{"id":1072,"date":"2025-03-20T10:58:06","date_gmt":"2025-03-20T10:58:06","guid":{"rendered":"https:\/\/www.maple-networks.com\/?page_id=1072"},"modified":"2025-12-15T16:30:37","modified_gmt":"2025-12-15T16:30:37","slug":"endpoint-security","status":"publish","type":"page","link":"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/endpoint-security\/","title":{"rendered":"Endpoint Security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1072\" class=\"elementor elementor-1072\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ebcb971 e-con-full e-flex e-con e-parent\" data-id=\"4ebcb971\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-33167f53 e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"33167f53\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-73d08d4e e-con-full e-flex e-con e-child\" data-id=\"73d08d4e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d6a590a elementor-widget elementor-widget-image\" data-id=\"5d6a590a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.maple-networks.com\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"945\" src=\"https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/10\/Logo-Maple-Horizontal-colour-white-1-1-scaled.png\" class=\"attachment-full size-full wp-image-2032\" alt=\"\" srcset=\"https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/10\/Logo-Maple-Horizontal-colour-white-1-1-scaled.png 2560w, https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/10\/Logo-Maple-Horizontal-colour-white-1-1-300x111.png 300w, https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/10\/Logo-Maple-Horizontal-colour-white-1-1-1024x378.png 1024w, https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/10\/Logo-Maple-Horizontal-colour-white-1-1-768x283.png 768w, https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/10\/Logo-Maple-Horizontal-colour-white-1-1-1536x567.png 1536w, https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/10\/Logo-Maple-Horizontal-colour-white-1-1-2048x756.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1fbb7424 e-con-full e-flex e-con e-child\" data-id=\"1fbb7424\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e6385e8 elementor-widget elementor-widget-ekit-nav-menu\" data-id=\"7e6385e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ekit-nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<nav class=\"ekit-wid-con ekit_menu_responsive_tablet\"\n\t\t\tdata-hamburger-icon=\"\"\n\t\t\tdata-hamburger-icon-type=\"icon\"\n\t\t\tdata-responsive-breakpoint=\"1024\">\n\t\t\t            <button class=\"elementskit-menu-hamburger elementskit-menu-toggler\"  type=\"button\" aria-label=\"hamburger-icon\">\n                                    <span class=\"elementskit-menu-hamburger-icon\"><\/span><span class=\"elementskit-menu-hamburger-icon\"><\/span><span class=\"elementskit-menu-hamburger-icon\"><\/span>\n                            <\/button>\n            <div id=\"ekit-megamenu-top-menu\" class=\"elementskit-menu-container elementskit-menu-offcanvas-elements elementskit-navbar-nav-default ekit-nav-menu-one-page- ekit-nav-dropdown-hover\"><ul id=\"menu-top-menu\" class=\"elementskit-navbar-nav elementskit-menu-po-right submenu-click-on-icon\"><li id=\"menu-item-302\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-302 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"#\" class=\"ekit-menu-nav-link ekit-menu-dropdown-toggle\">Our Services<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t<li id=\"menu-item-304\" class=\"sub1 menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-304 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"#\" class=\"sub1 dropdown-item\">Managed Services<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n\t<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t\t<li id=\"menu-item-3562\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-3562 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/data\/\" class=\"dropdown-item\">Data<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n\t\t<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t\t\t<li id=\"menu-item-319\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-319 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/data\/staas\/\" class=\"dropdown-item\">Storage as a Service (StaaS)<\/a>\t\t\t<li id=\"menu-item-314\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-314 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/data\/baas\/\" class=\"dropdown-item\">Backup as a Service (BaaS)<\/a>\t\t\t<li id=\"menu-item-315\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-315 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/data\/baas-m365\/\" class=\"dropdown-item\">Backup as a Service M365<\/a>\t\t\t<li id=\"menu-item-316\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-316 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/data\/draas\/\" class=\"dropdown-item\">Disaster Recovery as a Service (DRaaS)<\/a>\t\t\t<li id=\"menu-item-566\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-566 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/data\/monitoring-as-a-service\/\" class=\"dropdown-item\">Monitoring as a Service<\/a>\t\t\t<li id=\"menu-item-565\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-565 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/data\/maple-s3\/\" class=\"dropdown-item\">Maple S3<\/a>\t\t<\/ul>\n\t\t<li id=\"menu-item-307\" class=\"sub2 menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-307 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/security\/\" class=\"sub2 dropdown-item\">Security<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n\t\t<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t\t\t<li id=\"menu-item-312\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-312 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/security\/noc\/\" class=\"dropdown-item\">Network Operations Centre (NOC)<\/a>\t\t\t<li id=\"menu-item-310\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-310 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/security\/mdr\/\" class=\"dropdown-item\">Managed Detection and Response (MDR)<\/a>\t\t\t<li id=\"menu-item-564\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-564 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/security\/ndr\/\" class=\"dropdown-item\">Network Detection and Response (NDR)<\/a>\t\t\t<li id=\"menu-item-563\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-563 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/security\/edr\/\" class=\"dropdown-item\">Endpoint Detection and Response (EDR)<\/a>\t\t\t<li id=\"menu-item-562\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-562 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/security\/fwaas\/\" class=\"dropdown-item\">Firewalls