Best Network Security Software in China

Find and compare the best Network Security software in China in 2025

Use the comparison tool below to compare the top Network Security software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    AIONCLOUD Reviews

    AIONCLOUD

    AIONCLOUD

    $35 per month
    Traditional networks were located in data centers and connected users to secure applications. However, many applications are moving to a Software-as-a-Service (SaaS) model located on the cloud. Traditional network security is not effective in solving the problem because of the number of users and devices that are connected all around the world. MONITORAPP provides Security-as-a-Service (SECaaS) on its cloud-based service platform AIONCLOUD. AIONCLOUD provides Website Protection and Secure Internet Access to ensure smooth business operations. AIONLCOUD Website Security implemented on edge networks has the same performance as physical servers. Application performance and security can be maintained regardless of where your application is located. This includes cloud, multi-cloud, and data centers.
  • 2
    Haystax Reviews

    Haystax

    Haystax Technology

    Our platform analyzes threats and prioritizes risks, allowing leaders and operators to take action when it is most important. Instead of mining a vast amount of data to generate threat intelligence, we first create a system that transforms human expertise into models capable of evaluating complex security problems. We can then automatically score high-priority threats and quickly deliver them to the right people by using analytics. To enable our users to manage critical assets and respond to incidents, we have built a tightly integrated ecosystem of web and mobile apps. Our Haystax Analytics Platform, which can be used on-premises or in the cloud, is a platform for early threat detection and situational awareness. It also allows information sharing. Continue reading to learn more.
  • 3
    ClrStream Reviews

    ClrStream

    Mithi Software Technologies

    29% of businesses that suffer a data breach lose revenue. Email is the most common target of attack. ClrStream will protect your email systems. ClrStream is a security and continuity solution that can be used with MS Exchange, Office 365. 88% of businesses suffer data loss, with email being the main culprit. Email scrubbing solution that guarantees protection against Malware, Ransomware and Virus. It has low latency for mail delivery and a low number of false positives. A peripheral, outside-of-environment solution that can be used to protect against DDOS attacks. This solution can provide email continuity when the primary mail server goes down or is unavailable. A solution that offers built-in redundancies, scale, and eliminates the need to use a mail parking service. A cloud-based SaaS service that reduces bandwidth usage and eliminates management headaches.
  • 4
    Sepior Reviews
    Multiparty Computation (MPC), which generates keys in the form distributed key shares, eliminates the need for a single key on any device. This eliminates single points of failure. Sepior offers next-generation key management technology to allow businesses to transact online using institutional-grade cryptocurrency wallets, private Blockchains, and SaaS apps. Sepior is leading the industry transition towards threshold cryptography. Sepior uses multiparty computation (MPC), to address the need to protect data confidentiality, integrity, as well as the availability of new and evolving online services. Sepior is a solution for institutional traders and cryptocurrency exchange providers. It secures private keys that are stored in wallets and facilitates institutional-grade wallet security for service providers. Sepior's method also significantly reduces the mining workload and simplifies on-chain operations.
  • 5
    StreamScan MDR Reviews
    Medium-sized businesses are just as critical to network security as multinationals. One in four Canadian companies, regardless of size, will have their networks compromised every year. StreamScan was the first to offer affordable cybersecurity solutions that were specifically priced for small and medium-sized businesses. StreamScan's Managed Detection & Response service (MDR), leverages our AI-powered network monitoring Cyberthreat Detection Systems (CDS) technology. This allows you to get enterprise-level protection at a cost that makes sense.
  • 6
    Unistal Anti Virus Reviews

