Best IT Security Software in China - Page 70

Find and compare the best IT Security software in China in 2025

Use the comparison tool below to compare the top IT Security software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    MobiKEY Reviews
    Achieve remarkable results for your organization through the secure and immediate delivery of actionable insights, whether in a manufacturing facility, a military operation, or a university parking lot. By utilizing the right analytical tools, your ability to enhance performance knows no bounds. We can implement the necessary technologies to uncover crucial insights and eliminate obstacles, all while maintaining military-grade data security. Route1 empowers various organizations to utilize their existing data—and even the data they were unaware of—to enhance decision-making and secure significant competitive advantages, without sacrificing data integrity. Our patented technologies ensure data security, while our real-time acquisition and analytics provide a deep understanding of your information. With the help of our robust industrial-grade devices, you can visualize your data effectively. By leveraging our advanced technologies and services, we can assist you in maximizing your data potential, transforming the information you have and the data you didn't realize you possessed into strategic advantages, ultimately leading to outstanding results. Embrace the future of data with confidence.
  • 2
    API Critique Reviews

    API Critique

    Entersoft Information Systems

    $199 per month
    API critique offers a penetration testing solution specifically designed for enhancing REST API Security. We have pioneered the first-ever pentesting tool, marking a significant advancement in safeguarding APIs amidst the increasing number of targeted attacks. Drawing from OWASP guidelines and our extensive expertise in penetration testing, we ensure that a wide array of vulnerabilities is thoroughly evaluated. Our scanning tool assesses the severity of issues using the CVSS standard, which is recognized and utilized by numerous respected organizations, allowing your development and operations teams to effectively prioritize vulnerabilities with ease. Results from your scans are available in multiple reporting formats such as PDF and HTML, catering to both stakeholders and technical teams, while we also offer XML and JSON formats for automation tools to facilitate the creation of tailored reports. Moreover, development and operations teams can enhance their knowledge through our exclusive Knowledge Base, which outlines potential attacks and provides countermeasures along with remediation steps to effectively reduce risks to your APIs. This comprehensive approach not only strengthens your API security posture but also empowers your teams with the insights needed to proactively address vulnerabilities.
  • 3
    VerifyKit Reviews

    VerifyKit

    VerifyKit

    $7.90 per month
    VerifyKit offers a user-friendly verification solution that enables seamless app sign-ups without requiring a phone number or one-time password for authentication. In addition to its reliability and customization options, it provides users with the flexibility to select their preferred verification platform, such as WhatsApp, Telegram, or SMS, enhancing their overall experience. This adaptability ensures that users can engage with the app in a way that suits them best.
  • 4
    OpenText Static Application Security Testing Reviews
    OpenText Static Application Security Testing (SAST) provides precise identification and remediation of application security flaws directly within source code, helping organizations reduce risks early in development. The platform supports over 33 major programming languages and frameworks, enabling broad language coverage for diverse development environments. It integrates smoothly with widely used CI/CD pipelines and developer tools such as Jenkins, Atlassian Bamboo, Azure DevOps, and Microsoft Visual Studio, ensuring security fits naturally into existing workflows. AI-driven analysis prioritizes vulnerabilities and dramatically reduces false positives by customizing rules and scan depths, speeding up development cycles by up to 25%. OpenText SAST meets compliance benchmarks like OWASP 1.2b, offering developers detailed guidance to efficiently fix issues and improve code quality. Its flexible deployment options include multi-tenant SaaS, private cloud, and on-premises installations, allowing organizations to scale securely and according to their infrastructure needs. Backed by a dedicated Software Security Research team, the solution receives agile updates to stay current with emerging threats. Customers praise the tool for reducing manual code review efforts while increasing vulnerability detection accuracy.
  • 5
    CyberEasy Reviews

