Best IT Security Software in China - Page 6

Find and compare the best IT Security software in China in 2025

Use the comparison tool below to compare the top IT Security software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Imunify360 Reviews
    Imunify360 provides security solutions for web-hosting servers. Imunify360 is more than antivirus and WAF. It combines an Intrusion Prevention & Detection system with an Application Specific Web Application Firewall, Real time Antivirus protection, and Patch Management components into one security suite. Imunify360 is fully automated and displays all statistics in an intuitive dashboard.
  • 2
    GateKeeper Enterprise Reviews

    GateKeeper Enterprise

    Untethered Labs, Inc.

    $3/user/month
    3 Ratings
    Passwordless, proximity login to desktop applications, Macs, PCs, Macs, websites and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords and 2FA and gives employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password resets will be reduced. Login and autolock with proximity
  • 3
    Massdriver Reviews
    At Massdriver, we believe in prevention, not permission. Our self-service platform lets ops teams encode their expertise and your organization’s non-negotiables into pre-approved infrastructure modules—using familiar IaC tools like Terraform, Helm, or OpenTofu. Each module embeds policy, security, and cost controls, transforming raw configuration into functional software assets that streamline multi-cloud deployments across AWS, Azure, GCP, and Kubernetes. By centralizing provisioning, secrets management, and RBAC, Massdriver cuts overhead for ops teams while empowering developers to visualize and deploy resources without bottlenecks. Built-in monitoring, alerting, and metrics retention reduce downtime and expedite incident resolution, driving ROI through proactive issue detection and optimized spend. No more juggling brittle pipelines—ephemeral CI/CD automatically spins up based on the tooling in each module. Scale faster and safer with unlimited projects and cloud accounts while ensuring compliance at every step. Massdriver—fast by default, safe by design.
  • 4
    MyChat Reviews

    MyChat

    Network Software Solutions

    $6/per user/one-time
    3 Ratings
    Secure instant messaging system that works over local networks and the Internet. Collaboration tools for employee engagement.
  • 5
    Routee Reviews

    Routee

    AMD Telecom

    $0.01 one-time fee
    2 Ratings
    Routee is an intelligent omnichannel communication platform. (CPaaS), Routee offers advanced Web and API automation for all industry sectors. Routee's services are powered by AMD Telecom's strong infrastructure. They enable businesses to optimize marketing and business processes. -SMS Marketing: Custom-made messages based upon customers' individual preferences -Email Marketing: personalized newsletters and email campaigns based upon audience behavioral data -Transactional email: automated emails to customers regarding important data about their transactions -Marketing Automation: Rich forms & customer data capture. Automate repetitive marketing tasks and track marketing campaigns. -Two factor authentication: A second layer of security that includes fallback via SMS, Voice, Viber, and Missed Call -Cloud IVR: Multilingual capabilities, including the ability to convert speech into text and text to human-sounding text -Push Notifications: personalized web and mobile push notifications based on segmentation.
  • 6
    Hackrate Reviews

    Hackrate

    Hackrate

    €250/month
    2 Ratings
    Check us out at hckrt.com! 🔐 Hackrate Ethical Hacking Platform is a crowdsourced security testing platform that connects businesses with ethical hackers to find and fix security vulnerabilities. Hackrate's platform is a valuable tool for businesses of all sizes. By crowdsourcing their security testing, businesses can gain access to a large pool of experienced ethical hackers who can help them find and fix security vulnerabilities quickly and efficiently. Some of the benefits of using the Hackrate Ethical Hacking Platform: Access to a large pool of experienced ethical hackers: Hackrate has a global network of ethical hackers who can help businesses of all sizes find and fix security vulnerabilities. Fast and efficient testing: Hackrate's platform is designed to be fast and efficient, with businesses able to get started with testing in just a few hours. Affordable pricing: Hackrate's pricing is affordable and flexible, with businesses able to choose the pricing plan that best meets their needs. Secure and confidential: Hackrate's platform is secure and confidential, with all data encrypted and protected by industry-standard security measures.
  • 7
    ChargeSentry Reviews

