Seqrite Endpoint Security

Similar documents
Quick Heal Exchange Protection 4.0

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Kaspersky Small Office Security User Guide

Copyright by Parallels Holdings, Ltd. All rights reserved.

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Endpoint Protection

How To Protect Your Computer From A Malicious Virus

escan Corporate Edition User Guide

Kaspersky Internet Security User Guide

Endpoint protection for physical and virtual desktops

Symantec Endpoint Protection

Total Defense Endpoint Premium r12

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

Kaspersky Total Security User Guide

Kaspersky Internet Security

DCPS STUDENT OPTION HOME USE PROGRAM SIGN UP INSTRUCTIONS

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

Sage Grant Management System Requirements

Symantec Protection for SharePoint Servers Getting Started Guide

Grant Management. System Requirements

CA Host-Based Intrusion Prevention System r8.1

What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting

Symantec Endpoint Protection Small Business Edition Getting Started Guide

Secure Your Mobile Workplace

Symantec Endpoint Protection MP1a and MP1 Release Notes

Endpoint protection for physical and virtual desktops

inforouter V8.0 Server & Client Requirements

Seqrite Antivirus Server Edition

Technical Requirements

System Requirements. SuccessMaker 5

System Requirements. SuccessMaker 5 Hosted

To ensure you have the appropriate equipment and settings please review the following: Software and Hardware Recommendations.

Parallels Virtuozzo Containers 4.7 for Linux Readme

Symantec AntiVirus for Network Attached Storage Integration Guide

Abila Grant Management. System Requirements

BITDEFENDER ENDPOINT SECURITY TOOLS

Get Started Guide - PC Tools Internet Security

Internet Security Suite

Kaspersky PURE User Guide

Seqrite Mobile Device Management

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Platform Guide. SA Supported Platforms. Service Package Version 7.4R1

McAfee Firewall for Linux 8.0.0

Maple T.A. Beginner's Guide for Instructors

Outpost Pro PC security products Security Suite, Antivirus, Firewall

Kaspersky Small Office Security USER GUIDE

Platform Guide. SA Supported Platforms. Service Package Version 7.3R1

Novell Open Workgroup Suite

System Requirements and Platform Support Guide

Sage HRMS 2014 Sage Employee Self Service

Client System Requirements for Brainloop Secure Dataroom as of Version 8.30

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

Kaspersky Anti-Virus 2013 User Guide

Symantec Endpoint Protection Datasheet

Lepide Active Directory Self Service

Seven for 7: Best practices for implementing Windows 7

AND SERVER SECURITY

MYOB EXO System Requirement Guidelines. 30 April 2014 Version 2.7

AND SERVER SECURITY

Platform Guide. SA Supported Platforms. Service Package Version 7.2R1

McAfee Data Loss Prevention Endpoint

PLATO Learning Environment 2.0 System and Configuration Requirements. Dec 1, 2009

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

Platform Guide. SA Supported Platforms Service Package Version 7.4R7

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

How To Fix A Fault Notification On A Network Security Platform (Xc) (Xcus) (Network) (Networks) (Manual) (Manager) (Powerpoint) (Cisco) (Permanent

SA Supported Platforms

QPS 9.2 ReadMe...5. QPS components...6

Platform Guide. SA Supported Platforms. Service Package Version 7.3R1

Pearl Echo Installation Checklist

Quark Publishing Platform 9.5 ReadMe

FAQS. You can schedule a WebEx session ahead or start it instantly in your choice of ways:

Installation & Activation Guide. Lepide Active Directory Self Service

Symantec AntiVirus Enterprise Edition

Hope is not a strategy. Jérôme Bei

Quark Publishing Platform ReadMe

Bitdefender Internet Security 2015 User's Guide

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.

