ensun logo
Locations
Company type
Result types
Industries
Employees
Founding year
background

Top Cyber Security Companies in China

The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers

Close

Filter

Result configuration


Continents


Locations


Result types


Company type


Industries


Company status

Number of employees

to

Founding year

to

Clear filters

60 companies for Cyber Security in China

Sort by:

Relevance

CYBER.SO-Cyber Services HK's Logo

CYBER.SO-Cyber Services HK

China

D

1-10 Employees

2020

Key takeaway

Cyber Services is a global provider specializing in advanced cybersecurity measures and safeguards to protect confidential data and electronic assets from cyberattacks. Their team employs sophisticated countermeasures and state-of-the-art tools to detect and neutralize threats, ensuring the integrity of their clients' internal data.

Reference

Core business

Digital Cybersecurity Agency | Cyber Services HK

Cyber.so-Cyber Services HK - International Digital Security Agency offers solutions based on highest intelligence-Identification of Corruption, Bribery,Money Laundry.Investigating into Financial Markets crime.CryptoCurency crime. Identification of Fraud. Deep Due Diligence. Asset Tracing and Recovery.OSINT

CYPHER's Logo

CYPHER

Kowloon, China

D

1-10 Employees

-

Key takeaway

CYPHER is a cyber security consultancy that offers intelligence-based security assessments, helping clients identify and address vulnerabilities through realistic hacking simulations. Their tailored solutions make essential cyber security services more accessible, particularly for SMEs.

Reference

Core business

Cypher | Security Testing, Security Consultant, Ethical Hacking

北京微步在线科技有限公司's Logo

北京微步在线科技有限公司

Dongcheng District, China

D

11-50 Employees

-

Key takeaway

ThreatBook is a leading provider of cybersecurity solutions, offering a range of SaaS-based threat intelligence products and services that ensure comprehensive protection for cloud, network traffic, and endpoints. Their focus on threat detection and response positions them as a key player in the cybersecurity landscape.

Reference

Product

Cyber Security Solutions_Security Operation | ThreatBook

Looking for more accurate results?

Find the right companies for free by entering your custom query!

25M+ companies

250M+ products

Free to use

Huge Crown Technology Limited's Logo

Huge Crown Technology Limited

Hong Kong Island, China

D

11-50 Employees

2013

Key takeaway

HCTL offers comprehensive cybersecurity solutions, including data protection, network security, IoT security, and identity and access management, ensuring robust protection for your business. Their dedicated team provides consultative assistance and a range of services to enhance your organization's security posture.

Reference

Service

IT Consulting | Huge Crown Technology

From data protection to network security, from IoT security to Trust management and Identity and Access Management, discover how HCTL cybersecurity hardware and software solutions ensure the ultimate security for your business.

Breadcrumb Cybersecurity's Logo

Breadcrumb Cybersecurity

Hong Kong Island, China

D

11-50 Employees

-

Key takeaway

Breadcrumb Cybersecurity specializes exclusively in cybersecurity, offering a range of services including managed security, digital forensics, and breach response. Their commitment to providing high-level cybersecurity consultation addresses the challenges organizations face in keeping up with evolving cyber threats.

Reference

Service

services - Breadcrumb Cybersecurity

Comprehensive and proven cybersecurity services for your organization.

Synergy Strategic Solutions Ltd.'s Logo

Synergy Strategic Solutions Ltd.

Hong Kong Island, China

D

51-100 Employees

2011

Key takeaway

SYNERGY offers comprehensive cyber security services designed to protect your entire value chain. Their deep industry knowledge and commitment to innovative solutions ensure that clients can navigate their digital journey with confidence, making them a trusted partner in achieving robust cyber protection.

Reference

Service

Cyber Security Services – Synergy solutions

Network Box Corporation's Logo

Network Box Corporation

Kowloon, China

D

101-250 Employees

2000

Key takeaway

Network Box is a leading global Managed Security Service Provider (MSSP) that emphasizes effective, comprehensive, and affordable cybersecurity solutions. With a strong focus on cloud services and regional Security Operations Centres, they offer next-generation managed security to help businesses stay protected against evolving cyber threats.

