Privacy Policy
Effective Date: March 2026
End Defend Inc. ("we", "us", or "our") is fundamentally committed to protecting the privacy of both our enterprise administrators and their downstream employees. Unlike legacy endpoint monitoring tools, our Shadow IT Discovery engine prioritizes data minimization and organizational telemetry over personal surveillance.
1. Data We Collect
As an enterprise security vendor, we process information on behalf of our corporate clients (the "Data Controllers"). We collect the following categories of data explicitly for security and risk intelligence:
- Network Telemetry: High-level domain requests, SNI headers, and protocol metadata to identify Unsanctioned SaaS and AI applications.
- Endpoint Metadata: Operating system versions, IP aggregates, and machine identifiers necessary for applying Corporate Access Policies.
- Administrative Data: Names, corporate emails, and authentication logs of IT Administrators utilizing the End Defend dashboard.
2. What We DO NOT Collect
We firmly believe in boundary-driven security. We do not engage in:
- Kernel-level keystroke logging (Keylogging).
- SSL decryption of personal or financial traffic.
- Unprompted, silent visual recordings lacking explicit policy violation triggers.
3. Data Residency and Isolation
Every enterprise client is assigned a cryptographically isolated database schema. Tenant data cannot cross-pollinate, ensuring absolute compliance with regional data sovereignty laws (including GDPR and CCPA). Access to tenant data is tightly restricted and entirely governed by the deploying organization.
For inquiries regarding our data handling or DPA execution, please utilize our Secure Contact portal.