---
description: Page 9 - Compare the best Computer Security Software in Canada. Capterra offers software reviews from verified users, pricing, and features. Find the top rated software for your business.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 9 - Computer Security Software - Prices & Reviews - Capterra Canada 2026
---

Breadcrumb: [Home](/) > [Computer Security Software](https://www.capterra.ca/directory/10005/computer-security/software) > [Page 9](https://www.capterra.ca/directory/10005/computer-security/software?page=9)

# Computer Security Software

Canonical: https://www.capterra.ca/directory/10005/computer-security/software

Page: 9 / 11\
Prev: [Previous page](https://www.capterra.ca/directory/10005/computer-security/software?page=8)\
Next: [Next page](https://www.capterra.ca/directory/10005/computer-security/software?page=10)

> Computer Security software automates the security and monitoring of computer systems from malware, threats and unauthorized use. It primarily offers endpoint protection, network security, antivirus, remote monitoring and VPN functionalities.

-----

## Products

1. [Bravura Privilege](https://www.capterra.ca/software/173107/Bravura-Privilege) — 4.0/5 (1 reviews) — Secure access to elevated privileges, including administrator accounts and security groups.
2. [Vulnerability Intelligence](https://www.capterra.ca/software/173345/saas-vulnerability-scanner) — 5.0/5 (1 reviews) — Vulnerability Intelligence by CyberSecurity Help provides actionable intelligence on software vulnerabilities to enhance security.
3. [Morphisec Guard](https://www.capterra.ca/software/191197/morphisec) — 5.0/5 (1 reviews) — Morphisec provides prevention-first security to prevent the most advanced threats and close security gaps.
4. [Cyber Hawk](https://www.capterra.ca/software/194231/cyber-hawk) — 4.0/5 (1 reviews) — Cyber Hawk detects insider cybersecurity threats and generates alerts of suspicious network changes and anomalous end-user behaviors.
5. [StackRox](https://www.capterra.ca/software/210440/stackrox) — 4.0/5 (1 reviews) — Container security tool that helps businesses protect native cloud applications via threat detection, vulnerability management \&amp; more.
6. [CloudJacket MXDR](https://www.capterra.ca/software/212808/cloudjacketx) — 5.0/5 (1 reviews) — High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.
7. [Secure Remote Worker](https://www.capterra.ca/software/1017612/secure-remote-worker) — 5.0/5 (1 reviews) — Secure untrusted or employee-owned devices and enforces temporary lockdown policy, restriction settings, and resource access.
8. [Ericsson NetCloud Manager](https://www.capterra.ca/software/1026520/netcloud) — 5.0/5 (1 reviews) — NetCloud SASE's RBI functionality air-gaps computers from zero-day web exploits and phishing attacks. ZTNA can replace insecure VPNs.
9. [Disk Deleter](https://www.capterra.ca/software/1029602/disk-deleter) — 5.0/5 (1 reviews) — DiskDeleter series software for HDD / SSD sanitization Secure Data Wipe for Enterprise with Tamper Proof Deletion Certificates DiskDel