    CyberEasy

    Knogin

    $7 per user per month
    An Exceptional Threat Detection Solution for Individuals and Organizations. Your IT and information security personnel face immense challenges in safeguarding the network against outside threats while also mitigating the risk of data breaches caused by internal mistakes. CyberEasy empowers you to take control of your digital landscape while minimizing expenses. Our mission is to make cybersecurity accessible to everyone by ensuring it is user-friendly and fits within virtually any financial plan. With CyberEasy, you can confidently navigate the complexities of digital security without breaking the bank.
  • 6
    HushHush Data Masking Reviews
    Modern enterprises encounter severe repercussions if they fail to comply with the growing privacy standards set by regulators and the public alike. To stay competitive, vendors must continuously integrate advanced algorithms aimed at safeguarding sensitive information such as Personally Identifiable Information (PII) and Protected Health Information (PHI). HushHush leads the way in privacy defense through its innovative PII data discovery and anonymization tool, which is also referred to as data de-identification, data masking, and obfuscation software. This tool assists organizations in locating, classifying, and anonymizing sensitive data, ensuring compliance with regulations like GDPR, CCPA, HIPAA/HITECH, and GLBA. It offers a suite of rule-based atomic add-on components that empower users to build robust and secure data anonymization strategies. HushHush's solutions are pre-configured to effectively anonymize both direct identifiers, such as Social Security Numbers and credit card information, as well as indirect identifiers, utilizing a combination of fixed algorithms tailored for this purpose. With such versatile capabilities, HushHush not only enhances data security but also fortifies trust with clients regarding their privacy.
  • 7
    VdoCipher Reviews

    VdoCipher

    VdoCipher Media Solutions

    $129 per user, per year
    VdoCipher video streaming can't be downloaded with any internet plugins. VdoCipher provides a complete video hosting solution for media, marketing and e-learning businesses. The videos streamed through VdoCipher are not available for download by hackers, plugins, or downloaders. Hollywood has certified DRM to prevent piracy. Ip address, user ID, email id and phone number. Screen captures can be customized in size, color and speed. Amazon AWS for Servers + CDN Transcoding, Analytics and Dashboard, Plugins, Custom Workflows. Player customizable with subtitles, speed changes, forward rewind and other options. Viewer can download the secure android app and then play offline. DRM encrypted video streaming technology guarantees that no plugin or downloader can grab your content. Widevine DRM offers the highest level of security against video piracy. Viewer-specific static/moving watermark with email, IP, and time stamp. You can customize the color, speed, transparency, and size of your watermark.
  • 8
    SD Elements Reviews
    Today, Security Compass is a pioneer in application security that enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows. To better understand the benefits, costs, and risks associated with an investment in SD Elements, Security Compass commissioned Forrester Consulting to interview four decision-makers with direct experience using the platform. Forrester aggregated the interviewees’ experiences for this study and combined the results into a single composite organization. The decision-maker interviews and financial analysis found that a composite organization experiences benefits of $2.86 million over three years versus costs of $663,000, adding up to a net present value (NPV) of $2.20 million and an ROI of 332%. Security Compass is the trusted solution provider to leading financial and technology organizations, the US Department of Defense, government agencies, and renowned global brands across multiple industries.
  • 9
    SendSafely Reviews

    SendSafely

    SendSafely

    $11.50/user/month
    SendSafely is a comprehensive end-to-end encryption solution tailored for contemporary businesses. It allows for the effortless sharing of encrypted files and sensitive information across any device, simplifying secure file exchanges. With a focus on security, it is trusted by prominent brands that prioritize the safeguarding of customer data. The platform is compatible with all major web browsers, requiring no software installation or management of encryption keys. Designed to aid in compliance with essential regulations such as HIPAA, GDPR, and CCPA, SendSafely offers a Business Associate Agreement (BAA) for added assurance. Users can choose from various pre-built integrations or create custom solutions using the developer API. The platform includes business-specific features like user management, single sign-on, and options for custom branding. Furthermore, SendSafely connects seamlessly with numerous popular third-party systems, enhancing them with end-to-end encryption. This capability allows businesses to incorporate encryption into their existing workflows, thus extending the functionality of their current applications and infrastructure. In today’s digital landscape, ensuring the security of data exchange is not just a necessity, but a vital component of maintaining trust with clients.
  • 10
    Auth.GG Reviews

    Auth.GG

    Auth.GG

    $14.95 one-time payment
    Securely license and sell your software with our innovative solutions. We empower software developers by offering an unparalleled level of protection for their applications, emphasizing the importance of product security in our practices. Our experienced developers are dedicated to safeguarding your software effectively. We strive to provide a comprehensive panel tailored to all your needs without straining your budget. Utilizing industry-standard cryptographic techniques, our team ensures optimal performance and security for your products. Additionally, we have a committed support team ready to help you resolve any issues that may arise with our services. Our mission is to create fully featured panels that stand out from the competition, ensuring customer satisfaction. Designed with user-friendliness in mind, our panel is visually appealing and highly functional. Moreover, our multilingual authentication system enables you to license your software in nearly any programming language. You will have the ability to oversee all your users, generate licenses effortlessly, and review logs for comprehensive management. With our solutions, you can focus on developing your software while leaving the security and licensing complexities to us.
  • 11
    idgard Reviews