Install Guide Housatonic Project Plan for Web. Housatonic Software - Project Plan 365 App

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

End-user Security Analytics Strengthens Protection with ArcSight

FAQ. Safe Anywhere PC. Disclaimer:

PARALLELS SERVER BARE METAL 5.0 README

Worry-FreeTM. Business Security Standard and Advanced Editions. System Requirements. Administrator s Guide. Securing Your Journey to the Cloud8

LabStats 5 System Requirements

Kaspersky Anti-Virus 2012 User Guide

GRAVITYZONE UNIFIED SECURITY MANAGEMENT

Kaspersky Internet Security 2012 User Guide

Dell Enterprise Mobility Management

Installation Guide. Help Desk Manager. Version v12.1.0

Transcription:

Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Business Edition

Product Highlights Innovative endpoint security that prevents data leakage, monitors assets, file transfers and provides robust web security and antivirus features. Integrates malware protection, web protection, browser and data protection (DLP)-all in one license. Centralized patch management solution for all Microsoft application vulnerability patching needs. Comprehensive and cumulative information of Windows, Mac and Linux endpoints with enhanced Asset Management feature. Administrators can specify device names and time-based access ensuring complete control of USB interface. Strong endpoint protection for Windows, Mac and Linux platforms from one management console. Reports of ransomware incidents across endpoint network. Features ADVANCED DEVICE CONTROL Allows you to manage various external devices that your employees use. It enables organizations to control, configure and define separate access policies for various device types on Windows and Mac platforms. With the help of this feature, IT administrators can grant, Permit temporary access to a device for specific client for configured duration. Specified access to USB mass storage devices based on its model name. Blocking of USB interface is possible for all USB devices except mass storage and input devices. Full device encryption for all file systems. In addition to these enhancements, each external storage device can be granted the following access types: Allow Data can be transferred to and from the device. Block Data cannot be transferred to or from the device. Read Only Data can only be read from the device

RANSOMWARE PROTECTION The Anti-ransomware feature uses s behavior-based detection technology that analyzes the behavior of programs in real-time. This helps in detecting and blocking threats such as ransomware. As an added layer of protection, this feature also backs up your data in a secured location to help you restore your files in case of a ransomware attack. anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection - Detects known ransomware that try to infiltrate your system through infected emails and other mediums like USB drives or other infected systems in the network. Proactively monitors the system for new ransomware infections - Monitors activity of downloaded files whose components could become a potential ransomware attack. Runs on a behavior-based detection engine - Analyzes how a program behaves in real-time, so that it can be stopped before it does any damage. Has an inbuilt data backup and restore tool - The back and restore tool proactively keeps a backup of all your important files and stores it in a secure location. These files can be restored in case of a ransomware attack.

WEB FILTERING Allows the blocking of particular categories of websites (e.g. Social Networking, Games, etc.) or individual user-specified websites to limit web access and increase productivity. ASSET MANAGEMENT Gives comprehensive and cumulative information about the hardware and software configuration of every endpoint. The administrators can easily view details such as hardware configuration, system information, updates installed and hardware/software changes pertinent for each system. Notifications are sent to the configured email addresses whenever any alteration to the hardware or software takes place on any system. For instance, if there is a change in RAM a notification is sent to the administrators with all details of the change. VULNERABILITY SCAN This feature scans known vulnerabilities of installed applications and operating systems in the network in real-time. It helps frame security measures against known vulnerabilities and protects against security breaches by threat agents. Scans vulnerabilities in applications such as Adobe, Safari, Mozilla, Oracle, etc. Sends notifications regarding unpatched operating systems working on computers within the network. DATA LOSS PREVENTION * Stops data leakage within or outside the organization by regulating data transfer channels such as removable devices, network sharing, web apps, online services, print screen and system clipboard. DLP also provides the ability to scan data-at-rest on endpoints and removable devices. The following channels can be regulated by DLP:

Office files, Graphic files, Programming files and others can be monitored. Confidential data like credit/debit card data and personal files can be watched over. Customized user-defined dictionary can also be implemented. Instant alerts and cumulative reports can also be scrutinized to preside over data leakage. IDS / IPS Advanced defense detects attacks from various sources such as port scanning attack, Distributed Denial of Service (DDoS) and more. This detection implements a security layer to all communications and cordons your system from unwanted intrusions or attacks. Intrusion Prevention Blocks malicious network activities that attempt to exploit software vulnerabilities of the applications. Port Scanning Attack Prevention Essentially, a port scan attack consists of sending a message to each port in the network, one at a time. Depending on the response received the attacker determines if the port is being used and can be probed further for vulnerabilities. This feature blocks intruder attempts aimed at attacking any open port in the network. DDoS Attack Prevention DDoS (Distributed Denial of Service) is a type of DoS attack where multiple compromised systems which are usually infected with malware are used to target a single system, resulting in denial of service. successfully blocks any attempt to initiate any DDoS attack to any system in the network. GROUP POLICY MANAGEMENT Different user groups within the network can be defined and flexible policies can be set accordingly for each group. SPAM PROTECTION Scans your endpoint inboxes for spam, phishing attacks and unsolicited emails that sneak through network defenses.