    ChargeSentry

    ChargeSentry

    $99.95 per month
    1 Rating
    Never respond to another chargeback! Stop wasting your time responding to chargebacks or losing money. ChargeSentry wins back your revenue automatically! No other service compares to ChargeSentry – we’re less expensive, easier, and faster than the other guys. Responding to your chargebacks is clumsy and time-consuming. Ineffective responses and lack of proper evidence cause poor results. Other chargeback response services don’t help much. They’re expensive, require long contracts, lengthy integration, and usually still require you to do something. We started ChargeSentry to help small and medium-sized e-commerce merchants, just like you, eliminate the friction of responding to your chargebacks and ending revenue loss. Started by e-commerce and merchant processing industry veterans, we bring over 15 years of experience responding to countless chargebacks.
  • 8
    Virtual Safe Business Professional Reviews
    Virtual Safe Business Professional software allows you and your employees manage encrypted directories within your IT infrastructure. Data Management: You can expand the individual virtual safes to include master data. You can expand your safes by adding an item, customer number, or processing status. Safe-Search: The integrated search function can be used by you or your employees to filter according to master data. Master-Password: A master password can be used to secure critical operations and all safes can also be opened with it. Collaboration: It is essential that you have the right software to support you when working in a group. Therefore the type of access can be selected by the user. Software recognizes when safe data is being processed. All employees can still access the safe data in this situation. The company standards are mapped and distributed to business units via common configuration directories.
  • 9
    Insightful Reviews

    Insightful

    Insightful

    $6.40 per employee per month
    1 Rating
    Insightful is workforce analytics software that helps companies improve team performance. It gives you the tools to make smart, data-driven decisions. The platform turns raw data into clear, actionable insights. With powerful tracking and analysis, Insightful captures and analyzes employee performance. It helps spot productivity patterns, improve workflows, and boost engagement. Features include time and activity tracking, data collection, analysis, reports, and easy-to-read visuals. These insights can support HR, talent teams, and company leaders. Insightful helps office-based, hybrid, and remote teams reach their full potential.
  • 10
    Perimeter 81 Reviews

    Perimeter 81

    Check Point Software Technologies

    $8 per user per month
    1 Rating
    Perimeter 81, a SaaS-based solution that provides customized networking and the highest level of cloud security, is revolutionizing how organizations use network security. Perimeter 81 simplifies secure network, cloud, and application access for modern and distributed workforce with an integrated solution that gives companies of all sizes the ability to be securely mobile and cloud-confident. Perimeter 81's cloud-based, user-centric Secure Network as a service is not like hardware-based firewalls and VPN technology. It uses the Zero Trust and Software Defined Perimeter security models. It offers greater network visibility, seamless integration with all major cloud providers, and seamless onboarding.
  • 11
    Teramind Reviews

    Teramind

    Teramind

    $12/month/user
    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live and recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.
  • 12
    System Frontier Reviews
    Delegate granular management of servers, workstations, network devices and users to non-admins. Turn PowerShell, Python and other scripts into web tools to empower Tier 1 support teams. Every action maintains an audit trail and protects your IT operations with RBAC.
  • 13
    IceIT Reviews

    IceIT

    Quantum Knight, Inc

    0
    IceIT is a free desktop tool designed to make file encryption fast and effortless with cutting-edge, quantum-level security. For users needing more, IceIT provides commercial options that allow secure, private networking and continuous file sharing—no cloud accounts required. With IceIT, you can confidently use email, text, and other familiar communication channels without concern. Want to safeguard your backups? Just IceIT!
  • 14
    Panoptic Scans Reviews