as a Service (FWaaS)<\/a>\t\t\t<li id=\"menu-item-1660\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1660 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/security\/penetration-testing-as-a-service\/\" class=\"dropdown-item\">Penetration Testing as a Service (PTaaS)<\/a>\t\t\t<li id=\"menu-item-1813\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1813 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/security\/vulnerability-management-as-a-service\/\" class=\"dropdown-item\">Vulnerability Management (VMaaS)<\/a>\t\t\t<li id=\"menu-item-1763\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1763 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/security\/honeypots\/\" class=\"dropdown-item\">Honeypots (Deception as a Service)<\/a>\t\t<\/ul>\n\t\t<li id=\"menu-item-3574\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-3574 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/cloud\/\" class=\"dropdown-item\">Cloud<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n\t\t<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t\t\t<li id=\"menu-item-322\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-322 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/cloud\/management\/\" class=\"dropdown-item\">Cloud Management<\/a>\t\t\t<li id=\"menu-item-321\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-321 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/managed-services\/cloud\/cloud-optimisation\/\" class=\"dropdown-item\">Cloud Cost Optimisation<\/a>\t\t<\/ul>\n\t<\/ul>\n\t<li id=\"menu-item-305\" class=\"sub1 menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-305 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"#\" class=\"sub1 dropdown-item\">Professional Services<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n\t<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t\t<li id=\"menu-item-638\" class=\"sub2 menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-638 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/data\/\" class=\"sub2 dropdown-item\">Data<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n\t\t<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t\t\t<li id=\"menu-item-972\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-972 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/data\/project-management\/\" class=\"dropdown-item\">Project Management<\/a>\t\t\t<li id=\"menu-item-975\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-975 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/data\/strategic-consultancy\/\" class=\"dropdown-item\">Strategic Consultancy<\/a>\t\t\t<li id=\"menu-item-640\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-640 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/data\/infrastructure-consultancy\/\" class=\"dropdown-item\">Infrastructure Consultancy<\/a>\t\t\t<li id=\"menu-item-639\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-639 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/data\/backup-health-check\/\" class=\"dropdown-item\">Backup Health Check<\/a>\t\t\t<li id=\"menu-item-655\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-655 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/data\/m365-migration\/\" class=\"dropdown-item\">M365 Migration<\/a>\t\t<\/ul>\n\t\t<li id=\"menu-item-632\" class=\"sub2 menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-632 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/security\/\" class=\"sub2 dropdown-item\">Security<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n\t\t<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t\t\t<li id=\"menu-item-635\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-635 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/security\/penetration-testing\/\" class=\"dropdown-item\">Penetration Testing<\/a>\t\t\t<li id=\"menu-item-3764\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-3764 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/red-teaming\/\" class=\"dropdown-item\">Red Teaming<\/a>\t\t\t<li id=\"menu-item-3769\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-3769 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/purple-teaming\/\" class=\"dropdown-item\">Purple Teaming<\/a>\t\t\t<li id=\"menu-item-3796\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-3796 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/first-responder-incident-readiness-training\/\" class=\"dropdown-item\">First Responder\/Incident Readiness Training<\/a>\t\t\t<li id=\"menu-item-3802\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-3802 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/incident-response-tabletop-exercise\/\" class=\"dropdown-item\">Incident Response Tabletop Exercise (TTX)<\/a>\t\t\t<li id=\"menu-item-636\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-636 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/security\/security-assessment\/\" class=\"dropdown-item\">Cyber Security Assessment<\/a>\t\t\t<li id=\"menu-item-3777\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-3777 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/nist\/\" class=\"dropdown-item\">NIST<\/a>\t\t\t<li id=\"menu-item-637\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-637 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/security\/sentinel-health-check\/\" class=\"dropdown-item\">Sentinel Health Check<\/a>\t\t\t<li id=\"menu-item-633\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-633 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/security\/intune-health-check\/\" class=\"dropdown-item\">Intune Health Check<\/a>\t\t\t<li id=\"menu-item-634\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-634 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/security\/sccm-health-check\/\" class=\"dropdown-item\">SCCM Health Check<\/a>\t\t<\/ul>\n\t\t<li id=\"menu-item-641\" class=\"sub2 menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-641 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/cloud\/\" class=\"sub2 dropdown-item\">Cloud<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n\t\t<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t\t\t<li id=\"menu-item-653\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-653 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/cloud\/cost-optimisation-assessment\/\" class=\"dropdown-item\">Cost Optimisation Assessment<\/a>\t\t\t<li id=\"menu-item-659\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-659 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/cloud\/cloud-consultancy\/\" class=\"dropdown-item\">Cloud Consultancy, Transformation and Migration<\/a>\t\t\t<li id=\"menu-item-642\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-642 