    Unistal Anti Virus

    Unistal Systems

    $49 one-time payment
    Unistal is synonymous with data security. Unistal's Protegent brand is the most powerful and fastest antivirus. Protegent is derived from the French word "Protegee", which means "To Protect". Protegent products are designed to protect your business, data, and computer/laptop. It is the only antivirus that has built-in data recovery software. It comes in three versions: Protegent antivirus and Total Security. Unistal has created a powerful solution that eliminates all unwanted viruses threats and makes your computer virus-free! Protegent Antivirus protects your computer from all types of Malware and also offers Pro-active data recovery software that will ensure that no data/files are lost due to any type of logical crash. Protegent Antivirus has the only inbuilt data recovery software.
  • 7
    Pwn Pulse Sensor Reviews
    Pwn Pulse Sensor gives you total device visibility by creating a baseline security profile and enforcing network controls across physical locations. It is easy to deploy without needing to install or manage agents. Real-time discovery of all IT/IoT devices, wired and wireless, on the network and in the airspace. Automatically create comprehensive fingerprints for all devices, including their manufacturer, OS, ports and running services. Analyze snapshots and correlate interfaces to create unique device identities. You can also track their behavior and change.
  • 8
    indeni Reviews
    Indeni's security infrastructure platform automates firewall health monitoring and automatically detects license expirations or misconfigurations before they impact network operations. It prioritizes issues automatically so that you only get the most important alerts. Indeni takes a snapshot of your cloud environment before it is built. Our cloud security analysis tool, Cloudrail, reviews your infrastructure-as-code files so you can identify violations earlier in development when they're easier to fix. Continuous detection of HA unreadiness due to cross-device inconsistencies with security policies, forwarding table, and other configurations. Consistent measurement that device configuration skews against locally-defined organizational standards. Collect relevant configuration and performance data from firewalls, load balancers and other security infrastructure.
  • 9
    NetBarrier X9 Reviews
    Protect your network at home and on the move with Network Protection Two-way Firewall responds instantly to all outgoing and incoming network connections. Anti-spyware measures include monitoring all application activity 24/7. Protection of networks based on location. Unknown devices and applications are protected without worrying.
  • 10
    Radware Bot Manager Reviews
    Your online business is protected using machine learning and collective bot intelligence. This ensures best-in-class protection. Radware Bot Manager (formerly ShieldSquare), a bot prevention service, is capable of processing billions of pages and is constantly learning to ensure that no legitimate traffic to your website or mobile app is blocked. Radware Bot Manager uses an API-based approach to integrate with your existing infrastructure, rather than the DNS rerouting technique used in other bot detection tools. Radware Bot Manager offers Cloud Connectors as well as Web server plugins for quick start. Complete bot protection is provided by a lightweight JavaScript and REST API code embedded on your webpage.
  • 11
    vArmour Reviews
    Modern cloud-based, remote-accessed 24/7 enterprises do not require legacy perimeters. Hybrid environments can be complex. People can work from anywhere and at any time. You don't know where your applications, infrastructure, and data are located, nor the millions of interconnections between them. vArmour allows you to automate, analyze, then act. Now. Based on what's happening right now or last week. No new agents. No new infrastructure. Your enterprise has full coverage so you can get up and running quickly. You can create security and business policies to protect your assets and business. This will reduce risk, ensure compliance, and build resilience. Enterprise-wide protection designed for today's world, not yesterday.
  • 12
    USEReady Reviews
    USEReady is a data, analytics, and AI solutions firm headquartered in New York. With over a decade of experience, USEReady helps organizations transform data into actionable insights and achieve business goals. The company offers migration automation tools like STORM and MigratorIQ, along with Pixel Perfect for enhanced enterprise reporting. Plus, its two practices viz., Data Value, which focuses on modern data architectures and BI & AI initiatives, and Decision Intelligence, which empowers informed decisions and drives business outcomes through AI lend further credence to its focus on data-driven transformation. With a global team of 450+ experts and offices in the U.S., Canada, India, and Singapore, USEReady has served over 300 customers, including Fortune 500 companies across various industries. The company partners with industry leaders like Tableau, Salesforce, Snowflake, Starburst, and AWS, and has received multiple awards, including Tableau Partner of the Year.