    Panoptic Scans

    Panoptic Scans

    $25/month
    Panoptic Scans is an automated vulnerability scanning platform that delivers thorough security assessments for applications and network infrastructures. By integrating established tools like OpenVAS, ZAP, and Nmap, it efficiently identifies common security flaws including the critical OWASP Top 10 vulnerabilities. The platform generates comprehensive reports that simplify the remediation process for security teams. One standout feature, Attack Narratives, illustrates potential attack paths by combining multiple vulnerabilities to highlight real-world exploitation scenarios. Users benefit from scheduled scans that provide continuous security coverage without requiring manual effort. Panoptic Scans’ fully managed scanners and infrastructure mean clients do not need to worry about server upkeep or performance issues. The platform’s intuitive interface and email notifications ensure that teams stay informed and in control. It also supports white-label reporting, allowing organizations to customize outputs for clients or internal stakeholders.
  • 15
    Noction Flow Analyzer (NFA) Reviews
    Noction Flow Analyzer is a network monitoring, alerting, and analytics tool that can ingest NetFlow, IPFIX and sFlow data. Engineers can use the NetFlow analyzer to optimize their network and applications performance, control bandwidth usage, plan network capacity, monitor and alert, perform detailed BGP peering analysis and improve security.
  • 16
    Easy365Manager Reviews

    Easy365Manager

    Agema A/S

    $84 per year
    Office 365 Management is now easier than ever. Manage everything with AD Users & Computers. Eliminate Exchange on-premises. Easy365Manager integrates Office 365 and AD management, eliminating need to log in to web consoles or run PowerShell. Easy365Manager adds two new tabs for user properties to AD Users & Computers. You can now manage EXO mailboxes from AD user properties, including complex settings such as calendar delegation which would otherwise require PowerShell scripting. Easy365Manager allows your first-level admin to work faster and reduces the number of tickets escalated to senior administrators. Easy365Manager can be installed on any PC or server with AD Users & Computers. There is no server component or service, AD Extension, or custom security layer. Easy365Manager can be installed and configured in less than 2 minutes, and you will instantly be rid of hybrid Office 365 management.
  • 17
    KernelCare Enterprise Reviews

    KernelCare Enterprise

    TuxCare

    $3.95 per month
    TuxCare's mission is to reduce cyber exploitation worldwide. TuxCare's automated live security patching solutions, long-term support services for Linux or open source software, allows thousands of organisations to quickly remediate vulnerabilities for increased security. TuxCare covers over one million of the world's most important enterprises, government agencies, service suppliers, universities, research institutions, and other organizations.
  • 18
    Sidescale Reviews

    Sidescale

    Sidescale.com

    $12.50
    Enterprise grade, lowest price, automation & developer-friendly. API (AWS & CCE compatible), Teams, Support. Instances, Virtual Private Cloud (VPC), Firewalls, Load Balancers. Resilient Network, DDOS Protection, and Direct Connect to AWS, GCE Azure, and many more. AWS's enterprise cloud offers incredible price performance at up to 90% off. Redundant infrastructure using blade server with converged storage area network (SAN), and blade server technology. Live migration and ephemeral volume support ensure uptime. Maximize asset security by using a firewall and DDOS protected carrier-grade network.
  • 19
    SparkView Reviews

    SparkView

    beyond SSL

    $60 per year
    Remote access to desktops and applications is fast, secure, and reliable. SparkView is a secure and simple way to connect devices that are not trusted to your desktops or applications. ZTNA, which does not require any client installation, provides secure remote access to any device that has a browser. All via HTML5 technology. The solution for mobile and remote work. Best web RDP client - advantages of SparkView: - ZTNA compliant remote access to applications, desktops and servers - Access from any device with browser (e.g. Chrome, Firefox, Edge, Opera, Safari, etc.) - No installation on clients or the target systems - One central point for administration, security and authorization - HTML5 technology - Flexible, stable and scalable - Low support and management overhead - Supports common protocols such as RDP, SSH, Telnet, VNC and HTTP(S) - No Java, no Flash, no ActiveX, no plugin, no rollout
  • 20
    AllSecureX Reviews