    idgard

    Uniscon

    $49.90 per month
    Collaboration at the highest level possible of data protection. Idgard cloud saas - ultra-secure file transfer and data room. More than 1,200 companies have already placed their trust in idgard. This web service enables digital communication and collaboration at the highest levels with customers and partners. It also simplifies them. idgard makes it easy to create data rooms for projects. They make file sharing easy and secure. Users can access their data via browser or app on the go. They are private and cannot be accessed by anyone else. This protection is provided by the internationally patentable sealed cloud technology. It automates key management. Instead of getting bogged down with technical questions, users can concentrate on their jobs. idgard is trusted by over 1.200 businesses. Over 70.000 users trust idgard. Simple and secure online storage and exchange of data.
  • 12
    Knowee Reviews

    Knowee

    Knowee

    $5 per user per month
    Knowee revolutionizes the traditional concept of business cards by turning them into an eco-friendly digital communication tool. With an alarming statistic of 2,400 trees being cut down daily for physical cards, and 60 million being printed each day, the environmental consequences are significant, resulting in an annual emission of 746,594 tons of CO2. As our work habits evolve, particularly in a remote setting, Knowee provides a modern solution for self-introduction that is not only paperless but also rich in multimedia content like videos. This innovative digital card can be seamlessly integrated into your email signature, enhancing your corporate identity with customizable templates that offer centralized management and valuable usage insights. Features such as corporate cardholder integration, CRM capabilities, domain URL masking, and anti-phishing measures ensure a secure and professional presentation. With the traditional method resulting in 88% of physical cards being lost, Knowee offers functional cards accessible on any device without requiring sign-up or prior knowledge, allowing users to share their information instantly via email, WhatsApp, text, Bluetooth, NFC, or AirDrop. Ultimately, this approach promotes a more sustainable and efficient way to network in today's digital age while minimizing environmental impact.
  • 13
    Libraesva Email Security Reviews
    Libraesva Email Security shields your organization from both established and emerging email threats, ensuring that only genuine messages reach you. It offers top-notch email protection through the fusion of cloud email and a secure email gateway, enhanced by Libraesva's distinctive Adaptive Trust Engine. This engine utilizes AI to comprehend typical behavioral patterns within organizations and among individuals, continuously evaluating the trustworthiness of business interactions and preemptively flagging unusual activity. Libraesva Email Security meticulously scans and sifts through all incoming and outgoing emails, identifying and thwarting advanced malware, phishing attempts, business email compromises, spam, and other risks. Its exclusive sandboxing technology disarms hazardous payloads and active content within attachments, while proactive URL analysis scrutinizes every link to shield users from accessing harmful websites.
  • 14
    Alexio Defender Reviews

    Alexio Defender

    Alexio Corporation & Healthcare Compliance Network

    $24.99 per user, per month
    Now is the moment to protect your data, and we are ready to assist you. A staggering 92% of Canadians express concerns regarding the privacy and security of their information. Strengthen your systems and personnel defenses with Alexio. Reduce expenses, as Alexio utilizes automation to handle most updates, repetitive tasks, and monitoring continuously, making it far more efficient and secure, without incurring costs for manual labor. With automated maintenance, we deliver award-winning solutions that apply necessary updates, ensuring your systems and major applications are consistently up to date, which enhances your safety and minimizes glitches. Alexio employs a comprehensive, multi-layered strategy to security; while antivirus is a crucial element, our approach extends further by incorporating machine learning, AI, and automation for ongoing protection. Additionally, the Alexio team asserts that if you cannot provide a report on it, it cannot be considered reliable. Thus, Alexio supplies daily evidence confirming that security measures are effectively implemented, ensuring peace of mind for our clients. By choosing Alexio, you take a significant step toward safeguarding your digital environment.
  • 15
    DNS Check Reviews