  • 13
    Imperva Advanced Bot Protection Reviews
    Protect your websites, mobile apps, and APIs against automated attacks without affecting business-critical traffic. Bad bots can cause serious damage to your business through online fraud, such as account takeovers and competitive price scraping. Imperva's Advanced Bot Protection can reduce negative business effects and eliminate bad bot traffic. Advanced Bot Protection will transform your online business performance. Flexible deployment options are available to meet your business needs. Use Imperva's Cloud Application Security platform, or a Connector for popular technology stacks. Advanced Bot Protection allows visibility and control over bot traffic, good and bad, without imposing any friction on legitimate users.
  • 14
    Qrator  Reviews
    Qrator Labs' filtering network enables small and large businesses to protect themselves from DDoS attacks of any kind, regardless of their bandwidth or complexity. Qrator Labs offers multiple connections options, including DNS and BGP. The latter allows protection of all infrastructure against any attack. Qrator Labs does not require the involvement of qualified specialists or manual configuration to protect against DDoS attacks. Qrator Labs has highly qualified engineers who can assist customers through all communication channels. If the SLA level is not met or the service does not meet the stated quality, the client will not pay for the service. Qrator Labs has enough computing power and channel capacity to process more than 3,000 Gb per second.
  • 15
    Ivanti Connect Secure Reviews
    Zero trust access to the cloud or data center. Secure, reliable access leads to higher productivity and lower costs. Before granting access to cloud, it ensures compliance. Data protection via lockdown mode and always-on VPN. This is the most widely used SSL VPN for all sizes of organizations and in every industry. One client allows remote and on-site access to reduce management complexity. Directory Services, Identity Services. Before connecting, ensure that all devices meet security requirements. Access to cloud-based and on-premise resources is simple, secure, and easy. On-demand, per application and always-on VPN options protect data-in-motion. Centrally manage policy, track users, devices, security status, and access activity. You don't need to install anything to access web-based apps or virtual desktop products. Access to and protection of data for compliance with industry regulations.
  • 16
    Netskope Reviews
    Today, there are more users and data outside of the enterprise than inside. This is causing the network perimeter we know to be dissolved. We need a new perimeter. One that is built in cloud and tracks and protects data wherever it goes. One that protects the business without slowing down or creating unnecessary friction. One that allows secure and fast access to the cloud and the web via one of the most powerful and fastest security networks in the world. This ensures that you don't have to compromise security for speed. This is the new perimeter. This is the Netskope Security Cloud. Reimagine your perimeter. Netskope is committed to this vision. Security teams face challenges in managing risk and ensuring that the business is not affected by the organic adoption of mobile and cloud technology. Security has been able to manage risk traditionally by using heavy-handed controls. However, today's business wants speed and agility. Netskope is changing the definition of cloud, network and data security.
  • 17
    FireMon Reviews
    Comprehensive visibility across your entire network is essential for maintaining strong security and compliance. Learn how to gain real-time visibility into and control over complex hybrid network infrastructure, policies, and risk. Security Manager gives you real-time visibility, control and management of network security devices in hybrid cloud environments. It is a single pane. Security Manager offers automated compliance assessment capabilities that validate configuration requirements and alert when violations occur. Security Manager allows you to create customized reports or get audit reports right out of the box. This reduces the time spent configuring policies and gives security to ensure you are ready to meet regulatory or internal compliance audit requirements.
  • 18
    SmartFlow Reviews

