Best IT Management Software in China

Find and compare the best IT Management software in China in 2024

Use the comparison tool below to compare the top IT Management software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Box Reviews
    Top Pick

    Box

    Box

    $5.00 per user per month
    61 Ratings
    Secure collaboration with anyone, anyplace, on any device. It is our top priority to protect your cloud files. We have developed advanced security controls, intelligent threats detection, and complete information governance. We also know that your needs are not limited to these security controls. Strict data privacy? Check. Check. Check. Check. You should check. Collaboration is key to your business. This includes customers, partners, vendors, and teammates. Everyone can work together on your most important content easily if they are in the same place. You should not be sharing files but frustration. You should be able to rest assured that your data is safe. It is a waste of time to work on cumbersome, manual processes every day. We let anyone automate repeatable workflows that are important to your business, such as HR onboarding and contract management. Your workflows will move faster. You have more time for what is most important.
  • 2
    Amazon CloudWatch Reviews
    Amazon CloudWatch is a monitoring service that provides observability and data for developers, DevOps engineers, site reliability engineers (SREs), IT managers, and other users. CloudWatch gives you data and actionable insights that will help you monitor your applications, respond quickly to system-wide performance changes and optimize resource utilization. It also provides a unified view on operational health. CloudWatch gathers operational and monitoring data in the form logs, metrics and events. This gives you a single view of AWS resources, applications and services that are hosted on AWS and on-premises. CloudWatch can be used to detect anomalous behavior, set alarms, visualize logs side-by, take automated actions, troubleshoot problems, and uncover insights to help you keep your applications running smoothly.
  • 3
    AppDynamics Reviews
    We help you solve your most pressing business problems with simple, flexible and scalable packages that will make your digital transformation a reality. Get started today with our top business observability platform. AppDynamics or Cisco business lenses provide full-stack visibility. Prioritize the most important things for your business and your employees so that you can share, see and take action in real-time. With a deeper understanding and appreciation of user behavior and applications, you can turn performance into profit. You can quickly fix issues before they affect your bottom line by integrating full stack performance with key business metrics, such as conversions.
  • 4
    Amazon Route 53 Reviews

    Amazon Route 53

    Amazon

    $0.10 per month
    Amazon Route 53 is a cloud Domain Name System (DNS), web service that is highly available and scalable. It's designed to provide developers and businesses with a cost-effective and reliable way to route end users to Internet services. It does this by translating names into numeric IP addresses such as 192.0.2.1, which computers use to connect to each another. Amazon Route 53 is also fully compatible with IPv6. Amazon Route 53 connects user requests to AWS infrastructure, such as Amazon EC2 instances or Elastic Load Balance load balancers. It can also be used for routing users to infrastructure outside AWS. Amazon Route 53 can be used to set up DNS health checks. You can also monitor and control the ability of your applications to recover from failures with Route 53 Application Recovery Control. Amazon Route 53 Traffic Flow makes managing traffic globally easy through a variety routing types.
  • 5
    Infoblox NIOS Reviews
    Infoblox NIOS 8.5.3 provides efficient, multi-cloud integrations, automation, and strengthens DDI control and reliability. It also enhances service provider experiences for hybrid networks of all sizes, today and into the future. NIOS 8.5.3 increases security by using Access Control Lists (ACLs). Administrators can manage IP and network access and allow permissions to specific zones. NIOS 8.6.0 allows the pairing of virtual and physical appliances for hybrid HA. This improves reliability, redundancy, and customer experience during migration. Improved proxy functions and DoT and DoH control for greater privacy, security, and control. DTC is equipped with NIOS 8.6.0, which provides new consolidated monitor health settings for all members that allow them to share statuses and do health checks. It also provides a new LBDN Query configuration to allow full health check updates. NIOS 8.6.0 also offers new source IP load balancing that allows persistence during disconnect or reconnect events.
  • 6
    AWS IoT Analytics Reviews

