hard drive, DRIVECRYPT seamlessly decrypts it before it enters the system memory. When saving data back onto the hard drive, the application automatically re-encrypts it without any manual intervention. The entire process of disk encryption and decryption occurs transparently to both users and application programs, managed by an extension of the operating system that operates "on the fly" during the data transfer between the hard drive and memory. As a result, users can focus on their work without the need to remember complex security protocols or alter the regular functioning of their computers. This ensures a hassle-free experience while maintaining the integrity and confidentiality of sensitive information.
  • 3
    Declude Security Suite Reviews
    Declude offers a robust solution for email defense that integrates features such as anti-virus, anti-spam, hijack prevention, threat management, and Security Flaw Scanningâ„¢ (SFS), providing a free, all-in-one system to safeguard both incoming and outgoing emails. Originating in 1997, the technology was created by Scott Perry, a trailblazer in email threat management, specifically to function within the IMail and SmarterMail platforms. Today, Declude serves over 3,000 clients globally, including various government bodies, Fortune 100 enterprises, and top-tier universities. The platform promises fully integrated email solutions utilizing the finest available components, along with tailored integration, support, and management services. These offerings are designed to lower costs, enhance performance, and ensure a lasting competitive edge for businesses. Furthermore, Declude's commitment to innovation continues to position it as a leader in the ever-evolving landscape of email security.
  • 4
    TF2000 Reviews

    TF2000

    ComputerProx

    $79 one-time payment
    The ComputerProx TF2000 is a device that automates the locking process of your computer when you step away, enhancing security effortlessly. Utilizing ultrasound technology, it senses your presence and locks the system automatically when you are out of range, eliminating the need for any manual keystrokes. This means no more frustrating timeout settings that can mistakenly activate while you are still nearby. The device is designed to accurately detect when you are present, ensuring that it won’t inadvertently lock the computer at inappropriate times. Connecting via the USB port, the TF2000 is recognized by the system as a keyboard, allowing it to send commands as keystrokes without the need for additional drivers. Users can easily customize the individual keystrokes and timing using the provided configuration tool. Moreover, in addition to the 'walk-away' feature, the TF2000 also incorporates a 'walk-to' sequence, which triggers specific keystrokes when you approach the computer. For instance, when nearing the PC running Windows XP, the TF2000 automatically sends the CTRL-ALT-DEL combination, preparing the system for user authentication seamlessly. This advanced functionality not only streamlines your workflow but also enhances the overall security of your computer.
  • 5
    VFind Security ToolKit Reviews

    VFind Security ToolKit

    CyberSoft

    $1035 one-time payment
    The VFind Security ToolKit (VSTK) comprises a suite of four robust anti-malware utilities designed for network and computer protection, ensuring comprehensive and flexible safety against malware threats. One notable component, the CIT tool, is an exceptional anti-malware solution with various functionalities; it tracks all files that have been added, removed, altered, or duplicated. This tool can enforce baseline configuration control with remarkable precision, down to the smallest unit of data, and can be applied meticulously across entire systems or individual files. Furthermore, the CIT generates a database containing cryptographic hash values for every file it manages, enhancing security measures. In addition to its capabilities in virus protection, the UAD tool is specifically engineered for data identification through direct analysis, avoiding assumptions based solely on file names. This dual approach of the UAD tool ensures accurate identification regardless of file labeling, further strengthening the overall security framework provided by the VSTK.
  • 6
    Paragon Protect & Restore Reviews

    Paragon Protect & Restore

    Paragon Software Group

    $89.00/one-time/user
    An effective availability solution designed for safeguarding ESX/ESXi, Hyper-V, and physical Windows systems significantly streamlines IT management tasks while also minimizing costs. It enables centralized control over all backup operations through traditional monitoring tools, offering comprehensive features such as in-depth testing, reporting, and analytics. This solution is tailored to meet the specific recovery time objectives (RTO) and recovery point objectives (RPO) of a business. With capabilities like near Continuous Data Protection (CDP), immediate replication for failover, and automated data validation alongside test failovers, it guarantees ongoing continuity and availability. Additional features, including multi-tier storage support, archiving capabilities, and enhanced data duplication options, contribute to the cost-effectiveness of Paragon Protect & Restore. Furthermore, it is scalable to meet evolving IT demands and can be seamlessly integrated with VMware and Hyper-V hypervisors, allowing for quick adjustments in storage configuration and infrastructure growth within minutes. This flexibility ensures that organizations can maintain optimal performance while adapting to their changing needs.
  • 7
    SoftControl Reviews