    DNS Check

    Wind Serve

    $8 per user per month
    Simplifying DNS checks. With DNS Check, you can effortlessly monitor, share, and troubleshoot your DNS records. You can keep an eye on DNS records and name servers for any alterations or lookup failures, receiving notifications whenever a change occurs. You have the option to import your complete zone file or selectively monitor only the records that matter most. For sharing purposes, you can request updates on DNS records by providing a link that indicates which records are accurate and which are not, with alerts for any detected updates. Troubleshooting DNS issues is a breeze; if something malfunctions, our DNS checker will help you determine if a DNS problem exists and guide you on what needs fixing. Central to DNS Check is the DNS record checking tool that evaluates the DNS records you input against the responses from DNS servers. If a problem arises, this tool allows for quick identification of issues, including unresponsive name servers and incorrect IP addresses being returned. Additionally, our service aims not only to identify issues but also to empower users with knowledge on how to effectively resolve them.
  • 16
    DATPROF Reviews
    Mask, generate, subset, virtualize, and automate your test data with the DATPROF Test Data Management Suite. Our solution helps managing Personally Identifiable Information and/or too large databases. Long waiting times for test data refreshes are a thing of the past.
  • 17
    Ciphermail Appliance Reviews

    Ciphermail Appliance

    in-put

    $670 one-time payment
    Email encryption is crucial for safeguarding communications, as most emails are transmitted in unencrypted plain text, which exposes their content to anyone who can access the data stream. This lack of security is often unacceptable for businesses, organizations, and institutions, and could potentially breach relevant legal requirements. To enhance security and foster trust in communications, CipherMail serves as a central mail transfer agent (MTA) operating on a “store and forward” model. It temporarily stores incoming emails from both internal and external sources until they are encrypted or decrypted, enabling seamless forwarding to the recipient without requiring any modifications to the email client and working in conjunction with any SMTP server. Email encryption methods supported by CipherMail include S/MIME, PGP, or even embedding within a PDF file, and can be initiated based on specific triggers, such as keywords in the subject line. Additionally, CipherMail is equipped with a Data Leak Prevention (DLP) module to provide further protection against unauthorized data exposure. This comprehensive approach to email security not only protects sensitive information but also reinforces the integrity of electronic communications across various platforms.
  • 18
    Tenable Cloud Security Reviews
    The cloud security platform that is actionable. Reduce risk by quickly exposing and closing security gaps caused by misconfigurations. CNAPP solutions replace a patchwork product that can cause more problems than it solves, such as false positives or excessive alerts. These products are often only partially covered and create friction and overhead with the products that they're meant to work with. CNAPPs are the best way to monitor cloud native applications. They allow businesses to monitor cloud infrastructure and application security as a group, rather than monitoring each one individually.
  • 19
    Amazon Detective Reviews
    Examine and visualize security information to swiftly uncover the underlying causes of possible security threats. Amazon Detective simplifies the process of analyzing and investigating, allowing for a quick identification of the origins of potential security concerns or unusual behaviors. By automatically gathering log data from your AWS resources, Amazon Detective employs machine learning, statistical methods, and graph theory to create an interconnected dataset that facilitates quicker and more efficient security probes. Additionally, AWS security services, such as Amazon GuardDuty, Amazon Macie, and AWS Security Hub, along with third-party security solutions, can help recognize potential security issues or alerts. These tools are invaluable for notifying you of irregularities and guiding you on how to resolve them. However, there may be instances when a security alert requires a deeper investigation, necessitating a thorough analysis of additional information to pinpoint the root cause and take appropriate action. Such comprehensive investigations can enhance your overall security posture and responsiveness to threats.
  • 20
    Check An Invoice Reviews