    AWS IoT Analytics

    Amazon Web Services

    $3.43 per month
    IoT data is not structured and therefore difficult to analyze using traditional analytics and business intelligence tools designed to process structured data. IoT data is often gathered from devices that record very noisy processes (such temperature, motion, and sound). These devices often have large gaps and corrupted messages. This makes it difficult to analyze the data. IoT data can often only be meaningful when viewed in conjunction with third-party data inputs. Vineyard irrigation systems often combine moisture sensor data from the vineyard with rainfall data from the vineyard to aid farmers in determining when to water their crops. This allows for better water usage and maximizes harvest yield. AWS IoT Analytics automates all the tedious steps required to analyze data from IoT devices.
  • 7
    TensorFlow Reviews
    Open source platform for machine learning. TensorFlow is a machine learning platform that is open-source and available to all. It offers a flexible, comprehensive ecosystem of tools, libraries, and community resources that allows researchers to push the boundaries of machine learning. Developers can easily create and deploy ML-powered applications using its tools. Easy ML model training and development using high-level APIs such as Keras. This allows for quick model iteration and debugging. No matter what language you choose, you can easily train and deploy models in cloud, browser, on-prem, or on-device. It is a simple and flexible architecture that allows you to quickly take new ideas from concept to code to state-of the-art models and publication. TensorFlow makes it easy to build, deploy, and test.
  • 8
    Manjaro Reviews
    It is an open-source, friendly operating system. It combines all the best of cutting-edge software with a focus to get started quickly, automated tools that require less manual intervention, as well as help available whenever needed. Manjaro is suitable both for newcomers and seasoned computer users. You have complete control over your hardware unlike proprietary operating systems. Manjaro is a powerful Operating System that can be used at home, work, or in development environments. Many popular Windows applications can be run easily using compatibility software like Wine, PlayonLinux, or Proton via Steam. These examples are not exhaustive. This is a middle ground for those who want to have good performance, full control, cutting-edge software, and software stability.
  • 9
    Cove Data Protection Reviews
    Top Pick
    Cove Data Protection (formerly Nable Backup) protects servers, applications and databases as well as workstations and Microsoft 365 data. You can also store your backups in cloud storage at one of the 30 worldwide data centers. Flexible recovery options include file/folder/level recovery, virtual restore, and bare-metal restoration. You can reduce administrative time by managing backups from one dashboard for all your customers and all their devices and data types. Automated recovery testing allows for screenshot backup verification. TrueDelta compression, deduplication, and WAN optimization make daily backups light and quick. Cove Data Protection makes data protection simple, fast, and reliable.
  • 10
    Piwik PRO Reviews

    Piwik PRO

    Piwik PRO

    $500 per month
    1 Rating
    The Only Analytics Suite Designed for Data-Sensitive Industries. Piwik PRO allows you to track user behavior even when it is not secure. It is both privacy-compliant and available on-premises as well as in the cloud. Complete compliance with security and privacy laws around the world. Piwik PRO makes compliance easy with strict data privacy regulations. From privacy laws in the United States, to all European laws, directives, and including GDPR, HIPAA and Chinese Internet Law, Russian law 526FZ, and many others. Piwik PRO guarantees 100% data ownership. It is never shared with any third parties, regardless of whether you choose the Cloud or On-Premises solution. Combine data from Piwik PRO Analytics Suite for highly accurate customer profiles and detailed research on user behavior patterns. Integrate first-party data from web analysis, your company's CRM and offline sources (including CSV file), forms, or other sources. Get a complete picture about your customers' behavior.
  • 11
    EaseUS Todo Backup Reviews