10. [Specops Secure Service Desk](https://www.capterra.ca/software/1030848/specops-secure-service-desk) — 5.0/5 (1 reviews) — Cloud-based service desk platform that helps IT executives utilize authentication methods to manage access across assets.
11. [CyberCAST](https://www.capterra.ca/software/1034280/cybercast) — 5.0/5 (1 reviews) — A cybersecurity software designed to grow with you, whatever the future holds.
12. [Ace Managed Security Services](https://www.capterra.ca/software/1035823/ace-managed-security-services) — 5.0/5 (1 reviews) — ACE Managed Security services provide end-to-end protection with 24\*7\*365 monitoring and customizable security solutions.
13. [Radiant Security](https://www.capterra.ca/software/1044935/radiant-security) — 5.0/5 (1 reviews) — Radiant Security is an AI-powered assistant for SOCs that streamlines and automates alert triage, investigation, and response.
14. [RestoreX360](https://www.capterra.ca/software/1060303/restorex360) — 5.0/5 (1 reviews) — RestoreX360 simplifies PC management, enabling quick recovery from user errors, viruses, or failed installs.
15. [Predictive](https://www.capterra.ca/software/1061288/predictive) — 5.0/5 (1 reviews) — Cloud-based vulnerability management solution that lets users assess risks, identify threats, and more from a unified platform.
16. [Eye Security](https://www.capterra.ca/software/1062381/eye-security) — 5.0/5 (1 reviews) — Enterprise-grade Managed Extended Detection and Response (MXDR) at unbeatable prices for European businesses.
17. [Evidian](https://www.capterra.ca/software/2800/identity-access-manager) (0 reviews) — Manage \&amp; secure identity and access(SSO \&amp; MFA) to your data and lets you enforce a unified security policy across the enterprise.
18. [DeviceLock](https://www.capterra.ca/software/33075/devicelock) (0 reviews) — Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
19. [ControlCase Incident Manager](https://www.capterra.ca/software/48370/controlcase) (0 reviews) — Comprehensive computer security incident management system.
20. [CimTrak Integrity Suite](https://www.capterra.ca/software/117749/cimtrak-integrity-suite) (0 reviews) — Security application that helps secure and maintain business IT infrastructure, compliance with regulations such as the PCI-DSS, etc.
21. [EmpowerID](https://www.capterra.ca/software/136245/empowerid) (0 reviews) — The award-winning all-in-one Identity \&amp; Access Management suite incorporating IGA, AM \&amp; PAM available as on-premise, hybrid, or SaaS.
22. [Egosecure Endpoint](https://www.capterra.ca/software/137818/egosecure-endpoint) (0 reviews) — Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures.
23. [EntryProtect](https://www.capterra.ca/software/47272/entryprotect) (0 reviews) — On-premise solution that provides real-time protection of user data from malware and phishing attacks
24. [BitRaser](https://www.capterra.ca/software/170164/bitraser) (0 reviews) — Permanently erase your data beyond the scope of recovery. Erase data from PC, external hard drive, USB storage, SD cards and more.
25. [Encryptionizer](https://www.capterra.ca/software/171018/encryptionizer) (0 reviews) — Transparent Data Encryption for any application or database on the Windows Platform.

-----

Page: 9 / 11\
Prev: [Previous page](https://www.capterra.ca/directory/10005/computer-security/software?page=8)\
Next: [Next page](https://www.capterra.ca/directory/10005/computer-security/software?page=10)

## Related Categories

- [Cloud Security Software](https://www.capterra.ca/directory/31344/cloud-security/software)
- [Endpoint Protection Software](https://www.capterra.ca/directory/30907/endpoint-protection/software)
- [Vulnerability Management Software](https://www.capterra.ca/directory/31062/vulnerability-management/software)
- [Network Security Software](https://www.capterra.ca/directory/30003/network-security/software)
- [Cybersecurity Software](https://www.capterra.ca/directory/31037/cybersecurity/software)

## Links

- [View on Capterra](https://www.capterra.ca/directory/10005/computer-security/software)
- [All Categories](https://www.capterra.ca/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Canada","address":{"@type":"PostalAddress","addressLocality":"Toronto","addressRegion":"ON","postalCode":"M2N 7E9","streetAddress":"5000 Yonge Street 14th Floor, Suite 1402 Toronto ON M2N 7E9"},"description":"Capterra Canada helps millions of people find the best business software. With software reviews, ratings, infographics and a comprehensive list of business software.","email":"info@capterra.ca","url":"https://www.capterra.ca/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@type":"Organization","@id":"https://www.capterra.ca/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra/","https://www.instagram.com/capterra/","https://www.youtube.com/channel/UCyUw9-HIkKiYcTqcFDUcxPA"]},{"name":"Capterra Canada","url":"https://www.capterra.ca/","@type":"WebSite","@id":"https://www.capterra.ca/#website","publisher":{"@id":"https://www.capterra.ca/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.ca/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Computer Security Software","description":"Page 9 - Compare the best Computer Security Software in Canada. Capterra offers software reviews from verified users, pricing, and features. Find the top rated software for your business.","url":"https://www.capterra.ca/directory/10005/computer-security/software?page=9","about":{"@id":"https://www.capterra.ca/directory/10005/computer-security/software?page=9#itemlist"},"breadcrumb":{"@id":"https://www.capterra.ca/directory/10005/computer-security/software?page=9#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.capterra.ca/directory/10005/computer-security/software?page=9#webpage","mainEntity":{"@id":"https://www.capterra.ca/directory/10005/computer-security/software?page=9#itemlist"},"isPartOf":{"@id":"https://www.capterra.ca/#website"},"inLanguage":"en-CA","publisher":{"@id":"https://www.capterra.ca/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Computer Security Software","position":2,"item":"https://www.capterra.ca/directory/10005/computer-security/software","@type":"ListItem"},{"name":"Page 9","position":3,"item":"https://www.capterra.ca/directory/10005/computer-security/software?page=9","@type":"ListItem"}],"@id":"https://www.capterra.ca/directory/10005/computer-security/software?page=9#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 9 - Computer Security Software - Prices &amp; Reviews - Capterra Canada 2026","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Bravura Privilege","position":1,"description":"Bravura Privilege secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability.\n\nPAM secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/90304178-92ea-4851-9988-fde0e2dd0026.jpeg","url":"https://www.capterra.ca/software/173107/Bravura-Privilege","@type":"ListItem"},{"name":"Vulnerability Intelligence","position":2,"description":"Vulnerability Intelligence by CyberSecurity Help is vulnerability intelligence software that monitors software vendors to provide actionable vulnerability intelligence through data feeds and reports. The software tracks vulnerabilities by severity and patch availability, with details on information disclosure, authentication bypass, improper access control, and denial of service vulnerabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4c9b0300-df3f-4a70-a29d-4b64a3ce3635.png","url":"https://www.capterra.ca/software/173345/saas-vulnerability-scanner","@type":"ListItem"},{"name":"Morphisec Guard","position":3,"description":"Morphisec provides prevention-first security against the most advanced threats to stop the attacks that others don’t, from endpoint to the cloud. Morphisec's software is powered by Automated Moving Target Defense (AMTD) technology, the next evolution of cybersecurity. AMTD stops ransomware, supply chain attacks, zero-days, and other advanced attacks. Over 7,000 organizations trust Morphisec to protect nine million Windows and Linux servers, workloads, and endpoints. Morphisec stops thousands of advanced attacks daily at Lenovo/Motorola, TruGreen, Covenant Health, Citizens Medical Center, and many more. Learn more at www.morphisec.com.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/87760b32-adef-438b-81fe-2988f382f232.png","url":"https://www.capterra.ca/software/191197/morphisec","@type":"ListItem"},{"name":"Cyber Hawk","position":4,"description":"Cyber Hawk is a cybersecurity solution that detects insider cybersecurity threats and generates daily alerts of suspicious network changes and anomalous end-user behaviors, allowing you to create affordable, custom cybersecurity services.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fa16fe8a-1bfc-42dd-9406-d55ba9a8f12a.png","url":"https://www.capterra.ca/software/194231/cyber-hawk","@type":"ListItem"},{"name":"StackRox","position":5,"description":"Container security tool that helps businesses protect native cloud applications via threat detection, vulnerability management & more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5a6c5ef3-2776-420a-819c-7535b2ace9a0.png","url":"https://www.capterra.ca/software/210440/stackrox","@type":"ListItem"},{"name":"CloudJacket MXDR","position":6,"description":"CloudJacket MXDR is a fully managed security platform that detects, investigates, and responds to threats across your entire environment. Real protection without the need to stitch together multiple tools, eliminating the burden of building or expanding an internal Security Operation Center. \n\nOur solution unifies EDR, ITDR, SIEM, and Cloud security into a single pane of glass, while our 24/7 U.S. based SOC does the work most “managed” providers leave to you. \n\nHigh-fidelity security where agentic AI handles the volume while human analysts validate every real threat. Our team proactively hunts for what automation misses and takes decisive action when it matters most. This approach enables rapid isolation of compromised systems, termination of malicious processes, and providing guided remediation with full incident context. \n\nWe operate as an extension of your team. One platform. One partner. Faster response times.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3cf5efe1-be3b-4c48-96cf-3f3e2b05e99e.jpeg","url":"https://www.capterra.ca/software/212808/cloudjacketx","@type":"ListItem"},{"name":"Secure Remote Worker","position":7,"description":"Secure Remote Worker secures untrusted or employee-owned devices and enforces temporary lockdown policy, restriction settings, and resource access within a secured workspace. The user simply needs to log out of their secured environment in order to regain access to their personal machine. This at the same time blocks any access to corporate/enterprise resources until the secure session is next launched.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5c03470f-b817-483f-b64f-ea41e6842e8c.png","url":"https://www.capterra.ca/software/1017612/secure-remote-worker","@type":"ListItem"},{"name":"Ericsson NetCloud Manager","position":8,"description":"Designed to meet the needs of agile enterprises with lean IT departments, NetCloud SASE integrates cellular-centric SD-WAN and cybersecurity controls in a fully unified solution. As a zero trust cloud security solution, it protects enterprise networks, apps, users, and devices with capabilities including SWG, RBI, CASB, CDR, and ZTNA.  \n\nThe solution's powerful and efficient remote browser isolation functionality air-gaps devices from  web exploits and sophisticated phishing attacks. Content Disarm and Reconstruction (CDR) scans downloads/files to remove weaponized content, without disabling desired functionality. Zero Trust Network Access (ZTNA) replaces vulnerable and management-intensive VPNs to securely connect managed and unmanaged devices to web, cloud, and on-premises corporate apps and data.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/24f24abe-43b0-4dc4-907e-d1898446e8e7.png","url":"https://www.capterra.ca/software/1026520/netcloud","@type":"ListItem"},{"name":"Disk Deleter","position":9,"description":"What is diskdeleter?\nJungle Inc. is incorporated in USA and parent company is Jungle KK. Company designs, develops, publishes and distributes a wide range of software applications for Microsoft Windows and Mac operating systems.\n\nThe company was founded in January 2000 and has offices in Tokyo, Japan and Silicon Valley, United States.\n\nDiskDeleter wipes all information stored on a broad range.DiskDeleter is stored on a portable USB memory stick.\nDiskDeleter's license is unlimited","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c5ccbcc8-6bad-491e-8fb3-abc233d28fa8.png","url":"https://www.capterra.ca/software/1029602/disk-deleter","@type":"ListItem"},{"name":"Specops Secure Service Desk","position":10,"description":"Cloud-based service desk platform that helps IT executives utilize authentication methods to manage access across assets.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/aa11ebfd-e303-4162-8484-d5dbba1caff2.jpeg","url":"https://www.capterra.ca/software/1030848/specops-secure-service-desk","@type":"ListItem"},{"name":"CyberCAST","position":11,"description":"A Fundamentally Different Approach To Managed Security.\n\nZyston is a fully managed cybersecurity solution and easily the most complete security program management offering that exists today. Our program management methodology is designed to go beyond the alert, providing you with critical insights, technology requirements, and process expertise that enable you to build, operate, and mature an effective information security program.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/03318c29-2550-4b4e-adc7-9bc0e54bff66.png","url":"https://www.capterra.ca/software/1034280/cybercast","@type":"ListItem"},{"name":"Ace Managed Security Services","position":12,"description":"ACE Managed Security services provide end-to-end protection with 24*7*365 monitoring, customizable security solutions, automated compliance management, real-time threat analysis, and AI-powered threat intelligence. It supports the user's cybersecurity posture with fully managed, round-the-clock security services and helps companies defend against emerging threats by leveraging advanced security technologies and proactively hunting threats that lurk within the business network.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5f232c09-3c7d-4665-bd58-603ffce997c6.jpeg","url":"https://www.capterra.ca/software/1035823/ace-managed-security-services","@type":"ListItem"},{"name":"Radiant Security","position":13,"description":"Radiant Security is a security operations solution that enables the SOC to leverage the power of AI to streamline and automate analyst workflows. This dramatically boosts SOC analyst productivity, detects significantly more real attacks by deeply investigating every incident, and drastically reduces response times.\n \nRadiant’s AI SOC Analysts automate alert triage and incident investigation to provide unlimited capacity and to detect more real attacks. Incidents are escalated to analyst","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5669b782-4aa6-4a91-9b5e-e0117e6668d9.png","url":"https://www.capterra.ca/software/1044935/radiant-security","@type":"ListItem"},{"name":"RestoreX360","position":14,"description":"RestoreX360 is an all-in-one software solution meticulously crafted to help users maintain, repair, and optimize their Windows operating systems. With its comprehensive toolkit, RestoreX360 targets a wide range of common system issues and provides effective solutions to boost performance, enhance system stability, and improve the overall user experience.\n\nOne of the primary benefits of RestoreX360 is its ability to detect and resolve registry errors, which are often responsible for system slowdowns, crashes, and other performance-related problems. The software performs in-depth scans of the Windows registry, identifies inconsistencies, and repairs them, ensuring smoother and faster operation. By cleaning up fragmented, outdated, or corrupt entries, RestoreX360 minimizes errors and helps prevent potential system failures.\n\nIn addition to registry repair, RestoreX360 also helps optimize system performance by removing junk files, clearing cache, and cleaning up unnecessary system clutter.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d273948a-f42a-43a2-ab75-5fdf6293cb40.png","url":"https://www.capterra.ca/software/1060303/restorex360","@type":"ListItem"},{"name":"Predictive","position":15,"description":"Cloud-based vulnerability management solution that lets users assess risks, identify threats, and more from a unified platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b0e1a500-4d02-40b7-922e-f3737efc7148.png","url":"https://www.capterra.ca/software/1061288/predictive","@type":"ListItem"},{"name":"Eye Security","position":16,"description":"Advanced threats can often go undetected. Eye Security limits the impact of cyber threats, preventing data breaches and ransomware by adding 24/7 security operations to your business. \n\nEnterprise-grade Managed Detection and Response at unbeatable prices for European businesses.\n\n- 24/7 Managed XDR across all endpoints AND cloud\n- Your own SOC & full incident response team at no extra charge\n- 2h avg. plug & play integration with your tech stack\n- Advanced cyber security awareness training\n- Data hosting exclusively in the EU\n\nGet a demo and a complimentary cyber risk scan now.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/373b939c-2c29-4db7-ad3d-240661d484df.jpeg","url":"https://www.capterra.ca/software/1062381/eye-security","@type":"ListItem"},{"name":"Evidian","position":17,"description":"Evidian is a range of IAM products, offering SSO, MFA, Identity governance, identity federation ... On Prem or as a service. Evidian manages the access rights to your applications and allows you to apply a unified security policy throughout the company. Allows you to enforce access governance and automate account provisioning.\nEvidian is the Identity and Access Management (IAM) software suite of Atos.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/76266302-b613-4fdd-b4b3-16167d3482fe.jpeg","url":"https://www.capterra.ca/software/2800/identity-access-manager","@type":"ListItem"},{"name":"DeviceLock","position":18,"description":"Acronis DeviceLock DLP is an enterprise data loss prevention solution that provides comprehensive endpoint data protection. It minimizes insider threats, enforces process compliance, and increases efficiency of data protection through centralized management, increased productivity, and improved data loss prevention capabilities. The software controls costs with its modular architecture and delivers comprehensive data loss prevention through features like centralized management and deployment, agent-resident optical character recognition, clipboard control, log collection, alerting, tamper protection, allowlisting, and reporting.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f5b0041e-bd6d-4e82-85fa-d3189ca6f2d0.png","url":"https://www.capterra.ca/software/33075/devicelock","@type":"ListItem"},{"name":"ControlCase Incident Manager","position":19,"description":"ControlCase offers the most comprehensive computer security incident management system available.  This robust application centralizes the reporting, tracking and resolution of security incidents in an easy-to-use, web-based format. In addition to incident management, ControlCase helps comply with Federal regulations such as FISMA. It is the only platform that allows for secure reporting of security incidents to federal agencies such as US-CERT and FBI.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/45ba615a-5650-4523-a27b-888f45d9cac9.png","url":"https://www.capterra.ca/software/48370/controlcase","@type":"ListItem"},{"name":"CimTrak Integrity Suite","position":20,"description":"The CimTrak Integrity Suite continuously monitors &remediates unknown and unexpected changes to files, directories, configurations, users, groups, policies, active directories, database schema, cloud configurations, hypervisors, containers, network devices, and more in real-time. With System Integrity Assurance CimTrak helps companies/government agencies keep  IT infrastructures secure, maintain compliance, ensure continuous system availability, & take control of changes within IT environments.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/571430bb-2f9f-49ff-ab51-a03652a89573.png","url":"https://www.capterra.ca/software/117749/cimtrak-integrity-suite","@type":"ListItem"},{"name":"EmpowerID","position":21,"description":"All-in-one Identity Management and Cloud Security platform offer IGA, IAM, and PAM capabilities on-premise, hybrid, and SaaS. Built as a unified identity fabric for manageability and scalability, EmpowerID ships with a powerful API, the most extensive list of deep system connectors in the market (incl. market-leading integrations with Azure, SAP, and ServiceNow), and is driven by sophisticated RBAC/ABAC/PBAC and workflow engines with over 1,000 ready-to-use workflows for rapid deployment.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6c076002-a8d6-48e4-af81-4e502b7db592.png","url":"https://www.capterra.ca/software/136245/empowerid","@type":"ListItem"},{"name":"Egosecure Endpoint","position":22,"description":"Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures.\n1700 customers in 40 countries","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a1bc100a-1a36-4c09-b266-d9d55404f041.png","url":"https://www.capterra.ca/software/137818/egosecure-endpoint","@type":"ListItem"},{"name":"EntryProtect","position":23,"description":"Desktop software designed to protect all data entered into web browsers. Protects all data entry including personal and financial information from malware/spyware/trojans and phishing attacks that attempt to steal confidential information. Works alongside all other security software such as anti-virus providing a real-time layer of protection for all data.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fe418430-e83f-46a1-b30f-8e83bfdc7cc9.png","url":"https://www.capterra.ca/software/47272/entryprotect","@type":"ListItem"},{"name":"BitRaser","position":24,"description":"BitRaser File Eraser is a DIY software for permanent wiping of sensitive files, web browsing history, app & system traces, and deleted files from a laptop, desktop, and external storage media. The tool safeguards your data from falling into the wrong hands.\n\nWipe PC, external hard drive, USB storage, SD card & more\nErase sensitive files such as identity documents, tax records, etc.\nWipe clean web browsing history from Chrome, Mozilla, Safari, etc.\nRemove the app, system, & Internet traces","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/33594714-af6c-4fea-82a0-5b883afe63c0.png","url":"https://www.capterra.ca/software/170164/bitraser","@type":"ListItem"},{"name":"Encryptionizer","position":25,"description":"Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/31dc65be-07dd-4f9f-8c8d-7fd59e1c7bb6.png","url":"https://www.capterra.ca/software/171018/encryptionizer","@type":"ListItem"}],"@id":"https://www.capterra.ca/directory/10005/computer-security/software?page=9#itemlist","numberOfItems":25}
</script>