    Check An Invoice

    Check an Invoice

    $35 per month
    Intelligent, Safe, and Effortless. Elevate your document processing experience with our innovative solutions. Our services are fully adaptable, enhanced by cutting-edge AI technology that transforms your workflow into something remarkable. Your data's security is our utmost concern. With our automation, you can slash your document processing expenses by half! What sets us apart is our efficient documentation procedure. Observing the shortcomings of traditional OCR scanning systems, we took the initiative to redesign the process. Rather than hopping from one step to another, we seamlessly take charge and finalize checks in mere minutes, allowing you to focus on other essential tasks! Integration with your ERP system is another key feature. To streamline your operations, once you've approved our checks, we effortlessly upload the information directly into your ERP, eliminating the need for tedious manual data entry! Embrace the digital transformation of paperwork. The future lies in a paperless world, and our service empowers your business to easily manage and digitize documents with ease. So why not join us on this journey toward efficiency and innovation?
  • 21
    ManagedMethods Reviews
    ManagedMethods simplifies security for K-12 institutions using Google Workspace and Microsoft 365. This platform is designed for school district IT teams, enabling them to effectively manage risks related to data security and monitor student safety indicators in the cloud. With ManagedMethods, K-12 IT teams can easily and affordably detect potential cyber safety issues and data security threats within their Google Workspace and Microsoft 365 accounts. The service continuously monitors and audits the Google for Education and/or Microsoft 365 for Education environments, covering all aspects such as files in Drive and Shared Drives, Gmail, Google Meet, Google Chat, and Microsoft 365 resources stored in SharePoint and OneDrive, as well as Outlook 365 and Exchange. Users can establish automated monitoring for security signals and risk policies, along with generating audit reports, ensuring they have a clear understanding of activities within their district’s cloud applications. Additionally, this proactive approach allows schools to maintain a safer digital environment for both staff and students.
  • 22
    Drone Reviews
    Configuration as code allows for pipelines to be set up using a straightforward and legible file that can be committed to your git repository. Each step in the pipeline runs within a dedicated Docker container, which is automatically retrieved at the time of execution. Drone is compatible with various source code management systems, effortlessly integrating with platforms like GitHub, GitHubEnterprise, Bitbucket, and GitLab. It supports a wide range of operating systems and architectures, including Linux x64, ARM, ARM64, and Windows x64. Additionally, Drone is flexible with programming languages, functioning seamlessly with any language, database, or service that operates in a Docker container, offering the choice of utilizing thousands of public Docker images or providing custom ones. The platform also facilitates the creation and sharing of plugins by leveraging containers to insert pre-configured steps into your pipeline, allowing users to select from hundreds of available plugins or develop their own. Furthermore, Drone simplifies advanced customization options, enabling users to implement tailored access controls, establish approval workflows, manage secrets, extend YAML syntax, and much more. This flexibility ensures that teams can optimize their workflows according to their specific needs and preferences.
  • 23
    Appknox Reviews
    Accelerate the launch of top-tier mobile applications into the marketplace without sacrificing security. Entrust the development and deployment of exceptional mobile apps for your organization to us, allowing you to focus on your business while we handle mobile app security. Recognized as a leading security solution by Gartner, we take pride in how the Appknox platform protects our clients’ applications from all potential vulnerabilities. At Appknox, our commitment to providing Mobile Application Security empowers businesses to reach their goals both now and in the future. Our Static Application Security Testing (SAST) employs 36 diverse test cases to uncover nearly all vulnerabilities hidden within your source code, ensuring compliance with security standards like OWASP Top 10, PCI-DSS, HIPAA, and other prevalent security threat metrics. Additionally, our Dynamic Application Security Testing (DAST) identifies sophisticated vulnerabilities while your application is live, providing an extra layer of protection. Through our comprehensive security solutions, we strive to create a safer mobile environment for all users.
  • 24
    ThreatWatch Reviews
    Stay updated on new threats with our real-time, machine-curated threat intelligence. Identify and prioritize potential risks up to three months in advance compared to leading scanning solutions, eliminating the need for redundant scans or agents. Leverage Attenu8, our AI-driven platform, to focus on the most critical threats. Protect your DevOps pipeline from open source vulnerabilities, malware, code secrets, and configuration challenges. Safeguard your infrastructure, network, IoT devices, and other assets by representing them as virtual entities. Effortlessly discover and manage your assets through a straightforward open-source CLI. Decentralize your security functions with immediate alerts. Seamlessly integrate with MSTeams, Slack, JIRA, ServiceNow, and other platforms through our robust API and SDK. Maintain an edge over your adversaries by staying informed about emerging malware, vulnerabilities, exploits, patches, and remediation steps in real-time, powered by our advanced AI and machine-curated threat intelligence. With our solutions, your organization can ensure comprehensive security across all its digital assets.
  • 25
    Jamf Protect Reviews

    Jamf Protect

    Jamf Protect

    $5 per user, per month
    Endpoint protection designed exclusively for Mac. Jamf Protect protects MacOS from malware. It can detect and remove Mac-specific threats and monitor endpoints to ensure compliance. Jamf Protect is designed for Mac. Jamf Protect shines a spotlight on Apple, assisting security and IT teams with Macs in organizations of all sizes. Tools that are familiar with the Mac platform will help you scale your teams. Jamf Protect helps you maintain Mac endpoint compliance. It also addresses anti-virus needs by preventing macOS-specific malware. It can also control Mac applications within the organization. Jamf Protect has minimal impact on the device and end-user experience. Jamf Protect provides comprehensive information about Mac-specific malware to help you prevent it from running on your device and quarantine them for further analysis. Jamf Protect can limit the execution of unwanted software to protect your computer. Detect. Protect your Mac from sophisticated attacks