    EaseUS Todo Backup

    EaseUS Software

    $39 per year
    1 Rating
    EaseUS backup is packed with innovative backup features. It covers four editions: server, advanced server, workstation, and technician editions, which are suitable for different business sizes. It is designed to be used by businesses of all sizes and in all environments, from one workstation to an enterprise with multiple platforms. It provides a single-stop backup solution for all workloads on servers, databases and PCs. You should be focusing on what adds value to your business. Automated backup tasks can be scheduled for any time or event. It's easy to forget about it. Data can be protected actively, even if it's growing. It has no impact on your operating systems. Backups are an insurance policy. Backups can be run as often as necessary to protect your business data. You can send backup data to any device you choose, such as a disk, NAS device or tape, virtual machine or popular cloud service.
  • 12
    Kubernetes Reviews
    Kubernetes (K8s), an open-source software that automates deployment, scaling and management of containerized apps, is available as an open-source project. It organizes containers that make up an app into logical units, which makes it easy to manage and discover. Kubernetes is based on 15 years of Google's experience in running production workloads. It also incorporates best-of-breed practices and ideas from the community. Kubernetes is built on the same principles that allow Google to run billions upon billions of containers per week. It can scale without increasing your operations team. Kubernetes flexibility allows you to deliver applications consistently and efficiently, no matter how complex they are, whether you're testing locally or working in a global enterprise. Kubernetes is an open-source project that allows you to use hybrid, on-premises, and public cloud infrastructures. This allows you to move workloads where they are most important.
  • 13
    Google Kubernetes Engine (GKE) Reviews
    Advanced apps can be run on a managed Kubernetes service that is secured and managed. GKE is an enterprise-grade platform that allows containerized applications to run, including stateful and non-stateful, Linux and Windows, AI and ML and complex web apps. It also supports APIs and backend services. You can leverage industry-first features such as four-way auto scaling and no stress management. Optimize GPU/TPU provisioning, make use of integrated developer tools, and get multicluster support from SREs. Single-click clusters allow you to quickly get started. You can leverage a high-availability control plan that includes multi-zonal clusters and regional clusters. Reduce operational overhead by using auto-repair, automatic-upgrade, or release channels. Secure by default, with vulnerability scanning of container images as well as data encryption. Integrated Cloud Monitoring with infrastructure, application and Kubernetes specific views. You can speed up app development without compromising security.
  • 14
    Ivanti NAC Reviews
    Pulse Policy Secure is a next-generation NAC that allows organizations to gain complete visibility and understand their security posture. It also enforces roles-based access and endpoint policy for network users, guests, and IoT devices. Pulse NAC can automate threat response to mitigate malware and unauthorized access.
  • 15
    Obkio Reviews

    Obkio

    Obkio

    $399 per month
    6 Ratings
    Obkio is a simple Network Monitoring and Troubleshooting SaaS solution that allows users to continuously monitor the health of their network and core business applications to improve the end-user experience. Obkio identifies the cause of intermittent network problems, VoIP, video, and applications slowdown in seconds so you can troubleshoot before they affect your end-users. Deploy network monitoring Agents at strategic locations in a company's offices or network destinations such as data sites, remote sites, external client sites, or public or private clouds to continuously monitor performance using synthetic traffic exchanged every 500ms. Obkio continuously tests and measures network metrics, such as latency, jitter, packet loss, quality of service and customer experience via QoE (Quality of Experience). The app alerts you as soon as a problem occurs or even if there are signs that a failure is about to happen. Not only does it alert you and pinpoint the source of the issue, but it also allows you to go back in time to complete a diagnosis.
  • 16
    dataPARC Historian Reviews
    Unlock the full potential of your enterprise's time-series data with the dataPARC Historian. This solution elevates data management, facilitating smooth and secure data flow across your organization. Its design ensures easy integration with AI, ML, and cloud technologies, paving the way for innovative adaptability and deeper insights. Rapid access to data, advanced manufacturing intelligence, and scalability make dataPARC Historian the optimal choice for businesses striving for excellence in their operations. It's not just about storing data; it's about transforming data into actionable insights with speed and precision. The dataPARC Historian stands out as more than just a repository for data. It empowers enterprises with the agility to use time-series data more effectively, ensuring decisions are informed and impactful, backed by a platform known for its reliability and ease of use.
  • 17
    Parseur Reviews

    Parseur

    Parseur Pte. Ltd.