    SoftControl

    SafenSoft

    $25.00/one-time/user
    SoftControl offers a range of products aimed at enhancing information security for commercial enterprises. Their solutions focus on safeguarding businesses by providing proactive defenses against threats such as hacking attempts, malicious software, and insider risks. Additionally, they facilitate effective staff monitoring and control. Their offerings include specialized software and solutions for Automated Process Control Systems (APCS), ensuring centralized security management. In the banking sector, SoftControl's information security policies are designed to protect vital infrastructure, including software for ATMs, as well as front and back-office operations. They also provide robust protection for electronic banking documents and secure business communications, including confidential data sent via email attachments. Furthermore, their solutions help organizations comply with PCI DSS standards and regulations set forth by the Central Bank of Russia. Overall, SoftControl stands out as a comprehensive provider, addressing the multifaceted challenges of information security in today's digital landscape.
  • 8
    AccuHash Reviews

    AccuHash

    AccuHash

    $19.95 one-time payment
    AccuHash 2.0 is a utility designed for Windows operating systems, including 95, 98, Me, NT, 2000, XP, and 2003, that ensures the integrity and accuracy of data files through the use of various checksum calculation algorithms such as CRC32, MD5, and SHA-1. The program simplifies the process of verifying the integrity of files that are downloaded from the Internet, shared across networks, or burned onto CD/DVDs. Notably, AccuHash 2.0 employs an XML-based checksum file format that supports Unicode, facilitating the seamless exchange of checksum files across different systems and countries while also allowing for the addition of new algorithms and features. Additionally, it supports the widely-used checksum formats like SFV, MD5SUM, and BSD-style, enabling users to import and export checksums with ease. Featuring an integrated Checksum Calculator, AccuHash 2.0 allows users to calculate checksum values for all supported algorithms directly from specified files without the need to create separate checksum files, thus enhancing usability and efficiency. This makes it a versatile tool for anyone needing reliable file verification.
  • 9
    Infiltrator Reviews

    Infiltrator

    Infiltration Systems

    Infiltrator is a user-friendly and free network security scanner designed to efficiently assess your networked computers for vulnerabilities, exploits, and detailed information enumeration. This tool can uncover and organize a wide array of data on the systems it scans, including details about installed applications, shared resources, user accounts, storage drives, system updates, as well as NetBios and SNMP information, open ports, and so on! Additionally, Infiltrator evaluates the password and security settings of each machine, notifying you when adjustments are necessary to bolster protection. The findings are easily compiled into attractive and straightforward reports by the integrated report generator. Furthermore, Infiltrator is equipped with more than 15 robust network utilities for tasks such as footprinting, scanning, enumeration, and accessing devices. These utilities encompass features like ping sweeps, whois inquiries, email tracing, brute force cracking tools, share scanning, and various network discovery functions. With its extensive toolkit, Infiltrator ensures comprehensive network security management.
  • 10
    Stronghold Antivirus Reviews
    Stronghold Antivirus is a robust software solution designed to provide both exceptional real-time proactive (on-access) and on-demand protection for computers in both home and office settings. With the capability to detect and eliminate over 3.5 million known threats, including viruses, spyware, adware, trojans, rootkits, and more, it relies on a regularly updated database to stay ahead of malicious activity. Additionally, it employs an active on-access shield to tackle even unidentified threats effectively. The user-friendly and visually appealing interface makes Stronghold Antivirus accessible for beginners, while experienced users will appreciate the extensive capabilities of its advanced features. Despite its powerful functionality, it remains lightweight, ensuring that it will not significantly impact your computer's performance. Users can customize scan areas, adjust settings for both on-demand and on-access protection, schedule scans with tailored configurations, and manage whitelist and blacklist entries with ease. Overall, Stronghold Antivirus combines simplicity and strength, making it a compelling choice for anyone seeking comprehensive security for their devices.
  • 11
    Panda Fusion Reviews

