Best Security Compliance Software in China

Use the comparison tool below to compare the top Security Compliance software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Feroot Reviews

    Feroot

    Feroot Security

    28 Ratings
    See Software
    Learn More
    Feroot Security is a global leader in AI-powered website and web application compliance and security. Feroot AI protects digital experiences from hidden threats while continuously enforcing compliance with PCI DSS 4.0.1, HIPAA rules on online tracking technologies, CCPA/CPRA, GDPR, CIPA, and over 50 global laws and standards. The Feroot AI Platform replaces manual compliance work and operational overhead with continuous automation. What once required months of effort across security, engineering, and legal teams can now be deployed in minutes, delivering real-time protection and audit-ready evidence. Feroot unifies critical capabilities into a single platform, including JavaScript behavior analysis, web compliance scanning, third-party script monitoring, consent enforcement, and data privacy posture management. It is purpose-built to detect and stop web-based threats such as Magecart, formjacking, e-skimming, and unauthorized tracking on high-risk assets like payment pages, login flows, iframes, and healthcare portals. Trusted by Fortune 500 enterprises, healthcare providers, retailers, SaaS platforms, utilities, payment service providers, universities, and public sector organizations, Feroot safeguards hundreds of millions of users worldwide. Feroot AI solutions include PaymentGuard AI, HealthData Shield AI, AlphaPrivacy AI, CodeGuard AI, and MobileGuard AI. Visit feroot for more information.
  • 2
    Jscrambler Reviews
    See Software
    Learn More
    Jscrambler offers a comprehensive solution for security compliance through a single platform designed for client-side protection, crucial for adhering to standards such as PCI DSS v4, GDPR, and HIPAA. This platform enables organizations to secure all application code simultaneously while granting full oversight and management of third-party tags and pixels on their websites and payment interfaces. To enhance Code Integrity, Jscrambler employs polymorphic obfuscation and Runtime Self-Protection (RASP), which fortify first-party JavaScript against tampering and exposure, safeguarding the integrity of data processing logic. Through Webpage Integrity, the solution facilitates real-time monitoring and the enforcement of policies for all third-party scripts, effectively preventing unauthorized access to data and exfiltration (including risks like digital skimming). This ensures that payment and data-sensitive pages are in complete alignment with regulatory requirements. This holistic security framework provides the essential evidence and safeguards needed for more efficient compliance.
  • 3
    optivalue.ai Reviews

    optivalue.ai

    optivalue.ai

    Free
    3 Ratings
    See Software
    Learn More
    Transform the challenge of security compliance from a reactive task into a streamlined, automated advantage with Optivalue.ai. Our innovative AI platform empowers security, GRC, and compliance teams to effectively tackle questionnaires and audits. Streamline your process by automating responses for security questionnaires (such as CAIQ, SIG) and vendor risk assessments, cutting down manual effort by as much as 90%. This allows your team to shift their focus towards strategic initiatives rather than getting bogged down in spreadsheets. Our AI seamlessly integrates with your central source of truth for controls, producing precise drafts within minutes. Move beyond simple answers and provide verifiable evidence. Each assertion is backed by a credible source, including the relevant policy, page, and date. This comprehensive approach not only establishes an undeniable audit trail but also fosters client trust and speeds up sales cycles that may be delayed by security evaluations. Stay perpetually audit-ready with Optivalue.ai, which continuously reviews your documentation for compliance gaps, enabling proactive management. Our subscription model accommodates unlimited users, so you can get started today with a 14-day free trial—no credit card needed and no strings attached.
  • 4
    GlobalSUITE Reviews