    $99 / month
    1 Rating
    Parseur is the best email parser and document processing platform. With Parseur, automatically extract text from emails, PDFs, CSVs or Excels and sends it to any app, spreadsheet or database. Parseur will save your business hundreds hours of manual data entry and lets you automate your business. Parseur comes loaded with ready made templates for many industries including food delivery orders (e.g. Grubhub, DoorDash), Google Alerts, real estate leads (e.g. Zillow, Apartments.com), Job applications (e.g. LinkedIn), Bookings (e.g. Airbnb) and many more!
  • 18
    Megadisk Reviews
    Megadisk, a trusted cloud-based storage solution, redefines how individuals and businesses manage and access their data. Our cutting-edge technology, robust features and secure platform provide seamless file sharing and storage.
  • 19
    Quantum Armor Reviews

    Quantum Armor

    Silent Breach

    From $49/asset/month
    1 Rating
    Your attack surface is the sum total of all attack vectors that can be used against your perimeter defenses. It is simply the amount of information that you are exposing the outside world. The attack surface is the most important thing hackers will need to exploit to break into your network. When attacking targets, professional hackers usually follow the cyber kill chains. Typically, the first step in this process is to survey the target's attack surfaces. This is called advanced reconnaissance. By reducing the attack surface, you can reduce the risk and prevent attacks from ever happening. The cyber kill chain is a method for categorizing and tracking all stages of a cyberattack, from early reconnaissance to the exfiltration data.
  • 20
    Netdata Reviews
    Top Pick

    Netdata, Inc.

    Free
    18 Ratings
    Monitor your servers, containers, and applications, in high-resolution and in real-time. Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: Collects metrics from 800+ integrations Real-Time, Low-Latency, High-Resolution Unsupervised Anomaly Detection Powerful Visualization Out of box Alerts systemd Journal Logs Explorer Low Maintenance Open and Extensible Troubleshoot slowdowns and anomalies in your infrastructure with thousands of per-second metrics, meaningful visualisations, and insightful health alarms with zero configuration. Netdata is different. Real-Time data collection and visualization. Infinite scalability baked into its design. Flexible and extremely modular. Immediately available for troubleshooting, requiring zero prior knowledge and preparation.
  • 21
    NMIS Reviews
    FirstWave’s NMIS is a network management system that provides fault, performance, configuration management, performance graphs, and threshold alerts. Business rules allow for highly specific notification policies that can be used with multiple notification methods. FirstWave also enables partners, including some of the world’s largest telcos and managed service providers (MSPs), to protect their customers from cyber-attacks, while rapidly growing cybersecurity services revenues at scale. FirstWave provides a comprehensive end-to-end solution for network discovery, management, and cybersecurity for its partners globally.
  • 22
    GLPI  Reviews

    GLPI

    TECLIB

    €19/month/user
    1 Rating
    GLPI is a powerful Service Management software that uses open-source technologies. It makes it easy to plan and manage IT changes, solve problems efficiently, automate business processes, and maintain control over your IT infrastructure. Key features of the GLPI: 1. 1. 2. 2. Asset management and automatic inventories 3. Data quality control using rationality 4. Asset management: Administrative and financial 5. Software inventory and management of licences 6. Knowledge and frequently asked questions 7. Statistics and reports 8. 8. 9. Inventory of Android-based devices
  • 23
    Jit Reviews
    Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 24
    EcholoN Reviews
    Top Pick

    mIT solutions

    $5000 one-time payment
    15 Ratings
    EcholoN, the Service Management Software Suite is customer-oriented and highly effective at all levels. It provides a complete solution for support, service and customer care. You want total control over your system and the ability to operate your service management solution from your home. You prefer a cloud solution that doesn't burden your infrastructure. Your service management software can be operated in the EcholoN cloud. You just need to enter a new license code. All your stored data and workflows are kept and can be accessed for further processing. Once the license has been entered you can immediately start using the new options. A native app is better for each workstation because it has its own requirements. Depending on your application, role, and location, you can use an Android or native iOS app to work offline and receive in-the-field service. The web app can be used online on all devices.
  • 25
    Total Network Inventory Reviews

    Total Network Inventory

    Softinventive Lab

    $90.00/one-time
    2 Ratings
    Total Network Inventory 5 Professional provides powerful tools for software inventory and license compliance audit. There are no exhausting preparations needed in order to get your PC audit up and running: just install Total Network Inventory 5 on one computer and that's it—you're good to go. Define a list of separate network nodes or IP-ranges or connect the scanner to an Active Directory domain. Next, specify the administrator's password and call it done after clicking Start scan! In a few short minutes you'll own data on all your Windows, Mac OS X, Linux, and FreeBSD computers as well as network devices.