    Panda Fusion

    WatchGuard Technologies

    Fusion merges our Systems Management and Endpoint Protection Plus offerings to safeguard, oversee, and assist all of your business devices. The cloud-based solution enables swift deployment without the necessity for ongoing maintenance or expensive server investments. Enhance your endpoint security strategy with a diverse selection of IT and endpoint security operations products and modules designed to minimize potential threats and lower the likelihood of incidents. You can detect and prevent harmful activities or noncompliant behaviors, handle vulnerabilities, implement patches and updates, encrypt your sensitive data, and manage your corporate systems and endpoints efficiently. WatchGuard provides everything you require within one comprehensive platform, ensuring a seamless experience for your organization. This all-in-one solution streamlines security efforts while offering robust protection for your corporate assets.
  • 12
    Kerio Control Reviews

    Kerio Control

    GFI Software

    $270 per year
    Enhance your SMB's security by utilizing a firewall designed to detect threats, eliminate viruses, and establish a secure VPN. Easily configure your firewall with user-friendly traffic rules to manage both incoming and outgoing communications based on various criteria such as URL, application, and traffic type. The Snort system offers continuous monitoring for suspicious activities, allowing you to log or block communications based on their severity level. It effectively prevents the infiltration of viruses, worms, Trojans, and spyware into your network. Beyond merely scanning files for harmful code, Kerio Control analyzes network traffic to identify potential attacks, ensuring a comprehensive security approach. Establish fast and secure server-to-server connections between your offices using Kerio Control’s straightforward VPN setup, or connect to a remote office that lacks Kerio Control by employing standard VPN protocols for added flexibility. This multi-faceted approach not only safeguards your network but also maintains high performance across all connections.
  • 13
    Tectia Reviews

    Tectia

    SSH Communications Security

    We are a cybersecurity firm focused on protecting essential data during transit, use, and storage for prominent organizations globally. Evaluate your SSH key inventory and the associated risks with our self-service tool, SSHerlock, designed for discovering and auditing SSH keys and post-quantum resilience, all available at no cost. Our offerings extend to passwordless authentication, operational technology (OT) security, and defensive cybersecurity, among others. What significant trends are anticipated to influence cybersecurity in the coming year? PrivX is ideally suited for the secure management and monitoring of superuser and power user access across hybrid cloud environments while also removing dangerous privileged passwords from critical systems. UKM Zero Trust efficiently manages and automates the lifecycle of millions of encryption keys to enhance risk mitigation and ensure successful audits, promoting keyless access. Additionally, our software-based NQX delivers unparalleled performance and security, setting new standards in cybersecurity solutions. As technology continues to evolve, staying informed about these trends is crucial for maintaining robust security measures.
  • 14
    Acronis DeviceLock DLP Reviews

    Acronis DeviceLock DLP

    Acronis

    $615 one-time payment
    Acronis DeviceLock DLP delivers an all-encompassing solution for endpoint data loss prevention (DLP), efficiently identifying and safeguarding sensitive information while overseeing activities related to that data. It mitigates risks of data breaches caused by employee errors or insider threats by preventing unauthorized access and transfers of sensitive information, including data at rest. This solution simplifies data protection processes and decreases reporting times by providing a unified DLP system that grants extensive insight into both user behavior and data movement. By establishing and enforcing mandatory data handling and usage policies, organizations can diminish information security vulnerabilities while ensuring adherence to IT security regulations and standards. Additionally, Acronis DeviceLock DLP streamlines the management of DLP strategies, allowing for easy deployment via Active Directory (AD) and featuring multiple centralized management options tailored to fit the specific needs of your organization. With its user-friendly interface, organizations can maintain control over their sensitive data while significantly enhancing their overall security posture.
  • 15
    Ivanti Endpoint Manager Reviews
    Transitioning from Windows to macOS, iOS to Android, and even extending to IoT, there exists a singular platform for overseeing all your devices along with user profiles. Rather than merely ensuring your business operates smoothly, you can consolidate your endpoint and workspace management, meet the increasing demands of users, and streamline your administrative tasks using a unified endpoint management suite. Ivanti Endpoint Manager stands out as a trusted and effective solution for managing endpoints and user profiles, focusing on four key aspects: identifying all network-connected devices, automating software distribution, alleviating login issues, and facilitating integration with various IT solutions. By leveraging UEM, you can not only discover and inventory but also configure a wide range of devices, including PCs, laptops, servers, tablets, and smartphones. Additionally, it enables you to remotely control both Windows and Mac systems for greater efficiency. Embrace this comprehensive management tool and enhance your operational capabilities.
  • 16
    eScan Reviews

