Featured software
Most reviewed software
Explore the most reviewed products by our users on the Endpoint Protection Software
Local products for Canada
Filter Results (266)
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
Canada
Pricing Options
Product type
266 results
Safetica monitors your endpoints and protects them against insider threats and data breaches.
Learn more about Safetica
Safetica provides easy-to-use on-prem and cloud-native data loss prevention and insider threat protection solutions that help organizations secure their data and ensure regulatory compliance.
Safetica is a European software company founded in 2007, serving its customers in 120 countries globally, and provides data loss prevention and insider threat protection solutions.
Safetica NXT (cloud-native)
Safetica ONE (on-prem)
Learn more about Safetica
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
N-able EDR provides next-generation antivirus with behavioral AI threat detection and one-click remediation and rollback capabilities.
Learn more about Endpoint Detection and Response
N-able Endpoint Detection and Response (EDR) helps MSPs prevent, detect, and respond to ever-changing cyberthreats. Powered by SentinelOne, N-able EDR provides next-generation antivirus with behavioral AI threat detection and one-click remediation and rollback capabilities. As an integrated feature of N-able N-central and N-able RMM, N-able EDR lets you gain full monitoring and management of your endpoint security, all from a single dashboard.
Learn more about Endpoint Detection and Response
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management

SecureDoc Disk Encryption
SecureDoc Disk Encryption offers businesses Enterprise manageable, full-scale encryption using a sector-by-sector encryption approach.
Learn more about SecureDoc Disk Encryption
Our product ensures the protection of sensitive information stored on desktops, laptops, tablets & servers by employing single or multi-factor authentication from password to hardware token, and Smart card support for PreBoot Authentication (PBA). SecureDoc with PBConnex allows for preboot network authentication either wired or wirelessly by utilizing network based resources to authenticate users, enforce access controls, and manage end point devices before the operating system loads.
Learn more about SecureDoc Disk Encryption
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Covalence detects, analyzes, and responds to cyber threats across your endpoints, networks, and cloud services—all from one platform.
Learn more about Field Effect
As a holistic cybersecurity solution, Covalence detects, analyzes, and responds to cyber threats across your entire business—including your endpoints.
Covalence monitors and evaluates endpoint telemetry 24x7, directly on the agent, to identify malicious behavior. With real-time malware blocking and intelligent threat alerting, you can sleep soundly knowing your endpoints are secure.
Plus, Covalence powerfully protects your cloud services and network for a truly end-to-end defense.
Learn more about Field Effect
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
A revolutionary, 100% signature-free component that provides market-leading detection and remediation of ransomware attacks.
Learn more about Heimdal Ransomware Encryption Protection
Heimdal Ransomware Encryption Protection is an innovative and signature-free cybersecurity module with market-leading detection and remediation capacities that prevent any type of ransomware. This includes both fileless and file-based strains for complete, round-the-clock safety. It can detect any encryption attempt, even those that have no signatures or behavioral patterns. Our solution was built to be universally compatible with any antivirus, be it Heimdal’s own NGAV or something else.
Learn more about Heimdal Ransomware Encryption Protection
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Cybersecurity with AI-powered prevention, detection, response and hunting in a single autonomous XDR platform.
Learn more about SentinelOne
At SentinelOne, we are redefining cybersecurity by pushing the boundaries of autonomous technology. Our Singularity ️XDR Platform encompasses AI-powered prevention, detection, response, and threat hunting across user endpoints, containers, cloud workloads, and IoT devices. Empowering modern enterprises to defend faster, at greater scale, and with higher accuracy across their entire attack surface.
Learn more about SentinelOne
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
Learn more about ConnectWise SIEM
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
Learn more about ConnectWise SIEM
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Ninja Protect provides unprecedented visibility & control over endpoints, robust patching, and backup capabilities.
Learn more about NinjaOne
Ninja Protect is NinjaOne’s single-pane solution for endpoint protection. Providing unprecedented visibility & control over endpoints, robust patching, endpoint hardening, backup, and data protection capabilities alongside Bitdefender’s industry-leading next-generation AV & EDR capabilities, Ninja Protect is a holistic solution for endpoint protection. By combining these two powerful solutions, Ninja Protect helps IT leaders reduce their attack surface, stop active ransomware threats, and more.
Learn more about NinjaOne
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Prevent macOS malware, detect from Mac-specific threats, and monitor endpoints for compliance with Jamf Protect.
Learn more about Jamf Protect
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser experience. With known customizable prevention, intuitive dashboards, real-time alerts, and extensive reporting all of which is designed only for Macs, you can be certain that your Mac fleet is well secured and you always have full visibility into your Apple computers.
Learn more about Jamf Protect
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
On-prem & cloud-based unified endpoint management and security tool that helps manage organization endpoints from single console.
Learn more about ManageEngine Endpoint Central
Endpoint Central is a unified endpoint management solution that helps in managing servers, laptops, desktops, smartphones, & tablets from a central location. Using either an on-premise or a cloud-based UEM allows you to automate regular endpoint management routines like installing patches, deploying software, imaging & deploying OS, manage mobiles & BYOD devices, remote troubleshooting, modern management & much more! It also has a mobile app that allows you to manage endpoints anywhere, anytime!
Learn more about ManageEngine Endpoint Central
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Learn more about Automox
Automox uses a lightweight, cloud-native agent which can be installed on all endpoints in just a few minutes, ensuring that no device or server is left unpatched or untracked. With Automox, you'll have the ability to see all endpoints and applications from a single console which enables administrators to identify misconfigured systems, missing patches, or compliance issues.
Learn more about Automox
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Designed to adapt — secure network access solutions tailored to evolving business needs.
Learn more about NordLayer
Internal threats are as challenging as external ones — user-controlled devices are associated with potential risks of data leakage, malware files, and malicious activity easily triggered by human error. NordLayer endpoint protection consists of real-time device activity monitoring, detection of jailbroken/rooted devices to block from a company network, and ThreatBlock protection to mitigate endpoint security issues.
Learn more about NordLayer
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
The ultimate next-generation antivirus powered by market-leading threat intelligence, forensics, and firewall integration.
Learn more about Heimdal Next-Gen Endpoint Antivirus
Heimdal Next-Gen Endpoint Antivirus is an NGAV solution designed to provide market-leading endpoint detection and response through local signature-based file scanning, sandbox and backdoor analysis, process and behavior-based examination, and real-time cloud inspection. It is the detection-oriented counterpart to our threat prevention offering, Heimdal Threat Prevention. Besides its EDR features, Heimdal NGAV comes with complete firewall integration, which will further secure your workstations.
Learn more about Heimdal Next-Gen Endpoint Antivirus
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
ThreatLocker Endpoint Protection cybersecurity solutions proactively defend your business by reducing the attack surface. Try for Free
Learn more about ThreatLocker
Endpoint protection is crucial in today's cyber threat landscape to secure your organization from malicious attacks. ThreatLocker cybersecurity solutions proactively defend your business by reducing the attack surface, with granular controls over what is permitted. We enable organizations to only allow what their users need to complete their work while blocking everything else by default, enhancing productivity and mitigating cyber vulnerabilities. Schedule a demo with ThreatLocker today.
Learn more about ThreatLocker
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
Learn more about ESET Endpoint Security
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control.
Learn more about ESET Endpoint Security
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
CleanMyMac X is an all-in-one optimization kit for Mac. It deletes 49 types of Mac junk, optimizing the performance on every step.
Learn more about CleanMyMac X
CleanMyMac X is a complete set of Mac cleanup and productivity tools.
If your team uses Macs, CleanMyMac X is the right app to boost their performance. It fixes the most common Mac issues: cleanup, speedup, protection, and helps organize apps and files for increased productivity.
• Free up gigabytes of space
• Tune a Mac to its maximum speed
• Neutralize Mac-specific viruses and adware
• Update all software in one click
• Find and delete non-productive apps
Learn more about CleanMyMac X
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Search, analyze, and visualize data from your entire data ecosystem. Monitor, alert, and report on your operations to drive resilience.
Learn more about Splunk Enterprise
Are you ready to take control of your data? Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform.
Learn more about Splunk Enterprise
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Acronis Cyber Protect is the unique AI-enhanced integration of Data Protection with Cybersecurity in a single service provider solution
Learn more about Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL filtering, and more. Now Service Providers can eliminate complexity and make security a centerpoint of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue.
Learn more about Acronis Cyber Protect Cloud
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
WatchGuard Endpoint Security combines EPP, EDR, XDR, and DNS filtering solutions with Zero-Trust and Threat Hunting services.
Learn more about WatchGuard Endpoint Security
WatchGuard Endpoint Security delivers the technologies required to stop advanced cyberattacks on endpoints, including next-gen antivirus, EDR, ThreatSync (XDR) and DNS filtering solutions. WatchGuard EPP (Endpoint Protection Platform) goes beyond signature-based antivirus to stop malware, ransomware, and threats that leverage unknown, zero-day vulnerabilities.
Learn more about WatchGuard Endpoint Security
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
N-able N-central® is a powerful tool with advanced protection beyond EDR alone, to provide full layered security solution.
Learn more about N-central
N-able N-central® gives you comprehensive security features with maximum flexibility. A powerful tool that provides advanced patch management, web content filtering, two-way firewalls, and fast backup and recovery, N-central offers a strong layered approach to your customers' IT security. It can also help protect them against today's cyberthreats.
Learn more about N-central
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management

Deep Freeze
4.6
(38)
Local product
System recovery software to protect Windows & Mac workstations against pre-existing vulnerabilities & threats by rebooting & restoring.
Learn more about Deep Freeze
System recovery software to protect Windows & Mac workstations against pre-existing vulnerabilities & threats by rebooting & restoring.
Learn more about Deep Freeze
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Protect your equipment from digital threats. Complete security for small and medium businesses.
Learn more about ESET PROTECT MDR
ESET provides modern Endpoint Protection Platform (EPP) capabilities via the ESET PROTECT Platform, covering Windows, Mac, Linux and both Android and iOS operating systems, providing Mobile Device Management functionality. It comes with multi-tenant management, ensuring real-time visibility for both on-premises and off-premises endpoints as well as full reporting for ESET enterprise-grade solutions from a single pane of glass.
Learn more about ESET PROTECT MDR
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
ActiveLock continuously authenticates your workforce by the way they type to ensure only authorized users can access company endpoints.
Learn more about TypingDNA ActiveLock
When employees work remotely on company computers, you want to be sure no one else can access that device. Cybersecurity teams rely on TypingDNA ActiveLock to continuously authenticate each employee by the way they type - locking down the computer if the device is intentionally shared or gets into the wrong hands.
Learn more about TypingDNA ActiveLock
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Acronis Cyber Protect natively integrates cybersecurity, data protection and management to protect endpoints, systems and data.
Learn more about Acronis Cyber Protect
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection increasing productivity while decreasing TCO.
Acronis Cyber Protect offers one agent, one management interface, one license removing complexity and risks associated with non-integrated solutions.
With Acronis Cyber Protect, you get one integrated solution that delivers complete protection from todays threats.
Learn more about Acronis Cyber Protect
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Industry-leading Endpoint Protection Software. Discover, monitor and protect
your sensitive data.
Learn more about Endpoint Protector
Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as GDPR, PCI DSS, CCPA, HIPAA etc.
Learn more about Endpoint Protector
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
A prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching.
Learn more about ManageEngine Vulnerability Manager Plus
Vulnerability Manager Plus delivers comprehensive coverage, continual visibility, risk-based assessment, and integral remediation of vulnerabilities and misconfigurations from a central console. It offers extensive features including vulnerability assessment, automated patching, CIS compliance management, security configuration management, high-risk software audit, antivirus audit and active port audit. Vulnerability Manager Plus comes with plenty of reports, dashboards, and endless scalability.
Learn more about ManageEngine Vulnerability Manager Plus
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
EventLog Analyzer is a comprehensive log management solution that provides multiple security capabilities on a centralized platform.
Learn more about ManageEngine EventLog Analyzer
EventLog Analyzer, a comprehensive log management solution, collects, analyzes, correlates, searches, and archives log data from endpoints, firewalls, servers, databases, applications, and more. It provides visibility into network activity, spots suspicious activities through incident detection mechanisms such as event correlation, threat intelligence and more, mitigates potential threats and offers audit-ready report templates that help enterprises to comply with IT mandates at ease.
Learn more about ManageEngine EventLog Analyzer
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Banyan’s ZTNA solution provides secure one-click access to applications and infrastructure from anywhere – without legacy VPNs.
Learn more about Banyan Security
Banyan Security’s Zero Trust Newtork Access (ZTNA) solution enables fast, easy provisioning of user-to-application segmentation, giving users passwordless, one-click access to corporate applications, resources, and infrastructure from anywhere – without needing network-centric legacy VPNs. Risk and security are continuously evaluated and enforced in real-time across hybrid, multi-cloud, and SaaS environments.
Learn more about Banyan Security
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
24/7 SOC-as-a-Service capabilities in a turnkey approach.
Learn more about CipherBox
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities.
Learn more about CipherBox
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management

Deep Freeze Cloud
Make computers indestructible by eliminating any undesirable system changes from occuring.
Learn more about Deep Freeze Cloud
Faronics Cloud Deep Freeze makes computers indestructible by restoring every time to the original pristine state. Alongside this core function, you can set all your software and Windows to update according to a defined maintenance schedule, remote control into any user sessions, easily image and deploy, keep on top of all your software licensing, and save money on energy.
Deep Freeze helps to reduce IT helpdesk tickets by 63% and increase productivity.
Learn more about Deep Freeze Cloud
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Endpoint DLP Plus is an integrated DLP solution designed to safeguard sensitive endpoint data and effectively mitigate insider risks.
Learn more about ManageEngine Endpoint DLP Plus
Endpoint DLP Plus leverages advanced data loss prevention strategies to safeguard sensitive data within endpoints. Its capabilities enable administrators to locate, consolidate and categorize sensitive information as well as monitor and limit its movement across various exit routes such as cloud applications, email, peripheral devices and more in order to prevent accidental or deliberate disclosure. It is a versatile and scalable solution ideal for SMB's and enterprises.
Learn more about ManageEngine Endpoint DLP Plus
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform.
Cloud-based Endpoint Protection rated #1 for ease-of-use to help businesses identify, analyze, and remediate threats on a unified platform.
Learn more about Malwarebytes for Business
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management

1Password
4.7
(1,943)
Local product
1Password helps businesses improve security, visibility and control over how their passwords and company data are protected.
Secure your business starts with 1Password. Trusted by over 100,000 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture.
Learn more about 1Password
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers.
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers.
Learn more about Trellix Endpoint Security
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
VPN solution that provides businesses with remote access, policy management, threat protection, and more.
VPN solution that provides businesses with remote access, policy management, threat protection, and more.
Learn more about Cisco AnyConnect
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Security is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network.
Learn more about Symantec Endpoint Security
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Simplified endpoint management for desktops, servers, and mobile laptops.
GoTo Central is a powerful, easy-to-use endpoint management solution enabling IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. Whether you have remote employees or endpoints scattered across the globe, GoTo Central provides IT organizations with the speed, flexibility, and insight needed to increase productivity, reduce IT costs, and mitigate risk.
Learn more about Central
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Try a free Trial of WebTitan today, support included.
Learn more about WebTitan
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
On-premise & web-based solution for businesses that helps manage hosts' identity, endpoint visibility & compliance, attacks, and more.
On-premise & web-based solution for businesses that helps manage hosts' identity, endpoint visibility & compliance, attacks, and more.
Learn more about FortiClient
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Endpoint data loss protection and security platform that enables small businesses to manage recovery of deleted files and more.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the recovered files can be tracked through status reports.
Learn more about CrashPlan
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates, cloud-driven security means endpoints are always up to date.
Learn more about Webroot Business Endpoint Protection
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint
protection solution built to stop the widest range of attacks. Intercept X
combines multiple techniques including signatureless exploit prevention, deep
learning malware detection, anti-ransomware capabilities, root cause analysis,
and more.
Learn more about Intercept X Endpoint
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, MSPs, VARs/Distributors, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles.
Learn more about JumpCloud Directory Platform
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security
services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange
mail servers.
GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public
cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment.
Learn more about Bitdefender GravityZone
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Cypherdog's Encryption solution provides complete email protection by encrypting all email messages and attachments.
Cypherdog Encryption (CE) encrypts and decrypts any text or any media which you can send by any medium including e-mail or other platforms like Google Drive, Dropbox or Wetransfer.
You can use CE with Gmail on the most popular browsers, Thunderbird and Outlook. With just one click, you can use Cypherdog to encrypt e-mail messages and attachments.
CE is based on asymmetric encryption and prevent against data leaks and support cybersecurity policies.
Learn more about Cypherdog Encryption
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management

AccessPatrol
4.8
(95)
Local product
Device control software. Block USB removable storage devices and other peripherals to secure sensitive data against theft and misuse.
AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers.
AccessPatrol includes device control features for a variety of peripheral devices including USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, and MP3s.
File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users.
Learn more about AccessPatrol
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Cloud-based and on-premise platform that allows businesses to secure critical data with multi-factor authentication.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf.
Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation.
Learn more about Connect Secure
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Teramind tracks employee behavior, detects threats, and optimizes your business for productivity with advanced employee monitoring.
Discover Teramind - the ultimate tool for businesses looking to optimize productivity, streamline workflows, and protect assets. Our customizable platform ensures regulatory compliance, detects and prevents insider threats, and monitors remote employees. Automated actions keep your business secure and efficient, while real-time alerts and logs provide all-around security. Experience the power of machine-learned behavior analytics to secure your company data. Ready to revolutionize your business?
Learn more about Teramind
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
With remote work, digital storefronts, and BYOD, keeping your endpoints and network secure is a critical first-line defense against cyber threats. With OneLogin¿s endpoint management and protection, your users are secure and productive from any device on any platform. OneLogin Desktop provides seamless and secure single sign-on to apps, ensuring end-users always access from trusted corporate PCs and Macs, without having to re-enter their directory credentials.
Learn more about OneLogin
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management
DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review.
We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments.
Learn more about DNSFilter
...
Read more
Features
- Encryption Software
- Activity Tracking
- Device Management
- Application Security
- Compliance Management