    SmartFlow

    Solana Networks

    $5000 per year
    SmartFlow, an IT cyber security monitoring tool, uses Anomaly Detection (to pinpoint difficult-to-detect security threats). SmartFlow is an addition to existing signature-based security monitoring tools. It analyzes network traffic to detect zero-day security threats. Smartflow is an appliance-based solution that is targeted at medium and large businesses. SmartFlow uses patent-pending network behaviour analysis and anomaly detection techniques to identify security threats in a network. It uses Solana algorithms to analyze flow data such Netflow to detect malware, DDoS attacks and Botnets. Signature-based security monitoring tools may not detect zero day threats or encrypted malicious traffic (such Botnet Command & Control). SmartFlow will detect them. SmartFlow analyzes network traffic and flows data to produce more than 20 statistical measures that it continuously analyzes in order to detect cyber threats early.
  • 19
    Barracuda Spam Firewall Reviews

    Barracuda Spam Firewall

    Barracuda Networks

    $699.99/one-time
    Malicious email, spam and viruses are becoming more sophisticated. Your corporate email can be a gateway to sensitive information that can be lost or destroyed, as well as attacks that can affect your network performance and employees productivity. The Barracuda Spam firewall scans email and incoming files with three layers of powerful virus scanning technology. To provide the best protection against email-borne threats, the firewall connects with the Barracuda Safety Cloud. Not all threats come from the outside. The firewall checks for internal tainted emails to prevent viruses from spreading. Barracuda is the industry's leader in spam protection for business. Barracuda Spam Firewall uses Barracuda Central for email detection from spammers. It also determines if domains embedded in emails lead to spam or malware sites.
  • 20
    iPrism Web Security Reviews
    iPrism Web Security combines fine-grained content filtering with threat detection and mitigation methods to provide powerful protection against Advanced Persistent Threats (botnets, viruses, and others). iPrism Web Security is easy to use and "set it and forget". It is self-contained to provide advanced threat protection, policy enforcement, and requires almost no maintenance. Our comprehensive reporting makes managing your network easy. iPrism employs a unique combination of iGuard's automated intelligence and human analysis to block malware, Crypto-Locker, and other inappropriate sites. It improves user productivity by reducing latency and false negative rates. This innovative approach ensures that you have the most up-to-date, advanced web protection available 24/7 and is supported by world-class customer service.
  • 21
    Privatoria Reviews

    Privatoria

    Privatoria

    $2.74 per user per month
    If you are concerned about your online dzafetu, there are tru dzome ways that will conceal your identity. Today's most popular modzt are those that hide your ir. These methods are able to evade the use of rroxu server and software rrogramdz. VPN is a great tool to keep you anonymous and secure. It establishes a secure, encrypted connection between you (and the accessed website). All traffic that you send to a VPN server goes through an encrypted tunnel. No one can see it once it leaves the tunnel and reaches the public internet. Your personal data will remain secure even after it leaves the tunnel if you connect to websites using HTTPS encryption. VPN protects information and leaves no footprints when surfing the internet.
  • 22
    Chariot Reviews
    Chariot is the first offensive security platform that can comprehensively catalog Internet-facing assets, contextualize their value, identify and validate real compromise paths, test your detection response program, and generate policy-as code rules to prevent future exposures. We are a concierge managed service and work as an extension to your team to help reduce the burden of daily blocking and tackling. Your account is assigned to dedicated offensive security experts who will assist you throughout the entire attack lifecycle. Before you submit a ticket to your team, we remove the noise by verifying that every risk is accurate and important. Our core value is to only signal when it matters and to guarantee zero false positives. Partner Praetorian to get the upper hand over attackers Our combination of security expertise and technology automation allows us to put you back on your offensive.
  • 23
    Secure My Files Reviews

    Secure My Files

    SecuSimple

    $14.99 one-time payment
    Secure My Files Mini or SMF, is a JavaScript library that encrypts documents using browser-based encryption. SMF uses symmetric encryption algorithms (AES using a 256-bit Cypher) to encrypt or decrypt files. Secure My Files is an application that can be used as such. The sources can be deployed on your own server. Everything is static so any web server can run it. SMF can be used as a library. First, you need to add the JavaScript script to the page. A password is required to encrypt or decrypt files. Github has the source code available for everyone to view. Everyone can contribute to security by detecting and fixing bugs. Our servers and we are located in Europe. Secure My Files can be customized to your liking. Use as a library in a custom application.
  • 24
    beSECURE Reviews

    beSECURE

    Beyond Security (Fortra)

    Vulnerability Management and Assessment that is flexible, accurate, and low-maintenance. This solution delivers solid security improvements. This product is designed to provide the best and most efficient network security improvement tailored to your company's needs. Continuously scan for application and network vulnerabilities. Daily updates and specialized testing methods to detect 99.99% of vulnerabilities. Flexible reporting options that are data driven to empower remediation teams. *Bug bounty program* to cover any false positives that are discovered. Total organizational control.
  • 25
    Safend Protector Reviews
    Safend Protector detects and blocks data leakage from both internal and external sources by monitoring endpoint devices. Protector uses granular, customizable security policies and rules to automatically detect, permit and restrict files and encrypt media devices. Protector is intuitive and compliant with PCI, HIPAA and EU GDPR. Protector's AV SCAN prevents viruses from entering removable devices. It blocks every device as soon as it is inserted. It then checks for viruses and allows usage according to policies and rules. AV SCAN interfaces to most anti-virus software already used to protect data networks. It permits devices when there are no viruses and blocks any devices that are contaminated. Endpoint connectivity can be restricted, blocked or blocked without compromising security.