Reference

Core business

About Us — Network Box Managed Security Services

Sangfor Technologies's Logo

Sangfor Technologies

Shenzhen, China

D

1001-5000 Employees

2000

Key takeaway

Sangfor Technologies specializes in Cyber Security Services, offering a range of solutions including incident response, security assessment, and on-demand threat identification. Their focus on real-world security needs ensures that their products effectively address current market demands.

Reference

Service

Cyber Security Services | Sangfor Technologies

On demand threat identification, analysis and risk management services

Maximus's Logo

Maximus

Hong Kong Island, China

D

11-50 Employees

2002

Key takeaway

MXC is a certified cybersecurity provider recognized by CREST, offering expert information security services to protect businesses from digital threats. With a focus on PCI DSS compliance and a team of experienced consultants, MXC ensures robust security assessments and pragmatic solutions to manage IT risks effectively.

Reference

Core business

Maximus – We Are Cyber Security

Multisoft Limited's Logo

Multisoft Limited

Kowloon, China

D

51-100 Employees

2006

Key takeaway

Multisoft Limited (MTS) offers comprehensive cyber security solutions that empower customers to navigate the complex security software landscape effectively. With extensive experience in system networking and security, MTS is dedicated to helping clients achieve their business goals through robust IT development and support.

Reference

Service

Cyber Security | Multisoft

Our cyber security solutions allow you to make informed choices in today's complex and highly fragmented security software market.


Related searches for Cyber Security

Technologies which have been searched by others and may be interesting for you:

Products and services for Cyber Security

A selection of suitable products and services provided by verified companies according to your search.

Product: Text Anonymization Service

Product

Text Anonymization Service

Go to product

Product: Security Consultant

Service

Security Consultant

Go to product

Product: Product Security

Service

Product Security

Go to product

Product: enclaive vHSM

Product

enclaive vHSM

Go to product


Use cases around Cyber Security

A selection of suitable use cases for products or services provided by verified companies according to your search.

UseCase: Cybersecurity

Use case

Cybersecurity

All

Cybersecurity is the act of protecting your digital assets against bad actors attack. This is a vast field which starts by identifying the risk in your industry and mitigating these risks on the best of your ability. There is always the probability that a bad actor will penetrate your defense system, in that case you should have in place a response plan. Are your digital assets protected?

UseCase: Managed Firewall für ein öffentliches Unternehmen – NIS2-Compliance gewährleistet

Use case

Managed Firewall für ein öffentliches Unternehmen – NIS2-Compliance gewährleistet

Public Sector

Herausforderung: Ein öffentliches Versorgungsunternehmen steht vor der Aufgabe, seine IT-Infrastruktur gegen wachsende Cyberbedrohungen abzusichern und gleichzeitig die Vorgaben der NIS-Richtlinie (Network and Information Security) zu erfüllen. Die internen IT-Ressourcen reichen nicht aus, um die Anforderungen an kontinuierliche Überwachung, Aktualisierungen und Protokollierung zu bewältigen. Lösung: Mit der Managed Firewall von bytehaus wird die Sicherheitsinfrastruktur des Unternehmens auf den neuesten Stand gebracht. Bytehaus analysiert die Netzwerkarchitektur und implementiert eine maßgeschneiderte Firewall-Lösung, die den strengen Anforderungen der NIS-Richtlinie entspricht.

UseCase: Managed Firewall für ein Unternehmen mit 10 Mitarbeitern – Prävention nach früherem Hackerangriff

Use case

Managed Firewall für ein Unternehmen mit 10 Mitarbeitern – Prävention nach früherem Hackerangriff

Supplier

Herausforderung: Ein mittelständisches Unternehmen mit 10 Mitarbeitern wurde vor einigen Jahren Opfer eines Hackerangriffs, bei dem sensible Daten gestohlen und der Betrieb erheblich beeinträchtigt wurden. Seitdem besteht ein hohes Sicherheitsbewusstsein, jedoch fehlen die internen Ressourcen, um die IT-Sicherheit auf dem aktuellen Stand zu halten und neue Bedrohungen abzuwehren. Lösung: Mit der Managed Firewall von Bytehaus erhält das Unternehmen eine umfassende Sicherheitslösung, die speziell auf kleine Unternehmen mit begrenzten IT-Ressourcen zugeschnitten ist. Bytehaus übernimmt die Implementierung, Verwaltung und Überwachung der Firewall, sodass das Unternehmen vor zukünftigen Angriffen optimal geschützt ist.