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/cloud\/microsoft-licencing-consultancy\/\" class=\"dropdown-item\">Microsoft Licencing Consultancy<\/a>\t\t\t<li id=\"menu-item-654\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-654 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/professional-services\/cloud\/data-centre-move\/\" class=\"dropdown-item\">Data Centre Move<\/a>\t\t<\/ul>\n\t<\/ul>\n\t<li id=\"menu-item-306\" class=\"sub1 menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-306 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"#\" class=\"sub1 dropdown-item\">Support<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n\t<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t\t<li id=\"menu-item-735\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-735 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/support\/maple-care\/\" class=\"dropdown-item\">Maple Care<\/a>\t\t<li id=\"menu-item-1214\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1214 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/support\/third-party-maintenance\/\" class=\"dropdown-item\">Third Party Maintenance<\/a>\t<\/ul>\n<\/ul>\n<\/li>\n<li id=\"menu-item-303\" class=\"indent menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-303 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"#\" class=\"ekit-menu-nav-link ekit-menu-dropdown-toggle\">Our Solutions<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t<li id=\"menu-item-1009\" class=\"sub1 menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-1009 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"#\" class=\"sub1 dropdown-item\">Data Solutions<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n\t<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t\t<li id=\"menu-item-1052\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1052 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/data-solutions\/storage\/\" class=\"dropdown-item\">Storage<\/a>\t\t<li id=\"menu-item-1051\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1051 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/data-solutions\/back-up-and-data-protection\/\" class=\"dropdown-item\">Back-up and Data Protection<\/a>\t\t<li id=\"menu-item-1050\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1050 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/data-solutions\/ransomware-protection\/\" class=\"dropdown-item\">Ransomware Protection<\/a>\t\t<li id=\"menu-item-1049\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1049 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/data-solutions\/disaster-recovery\/\" class=\"dropdown-item\">Disaster Recovery<\/a>\t\t<li id=\"menu-item-1048\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1048 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/data-solutions\/virtualisation\/\" class=\"dropdown-item\">Virtualisation<\/a>\t\t<li id=\"menu-item-1047\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1047 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/data-solutions\/endpoint-modern-workspace\/\" class=\"dropdown-item\">Endpoint \/ Modern Workspace<\/a>\t\t<li id=\"menu-item-1046\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1046 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/data-solutions\/s3-archive\/\" class=\"dropdown-item\">S3 &amp; Archive\u00a0<\/a>\t\t<li id=\"menu-item-1045\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1045 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/data-solutions\/networking\/\" class=\"dropdown-item\">Networking<\/a>\t\t<li id=\"menu-item-1044\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1044 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/data-solutions\/internet-of-things\/\" class=\"dropdown-item\">Internet of Things (IoT)<\/a>\t<\/ul>\n\t<li id=\"menu-item-1010\" class=\"sub1 menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-1010 nav-item elementskit-dropdown-has relative_position elementskit-dropdown-menu-default_width elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"#\" class=\"sub1 dropdown-item\">Security Solutions<i aria-hidden=\"true\" class=\"icon icon-arrow-point-to-down elementskit-submenu-indicator\"><\/i><\/a>\n\t<ul class=\"elementskit-dropdown elementskit-submenu-panel\">\n\t\t<li id=\"menu-item-1816\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1816 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/security-operations-center\/\" class=\"dropdown-item\">SOC as a Service (SOCaaS)<\/a>\t\t<li id=\"menu-item-1100\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1100 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/firewalls\/\" class=\"dropdown-item\">Firewalls<\/a>\t\t<li id=\"menu-item-1099\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1099 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/access-management\/\" class=\"dropdown-item\">Identity and Access Management<\/a>\t\t<li id=\"menu-item-1098\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1098 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/microsoft-intune-configuration-manager\/\" class=\"dropdown-item\">Microsoft Intune and Configuration Manager<\/a>\t\t<li id=\"menu-item-1097\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1097 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/cloud-access-security-broker\/\" class=\"dropdown-item\">Cloud Access Security Broker (CASB)<\/a>\t\t<li id=\"menu-item-1096\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1096 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/security-information-event-management\/\" class=\"dropdown-item\">Security Information and Event Management (SIEM)<\/a>\t\t<li id=\"menu-item-1095\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1095 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/endpoint-security\/\" class=\"dropdown-item\">Endpoint Security<\/a>\t\t<li id=\"menu-item-1094\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1094 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/network-protection\/\" class=\"dropdown-item\">Network Protection<\/a>\t\t<li id=\"menu-item-1092\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1092 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/penetration-testing\/\" class=\"dropdown-item\">Penetration Testing<\/a>\t\t<li id=\"menu-item-1091\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1091 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/patch-management\/\" class=\"dropdown-item\">Patch Management<\/a>\t\t<li id=\"menu-item-1090\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1090 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/email-security\/\" class=\"dropdown-item\">Email Security \/ Phishing<\/a>\t<\/ul>\n<\/ul>\n<\/li>\n<li id=\"menu-item-296\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-296 nav-item elementskit-mobile-builder-content\" data-vertical-menu=\"750px\"><a href=\"https:\/\/www.maple-networks.com\/en-us\/about-us\/\" class=\"ekit-menu-nav-link\">About Us<\/a><\/li>\n<\/ul><div class=\"elementskit-nav-identity-panel\"><button class=\"elementskit-menu-close elementskit-menu-toggler\" type=\"button\">X<\/button><\/div><\/div>\n\t\t\t<div class=\"elementskit-menu-overlay elementskit-menu-offcanvas-elements elementskit-menu-toggler ekit-nav-menu--overlay\"><\/div>        <\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40e63dca elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-button\" data-id=\"40e63dca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.maple-networks.com\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1398e87f e-con-full e-flex e-con e-child\" data-id=\"1398e87f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f3d39dd animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7f3d39dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Strengthen Your Defence with Modern Endpoint Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6986db1a elementor-widget elementor-widget-text-editor\" data-id=\"6986db1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2940\" data-end=\"3193\">Every device your organisation uses \u2014 laptops, mobiles, VMs, servers, tablets, remote desktops \u2014 is a potential entry point for attackers. With hybrid work, cloud adoption, and increased device sprawl, securing every endpoint is more critical than ever.<\/p>\n<p data-start=\"3195\" data-end=\"3521\">Maple\u2019s Endpoint Security solutions provide a strong, preventative layer of defence designed to protect user devices from malware, ransomware, phishing, and vulnerability exploitation. We combine advanced security tooling with expert guidance to ensure your endpoints remain resilient, compliant, and ready for modern threats.<\/p>\n<p data-start=\"3523\" data-end=\"3629\">We help organisations simplify endpoint protection and reduce risk across every device, wherever it lives.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-256df04f e-con-full e-flex e-con e-child\" data-id=\"256df04f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-319646f6 elementor-widget elementor-widget-button\" data-id=\"319646f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjI1MTYiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book a Call<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a529f03 e-con-full e-flex e-con e-parent\" data-id=\"2a529f03\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-889b346 elementor-widget elementor-widget-heading\" data-id=\"889b346\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why it Matters<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3aae6bd5 e-con-full e-flex e-con e-child\" data-id=\"3aae6bd5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5ecc440d e-con-full e-flex e-con e-child\" data-id=\"5ecc440d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11760a91 elementor-cta--valign-middle elementor-widget-tablet__width-inherit elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"11760a91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\t1. Devices Are a Major Attack Vector\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tEndpoints remain a top target for ransomware, phishing, and credential theft \u2014 especially in hybrid environments.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a0f2356 e-con-full e-flex e-con e-child\" data-id=\"1a0f2356\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c880ee1 elementor-cta--valign-middle elementor-widget-tablet__width-inherit elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"7c880ee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\t2. Malware &amp; Exploits Bypass Traditional Controls\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tAttackers increasingly use fileless attacks, scripts, and zero-days that require modern, AI-driven protection.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-292ab845 e-con-full e-flex e-con e-child\" data-id=\"292ab845\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48da8d7a elementor-cta--valign-middle elementor-widget-tablet__width-inherit elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"48da8d7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\t3. Human Error Creates Real Risk\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tPhishing, unsafe downloads, shadow IT, and public Wi-Fi use all increase exposure for unmanaged or poorly secured devices.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2c2d4409 e-con-full e-flex e-con e-child\" data-id=\"2c2d4409\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-586393a7 elementor-cta--valign-middle elementor-widget-tablet__width-inherit elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"586393a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\t4. Compliance Requires Strong Endpoint Controls\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tIndustries like healthcare, finance, and public sector require demonstrable endpoint protection to meet strict standards.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3571e7d7 e-flex e-con-boxed e-con e-parent\" data-id=\"3571e7d7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e00a9ee elementor-widget elementor-widget-elementskit-heading\" data-id=\"6e00a9ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h4 class=\"elementskit-section-subtitle\">\n\t\t\t\t\t\tMaple\u2019s Approach\n\t\t\t\t\t<\/h4><h2 class=\"ekit-heading--title elementskit-section-title\">How Maple Networks Helps<\/h2><\/div><\/div>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3920b578 e-con-full e-grid e-con e-child\" data-id=\"3920b578\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4dca686d ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"4dca686d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <svg aria-hidden=\"true\" class=\"elementkit-infobox-icon e-font-icon-svg e-fab-canadian-maple-leaf\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M383.8 351.7c2.5-2.5 105.2-92.4 105.2-92.4l-17.5-7.5c-10-4.9-7.4-11.5-5-17.4 2.4-7.6 20.1-67.3 20.1-67.3s-47.7 10-57.7 12.5c-7.5 2.4-10-2.5-12.5-7.5s-15-32.4-15-32.4-52.6 59.9-55.1 62.3c-10 7.5-20.1 0-17.6-10 0-10 27.6-129.6 27.6-129.6s-30.1 17.4-40.1 22.4c-7.5 5-12.6 5-17.6-5C293.5 72.3 255.9 0 255.9 0s-37.5 72.3-42.5 79.8c-5 10-10 10-17.6 5-10-5-40.1-22.4-40.1-22.4S183.3 182 183.3 192c2.5 10-7.5 17.5-17.6 10-2.5-2.5-55.1-62.3-55.1-62.3S98.1 167 95.6 172s-5 9.9-12.5 7.5C73 177 25.4 167 25.4 167s17.6 59.7 20.1 67.3c2.4 6 5 12.5-5 17.4L23 259.3s102.6 89.9 105.2 92.4c5.1 5 10 7.5 5.1 22.5-5.1 15-10.1 35.1-10.1 35.1s95.2-20.1 105.3-22.6c8.7-.9 18.3 2.5 18.3 12.5S241 512 241 512h30s-5.8-102.7-5.8-112.8 9.5-13.4 18.4-12.5c10 2.5 105.2 22.6 105.2 22.6s-5-20.1-10-35.1 0-17.5 5-22.5z\"><\/path><\/svg>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Modern, AI-Driven Endpoint Protection                <\/h3>\n                        \t\t  \t<p>Protect every device with advanced anti-malware, exploit mitigation, ransomware defence, and behavioural analysis.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-663acb7a ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"663acb7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <svg aria-hidden=\"true\" class=\"elementkit-infobox-icon e-font-icon-svg e-fab-canadian-maple-leaf\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M383.8 351.7c2.5-2.5 105.2-92.4 105.2-92.4l-17.5-7.5c-10-4.9-7.4-11.5-5-17.4 2.4-7.6 20.1-67.3 20.1-67.3s-47.7 10-57.7 12.5c-7.5 2.4-10-2.5-12.5-7.5s-15-32.4-15-32.4-52.6 59.9-55.1 62.3c-10 7.5-20.1 0-17.6-10 0-10 27.6-129.6 27.6-129.6s-30.1 17.4-40.1 22.4c-7.5 5-12.6 5-17.6-5C293.5 72.3 255.9 0 255.9 0s-37.5 72.3-42.5 79.8c-5 10-10 10-17.6 5-10-5-40.1-22.4-40.1-22.4S183.3 182 183.3 192c2.5 10-7.5 17.5-17.6 10-2.5-2.5-55.1-62.3-55.1-62.3S98.1 167 95.6 172s-5 9.9-12.5 7.5C73 177 25.4 167 25.4 167s17.6 59.7 20.1 67.3c2.4 6 5 12.5-5 17.4L23 259.3s102.6 89.9 105.2 92.4c5.1 5 10 7.5 5.1 22.5-5.1 15-10.1 35.1-10.1 35.1s95.2-20.1 105.3-22.6c8.7-.9 18.3 2.5 18.3 12.5S241 512 241 512h30s-5.8-102.7-5.8-112.8 9.5-13.4 18.4-12.5c10 2.5 105.2 22.6 105.2 22.6s-5-20.1-10-35.1 0-17.5 5-22.5z\"><\/path><\/svg>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Hardening &amp; Attack Surface Reduction                <\/h3>\n                        \t\t  \t<p>We lock down device configurations to minimise risk, enforce least privilege, and reduce exploitable pathways.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41fc235b ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"41fc235b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <svg aria-hidden=\"true\" class=\"elementkit-infobox-icon e-font-icon-svg e-fab-canadian-maple-leaf\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M383.8 351.7c2.5-2.5 105.2-92.4 105.2-92.4l-17.5-7.5c-10-4.9-7.4-11.5-5-17.4 2.4-7.6 20.1-67.3 20.1-67.3s-47.7 10-57.7 12.5c-7.5 2.4-10-2.5-12.5-7.5s-15-32.4-15-32.4-52.6 59.9-55.1 62.3c-10 7.5-20.1 0-17.6-10 0-10 27.6-129.6 27.6-129.6s-30.1 17.4-40.1 22.4c-7.5 5-12.6 5-17.6-5C293.5 72.3 255.9 0 255.9 0s-37.5 72.3-42.5 79.8c-5 10-10 10-17.6 5-10-5-40.1-22.4-40.1-22.4S183.3 182 183.3 192c2.5 10-7.5 17.5-17.6 10-2.5-2.5-55.1-62.3-55.1-62.3S98.1 167 95.6 172s-5 9.9-12.5 7.5C73 177 25.4 167 25.4 167s17.6 59.7 20.1 67.3c2.4 6 5 12.5-5 17.4L23 259.3s102.6 89.9 105.2 92.4c5.1 5 10 7.5 5.1 22.5-5.1 15-10.1 35.1-10.1 35.1s95.2-20.1 105.3-22.6c8.7-.9 18.3 2.5 18.3 12.5S241 512 241 512h30s-5.8-102.7-5.8-112.8 9.5-13.4 18.4-12.5c10 2.5 105.2 22.6 105.2 22.6s-5-20.1-10-35.1 0-17.5 5-22.5z\"><\/path><\/svg>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Policy Enforcement Across Hybrid Environments                <\/h3>\n                        \t\t  \t<p>Whether devices are in the office, remote, or roaming, Maple ensures consistent policy enforcement and security controls.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76dc6755 ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"76dc6755\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <svg aria-hidden=\"true\" class=\"elementkit-infobox-icon e-font-icon-svg e-fab-canadian-maple-leaf\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M383.8 351.7c2.5-2.5 105.2-92.4 105.2-92.4l-17.5-7.5c-10-4.9-7.4-11.5-5-17.4 2.4-7.6 20.1-67.3 20.1-67.3s-47.7 10-57.7 12.5c-7.5 2.4-10-2.5-12.5-7.5s-15-32.4-15-32.4-52.6 59.9-55.1 62.3c-10 7.5-20.1 0-17.6-10 0-10 27.6-129.6 27.6-129.6s-30.1 17.4-40.1 22.4c-7.5 5-12.6 5-17.6-5C293.5 72.3 255.9 0 255.9 0s-37.5 72.3-42.5 79.8c-5 10-10 10-17.6 5-10-5-40.1-22.4-40.1-22.4S183.3 182 183.3 192c2.5 10-7.5 17.5-17.6 10-2.5-2.5-55.1-62.3-55.1-62.3S98.1 167 95.6 172s-5 9.9-12.5 7.5C73 177 25.4 167 25.4 167s17.6 59.7 20.1 67.3c2.4 6 5 12.5-5 17.4L23 259.3s102.6 89.9 105.2 92.4c5.1 5 10 7.5 5.1 22.5-5.1 15-10.1 35.1-10.1 35.1s95.2-20.1 105.3-22.6c8.7-.9 18.3 2.5 18.3 12.5S241 512 241 512h30s-5.8-102.7-5.8-112.8 9.5-13.4 18.4-12.5c10 2.5 105.2 22.6 105.2 22.6s-5-20.1-10-35.1 0-17.5 5-22.5z\"><\/path><\/svg>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Expert-Led Monitoring &amp; Improvements                <\/h3>\n                        \t\t  \t<p>We help configure, tune, and continuously optimise endpoint security to fit your environment and risk profile.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10ab84a7 ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"10ab84a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <svg aria-hidden=\"true\" class=\"elementkit-infobox-icon e-font-icon-svg e-fab-canadian-maple-leaf\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M383.8 351.7c2.5-2.5 105.2-92.4 105.2-92.4l-17.5-7.5c-10-4.9-7.4-11.5-5-17.4 2.4-7.6 20.1-67.3 20.1-67.3s-47.7 10-57.7 12.5c-7.5 2.4-10-2.5-12.5-7.5s-15-32.4-15-32.4-52.6 59.9-55.1 62.3c-10 7.5-20.1 0-17.6-10 0-10 27.6-129.6 27.6-129.6s-30.1 17.4-40.1 22.4c-7.5 5-12.6 5-17.6-5C293.5 72.3 255.9 0 255.9 0s-37.5 72.3-42.5 79.8c-5 10-10 10-17.6 5-10-5-40.1-22.4-40.1-22.4S183.3 182 183.3 192c2.5 10-7.5 17.5-17.6 10-2.5-2.5-55.1-62.3-55.1-62.3S98.1 167 95.6 172s-5 9.9-12.5 7.5C73 177 25.4 167 25.4 167s17.6 59.7 20.1 67.3c2.4 6 5 12.5-5 17.4L23 259.3s102.6 89.9 105.2 92.4c5.1 5 10 7.5 5.1 22.5-5.1 15-10.1 35.1-10.1 35.1s95.2-20.1 105.3-22.6c8.7-.9 18.3 2.5 18.3 12.5S241 512 241 512h30s-5.8-102.7-5.8-112.8 9.5-13.4 18.4-12.5c10 2.5 105.2 22.6 105.2 22.6s-5-20.1-10-35.1 0-17.5 5-22.5z\"><\/path><\/svg>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Seamless Integration with EDR + MEM                <\/h3>\n                        \t\t  \t<p>Endpoint Security works together with SCCM\/Intune and EDR to provide full-stack protection from device to cloud.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ba5cdf ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"3ba5cdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <svg aria-hidden=\"true\" class=\"elementkit-infobox-icon e-font-icon-svg e-fab-canadian-maple-leaf\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M383.8 351.7c2.5-2.5 105.2-92.4 105.2-92.4l-17.5-7.5c-10-4.9-7.4-11.5-5-17.4 2.4-7.6 20.1-67.3 20.1-67.3s-47.7 10-57.7 12.5c-7.5 2.4-10-2.5-12.5-7.5s-15-32.4-15-32.4-52.6 59.9-55.1 62.3c-10 7.5-20.1 0-17.6-10 0-10 27.6-129.6 27.6-129.6s-30.1 17.4-40.1 22.4c-7.5 5-12.6 5-17.6-5C293.5 72.3 255.9 0 255.9 0s-37.5 72.3-42.5 79.8c-5 10-10 10-17.6 5-10-5-40.1-22.4-40.1-22.4S183.3 182 183.3 192c2.5 10-7.5 17.5-17.6 10-2.5-2.5-55.1-62.3-55.1-62.3S98.1 167 95.6 172s-5 9.9-12.5 7.5C73 177 25.4 167 25.4 167s17.6 59.7 20.1 67.3c2.4 6 5 12.5-5 17.4L23 259.3s102.6 89.9 105.2 92.4c5.1 5 10 7.5 5.1 22.5-5.1 15-10.1 35.1-10.1 35.1s95.2-20.1 105.3-22.6c8.7-.9 18.3 2.5 18.3 12.5S241 512 241 512h30s-5.8-102.7-5.8-112.8 9.5-13.4 18.4-12.5c10 2.5 105.2 22.6 105.2 22.6s-5-20.1-10-35.1 0-17.5 5-22.5z\"><\/path><\/svg>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Full Visibility Across Managed &amp; Unmanaged Devices                <\/h3>\n                        \t\t  \t<p>Identify at-risk endpoints, non-compliant devices, and systems missing critical protections.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a553b8f e-con-full e-flex e-con e-parent\" data-id=\"a553b8f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b79fa64 elementor-widget elementor-widget-heading\" data-id=\"7b79fa64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Service Breakdown (Features &amp; Benefits)<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-228d51f7 e-con-full e-flex e-con e-child\" data-id=\"228d51f7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1fa386bc e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"1fa386bc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d52132e e-con-full e-flex e-con e-child\" data-id=\"4d52132e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53bc2ff5 elementor-widget elementor-widget-elementskit-heading\" data-id=\"53bc2ff5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper    ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"elementskit-section-subtitle\">\n\t\t\t\t\t\tAdvanced Endpoint Protection\n\t\t\t\t\t<\/h3><h2 class=\"ekit-heading--title elementskit-section-title\">Modern defence against malware and ransomware<\/h2><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-529f5c6b elementor-widget elementor-widget-text-editor\" data-id=\"529f5c6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"5499\" data-end=\"5590\">AI-enabled detection blocks known and emerging threats before they impact users or systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d5247f1 elementor-align-left elementor-widget elementor-widget-elementskit-button\" data-id=\"6d5247f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-button.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-btn-wraper\">\n\t\t\t\t\t\t\t<a href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjI1MTYiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\" class=\"elementskit-btn  whitespace--normal\" id=\"\">\n\t\t\t\t\tBook a Call\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3a2c72a7 e-con-full e-flex e-con e-child\" data-id=\"3a2c72a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-340c73ed e-con-full e-flex e-con e-child\" data-id=\"340c73ed\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6cf583e1 elementor-widget elementor-widget-elementskit-heading\" data-id=\"6cf583e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper    ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"elementskit-section-subtitle\">\n\t\t\t\t\t\tApplication Control &amp; Device Hardening\n\t\t\t\t\t<\/h3><h2 class=\"ekit-heading--title elementskit-section-title\">Reduce your attack surface at scale<\/h2><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40d2d319 elementor-widget elementor-widget-text-editor\" data-id=\"40d2d319\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"5693\" data-end=\"5783\">We implement industry-aligned hardening controls, safe app lists, and privilege reduction.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26808af2 elementor-align-left elementor-widget elementor-widget-elementskit-button\" data-id=\"26808af2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-button.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-btn-wraper\">\n\t\t\t\t\t\t\t<a href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjI1MTYiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\" class=\"elementskit-btn  whitespace--normal\" id=\"\">\n\t\t\t\t\tBook a Call\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33be622b e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"33be622b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f1b788b e-con-full e-flex e-con e-child\" data-id=\"1f1b788b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-6d4bace4 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"6d4bace4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1bfdc15e e-con-full e-flex e-con e-child\" data-id=\"1bfdc15e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1901f217 elementor-widget elementor-widget-elementskit-heading\" data-id=\"1901f217\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper    ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"elementskit-section-subtitle\">\n\t\t\t\t\t\tDevice Encryption &amp; Data Protection\n\t\t\t\t\t<\/h3><h2 class=\"ekit-heading--title elementskit-section-title\">Keep sensitive information secure anywhere<\/h2><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33a27475 elementor-widget elementor-widget-text-editor\" data-id=\"33a27475\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"5890\" data-end=\"5949\">Ensure lost or stolen devices cannot expose corporate data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-100326de elementor-align-left elementor-widget elementor-widget-elementskit-button\" data-id=\"100326de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-button.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-btn-wraper\">\n\t\t\t\t\t\t\t<a href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjI1MTYiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\" class=\"elementskit-btn  whitespace--normal\" id=\"\">\n\t\t\t\t\tBook a Call\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10151a1d e-con-full e-flex e-con e-child\" data-id=\"10151a1d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-65ef3b3a e-con-full e-flex e-con e-child\" data-id=\"65ef3b3a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73343e6 elementor-widget elementor-widget-elementskit-heading\" data-id=\"73343e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper    ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"elementskit-section-subtitle\">\n\t\t\t\t\t\tPolicy Compliance &amp; Continuous Monitoring\n\t\t\t\t\t<\/h3><h2 class=\"ekit-heading--title elementskit-section-title\">Stay aligned with security frameworks and audits<\/h2><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-105495f0 elementor-widget elementor-widget-text-editor\" data-id=\"105495f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"6068\" data-end=\"6159\">We help enforce consistent policies that support Cyber Essentials, ISO27001, CAF, and more.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69faf5d4 elementor-align-left elementor-widget elementor-widget-elementskit-button\" data-id=\"69faf5d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-button.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-btn-wraper\">\n\t\t\t\t\t\t\t<a href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjI1MTYiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\" class=\"elementskit-btn  whitespace--normal\" id=\"\">\n\t\t\t\t\tBook a Call\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25076794 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"25076794\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-756ccff6 e-con-full e-flex e-con e-parent\" data-id=\"756ccff6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7482100 elementor-widget elementor-widget-heading\" data-id=\"7482100\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Real-World Impact\u200b<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5191ae8c e-con-full e-flex e-con e-parent\" data-id=\"5191ae8c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-51305e2c e-con-full e-flex e-con e-child\" data-id=\"51305e2c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39e19804 elementor-widget-tablet__width-inherit elementor-widget elementor-widget-counter\" data-id=\"39e19804\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"3000\" data-to-value=\"82\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4f0073 elementor-widget elementor-widget-heading\" data-id=\"d4f0073\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Reduction in ransomware susceptibility after standard hardening and application control are implemented.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ea0c00c e-con-full e-flex e-con e-child\" data-id=\"6ea0c00c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-414c58a4 elementor-widget-tablet__width-inherit elementor-widget elementor-widget-counter\" data-id=\"414c58a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"60\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9295e79 elementor-widget elementor-widget-heading\" data-id=\"9295e79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Decrease in endpoint exploit activity with modern prevention tools.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-234f15d5 e-con-full e-flex e-con e-child\" data-id=\"234f15d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c16416 elementor-widget-tablet__width-inherit elementor-widget elementor-widget-counter\" data-id=\"9c16416\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"3000\" data-to-value=\"100\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-563ce101 elementor-widget elementor-widget-heading\" data-id=\"563ce101\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Visibility across managed and unmanaged devices after onboarding to Maple\u2019s endpoint security framework.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58866815 e-con-full e-flex e-con e-parent\" data-id=\"58866815\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56c50c4d elementor-widget elementor-widget-heading\" data-id=\"56c50c4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect Every Endpoint. Strengthen Every Layer.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ce183a9 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"4ce183a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"6570\" data-end=\"6776\">Your security is only as strong as the devices that connect to your network. Maple gives you the foundational endpoint protection you need to stay safe, compliant, and resilient \u2014 wherever your people work.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-385667b3 elementor-widget elementor-widget-button\" data-id=\"385667b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.maple-networks.com\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us Today<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Our Services Managed Services Data Storage as a Service (StaaS) Backup as a Service (BaaS) Backup as a Service M365 Disaster Recovery as a Service (DRaaS) Monitoring as a Service Maple S3 Security Network Operations Centre (NOC) Managed Detection and Response (MDR) Network Detection and Response (NDR) Endpoint Detection and Response (EDR) Firewalls as a [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":3596,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"class_list":["post-1072","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Endpoint Security - Maple Networks<\/title>\n<meta name=\"description\" content=\"Maple offers endpoint security with 24\/7 monitoring, threat detection, and real-time response to keep your business secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/endpoint-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint Security - Maple Networks\" \/>\n<meta property=\"og:description\" content=\"Maple offers endpoint security with 24\/7 monitoring, threat detection, and real-time response to keep your business secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/endpoint-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Maple Networks\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-15T16:30:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/10\/Logo-Maple-Horizontal-colour-white-1-1-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"945\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.maple-networks.com\\\/our-solutions\\\/security-solutions\\\/endpoint-security\\\/\",\"url\":\"https:\\\/\\\/www.maple-networks.com\\\/our-solutions\\\/security-solutions\\\/endpoint-security\\\/\",\"name\":\"Endpoint Security - Maple Networks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.maple-networks.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.maple-networks.com\\\/our-solutions\\\/security-solutions\\\/endpoint-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.maple-networks.com\\\/our-solutions\\\/security-solutions\\\/endpoint-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.maple-networks.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Logo-Maple-Horizontal-colour-white-1-1-scaled.png\",\"datePublished\":\"2025-03-20T10:58:06+00:00\",\"dateModified\":\"2025-12-15T16:30:37+00:00\",\"description\":\"Maple offers endpoint security with 24\\\/7 monitoring, threat detection, and real-time response to keep your business secure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.maple-networks.com\\\/our-solutions\\\/security-solutions\\\/endpoint-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.maple-networks.com\\\/our-solutions\\\/security-solutions\\\/endpoint-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.maple-networks.com\\\/our-solutions\\\/security-solutions\\\/endpoint-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.maple-networks.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Logo-Maple-Horizontal-colour-white-1-1-scaled.png\",\"contentUrl\":\"https:\\\/\\\/www.maple-networks.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Logo-Maple-Horizontal-colour-white-1-1-scaled.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.maple-networks.com\\\/our-solutions\\\/security-solutions\\\/endpoint-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.maple-networks.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Solutions\",\"item\":\"https:\\\/\\\/www.maple-networks.com\\\/our-solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Solutions\",\"item\":\"https:\\\/\\\/www.maple-networks.com\\\/our-solutions\\\/security-solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Endpoint Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.maple-networks.com\\\/#website\",\"url\":\"https:\\\/\\\/www.maple-networks.com\\\/\",\"name\":\"Maple Networks\",\"description\":\"Your Trusted Technology Partner.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.maple-networks.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.maple-networks.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.maple-networks.com\\\/#organization\",\"name\":\"Maple Networks\",\"url\":\"https:\\\/\\\/www.maple-networks.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.maple-networks.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.maple-networks.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cropped-Logo-Maple-Horizontal.png\",\"contentUrl\":\"https:\\\/\\\/www.maple-networks.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cropped-Logo-Maple-Horizontal.png\",\"width\":1243,\"height\":416,\"caption\":\"Maple Networks\"},\"image\":{\"@id\":\"https:\\\/\\\/www.maple-networks.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Endpoint Security - Maple Networks","description":"Maple offers endpoint security with 24\/7 monitoring, threat detection, and real-time response to keep your business secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/endpoint-security\/","og_locale":"en_US","og_type":"article","og_title":"Endpoint Security - Maple Networks","og_description":"Maple offers endpoint security with 24\/7 monitoring, threat detection, and real-time response to keep your business secure.","og_url":"https:\/\/www.maple-networks.com\/en-us\/our-solutions\/security-solutions\/endpoint-security\/","og_site_name":"Maple Networks","article_modified_time":"2025-12-15T16:30:37+00:00","og_image":[{"width":2560,"height":945,"url":"https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/10\/Logo-Maple-Horizontal-colour-white-1-1-scaled.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.maple-networks.com\/our-solutions\/security-solutions\/endpoint-security\/","url":"https:\/\/www.maple-networks.com\/our-solutions\/security-solutions\/endpoint-security\/","name":"Endpoint Security - Maple Networks","isPartOf":{"@id":"https:\/\/www.maple-networks.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.maple-networks.com\/our-solutions\/security-solutions\/endpoint-security\/#primaryimage"},"image":{"@id":"https:\/\/www.maple-networks.com\/our-solutions\/security-solutions\/endpoint-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/10\/Logo-Maple-Horizontal-colour-white-1-1-scaled.png","datePublished":"2025-03-20T10:58:06+00:00","dateModified":"2025-12-15T16:30:37+00:00","description":"Maple offers endpoint security with 24\/7 monitoring, threat detection, and real-time response to keep your business secure.","breadcrumb":{"@id":"https:\/\/www.maple-networks.com\/our-solutions\/security-solutions\/endpoint-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.maple-networks.com\/our-solutions\/security-solutions\/endpoint-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.maple-networks.com\/our-solutions\/security-solutions\/endpoint-security\/#primaryimage","url":"https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/10\/Logo-Maple-Horizontal-colour-white-1-1-scaled.png","contentUrl":"https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/10\/Logo-Maple-Horizontal-colour-white-1-1-scaled.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.maple-networks.com\/our-solutions\/security-solutions\/endpoint-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.maple-networks.com\/"},{"@type":"ListItem","position":2,"name":"Our Solutions","item":"https:\/\/www.maple-networks.com\/our-solutions\/"},{"@type":"ListItem","position":3,"name":"Security Solutions","item":"https:\/\/www.maple-networks.com\/our-solutions\/security-solutions\/"},{"@type":"ListItem","position":4,"name":"Endpoint Security"}]},{"@type":"WebSite","@id":"https:\/\/www.maple-networks.com\/#website","url":"https:\/\/www.maple-networks.com\/","name":"Maple Networks","description":"Your Trusted Technology Partner.","publisher":{"@id":"https:\/\/www.maple-networks.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.maple-networks.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.maple-networks.com\/#organization","name":"Maple Networks","url":"https:\/\/www.maple-networks.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.maple-networks.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/07\/cropped-Logo-Maple-Horizontal.png","contentUrl":"https:\/\/www.maple-networks.com\/wp-content\/uploads\/2025\/07\/cropped-Logo-Maple-Horizontal.png","width":1243,"height":416,"caption":"Maple Networks"},"image":{"@id":"https:\/\/www.maple-networks.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.maple-networks.com\/en-us\/wp-json\/wp\/v2\/pages\/1072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.maple-networks.com\/en-us\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.maple-networks.com\/en-us\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.maple-networks.com\/en-us\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.maple-networks.com\/en-us\/wp-json\/wp\/v2\/comments?post=1072"}],"version-history":[{"count":6,"href":"https:\/\/www.maple-networks.com\/en-us\/wp-json\/wp\/v2\/pages\/1072\/revisions"}],"predecessor-version":[{"id":3197,"href":"https:\/\/www.maple-networks.com\/en-us\/wp-json\/wp\/v2\/pages\/1072\/revisions\/3197"}],"up":[{"embeddable":true,"href":"https:\/\/www.maple-networks.com\/en-us\/wp-json\/wp\/v2\/pages\/3596"}],"wp:attachment":[{"href":"https:\/\/www.maple-networks.com\/en-us\/wp-json\/wp\/v2\/media?parent=1072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}