    eScan

    MicroWorld Technologies

    $58.95/one-time/user
    eScan's next generation antivirus solution protects your home network from malware, viruses, ransomware, and other threats using a layered approach. eScan is able to block a wide range of attacks thanks to its unique combination of modern and basic techniques. It includes web filtering, signature-based Malware detection and behavior analysis, as well as innovative techniques such deep learning malware detection, exploit prevention and heuristic scanning. eScan provides business endpoint protection, endpoint detection and response solutions (EDR), as well as anti-spam solutions email and multi-factor authentication.
  • 17
    ESET Endpoint Encryption Reviews
    An easy-to-use, standalone encryption solution offers comprehensive remote management of endpoint encryption keys and security policies for data stored on hard drives, portable devices, and emails. Utilizing patented technology, it safeguards data for organizations of any size. ESET Endpoint Encryption is validated under FIPS 140-2 standards and employs 256-bit AES encryption. This system does not necessitate a server for installation and efficiently accommodates remote users. It allows for the management of encryption across Windows machines and integrates with native macOS encryption (FileVault) all through a unified dashboard. With ESET Endpoint Encryption, businesses gain enhanced capabilities to secure specific files, folders, virtual disks, or archives. By encrypting emails along with their attachments and limiting access to removable media for designated users, organizations can ensure data protection during transit and mitigate the risk of data breaches. Additionally, administrators maintain complete oversight of licensing, software functionalities, security policies, and encryption keys from a specialized ESET Endpoint Encryption console, offering a robust framework for data security management.
  • 18
    Abacre Advanced Log Analyzer Reviews

    Abacre Advanced Log Analyzer

    Abacre

    $49.99 one-time payment
    Advanced Log Analyzer is a robust software tool designed for analyzing web activity. It produces a wide array of standard reports such as the Most Common Pages and Referrers. However, its standout feature lies in its unique reporting capabilities, which include insights on Most Common Visitor Paths and Profiles, as well as Web Model reports and analyses of both Indirect and Direct Referrers. This innovative approach to data presentation enhances the understanding of user behavior on websites. Furthermore, these untraditional reports can greatly aid in optimizing web strategies and improving user engagement.
  • 19
    Secure CommNet Reviews

    Secure CommNet

    Radient Software

    $29 one-time payment
    Your licenses remain active, ensuring that you will continue to receive top-notch email technical support. Additionally, you can still acquire new or extra licenses for both CommNet and Secure CommNet. Your ongoing trust is essential to us, and we appreciate your loyalty to Radient Software over the years! We are excited to welcome you! CommNet and Secure CommNet, which include SSH2 support, are robust communications software solutions for Windows, seamlessly combining modem dial-up and Internet Telnet into efficient, user-friendly applications. Equipped with essential communication features, this software has been rigorously tested for over two decades. There's absolutely no risk in giving it a try—feel free to download a complimentary 30-day trial whenever you wish. The software supports Telnet and modem dial-up, offers a Telnet Host Mode Server that permits other Telnet clients to connect to your system, and includes Zmodem and FTP capabilities during Telnet sessions, making it a versatile choice for your communication needs. Exploring all these features can significantly enhance your connectivity experience.
  • 20
    WiKID Authentication System Reviews

    WiKID Authentication System

    WiKID Systems

    $2.00/month/user
    Our latest release makes it easy to meet PCI-DSS3.2. WiKID two-factor authentication is now available for service and privileged accounts. Instead of sharing passwords and keeping them in spreadsheets or vaults, you can use WiKID two factor authentication. Stop attackers from escalating to administrator rights by preventing pass-the-hash attacks. Learn how to set it all up. The Enterprise version is available for up to five users. This version is ideal for small businesses and large enterprises that require extended testing. This Enterprise version is not crippleware. Broad protocol support - RADIUS and LDAP, TACACS+ and SAML, native Active Directory WIKID is compatible with all remote access and privileged access management tools such as Cisco, Checkpoint and Fortinet. It also works with all enterprise-class VPN solutions, IPSec or PPTP. We have helped hundreds of organizations implement two factor authentication using standard protocols. Get our eGuide to learn how to integrate Active Directory for authorization.
  • 21
    SDS E-Business Server Reviews