    GlobalSUITE

    GlobalSuite Solutions

    Not available
    1 Rating
    GlobalSUITE Solutions applications simplify compliance with industry frameworks and promote adherence to best practices derived from a comprehensive collection of global standards and specific regulations. This solution enhances the management of your Security and Cybersecurity System by eliminating outdated manual processes that can hinder equipment efficiency. Clients can commence operations immediately, without the hassle of spending time on loading various compliance and risk catalogs, methodologies, and controls. Everything is set up to streamline processes, allowing you to concentrate on what truly matters—achieving your objectives. We also assist with a risk analysis that is flexible enough to fit any methodology, enabling you to conduct assessments using risk maps and automated dashboards. Furthermore, the system facilitates the creation of an automated adequacy plan with workflows that provide period comparisons and maintain a record of compliance history, ensuring you remain informed and proactive in your security practices. This comprehensive approach not only saves time but also enhances the overall effectiveness of your security measures.
  • 5
    Teramind Reviews

    Teramind

    Teramind

    $12/month/user
    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live and recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.
  • 6
    Spambrella Reviews

    Spambrella

    Spambrella

    $1.00
    Dynamically classify fake email. Preventively identify suspicious URLs and sandbox them. Big-data analysis can be used to accurately classify bulk mail. All this in one service that connects to Google Workspace and Microsoft 365. Spambrella's Email Security & User Awareness Training technology is used in many of the world's most successful security-conscious businesses across many continents and environments. Spambrella can help you unify your email security requirements and user awareness training needs on a global level. Spambrella is your outsourced email security team. We are able to migrate you seamlessly and have the technical expertise of all other service providers, such as Symantec.cloud, Mimecast, MxLogic. To uncover email threats to your email users, schedule a demo with our cybersecurity experts today.
  • 7
    Vanta Reviews
    Vanta is the leading trust management platform that helps simplify and centralize security for organizations of all sizes. Thousands of companies rely on Vanta to build, maintain and demonstrate trust in a way that's real-time and transparent. Founded in 2018, Vanta has customers in 58 countries with offices in Dublin, New York, San Francisco and Sydney.
  • 8
    Zercurity Reviews

    Zercurity

    Zercurity

    $15.01 per month
    Strengthen and enhance your cybersecurity framework with Zercurity, allowing you to minimize the time and resources dedicated to overseeing, managing, and navigating the various aspects of cybersecurity within your organization. Obtain actionable data points that provide a clear snapshot of your existing IT infrastructure, with automatic analysis of assets, applications, packages, and devices. Our advanced algorithms will execute queries across your resources, promptly identifying anomalies and vulnerabilities as they arise. Safeguard your organization by revealing potential threats and mitigating associated risks effectively. With automatic reporting and auditing features, remediation processes become more efficient and manageable. Experience comprehensive security monitoring that covers all areas of your organization, enabling you to query your infrastructure as if it were a database. Receive immediate answers to your most challenging inquiries while continuously measuring your risk exposure in real-time. Stop speculating about where your cybersecurity vulnerabilities may exist and gain profound insights into every aspect of your organization’s security posture. Zercurity empowers you to stay ahead of threats, ensuring that your defenses are always on alert.
  • 9
    ProActive Compliance Tool Reviews

    ProActive Compliance Tool

    ProActive Compliance Tool

    €220.50 per month
    The ProActive Compliance Tool (PCT) is designed to assist organizations in adhering to both internal and external legal requirements and regulations. It simplifies the process of managing information security, as well as conducting audits or obtaining certifications, allowing users to engage with the tool without requiring extensive prior knowledge. This intuitive and structured digital solution enables companies to effectively monitor and uphold their management information and certification statuses. As an online platform, the PCT facilitates the design, implementation, and ongoing management of your compliance system. Utilizing the PCT empowers you to take control of various aspects such as information security, business continuity, quality assurance, and risk management. With this tool, you can document, assess, and enhance your organizational information seamlessly. Moreover, the PCT centralizes all necessary documentation, making it easily accessible from one location. This versatile tool is compatible with all widely recognized standards, certification frameworks, and assessment protocols, ensuring a comprehensive compliance approach for any organization. Ultimately, the PCT serves as a vital resource in fostering a culture of proactive compliance and continuous improvement within your organization.
  • 10
    Emgage Reviews

