ensun logo
Locations
Company type
Result types
Industries
Employees
Founding year
background

Top Zero Trust Companies in China

The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers

Close

Filter

Result configuration


Continents


Locations


Result types


Company type


Industries


Company status

Number of employees

to

Founding year

to

Clear filters

39 companies for Zero Trust in China

Sort by:

Relevance

Datacloak's Logo

Datacloak

Shenzhen, China

D

11-50 Employees

2018

Key takeaway

DataCloak is a company focused on innovative data security technologies, emphasizing its commitment to preventing unauthorized access and disclosure of sensitive enterprise data. Their integrated data security platform, which utilizes cryptography and AI, aligns with the principles of Zero Trust by ensuring robust protection across various environments.

Reference

Product

DataCloak | Zero Trust|Data Security|DACS|Data Leakage Prevention|Secure Remote Office|Mobile Secure Office|Secure Cloud Desktop|Dynamic Security|Data Security Platform|Secure Workspace

Systex's Logo

Systex

Hong Kong Island, China

D

1001-5000 Employees

1997

Key takeaway

Systex specializes in integrated application solutions and has established strategic partnerships with leading companies, enhancing its technological capabilities and service offerings. This expertise positions Systex as a key player in providing comprehensive IT solutions, which may align with the principles of a Zero Trust approach.

Reference

Product

Netskope

TELSTRA INTERNATIONAL LIMITED's Logo

TELSTRA INTERNATIONAL LIMITED

Hong Kong Island, China

D

51-100 Employees

2000

Key takeaway

The company emphasizes its commitment to safeguarding user data through security automation, which aligns with the principles of a Zero Trust approach. By ensuring secure connections to cloud environments and protecting account details, the company illustrates its focus on maintaining robust security measures.

Reference

Product

Cloud Connectivity | Telstra

Simply & securely connect to all your cloud environments from one place. Access 170+ providers with the first globally connected on-demand networking platform.

Looking for more accurate results?

Find the right companies for free by entering your custom query!

25M+ companies

250M+ products

Free to use

Skygear.io's Logo

Skygear.io

Kowloon, China

D

51-100 Employees

2008

Key takeaway

Authgear.com emphasizes the importance of trust in data management, particularly through its robust identity and access management solutions. Their platform addresses security challenges by enabling seamless and secure external access to business applications, which is essential for implementing a Zero Trust framework.

Reference

Product

External Identity and Access Management - Authgear

Integrate your business applications with Authgear to centralize management of external and internal identities.

Huge Crown Technology Limited's Logo

Huge Crown Technology Limited

Hong Kong Island, China

D

11-50 Employees

2013

Key takeaway

HCTL offers comprehensive cybersecurity solutions that encompass data protection, network security, and identity and access management, aligning with the principles of Zero Trust by emphasizing robust security measures throughout the organization's infrastructure. Their professional team provides consultative assistance and advanced security services to enhance your business's overall security posture.

Reference

Service

IT Consulting | Huge Crown Technology

From data protection to network security, from IoT security to Trust management and Identity and Access Management, discover how HCTL cybersecurity hardware and software solutions ensure the ultimate security for your business.

CYPHER's Logo

CYPHER

Kowloon, China

D

1-10 Employees

-

Key takeaway

CYPHER is a cyber security consultancy that emphasizes intelligence-based security assessments, which can align with the principles of a "Zero Trust" approach by identifying and addressing defense weaknesses through simulated hacker tests. Their tailored solutions make advanced cyber security more accessible, especially for SMEs looking to enhance their security posture.

Reference

Core business

Cypher | Security Testing, Security Consultant, Ethical Hacking

SDAP's Logo

SDAP

Hong Kong Island, China

D

11-50 Employees

2012

Key takeaway

SDAP is an IT consultation firm specializing in network security assessment and incident response for SMEs. With a focus on evaluating risks related to data leakage and unauthorized access, SDAP provides comprehensive cybersecurity solutions that align with the principles of a "Zero Trust" approach.

Reference

Core business

SDAP – IT SECURITY

Hoplite Technology Ltd's Logo

Hoplite Technology Ltd

Kowloon, China

D

1-10 Employees

2018

Key takeaway

Hoplite Tech emphasizes the importance of cyber security for everyday users, advocating for personal information anonymity as a universal right. Their mission is to empower individuals to protect their digital assets and online identity.

Reference

Core business

Hoplite Founding Story and Team

Build Trust via Risk Visibility

Network Box Corporation's Logo

Network Box Corporation

Kowloon, China

D

101-250 Employees

2000

Key takeaway

Network Box is a leading global Managed Security Service Provider (MSSP) that emphasizes comprehensive and effective cybersecurity solutions. As they transition to a multi-tenanted cloud platform, their focus on next-generation managed security aligns with the principles of a Zero Trust approach, ensuring robust protection against evolving cyber threats.

Reference

Core business

About Us — Network Box Managed Security Services

Nexusguard's Logo

Nexusguard

Tsuen Wan District, China

D

101-250 Employees

2008

Key takeaway

Nexusguard specializes in DDoS attack detection and mitigation, emphasizing the importance of robust cybersecurity solutions tailored to various industries. Their comprehensive product portfolio and focus on simplifying DDoS protection for Communications Service Providers (CSPs) highlight their commitment to countering threats and ensuring maximum uptime.

Reference

Core business

Nexusguard - Simplifying DDoS for Communications Service Providers

Nexusguard simplifies DDoS Protection for service providers and enterprises. From cloud services to managed DDoS protection platform to professional training courses, learn how we can help you today.


Related searches for Zero Trust

Technologies which have been searched by others and may be interesting for you:

Information about Zero Trust in China

When exploring the Zero Trust industry in China, it is crucial to consider the regulatory environment, as the country has stringent cybersecurity laws that impact how companies operate. Understanding the Cybersecurity Law and the Data Security Law is essential, as they dictate compliance requirements for businesses, particularly those handling sensitive data. The competitive landscape is rapidly evolving, with both domestic and international players vying for market share. This competition fosters innovation but also presents challenges, such as the need for continuous adaptation to changing technologies and threats. Opportunities abound in sectors such as finance, healthcare, and government, where Zero Trust architectures can significantly enhance security. However, environmental considerations also play a role, as companies are increasingly looking to implement sustainable practices within their IT operations. Additionally, the global market relevance of Zero Trust solutions continues to grow, as organizations worldwide adopt this security framework to counter cyber threats. Thus, staying informed about international trends and advancements in Zero Trust strategies can provide a competitive edge. Networking with local industry experts and attending relevant conferences can also offer insights into best practices and emerging technologies in this dynamic field.


Insights about the Zero Trust results above

Some interesting numbers and facts about your company results for Zero Trust

Country with most fitting companiesChina
Amount of fitting manufacturers21
Amount of suitable service providers22
Average amount of employees51-100
Oldest suiting company1997
Youngest suiting company2018

Frequently asked questions (FAQ) about Zero Trust Companies

Some interesting questions that has been asked about the results you have just received for Zero Trust

Based on our calculations related technologies to Zero Trust are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce

The most represented industries which are working in Zero Trust are IT, Software and Services, Other, Telecommunications, Defense, Automotive

ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.

Zero Trust results by various countries

Related categories of Zero Trust