    SDS E-Business Server

    Software Diversified Services

    SDS is now engaged in the distribution, support, and active enhancement of the well-regarded E-Business Server, a genuine OpenPGP encryption solution that was initially created by cryptography innovator Phil Zimmerman. By leveraging OpenPGP encryption technology along with adaptable APIs, the SDS E-Business Server delivers robust encryption capabilities that seamlessly integrate with a diverse array of applications and platforms, including mainframes. This server is tailored for organizations that demand top-tier security for data that is stored internally, shared within the organization, and transmitted outside its protective boundaries. The complexities of modern data security requirements are significant yet essential. Achieve compliance with GDPR and other critical standards through the use of invulnerable signature generation and dependable authentication methods, ensuring your data is secure. Notably, the E-Business Server also optimizes file sizes, minimizes bandwidth usage, accelerates processing times, and conserves disk space, allowing for efficient resource management. As the digital landscape evolves, organizations must prioritize solutions that not only enhance security but also streamline operations for improved productivity.
  • 22
    Adabas & Natural Reviews
    In a world characterized by rapid transformation, securing a visionary partner is essential for navigating the future. You require someone who can guide you in evolving your robust Adabas & Natural applications well into the year 2050 and further. For decades, Adabas & Natural have been your reliable backbone for achieving results. Now, envision a future where you can maximize that investment and leverage the distinctive business logic ingrained in your essential applications. We stand ready to be that partner, dedicated to facilitating the digital modernization of your legacy systems swiftly and without risks. Together, we can address the generational shift in developers, enhance your applications to reduce expenses, broaden the accessibility of your core applications, and speed up development within a cutting-edge environment. Rely on advanced Adabas & Natural technologies to streamline your IT landscape and modernize your applications quickly and safely. Embrace new opportunities with APIs, transition Adabas & Natural to the cloud, attract fresh developer talent through DevOps practices, and reduce costs by transferring mainframe workloads to zIIP. By taking these steps, you position your organization to thrive in a rapidly evolving digital landscape.
  • 23
    Trend Micro Smart Protection Suites Reviews
    The landscape of security threats is in a constant state of flux, making it difficult for conventional security measures to keep pace. Relying on numerous point solutions on a single endpoint leads to an overwhelming number of products that fail to integrate, thereby increasing complexity, hindering user performance, and creating vulnerabilities in your defenses. As you transition towards cloud solutions, the need for adaptable security strategies that can evolve with your changing requirements becomes even more critical. In today’s environment, there is no one-size-fits-all solution capable of addressing every emerging threat. What you require is intelligent security that applies the appropriate methodology for each specific type of threat without compromising your system’s efficiency. Effective security must be multi-layered, seamlessly interconnected to counteract new threats while minimizing management burden. It should be designed to fit your operational environment, provided by an innovative and reputable vendor dedicated to advancing security for the future. Now is the time to consider the advantages of Trend Micro Smart Protection Suites for your organization. By opting for these solutions, you can ensure a more comprehensive and responsive approach to your security needs.
  • 24
    NICE Actimize Reviews
    Identify, thwart, and examine money laundering, fraud, and compliance breaches with a comprehensive perspective on risk throughout your enterprise. The Xceed AI cloud-native solution transforms AML and fraud prevention for financial institutions of all sizes, significantly expediting their digital and cloud advancements. The autonomous mission progresses with X-Sight, enabling you to surpass limitations on data and analytics in the battle against financial crime. The landscape of the financial services sector is evolving rapidly, as customers increasingly demand seamless interactions, swift transactions, and immediate access to their funds. Although these advancements are beneficial for business, risk and compliance departments find themselves inundated with alerts and data. NICE Actimize offers a groundbreaking approach to tackling financial crime prevention through its Autonomous Financial Crime Management system. By integrating cutting-edge technologies, financial organizations can effectively combine data, analytics, and automation to enhance their operational efficiency. Embracing this innovative strategy ensures that organizations are better prepared to meet the challenges posed by an ever-changing financial environment.
  • 25
    Noction IRP Reviews
    Noction IRP monitors the network edge and analyzes traffic to detect network congestion or blackouts. To reroute traffic to the most efficient route, the affected routes are inspected for specific metrics like latency and packet loss through all available providers. IRP also reduces bandwidth costs by routing outbound content flows over less expensive provider links while still ensuring predictable traffic delivery performance. IRP adds intelligence and insight to multi-homed routing decisions. It uses the company's existing infrastructure and delivers significant network performance improvements. It also optimizes existing Internet connectivity and lowers the cost of running the network. Noction IRP increases network performance by between 30% and 50% on average, reduces latency by upto 50%, and increases network availability up to 100%