ensun logo
Locations
Company type
Result types
Industries
Employees
Founding year
background

Top Threat Intelligence Companies in China

The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers

Close

Filter

Result configuration


Continents


Locations


Result types


Company type


Industries


Company status

Number of employees

to

Founding year

to

Clear filters

60 companies for Threat Intelligence in China

Sort by:

Relevance

北京微步在线科技有限公司's Logo

北京微步在线科技有限公司

Dongcheng District, China

D

11-50 Employees

-

Key takeaway

ThreatBook is a leading provider of threat intelligence, offering a range of SaaS-based products and services that deliver comprehensive protection across cloud, traffic, and endpoints.

Reference

Product

Cyber Security Solutions_Security Operation | ThreatBook

ThreatBook's Logo

ThreatBook

Dongcheng District, China

D

251-500 Employees

2015

Key takeaway

ThreatBook is a leading provider of threat intelligence, offering a range of SaaS-based products and services designed for comprehensive protection across cloud, traffic, and endpoints. Their focus on threat detection and response makes them a key player in the cybersecurity landscape.

Reference

Product

ThreatBook - Solutions

ThreatAgility's Logo

ThreatAgility

Huangpu District, China

D

1-10 Employees

2020

Key takeaway

ThreatAgility focuses on automotive cybersecurity, utilizing an AI-driven platform that enhances vehicle self-awareness and security. Their approach includes intelligent attack simulation to identify and prioritize cybersecurity requirements across vehicle systems.

Reference

Core business

Agile, Automotive Cybersecurity - ThreatAgility

Agile, intelligent cybersecurity, woven into the lifecycle of connected vehicles. ThreatAgility’s unique AI-driven platform enables self-aware, cybersecure vehicles.

Looking for more accurate results?

Find the right companies for free by entering your custom query!

25M+ companies

250M+ products

Free to use

Wynyard Group's Logo

Wynyard Group

Hong Kong Island, China

D

251-500 Employees

2011

Key takeaway

The Wynyard Group specializes in Cyber Threat Analytics, offering advanced technology solutions that enhance the capabilities of law enforcement agencies. Their Distributed SIEM solution aggregates and analyzes log data to identify suspicious activities, making it a valuable tool for threat intelligence.

Reference

Service

Distributed SIEM Solution | Cyber Threat Analytics | Wynyard Group

Distributed SIEM solution by Wynyard Group aggregates log data from the various connected devices and filters them for suspicious activity

CYPHER's Logo

CYPHER

Kowloon, China

D

1-10 Employees

-

Key takeaway

CYPHER is a cyber security consultancy that focuses on intelligence-based security assessments, offering services that simulate real-life hacking scenarios to identify vulnerabilities. Their tailored solutions make cyber security more accessible, particularly for SMEs.

Reference

Core business

Cypher | Security Testing, Security Consultant, Ethical Hacking

Infocean Technology's Logo

Infocean Technology

Kowloon, China

D

11-50 Employees

1999

Key takeaway

Infocean is dedicated to delivering specialized IT solutions, including security and threat vulnerability management. With a focus on risk assessments and advanced scanning technologies, Infocean helps organizations identify and address emerging security threats effectively.

Reference

Product

Threat/Vulnerability Management - Infocean Technology Co. Ltd.

Threat and Vulnerability Management Security threats facing organizations around the world are numerous and increasing daily. It is one of the most challenging and complex issues facing corporate IT today. By making use of advance scanning technologies, company is able to constantly discover new threat and

TEKID Limited's Logo

TEKID Limited

Changning District, China

D

11-50 Employees

2017

Key takeaway

TEKID emphasizes a holistic approach to Cyber Security, integrating expertise from various fields to enhance threat intelligence and digital safety. Their services include cyber-attack investigations, compliance projects, and active monitoring of digital assets, catering to the needs of both medium-sized and multinational organizations.

Reference

Core business

TEKID - Investigation & Discovery

Securing Businesses with Intelligence

CYBER.SO-Cyber Services HK's Logo

CYBER.SO-Cyber Services HK

China

D

1-10 Employees

2020

Key takeaway

Cyber Services specializes in developing and implementing advanced cybersecurity measures, including threat intelligence. They utilize state-of-the-art tools to gather and process data on potential and emerging threats, ensuring the protection of their clients' confidential data and electronic assets.

Reference

Service

Services | CYBER.SO

Cyber Security Agency provides Cyber & Business intelligence, Cyber Security solutions, Investigations & Consultancy tailor made for each customer.

FuseClick's Logo

FuseClick

Hong Kong Island, China

D

11-50 Employees

2015

Key takeaway

FlashIntel is a leading Go-to-Market Intelligence Company that provides innovative tools like FlashInfo and FlashClick to help businesses optimize their sales and partnership processes. Their 'Social Intent' feature offers deep insights into prospects' needs, which is crucial for effective threat intelligence and understanding market dynamics.

Reference

Core business

FlashIntel - A leading Go-to-Market Intelligence Company

TD Intelligence Technology's Logo

TD Intelligence Technology

Pudong, China

D

51-100 Employees

2016

Key takeaway

The company specializes in high-performance intelligence sensors and analytic tools that enhance traffic intelligence. This focus on providing robust traffic data can be integral to effective threat intelligence strategies.

Reference

Core business

About Us – TD Intelligence


Related searches for Threat Intelligence

Technologies which have been searched by others and may be interesting for you:

Products and services for Threat Intelligence

A selection of suitable products and services provided by verified companies according to your search.

Product: Source Recommendation Assessment

Service

Source Recommendation Assessment

Go to product


Use cases around Threat Intelligence

A selection of suitable use cases for products or services provided by verified companies according to your search.

UseCase: FInding the optimal Threat Intelligence

Use case

FInding the optimal Threat Intelligence

MSSP, Security

Ticura enriches existing threat intelligence programs with data from over 870 sources of network, public cloud, SaaS, endpoint and identity telemetry. Then, leveraging its proprietary detection engine, data science and machine learning, Ticura analyzes and surfaces the anomalies, incidents and threats to deliver optimal protection for your organization.

UseCase: FInding the optimal Threat Intelligence

Use case

FInding the optimal Threat Intelligence

MSSP, Security

Ticura enriches existing threat intelligence programs with data from over 870 sources of network, public cloud, SaaS, endpoint and identity telemetry. Then, leveraging its proprietary detection engine, data science and machine learning, Ticura analyzes and surfaces the anomalies, incidents and threats to deliver optimal protection for your organization.

Information about Threat Intelligence in China

When exploring the Threat Intelligence industry in China, several key considerations emerge. First, regulatory frameworks are critical, as the Chinese government imposes strict data security and cybersecurity laws that affect how companies collect, analyze, and share threat intelligence. Understanding these regulations is essential for compliance and operational success. Challenges such as a rapidly evolving threat landscape and geopolitical tensions can complicate intelligence gathering and sharing. Additionally, the competitive landscape is marked by a mix of domestic firms and multinational corporations, each vying for market share in a growing field driven by increasing cyber threats. Opportunities abound, particularly in sectors like finance, healthcare, and critical infrastructure, where demand for robust threat intelligence solutions is escalating. Moreover, the global relevance of China's Threat Intelligence market cannot be overlooked, as its position in the global supply chain makes it a focal point for cyber threats. Environmental concerns related to data centers and their energy consumption are also becoming increasingly important, as companies aim for sustainability in their operations. Overall, a comprehensive understanding of these factors will greatly benefit those looking to navigate the complexities of the Threat Intelligence industry in China.


Insights about the Threat Intelligence results above

Some interesting numbers and facts about your company results for Threat Intelligence

Country with most fitting companiesChina
Amount of fitting manufacturers41
Amount of suitable service providers40
Average amount of employees11-50
Oldest suiting company1999
Youngest suiting company2020

Frequently asked questions (FAQ) about Threat Intelligence Companies

Some interesting questions that has been asked about the results you have just received for Threat Intelligence

Based on our calculations related technologies to Threat Intelligence are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce

The most represented industries which are working in Threat Intelligence are IT, Software and Services, Other, Defense, Electronics and Electrical engineering, Finance and Insurance

ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.

Threat Intelligence results by various countries

Related categories of Threat Intelligence