    Emgage

    Emgage

    $0.00945 per month per unit
    Discover the ideal business software that combines the affordability and speed of standard solutions with the bespoke advantages of custom software. Whether you're involved in business or technology, you can enjoy remarkable flexibility, exceptional performance, and virtually limitless scalability to create or implement any software quickly and cost-effectively. The Emgage Application Platform comprises a comprehensive suite of easy-to-use services capable of supporting nearly any feature you envision. Our applications are developed on the foundation of this platform, which offers a strong and interconnected set of technologies that unlocks powerful functionalities, allowing you to enhance or broaden your applications while remaining rooted in a unified framework. Effortlessly manage your data and content without concerns about their storage locations. Integrate countless data sources to establish a robust data ecosystem. Furthermore, rest easy without the anxiety of managing your essential business applications, knowing that the Emgage platform has you covered. This innovative solution empowers your business to thrive in an ever-evolving digital landscape.
  • 11
    TrustCloud Reviews

    TrustCloud

    TrustCloud Corporation

    Stop getting overwhelmed by countless vulnerability alerts from your security systems. Instead, bring together data from your cloud, on-premises, and custom applications, integrating it with information from your security tools, to consistently evaluate the effectiveness of controls and the operational health of your complete IT landscape. Align control assurance with business consequences to identify which vulnerabilities to address first. Leverage AI and automated APIs to enhance and streamline risk assessments for first-party, third-party, and nth-party scenarios. Automate the evaluation of documents to obtain contextual and trustworthy insights. Conduct regular, systematic risk assessments across all internal and external applications to eliminate the dangers of relying on isolated or infrequent evaluations. Transition your risk register from being a manual spreadsheet to a dynamic system of predictive risk assessments. Continuously track and project your risks in real-time, allowing for IT risk quantification that can illustrate financial implications to stakeholders, and shift your approach from merely managing risks to actively preventing them. This proactive strategy not only strengthens your security posture but also aligns risk management with broader business objectives.
  • 12
    SAI360 Reviews
    Risk management is best done in a fluid and powerful way. Your decisions today can help you mitigate the risks that you might face tomorrow. SAI360 is a cloud-first software that combines modern ethics and compliance content to help organizations navigate risk in a flexible and agile way. All the best in intelligent solutions and global expertise in one platform. Configurability of solution, extensible data model with configurable interface/forms, fields and relationships to extend solutions. Process modeling: Modify or create new processes to automate, streamline, and reduce risk, compliance, audit, and other activities. Data visualization and analysis. Many pre-configured dashboards that are easy to set up allow you to visualize and analyze data. Learning and best practices content - Preloaded frameworks, control library and regulatory content, along with values-based ethics, compliance learning content. Integration framework with APIs, and other protocols.
  • 13
    ComplyScore Reviews