    AllSecureX

    AllSecureX

    $30/month per digital asset
    AllSecureX is a sophisticated AI-powered platform designed to quantify cyber risks in terms of real financial and operational impact. It simplifies cybersecurity for organizations by delivering clear priorities and business-focused insights, eliminating technical jargon. The platform uses its proprietary AllSecureXGPT intelligence to provide real-time, actionable answers to complex security challenges. Its Pentagon Framework leverages predictive modeling to improve cyber maturity and support strategic decision-making at the executive level. Hyperautomation technologies reduce manual security management while maintaining comprehensive protection across key areas like quantum-safe security, API security, cloud environments, email filtering, and network monitoring. AllSecureX integrates unified risk frameworks such as MITRE ATT&CK and FAIR to deliver consistent and accurate risk assessments. The platform offers continuous vendor and partner risk monitoring, ensuring third-party threats are managed effectively. Trusted globally, AllSecureX acts as a CISO assistant by turning cyber risks into measurable business value.
  • 21
    Runecast  Reviews

    Runecast

    Runecast Solutions

    Runecast is an enterprise IT platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. Your team can do more with less via a single platform that checks all your cloud infrastructure, for increased visibility, security, and time-saving. Security teams benefit from simplified vulnerability management and regulatory compliance, across multiple standards and technologies. Operations teams are able to reduce operational overheads and increase clarity, enabling you to be proactive and return to the valuable work you want to be doing.
  • 22
    JM-Crypt Reviews

    JM-Crypt

    JM-Crypt

    $2.99 (Android) - $9.99 (PC)
    Multi-platform, low-cost and professional software (Windows PC - Android Mobile) that encrypts sensitive data like photos and documents to protect them against theft or ransom. Ideal for VIPs and liberal professions like lawyers, doctors, etc. Check out our detailed product sheets on MS Store – "JM-Crypt PC" and Play Store – "JM-Crypt Mobile". Our software install on your device locally. No remote servers, no third parties, no pub, no IT backdoor and this for a derisory cost and unlimited duration. JM-Crypt uses the best known certified and official algorythm : AES-256 – CBC – PKCS with authentication (encrypt-then-mac) and random IV (initialization vector). Hash functions and HMAC: SHA3 – 256. The PC version allows serial encrytion, much better than full disk encryption as this method doesn't slow down your computer's performance, "JM-Crypt PC" can handle for fast encryption any folder or file extention of your choice.
  • 23
    Google Authenticator Reviews
    Top Pick
    Google Authenticator produces 2-Step Verification codes directly on your mobile device. This additional layer of security enhances the protection of your Google Account by necessitating a second verification step during the login process. Alongside your password, you will need a code that the Google Authenticator app generates on your phone. By using your Google Account, you can conveniently and securely access a multitude of websites and services, while also maintaining clear control over your privacy preferences. To further safeguard your account, utilize the Security Checkup tool, which offers tailored advice and actionable steps to bolster your account's security. It's crucial to understand that compromised passwords are far more prevalent than one might assume. Two-step verification serves as a formidable defense against unauthorized access, requiring that you complete an additional verification step after entering your password, thus significantly enhancing your account's safety. With this method, you can have greater peace of mind knowing that your information is better protected.
  • 24
    Dashlane Reviews
    Top Pick

    Dashlane

    Dashlane

    $4 per user per month
    15 Ratings
    Dashlane can fill all your passwords, payment details, and personal information wherever you need them. Yes, we are a password manager. We can simplify your online life in a profound way. Security for your business. Simplicity for your staff. Breach is most common when passwords are not strong enough, stolen or used again. It's important to have a way to manage them that is both easy and secure. Our patented security system and high employee adoption rate are why we are chosen by businesses. You can control your business credentials and protect yourself against hacks and breaches. We are easy to use, which is why our employees love us. They can keep their personal and business accounts separate but still manage them all in one place. You can save passwords and logins while browsing. You can sync your Dashlane data to all devices automatically, no matter if you're an Apple fanatic, an Android addict, and any combination in between.
  • 25
    Cisco Duo Reviews
    Top Pick

    Cisco Duo

    Cisco

    $3 per user per month
    12 Ratings
    Secure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix.