---
description: Page 7 - Compare the best Endpoint Protection Software in Canada. Capterra offers software reviews from verified users, pricing, and features. Find the top rated software for your business.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 7 - Endpoint Protection Software - Prices & Reviews - Capterra Canada 2026
---

Breadcrumb: [Home](/) > [Endpoint Protection Software](https://www.capterra.ca/directory/30907/endpoint-protection/software) > [Page 7](https://www.capterra.ca/directory/30907/endpoint-protection/software?page=7)

# Endpoint Protection Software

Canonical: https://www.capterra.ca/directory/30907/endpoint-protection/software

Page: 7 / 10\
Prev: [Previous page](https://www.capterra.ca/directory/30907/endpoint-protection/software?page=6)\
Next: [Next page](https://www.capterra.ca/directory/30907/endpoint-protection/software?page=8)

> Endpoint Protection software gives IT professionals the tools they need to protect their networks and assets from targeted attacks, malware, and other threats.

-----

## Products

1. [Dhound](https://www.capterra.ca/software/178979/dhound) — 4.5/5 (2 reviews) — Dhound is a security monitoring and intrusion detection tool for internet facing servers, clouds and web applications.
2. [Teleport](https://www.capterra.ca/software/185545/teleport) — 5.0/5 (2 reviews) — The easiest, most secure way to access and protect all your infrastructure.
3. [TeamViewer DEX](https://www.capterra.ca/software/198596/tachyon) — 4.0/5 (2 reviews) — Autonomous DEX: A personalized digital experience for every user.
4. [Quantum Network Security](https://www.capterra.ca/software/213092/check-point-cloud-managed-security-service) — 5.0/5 (2 reviews) — Web-based security solution that helps businesses monitor devices, create event logs, set security parameters for entire VPN \&amp; more.
5. [Microsoft Enterprise Mobility + Security](https://www.capterra.ca/software/213524/microsoft-enterprise-mobility-security-ems) — 4.5/5 (2 reviews) — Endpoint protection solution that helps businesses detect threats and malicious activities across devices to secure information breach.
6. [Archon](https://www.capterra.ca/software/215480/archon) — 4.5/5 (2 reviews) — Protect \&amp; monitor endpoints anywhere your users work. Enterprise-grade cybersecurity built exclusively for Managed Service Providers.
7. [Endpoint Detection and Response](https://www.capterra.ca/software/1011282/endpoint-detection-and-response) — 4.5/5 (2 reviews) — N-able EDR provides next-generation antivirus with behavioral AI threat detection and one-click remediation and rollback capabilities.
8. [Detego Digital Forensics](https://www.capterra.ca/software/1013672/detego-digital-forensics) — 4.5/5 (2 reviews) — A central platform to rapidly Extract, Analyse and Report on data from 1,000s of digital devices.
9. [ReaQta-Hive](https://www.capterra.ca/software/1013835/reaqta-hive) — 5.0/5 (2 reviews) — ReaQta-Hive is an Autonomous Detection \&amp; Response platform that protects endpoints against threats.
10. [Verimatrix XTD](https://www.capterra.ca/software/1033047/verimatrix-app-shield) — 5.0/5 (2 reviews) — Protect your code, data, and brand with the world’s \#1 enterprise-grade mobile app protection, threat detection, and response platform.
11. [Shieldoo](https://www.capterra.ca/software/1034200/shieldoo) — 5.0/5 (2 reviews) — Shieldoo is a next-generation private network that allows users to connect securely from anywhere.
12. [PureDome](https://www.capterra.ca/software/1041492/puredome) — 4.5/5 (2 reviews) — PureDome ensures endpoint protection for businesses by offering encrypted connections, dedicated IPs, and device posture check and more
13. [Trellix Network Detection & Response](https://www.capterra.ca/software/1042709/trellix-network-detection-response) — 4.5/5 (2 reviews) — Cloud-based network security platform that helps detect and remediate threats using AI and ML algorithms.
14. [Faronics Cloud](https://www.capterra.ca/software/1080712/Faronics-Cloud) — 5.0/5 (2 reviews) — Cloud-based IT management platform for education and enterprises that optimizes updates, imaging, security, and device control.
15. [Promisec Endpoint Manager](https://www.capterra.ca/software/146184/promisec-endpoint-manager-4-12) — 5.0/5 (1 reviews) — PEM provides holistic endpoint security management solution for medium and large enterprises.
16. [Privilege Manager](https://www.capterra.ca/software/173105/privilege-manager) — 4.0/5 (1 reviews) — Privileged Access Managemen solution that helps organizations protect their endpoints by implementing the principle of least privilege.
17. [Stellar EDB to PST Converter](https://www.capterra.ca/software/174641/edb-to-pst-converter) — 4.0/5 (1 reviews) — Stellar EDB to PST Converter is a professional tool that proficiently converts online as well as offline
18. [Morphisec Guard](https://www.capterra.ca/software/191197/morphisec) — 5.0/5 (1 reviews) — Morphisec provides prevention-first security to prevent the most advanced threats and close security gaps.
19. [Ivanti Neurons for UEM](https://www.capterra.ca/software/193214/unified-endpoint-manager) — 3.0/5 (1 reviews) — Endpoint management suite that helps businesses manage device data, automate deployments and resolve user issues on a unified platform.
20. [USB Lockit](https://www.capterra.ca/software/198915/usb-lockit) — 5.0/5 (1 reviews) — USB Lockit is a cloud-based cross-platform software that secures USB flash drives using password protection on a unified platform.
21. [CybrHawk SIEM XDR](https://www.capterra.ca/software/204613/siem-ztr) — 5.0/5 (1 reviews) — CybrHawk: Unmatched visibility against evolving cyber threats. Trust our advanced Open XDR SIEM platform for securing your business.
22. [CipherBox](https://www.capterra.ca/software/211686/cipherbox) — 5.0/5 (1 reviews) — 24/7 SOC-as-a-Service capabilities in a turnkey approach.
23. [CloudJacket MXDR](https://www.capterra.ca/software/212808/cloudjacketx) — 5.0/5 (1 reviews) — High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.
24. [ManageEngine Application Control Plus](https://www.capterra.ca/software/213495/manageengine-application-control-plus) — 5.0/5 (1 reviews) — Endpoint protection solution that helps create whitelists, block malicious applications, and provide temporary access to certain apps.
25. [Venn](https://www.capterra.ca/software/216643/venn) — 5.0/5 (1 reviews) — Venn secures remote work without virtual desktops or having to lock down every laptop.

-----

Page: 7 / 10\
Prev: [Previous page](https://www.capterra.ca/directory/30907/endpoint-protection/software?page=6)\
Next: [Next page](https://www.capterra.ca/directory/30907/endpoint-protection/software?page=8)

## Related Categories

- [Cloud Security Software](https://www.capterra.ca/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.ca/directory/10005/computer-security/software)
- [Data Loss Prevention Software](https://www.capterra.ca/directory/31106/data-loss-prevention/software)
- [Vulnerability Management Software](https://www.capterra.ca/directory/31062/vulnerability-management/software)
- [Network Security Software](https://www.capterra.ca/directory/30003/network-security/software)

## Links

- [View on Capterra](https://www.capterra.ca/directory/30907/endpoint-protection/software)
- [All Categories](https://www.capterra.ca/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Canada","address":{"@type":"PostalAddress","addressLocality":"Toronto","addressRegion":"ON","postalCode":"M2N 7E9","streetAddress":"5000 Yonge Street 14th Floor, Suite 1402 Toronto ON M2N 7E9"},"description":"Capterra Canada helps millions of people find the best business software. With software reviews, ratings, infographics and a comprehensive list of business software.","email":"info@capterra.ca","url":"https://www.capterra.ca/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@type":"Organization","@id":"https://www.capterra.ca/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra/","https://www.instagram.com/capterra/","https://www.youtube.com/channel/UCyUw9-HIkKiYcTqcFDUcxPA"]},{"name":"Capterra Canada","url":"https://www.capterra.ca/","@type":"WebSite","@id":"https://www.capterra.ca/#website","publisher":{"@id":"https://www.capterra.ca/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.ca/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Endpoint Protection Software","description":"Page 7 - Compare the best Endpoint Protection Software in Canada. Capterra offers software reviews from verified users, pricing, and features. Find the top rated software for your business.","url":"https://www.capterra.ca/directory/30907/endpoint-protection/software?page=7","about":{"@id":"https://www.capterra.ca/directory/30907/endpoint-protection/software?page=7#itemlist"},"breadcrumb":{"@id":"https://www.capterra.ca/directory/30907/endpoint-protection/software?page=7#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.capterra.ca/directory/30907/endpoint-protection/software?page=7#webpage","mainEntity":{"@id":"https://www.capterra.ca/directory/30907/endpoint-protection/software?page=7#itemlist"},"isPartOf":{"@id":"https://www.capterra.ca/#website"},"inLanguage":"en-CA","publisher":{"@id":"https://www.capterra.ca/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Endpoint Protection Software","position":2,"item":"https://www.capterra.ca/directory/30907/endpoint-protection/software","@type":"ListItem"},{"name":"Page 7","position":3,"item":"https://www.capterra.ca/directory/30907/endpoint-protection/software?page=7","@type":"ListItem"}],"@id":"https://www.capterra.ca/directory/30907/endpoint-protection/software?page=7#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 7 - Endpoint Protection Software - Prices &amp; Reviews - Capterra Canada 2026","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Dhound","position":1,"description":"Dhound IDS provides agent-based collection and analysis of security events on your internet facing server/device; agentless collection and analysis of security events for cloud (AWS); detecting and alerting about intrusions and suspecious activity; auditing outgoing traffic and data leakage detection; access control and comprehensive IP addresses analysis for incident investigation; tracking custom events that are important particularly for your online business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/03ac9920-158f-4a59-8c7a-871d05724e71.png","url":"https://www.capterra.ca/software/178979/dhound","@type":"ListItem"},{"name":"Teleport","position":2,"description":"Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and compromise. \n\nThe Teleport Infrastructure Identity Platform implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos. Headquartered in Oakland, CA, Teleport operates globally, with industry-leading customers such as Nasdaq, Moody’s, Adobe, and Elastic.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/adfb3088-111b-407a-9358-515210336eaf.png","url":"https://www.capterra.ca/software/185545/teleport","@type":"ListItem"},{"name":"TeamViewer DEX","position":3,"description":"The TeamViewer DEX platform is a cloud-native, real-time, autonomous DEX solution that fixes digital worker experience issues before they impact users. It removes friction from IT operations, improves compliance, reduces costs, and helps IT deliver personalized digital experiences by bringing the user front and center in the decision-making process. ​","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d4bec9c9-f4d3-45ff-9a4e-3c66cd639cef.png","url":"https://www.capterra.ca/software/198596/tachyon","@type":"ListItem"},{"name":"Quantum Network Security","position":4,"description":"Web-based security solution that helps businesses monitor devices, create event logs, set security parameters for entire VPN & more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8e05fa05-eb77-4036-89dc-8c0b3ca7b279.png","url":"https://www.capterra.ca/software/213092/check-point-cloud-managed-security-service","@type":"ListItem"},{"name":"Microsoft Enterprise Mobility + Security","position":5,"description":"Endpoint protection solution that helps businesses detect threats and malicious activities across devices to secure information breach.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e70f3225-3682-4245-86d3-aae12b250267.png","url":"https://www.capterra.ca/software/213524/microsoft-enterprise-mobility-security-ems","@type":"ListItem"},{"name":"Archon","position":6,"description":"Protect & monitor endpoints anywhere your users work. Enterprise-grade cybersecurity built exclusively for Managed Service Providers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/81b6fba4-08fc-481e-8d6b-216eff93bde7.png","url":"https://www.capterra.ca/software/215480/archon","@type":"ListItem"},{"name":"Endpoint Detection and Response","position":7,"description":"N-able Endpoint Detection and Response (EDR) helps MSPs prevent, detect, and respond to ever-changing cyberthreats. Powered by SentinelOne®, N-able EDR provides next-generation antivirus with behavioral AI threat detection and one-click remediation and rollback capabilities. As an integrated feature of N-able N-central and N-able N-sight, N-able EDR allows MSPs to gain full monitoring and management, paired with industry-leading endpoint detection and protection, for effective endpoint security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2ecf6b2a-ae73-4864-b606-7b182c0d51b6.png","url":"https://www.capterra.ca/software/1011282/endpoint-detection-and-response","@type":"ListItem"},{"name":"Detego Digital Forensics","position":8,"description":"An all-in-one Digital Forensics platform that enables organisations to extract, analyse and create court-ready reports on data from a range of devices including PCs, laptops, mobile phones, removable media, and smart devices.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1a3b0724-38a8-4c25-b416-935bbefcd13f.png","url":"https://www.capterra.ca/software/1013672/detego-digital-forensics","@type":"ListItem"},{"name":"ReaQta-Hive","position":9,"description":"ReaQta, an IBM company, is a top-tiered AI Autonomous Detection & Response platform built by an elite group of cyber security experts & AI/ML researchers. ReaQta allows organizations to eliminate the most advanced endpoint threats in real-time. \n\nEquipped with proprietary NanoOS technology, ReaQta-Hive delivers unprecedented visibility into processes and applications running on endpoints and is tamper-free to malware & attackers. ReaQta was named a 2020 Gartner Cool Vendor in Endpoint Security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ef30b2e8-c144-4fb8-93ed-190201b44f37.png","url":"https://www.capterra.ca/software/1013835/reaqta-hive","@type":"ListItem"},{"name":"Verimatrix XTD","position":10,"description":"If your enterprise has an app, you need XTD.\n\nVerimatrix XTD stands at the forefront of application security, offering unmatched protection for mobile, web desktop and embedded applications in critical industries while streamlining implementation to empower innovation.\n\nWhile many organizations have some form of cybersecurity protection for their managed devices (employee devices), XTD is one of the only cybersecurity solutions to address multi-vector threats stemming from unmanaged (consumer) mobile devices.\n\nVerimatrix XTD extends beyond your existing MTD and EDR security to protect threats from unmanaged devices. Powered by AI/ML, detect and respond to threats before your enterprise is compromised.\n\nVerimatrix XTD provides multi-layered in-app protection combining a range of advanced security techniques.\n- Code obfuscation\n- Anti-tamper technology\n- iOS jailbreak detection\n- Android root detection\n- Environmental checks\n- Anti reverse-engineering technology","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/866b8058-89fd-4627-8e5e-c879946f3740.png","url":"https://www.capterra.ca/software/1033047/verimatrix-app-shield","@type":"ListItem"},{"name":"Shieldoo","position":11,"description":"Shieldoo is a next-generation private network that allows users to connect securely from anywhere. The tool's secure structure with nodes provides an easy way to create your connection, and there are no technical skills needed in order of administration because it does all of that work behind the scenes. In addition, you only pay based on how many users and servers you use each month - making this affordable for anyone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3c0af8e2-a115-424a-8e84-44f3ec3bb8b6.png","url":"https://www.capterra.ca/software/1034200/shieldoo","@type":"ListItem"},{"name":"PureDome","position":12,"description":"PureDome offers businesses comprehensive endpoint protection, bolstering the security of devices and networks against cyber threats. With encrypted connections provided by its VPN and dedicated IPs for access controls, devices remain safeguarded. PureDome's device posture check ensures that only authorized and properly configured devices can access the network. Additionally, the Internet Kill Switch adds an extra layer of safety by automatically disconnecting devices during VPN disruptions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/53c470cc-f4e8-40c1-9e35-0867d5bc3e2f.png","url":"https://www.capterra.ca/software/1041492/puredome","@type":"ListItem"},{"name":"Trellix Network Detection & Response","position":13,"description":"Cloud-based network security platform that helps detect and remediate threats using AI and ML algorithms.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/dd6c6d88-6885-4dee-8cff-47f5ce440e9d.png","url":"https://www.capterra.ca/software/1042709/trellix-network-detection-response","@type":"ListItem"},{"name":"Faronics Cloud","position":14,"description":"Cloud-based endpoint management software that provides secure device control and monitoring capabilities. The platform offers a unified console for managing Windows, Mac, iOS, Android, and Chromebook devices with features including automated security, remote monitoring, and system restoration functionality. Faronics Cloud incorporates multiple security tools such as Software Updater for patch management, Anti-Executable for application control, Anti-Virus protection, and the signature Deep Freeze technology that returns computers to their original state upon restart. The system also includes reporting and analytics tools that deliver detailed insights on device health, software usage, and security compliance through customizable dashboards, allowing for data-driven decisions and proactive issue identification across the IT environment.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/53c0d354-e359-436e-85eb-e512e0cd08e6.png","url":"https://www.capterra.ca/software/1080712/Faronics-Cloud","@type":"ListItem"},{"name":"Promisec Endpoint Manager","position":15,"description":"PEM (Promisec Endpoint Manager) is the first agentless solution that delivers complete endpoint detection and remediation capabilities across the enterprise. PEM leverages proprietary technology to quickly inspect your entire enterprise, identifying, analyzing, and remediating security gaps.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7cab208e-b3f8-4b88-b407-552d3e781a86.png","url":"https://www.capterra.ca/software/146184/promisec-endpoint-manager-4-12","@type":"ListItem"},{"name":"Privilege Manager","position":16,"description":"Privilege Manager is the only all-in-one least privilege and application control solution capable of supporting enterprises and fast-growing organizations at scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application controls keep people productive, and actionable reporting demonstrates value to executives and auditors.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e4fe53bc-4eac-44fe-ae36-53fe743f96b3.png","url":"https://www.capterra.ca/software/173105/privilege-manager","@type":"ListItem"},{"name":"Stellar EDB to PST Converter","position":17,"description":"Stellar EDB to PST Converter efficiently and quickly converts Microsoft Exchange Database (EDB) files into Outlook PST files. The software can convert both online and offline EDB files and the converted data can also be saved in HTML, RTF and PDF format. All the mailbox items including contacts, calendars, emails, attachments, notes, tasks and journals can be converted.\nUser can preview the data before saving it in a PST file and there is also a provision for selective conversion.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c9b457e5-d49d-49c0-8f4f-c6cced827974.png","url":"https://www.capterra.ca/software/174641/edb-to-pst-converter","@type":"ListItem"},{"name":"Morphisec Guard","position":18,"description":"Morphisec provides prevention-first security against the most advanced threats to stop the attacks that others don’t, from endpoint to the cloud. Morphisec's software is powered by Automated Moving Target Defense (AMTD) technology, the next evolution of cybersecurity. AMTD stops ransomware, supply chain attacks, zero-days, and other advanced attacks. Over 7,000 organizations trust Morphisec to protect nine million Windows and Linux servers, workloads, and endpoints. Morphisec stops thousands of advanced attacks daily at Lenovo/Motorola, TruGreen, Covenant Health, Citizens Medical Center, and many more. Learn more at www.morphisec.com.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/87760b32-adef-438b-81fe-2988f382f232.png","url":"https://www.capterra.ca/software/191197/morphisec","@type":"ListItem"},{"name":"Ivanti Neurons for UEM","position":19,"description":"Ivanti Neurons for Unified Endpoint Management (UEM) is a cloud-based platform that enhances visibility and control over various endpoints like mobiles, desktops, and IoT devices. It offers a unified interface for device discovery, management, and security, ensuring robust endpoint protection. Utilizing AI-driven automation, the solution proactively secures and heals devices, streamlining operations for IT teams and improving user experiences. Key features include real-time asset discovery, maintaining a consistent inventory to minimize security risks. It supports self-healing and self-securing capabilities, reducing the need for manual IT intervention by automating common tasks and diagnostics. This not only boosts productivity but also provides precise, actionable insights for quicker issue resolution, thereby increasing business efficiency and lowering costs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/debf614a-b4dd-47a9-80e8-01a619e43f0d.jpeg","url":"https://www.capterra.ca/software/193214/unified-endpoint-manager","@type":"ListItem"},{"name":"USB Lockit","position":20,"description":"USB Lockit is a cross-platform software that secures USB flash drives using password protection. It allows users to lock their USB drive with a PIN, encrypting files and restricting access to authorized users entering the correct PIN. Available for Android and Windows, USB Lockit safeguards sensitive files from unauthorized access when the drive connects to other devices. The software provides data protection capabilities, including AES 256-bit encryption across operating systems.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e9591215-a953-4e3f-a84f-001002d7d423.png","url":"https://www.capterra.ca/software/198915/usb-lockit","@type":"ListItem"},{"name":"CybrHawk SIEM XDR","position":21,"description":"Enterprises rely on CybrHawk as their trusted cybersecurity partner to uncover the unknown and reveal the truth. With our advanced Open XDR SIEM platform and comprehensive services, we provide unmatched visibility for sensitive data and critical systems. Trust CybrHawk to defend your business with confidence against evolving cyber threats. Discover the power of CybrHawk solutions and stay one step ahead in the dynamic digital landscape.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/74052533-80e7-420e-baf7-41358eb7a5a7.png","url":"https://www.capterra.ca/software/204613/siem-ztr","@type":"ListItem"},{"name":"CipherBox","position":22,"description":"CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3ac5a950-92cf-4446-a3e2-67cc9efe2e12.png","url":"https://www.capterra.ca/software/211686/cipherbox","@type":"ListItem"},{"name":"CloudJacket MXDR","position":23,"description":"CloudJacket MXDR is a fully managed security platform that detects, investigates, and responds to threats across your entire environment. Real protection without the need to stitch together multiple tools, eliminating the burden of building or expanding an internal Security Operation Center. \n\nOur solution unifies EDR, ITDR, SIEM, and Cloud security into a single pane of glass, while our 24/7 U.S. based SOC does the work most “managed” providers leave to you. \n\nHigh-fidelity security where agentic AI handles the volume while human analysts validate every real threat. Our team proactively hunts for what automation misses and takes decisive action when it matters most. This approach enables rapid isolation of compromised systems, termination of malicious processes, and providing guided remediation with full incident context. \n\nWe operate as an extension of your team. One platform. One partner. Faster response times.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3cf5efe1-be3b-4c48-96cf-3f3e2b05e99e.jpeg","url":"https://www.capterra.ca/software/212808/cloudjacketx","@type":"ListItem"},{"name":"ManageEngine Application Control Plus","position":24,"description":"Application Control Plus is an enterprise security solution that prevents malicious software from being installed on endpoints. The product helps IT administrators setup application Allow-lists and Blacklists for their network, with on-demand application access capabilities. The solution effectively prevents high-risk applications like End-Of-Life software, Peer-To-Peer software like Torrent downloaders from existing within the network.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e3fdf8e2-d6ba-4972-892b-55f6d622e2c2.png","url":"https://www.capterra.ca/software/213495/manageengine-application-control-plus","@type":"ListItem"},{"name":"Venn","position":25,"description":"Venn is revolutionizing how businesses enable remote workers and contractors, removing the burden of buying and securing laptops or dealing with virtual desktops. Our patented technology provides companies with a new approach to securing workers on unmanaged or personal computers. \n\nWith Venn’s Blue Border™, work lives in a company-controlled Secure Enclave installed on the user’s computer, where all data is encrypted and access is managed. Work applications run locally within the Enclave – visually indicated by the Blue Border – isolating and protecting business activity from any personal use on the same computer. Company data is secured without controlling the entire device while ensuring end-user privacy for everything outside the Blue Border. As a result, IT teams can easily support Bring Your Own Device workforces without the cost, complexity, and usability challenges of virtual desktops.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ab5cd452-f0cc-4659-ba01-4718e186c7a8.jpeg","url":"https://www.capterra.ca/software/216643/venn","@type":"ListItem"}],"@id":"https://www.capterra.ca/directory/30907/endpoint-protection/software?page=7#itemlist","numberOfItems":25}
</script>