    ComplyScore

    ComplyScore

    $25 per user
    ComplyScore stands as a premier provider of governance, risk management, and compliance (GRC), alongside vendor governance and information security solutions. Since its establishment in 2003, ComplyScore has been dedicated to offering strategic enterprise solutions and services that enhance business operations, delivering competitive advantages through innovation, dependability, and expeditious market entry. We prioritize precision in GRC, designing our solutions to align with the specific needs of organizations of all sizes. Our comprehensive, web-based offerings uniquely integrate risk, compliance, and audit functionalities, effectively removing redundancies and simplifying the management of compliance and risk. At ComplyScore, our unwavering commitment to innovation ensures that we enhance the efficiency of compliance processes for our clients. Our managed services provide a complete end-to-end solution, while our online audit capabilities facilitate swift execution by certified auditors, allowing clients to manage assessments on a large scale. Furthermore, we enhance the scalability and speed of vendor assessments, making them efficient and effective across the globe. With a focus on continuous improvement, we aim to redefine the standards of compliance management in the industry.
  • 14
    Kertos Reviews
    Kertos revolutionizes the way data protection translates into compliance. Meeting legal obligations and automating compliance workflows has never been simpler. We empower organizations to achieve comprehensive compliance, allowing you to concentrate on your core business activities. Our no-code platform and unique REST API facilitate the seamless integration of both internal and external data sources, including your proprietary databases, SaaS applications, and third-party services. With our discovery feature, you receive immediate compliance insights and automated categorization of data processes that easily fit into essential documents such as RoPA, TIA, DPIA, and TOMs. By using Kertos, you can enhance your compliance initiatives, ensure ongoing audit readiness, and access daily insights into data protection while utilizing our dashboard for predictive analytics and effective risk management. Uncover your data framework, fulfill regulatory requirements, automate your privacy tasks, and simplify reporting for maximum efficiency. Ultimately, Kertos empowers you to manage compliance effortlessly and stay ahead in a rapidly evolving regulatory landscape.
  • 15
    Neumetric Reviews
    Achieving certification without the aid of automation is nearly unattainable, and for compliance to be truly effective, it must be cost-efficient. The journey towards security and compliance is continuous and requires the support of a dependable partner. Certification itself is a systematic process, and the foundation for success lies in having a meticulously crafted roadmap. Effective execution across all security domains, paired with automation, accelerates the achievement of key milestones. Neumetric simplifies the complexities of compliance by leveraging the expertise of security professionals, thereby reducing the necessity for in-house specialists. Their platform enhances compliance management through a unified task management system, making it easier to comply with regulations such as GDPR and ISO certification by centralizing tasks in one location. This approach not only improves tracking and ensures efficient administration but also prepares organizations to meet a variety of regulatory demands. Additionally, it streamlines the creation and management of documents across various domains, particularly advantageous for frameworks like ISMS, by automating processes and offering a comprehensive dashboard for oversight. As a result, organizations can focus more on their core missions while maintaining compliance effortlessly.
  • 16
    Etactics CMMC Compliance Suite Reviews
    Investing time and resources to prepare for the Cybersecurity Maturity Model Certification (CMMC) assessment is a significant undertaking for organizations. Those managing Controlled Unclassified Information (CUI) in the defense industrial sector should anticipate a certification from an authorized CMMC 3rd Party Assessment Organization (C3PAO) to validate their adherence to NIST SP 800-171 security standards. Assessors will scrutinize how contractors fulfill each of the 320 objectives related to all relevant assets, which encompass personnel, facilities, and technologies. The evaluation process is likely to include artifact reviews, interviews with essential staff, and examinations of technical, administrative, and physical controls. As they compile their evidence, organizations must create clear connections between the artifacts, the security requirement objectives, and the assets under consideration. This comprehensive approach will not only aid in meeting certification criteria but also enhance overall security posture.
  • 17
    Oneleet Reviews
    We help companies build their trust by creating real security controls and then attesting these controls with a SOC2 report. Oneleet's full-stack platform makes cybersecurity easy and painless. We help businesses to stay secure so they can focus on delivering value to their clients. We'll begin by having a scoping conversation to learn about your security concerns, compliance needs, and infrastructure. We'll then build you a custom security plan that is appropriate for your stage. We'll also take you through a SOC 2 audit with a third-party CPA. Oneleet offers everything you need in one place to become compliant. All tools under one roof make the compliance journey seamless.
  • 18
    HITRUST MyCSF Reviews
    No matter what industry they are in, organizations face challenges with managing information security risks and data governance. They also need to comply with numerous information protection regulations and national and international best practices. HITRUST recognizes that organizations of all sizes and in all industries and geographies must address these issues. Implementing an information management framework, performing detailed and accurate information risks assessments, streamlining remediation activities and reporting and tracking compliance are all resource-intensive, time-consuming, and often overwhelming. Our unique experience in framework development, information risk management, and compliance has been combined with hundreds of thousands of risk assessments to create the most efficient solution for managing, reporting, and assessing information risk.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB