The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers
Close
Filter
Result configuration
Continents
Select continent
Locations
Result types
Company type
Select company type
Industries
Select industry
Company status
Select company status preset
Number of employees
Min.
Max.
Founding year
Datacloak
Shenzhen, China
D
11-50 Employees
2018
Key takeaway
DataCloak is a company focused on innovative data security technologies, emphasizing its commitment to preventing unauthorized access and disclosure of sensitive enterprise data. Their integrated data security platform, which utilizes cryptography and AI, aligns with the principles of Zero Trust by ensuring robust protection across various environments.
Reference
Product
DataCloak | Zero Trust|Data Security|DACS|Data Leakage Prevention|Secure Remote Office|Mobile Secure Office|Secure Cloud Desktop|Dynamic Security|Data Security Platform|Secure Workspace
Systex
Hong Kong Island, China
D
1001-5000 Employees
1997
Key takeaway
Systex specializes in integrated application solutions and has established strategic partnerships with leading companies, enhancing its technological capabilities and service offerings. This expertise positions Systex as a key player in providing comprehensive IT solutions, which may align with the principles of a Zero Trust approach.
Reference
Product
Netskope
TELSTRA INTERNATIONAL LIMITED
Hong Kong Island, China
D
51-100 Employees
2000
Key takeaway
The company emphasizes its commitment to safeguarding user data through security automation, which aligns with the principles of a Zero Trust approach. By ensuring secure connections to cloud environments and protecting account details, the company illustrates its focus on maintaining robust security measures.
Reference
Product
Cloud Connectivity | Telstra
Simply & securely connect to all your cloud environments from one place. Access 170+ providers with the first globally connected on-demand networking platform.
Looking for more accurate results?
Find the right companies for free by entering your custom query!
25M+ companies
250M+ products
Free to use
Skygear.io
Kowloon, China
D
51-100 Employees
2008
Key takeaway
Authgear.com emphasizes the importance of trust in data management, particularly through its robust identity and access management solutions. Their platform addresses security challenges by enabling seamless and secure external access to business applications, which is essential for implementing a Zero Trust framework.
Reference
Product
External Identity and Access Management - Authgear
Integrate your business applications with Authgear to centralize management of external and internal identities.
Huge Crown Technology Limited
Hong Kong Island, China
D
11-50 Employees
2013
Key takeaway
HCTL offers comprehensive cybersecurity solutions that encompass data protection, network security, and identity and access management, aligning with the principles of Zero Trust by emphasizing robust security measures throughout the organization's infrastructure. Their professional team provides consultative assistance and advanced security services to enhance your business's overall security posture.
Reference
Service
IT Consulting | Huge Crown Technology
From data protection to network security, from IoT security to Trust management and Identity and Access Management, discover how HCTL cybersecurity hardware and software solutions ensure the ultimate security for your business.
CYPHER
Kowloon, China
D
1-10 Employees
-
Key takeaway
CYPHER is a cyber security consultancy that emphasizes intelligence-based security assessments, which can align with the principles of a "Zero Trust" approach by identifying and addressing defense weaknesses through simulated hacker tests. Their tailored solutions make advanced cyber security more accessible, especially for SMEs looking to enhance their security posture.
Reference
Core business
Cypher | Security Testing, Security Consultant, Ethical Hacking
SDAP
Hong Kong Island, China
D
11-50 Employees
2012
Key takeaway
SDAP is an IT consultation firm specializing in network security assessment and incident response for SMEs. With a focus on evaluating risks related to data leakage and unauthorized access, SDAP provides comprehensive cybersecurity solutions that align with the principles of a "Zero Trust" approach.
Reference
Core business
SDAP – IT SECURITY
Hoplite Technology Ltd
Kowloon, China
D
1-10 Employees
2018
Key takeaway
Hoplite Tech emphasizes the importance of cyber security for everyday users, advocating for personal information anonymity as a universal right. Their mission is to empower individuals to protect their digital assets and online identity.
Reference
Core business
Hoplite Founding Story and Team
Build Trust via Risk Visibility
Network Box Corporation
Kowloon, China
D
101-250 Employees
2000
Key takeaway
Network Box is a leading global Managed Security Service Provider (MSSP) that emphasizes comprehensive and effective cybersecurity solutions. As they transition to a multi-tenanted cloud platform, their focus on next-generation managed security aligns with the principles of a Zero Trust approach, ensuring robust protection against evolving cyber threats.
Reference
Core business
About Us — Network Box Managed Security Services
Nexusguard
Tsuen Wan District, China
D
101-250 Employees
2008
Key takeaway
Nexusguard specializes in DDoS attack detection and mitigation, emphasizing the importance of robust cybersecurity solutions tailored to various industries. Their comprehensive product portfolio and focus on simplifying DDoS protection for Communications Service Providers (CSPs) highlight their commitment to countering threats and ensuring maximum uptime.
Reference
Core business
Nexusguard - Simplifying DDoS for Communications Service Providers
Nexusguard simplifies DDoS Protection for service providers and enterprises. From cloud services to managed DDoS protection platform to professional training courses, learn how we can help you today.
Technologies which have been searched by others and may be interesting for you:
When exploring the Zero Trust industry in China, it is crucial to consider the regulatory environment, as the country has stringent cybersecurity laws that impact how companies operate. Understanding the Cybersecurity Law and the Data Security Law is essential, as they dictate compliance requirements for businesses, particularly those handling sensitive data. The competitive landscape is rapidly evolving, with both domestic and international players vying for market share. This competition fosters innovation but also presents challenges, such as the need for continuous adaptation to changing technologies and threats. Opportunities abound in sectors such as finance, healthcare, and government, where Zero Trust architectures can significantly enhance security. However, environmental considerations also play a role, as companies are increasingly looking to implement sustainable practices within their IT operations. Additionally, the global market relevance of Zero Trust solutions continues to grow, as organizations worldwide adopt this security framework to counter cyber threats. Thus, staying informed about international trends and advancements in Zero Trust strategies can provide a competitive edge. Networking with local industry experts and attending relevant conferences can also offer insights into best practices and emerging technologies in this dynamic field.
Some interesting numbers and facts about your company results for Zero Trust
Country with most fitting companies | China |
Amount of fitting manufacturers | 21 |
Amount of suitable service providers | 22 |
Average amount of employees | 51-100 |
Oldest suiting company | 1997 |
Youngest suiting company | 2018 |
Some interesting questions that has been asked about the results you have just received for Zero Trust
What are related technologies to Zero Trust?
Based on our calculations related technologies to Zero Trust are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce
Which industries are mostly working on Zero Trust?
The most represented industries which are working in Zero Trust are IT, Software and Services, Other, Telecommunications, Defense, Automotive
How does ensun find these Zero Trust Companies?
ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.