UseCase: Protecting Critical Infrastructure from Cyber Threats

Use case

Protecting Critical Infrastructure from Cyber Threats

KRITIS, Critical Infrastructure, Industries with Sensitive Data, Healthcare, Energy, Gov, Supplier

Operators of critical infrastructure such as energy, water, transportation, and healthcare are prime targets for cyberattacks. Many industrial control systems (ICS) and SCADA environments sometimes rely software that is difficult to patch, while strict regulatory requirements like NIS2 and BSI-KritisV demand enhanced security measures. Labyrinth uses specialized SCADA and OT decoys to simulate real industrial control systems, misleading attackers and capturing their activity without impacting operational performance. This ensures early threat detection, supports regulatory compliance with detailed forensic reporting, and protects against APTs and ransomware targeting critical systems.

UseCase: Protecting SMEs Against Targeted Cyber Attacks

Use case

Protecting SMEs Against Targeted Cyber Attacks

SME, all

Small and medium-sized enterprises (SMEs) often have limited IT resources and no dedicated Security Operations Center (SOC). They are particularly vulnerable to ransomware, phishing attacks, and data theft as traditional security systems like firewalls or antivirus software fail to counter modern threats. Labyrinth provides an easy-to-implement and cost-efficient deception technology that lures attackers into simulated IT environments, enabling threat detection up to 12 times faster before real damage occurs. This proactive approach reduces false positives, minimizes downtime, and ensures effective cybersecurity without requiring additional IT staff or high costs.

UseCase: Reducing SOC Workload in Large Enterprises

Use case

Reducing SOC Workload in Large Enterprises

Enterprise, all

Security teams in large enterprises face an overwhelming number of security alerts, including many false positives, making it difficult to detect and respond to advanced persistent threats (APTs). Labyrinth deploys highly realistic decoys within corporate networks, attracting and identifying attackers before they can infiltrate critical systems. By providing detailed forensic insights and attack timelines, Labyrinth helps SOC teams focus on real threats, reduces alert fatigue, and seamlessly integrates with existing SIEM, EDR, and firewall solutions for automated defense.

UseCase: Cybersecurity

Use case

Cybersecurity

All

Cybersecurity is the act of protecting your digital assets against bad actors attack. This is a vast field which starts by identifying the risk in your industry and mitigating these risks on the best of your ability. There is always the probability that a bad actor will penetrate your defense system, in that case you should have in place a response plan. Are your digital assets protected?

Information about Cyber Security in China

When exploring the Cyber Security industry in China, several key considerations emerge. The regulatory landscape is particularly significant, as the Chinese government has implemented stringent laws such as the Cybersecurity Law and the Data Security Law, which dictate how businesses must handle data and protect networks. Understanding these regulations is crucial for compliance and operational success. Additionally, the competitive landscape is intense, with both local firms and international companies vying for market share. Local firms often have an edge due to their understanding of domestic regulations and consumer behavior. Challenges such as talent shortages and the rapidly evolving nature of cyber threats also play a role in the industry. Opportunities abound, particularly in sectors like cloud security, mobile security, and the protection of critical infrastructure, as businesses increasingly prioritize security measures. Environmental concerns related to electronic waste and energy consumption from data centers are becoming more relevant, prompting companies to adopt sustainable practices. Lastly, China’s position in the global market is noteworthy, as it not only serves as a significant producer of technology but also as a target for cyber threats, making robust security measures essential for both domestic and international businesses operating within its borders.


Insights about the Cyber Security results above

Some interesting numbers and facts about your company results for Cyber Security

Country with most fitting companiesChina
Amount of fitting manufacturers41
Amount of suitable service providers44
Average amount of employees11-50
Oldest suiting company2000
Youngest suiting company2020

Frequently asked questions (FAQ) about Cyber Security Companies

Some interesting questions that has been asked about the results you have just received for Cyber Security

Based on our calculations related technologies to Cyber Security are Space Technologies, Military, Commercial Aviation, Airport Security

The most represented industries which are working in Cyber Security are IT, Software and Services, Other, Defense, Electronics and Electrical engineering, Telecommunications

ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.

Cyber Security results by various countries

Related categories of Cyber Security