Está en la página 1de 11

Seqrite Escan Enterprise

Feature
EPS 7.1 360

Core Protection
Antivirus, Antimalware
Provides real-time protection against threats arising from file transfers, internet downloads, email attachments,
archived files etc.

Email Protection
Blocks suspicious and infected mails before they reach your Inbox.

Attachment Control
Enables blocking of user specified attachment types

Behaviour Detection System


Monitors application activity for suspicious behaviour.

Spam Protection
Filters junk emails, allows you to create whitelists and blacklists of email addresses.

Auto run Protection


Protects the system from malicious programs that are automatically executed whenever an external device
(CD/DVD/USB) is plugged into a system.

Safe Mode Protection


Prevents accessing the system in Safe Mode.

Self-Protection
Protects Seqrite system files/registry entries from getting tampered/terminated.

Removal of Conflicting Software


Facilitates removal of 3rd party Antivirus/Endpoint Protection Solution before installation of Seqrite EPS Clients.

Ransomware Protection
Provides real time protection against threats arising due to ransomware.
Backup and Restore
Enables backing of critical data on specific endpoints and restores it in case of ransomware attack.

Vulnerability Scan & Patch Management


Vulnerability Scan
Scans endpoints for known vulnerabilities and helps to identify vulnerabilities present in various applications. Gives
brief overview of vulnerabilities having High, Medium and Low level severity.

Patch Management
Checks and installs missing patches for Microsoft applications such as MS Office, Windows Operating Systems,
Internet Explorer etc. and 3rd party applications such as Adobe Reader, Acrobat, Flash Player, VLC, Mozilla Firefox,
Thunderbird, Java, Putty, Notepad++ etc. Gives a summarized view of critical, important, and moderate updates
required on endpoints. [eScan supports Patching of Windows vulnerabilities only]

Offline Patch Management


Patching of applications on air gapped endpoints, which don’t have (or may have limited) connectivity to the central
EPS server.

Network Protection

Firewall
Monitors and controls incoming and outgoing connections based on predefined rules.

IDS/IPS
Detects malicious network traffic and prevents intrusion attempts to intrude into the network by exploiting
vulnerabilities.

Port Scan Attack Detection


Detects attempts to access the system through open ports.

DDOS Attack Detection


Detects DDOS (Distributed Denial of Service) attacks on your network.

Source of Infection
Helps to determine the source of infection.

Asset Management

Asset Management
Provides comprehensive information about System configuration, hardware configuration and softwares installed
on endpoints. Tracks hardware/software changes carried out on endpoints.
Example - RAM changed, Skype installed/uninstalled.

i. System Information

ii. Track Hardware changes on Endpoints

iii. Track Software changes on Endpoints

 Display Windows OS Product Key (last 4 digits)

 Display MS Office Product Key (last 4 digits)

iv. Customized Reports based on multiple parameters

 Based on Operating System

 Based on Application Name

 Based on System Manufacturer

 Based on RAM

 Based on Processor

 Based on Last Shutdown time

Web Security

Browsing Protection
Blocks malicious websites and thus provides safe browsing environment.

Phishing Protection
Blocks phishing and fraudulent websites which try to steal confidential information like login credentials, credit
card details etc.

Browser Sandbox
Provides virtualized environment to access the internet. When a website is accessed in browser sandbox, all
downloaded files like cookies, temporary internet files remain isolated from the system, preventing the system
from getting infected.

Safe Banking
Provides safe and isolated environment to perform banking and online transactions. Protects against data stealing
programs like Keyloggers, and blocks access to insecure payment websites.

Scheduled Internet Access


Allows you to set schedule for the users to access internet on specified days and for specific time period.

Web Filtering
Allows you to block individual websites or categories of websites such as social networking, games etc. to limit web
access and increase employee productivity.

Advanced Device Control

Restrict use of unauthorised devices in the network. Example USB Storage Device, Mobile Phones, Web Cameras,
Memory Card Readers, Printers, Scanners, etc.

i. USB Storage Device

ii. CD/DVD

iii. Internal Card Reader (SD Cards, Memory Cards)

iv. Floppy Drive

v. Wi-Fi

vi. Bluetooth

vii. Firewire Bus

viii. Serial Port

ix. SATA Controller

x. Thunderbolt

xi. PCMCIA

xii. Card Reader Device (MTD/SCSI)

xiii. Windows Portable Device (Digicams, Smartphones)

xiv. iPhone/iPad/iPod

xv. Blackberry
xvi. Scanner & Imaging Devices

xvii. Webcam

xviii. Local Printers

xix. Teensy Board

xx. Network Share

Temporary USB Storage Access


Allows administrator to provide authorised users access to USB storage devices for a limited duration.

Data Loss Prevention (DLP)

DLP
DLP prevents data theft and leakage of confidential data, by monitoring various data transfer channels, through
which data can be transferred out of the network.
DLP monitors the following data transfer channels to prevent data leak:-

 Print Screen

Monitors the 'Print Screen' functionality for Data Leak and provides real-time alerts when user tries to take
screenshot of sensitive data.

 Removable Device

Monitors data transferred to removable devices such as pen drives, CDs/DVDs

 Network Share

Monitors data transferred to network locations.

 Clipboard

Monitors data getting copied to clipboard.

 Printer Activity

Monitors printing activity on each endpoint and controls the printing privileges provided to user.
DLP monitors data transferred through various applications such as Instant Messengers, File Sharing/Cloud
Services, Social Media, Web Browsers, Email Clients, etc.

 Instant Messengers

 File Sharing/Cloud Services

 Social Media

 Web Browsers

 Email Clients

DLP monitors the following data types:

 File Types
Blocks transfer of different files such as MS Office files, graphics files, programming files etc. Custom extensions
can be added to monitor those file types not present in the pre-defined list.

 Confidential Data

Blocks transfer of files containing confidential data like credit/debit card numbers, personal Information such as
PAN, Phone Number, SSN, Aadhar number, Passport, Vehicle Registration number, PIN code etc.

 User Defined Dictionaries

Blocks transfer of files containing user defined keywords and phrases (which are pre-configured in user-defined-
dictionaries).

Data-At-Rest Scan
Detects confidential data residing on local drives, folders, and removable devices connected to the endpoints.

File Activity Monitor

File Activity Monitor


Monitors file activities like copying, renaming and deletion of files on local drives, removable drives, and network
drives. Enables administrators to easily track and audit files in the network.
Application Control

Application Control
Blocks the use of unauthorized applications on the network. Allow or block access to pre-defined categories of
applications such as file sharing applications, games etc. or any user-defined applications.

Tuneup
Tuneup
Helps to improve system performance.

 Disk Clean-up

Frees up disk space by removing junk files, temporary files, internet cache files etc.

 Registry Clean-up

Removes obsolete and invalid registry entries which are created due to improper uninstallation of applications.

 Defragmentation

Defragmentation re-organizes all the scattered fragments of data to improve system performance. On a hard disk,
data is distributed in small fragments at multiple locations. As usage goes up file fragments keep on increasing. Thus
the time taken to access any file also keeps on increasing, making the system slow.

Client Deployment

Supports multiple deployment methods for EPS Client Installation.

Active Directory
By synchronizing with Active Directory, the clients can be installed on all endpoints in the domain network
immediately. The domain network is periodically checked for new endpoints, and if detected, the client gets
deployed automatically on the new endpoints.

Remote Install/Uninstall
Remotely deploys EPS client by specifying host name, IP Address or by specifying IP range.
Notify Install
Sends email notification with link and instructions for client deployment.

Client Packager
Provision to create self-extracting EPS client package which can be distributed via storage devices, file sharing
applications, CD/DVDs, etc.

Login Script
A logon script is assigned to the endpoints in the domain based network, which is executed at each logon and
installs the EPS client as soon as the user logs in.

Disk Image
A disk image of Seqrite EPS client can be created using disk imaging tools.

Server Deployment
Deployment on server hosted on AWS/Azure
EPS is installed on Hostname or Public IP/FQDN of server hosted on Microsoft Azure and AWS Platform.

Reports Notifications & Logs


Reports and logs for various protection modules can be fetched manually or scheduled to be emailed at periodic
intervals. The reports can be viewed, printed, or exported in the .csv or .pdf formats. Notifications of various incidents
like virus outbreak, Port scan attack detection, Device control policy violations etc. can be sent via email or SMS to
multiple email addresses and phone numbers.

 Export Reports (csv/pdf)

 Scheduled Reports

 SMS Notifications/Alerts

 Email Alerts

 News Alerts
Management

Dashboard
Dashboard is a web-based graphical user interface which displays the current status of endpoints, giving a bird’s
eye view of all protection modules.

Management Console
A web-based management console that can be accessed from any location in the network.

Cloud Management Platform


Seqrite cloud is a cloud-based management platform to manage multiple EPS installed at different geographical
locations.

Groups & Policies


Multiple groups and subgroups can be created for different departments of an organization. Policies can be
customized as per group’s requirement.

Updates
Update Manager
Enables automatic downloading of Seqrite EPS updates at a central location. These updates can then be fetched by
all endpoints.

Multiple Update Manager


Allows multiple update managers to be deployed across the network. Update Manager helps to manage load
balancing of updates in a large network.

Scheduled Updates
Allows the user to schedule the update frequency as required.

Bandwidth Control
Allows the user to allocate bandwidth to the Update Manager from the total available bandwidth.
Roaming Platform

Cloud Platform to manage Roaming Clients


Roaming Platform is a cloud-based solution, which enables the administrator to manage the client endpoints, when
they are outside the local network. With the roaming platform, you can enforce policies and obtain the status of
roaming endpoints.

Compatibility
Windows

MAC

Linux

Disclaimer: This Comparison is only for circulation to authorised partners of Quick Heal/Seqrite, and not for public at large. This Comparison is
for personal use and guidance only and does not constitute any contractual representation, warranty or obligation by Quick Heal/Seqrite’s part
and in no way a legal or a binding document on Quick Heal/Seqrite. Liability for errors, omissions or consequential loss is expressly disclaimed.
Quick Heal/Seqrite expressly disclaims all and any liability and responsibility to any persons referring this Comparison, and of any consequence
of anything, done or omitted to be done by any such person in reliance, whether wholly or partially, upon the whole or any part of the contents
of this Comparison. The contents of this Comparison are an assistance, but it is the sole responsibility of the person referring this Comparison,
to determine the appropriateness of such contents. Therefore Quick Heal/Seqrite will not be liable in respect of any use or application of such
contents. This Comparison has been created using public-domain information or documentation available via websites, brochures, data sheets,
admin guides, user guides, installation manuals, etc.

También podría gustarte