THIRD-PARTY ANTIVIRUS REMOVAL During the EPS client installation, if another antivirus solution is detected its uninstaller will be launched, or it will automatically be uninstalled. The EPS installation will not proceed unless the previously installed antivirus is uninstalled from the system. BROWSING PROTECTION Endpoint clients can be safeguarded against attacks originating from malicious websites accessed from within the network. PHISHING PROTECTION Phishing attacks that originate from malicious codes over the Internet are thwarted before they can enter the network and spread. FIREWALL PROTECTION Blocks unauthorized access to the business network. Allows customization rules to be set to Low, Medium, High or Block All based on observed network traffic. Administrators can also configure exceptions for specific IP addresses or ports to be allowed or blocked. The three Firewall customization levels are: Low Firewall configured at Low allow access to all incoming and outgoing traffic excluding added exceptions. Medium Allows all outgoing traffic but blocks incoming traffic excluding added exceptions. High Blocks all incoming and outgoing traffic excluding added exceptions. Block all Blocks all incoming and outgoing traffic. This feature also gives the flexibility to configure exceptions to the Firewall rules. For instance, if the Firewall configuration has been set on High, an exception to allow all connections for a specific IP address or port can be added.

MULTIPLE UPDATE MANAGERS This feature allows multiple update managers to be deployed across the network. This helps in load balancing and in avoiding network congestion as is usually the case for a single update manager. EMAIL AND SMS NOTIFICATIONS This feature sends notifications to preconfigured email addresses and phone numbers. These notifications alert the network administrator about critical network events such as detection of viruses, virus out breaks, attempts to access an unauthorized device, license expiry date etc. OTHERS Windows client build and features are also integrated into. The following Windows client settings can also be configured from EPS server: Behavior Detection System settings These settings detect unknown viruses and malware and other threats in real-time by inspecting application behavior via heuristic scanning techniques. Safe Mode Protection settings These settings help avoid unauthorized access to computers when they are in safe mode. Certifications TOP PRODUCT

Product Comparison Features SME Business Total Enterprise Suite Antivirus Email Protection IDS/IPS Protection Firewall Protection Phishing Protection Browsing Protection SMS Notification Vulnerability Scan Roaming Platform Asset Management Spam Protection Web Filtering Advanced Device Control Application Control Tuneup File Activity Monitor Patch Management Data Loss Prevention *NOTE: Data Loss Prevention is not available in EPS Business or EPS Total by default. The feature is only available as an additional pack.

Feature Pack Get additional Feature Packs for Total Edition at an extra cost. Feature Pack DLP Features Data Loss Prevention System Requirements System requirements for server are as follows: General Requirements Component Processor RAM Hard disk space Requirements 1 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium or higher 2 GB 4 GB 4800 MB Web browser Internet Explorer 7, 8, 9, 10, or 11 Google Chrome 45, 46, or 47 Mozilla Firefox 38, 39, or 40 Display 1024 x 768 For more than 25 clients, recommends to install EPS Server and Patch Management server on the Windows server operating system. For more than 500 clients, recommends: A dedicated Web server (IIS). Minimum 2 GHz processor or higher. 4 GB RAM or higher

System Requirements System requirements for server are as follows: General Requirements Component Requirements Processor 1 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium or higher RAM 2 GB 4 GB Hard disk space 4800 MB Web browser Internet Explorer 7, 8, 9, 10, or 11 Google Chrome 45, 46, or 47 Mozilla Firefox 38, 39, or 40 Display 1024 x 768 For more than 25 clients, recommends to install EPS Server and Patch Management server on the Windows server operating system. For more than 500 clients, recommends: A dedicated Web server (IIS). Minimum 2 GHz processor or higher. 4 GB RAM or higher

Additional software required for SEPS server EPS server needs to have Microsoft IIS Web server as well as Microsoft. NET Framework 4.0 on your computer system. Web server Requirements IIS IIS Version 10 on Windows 10 IIS Version 8.5 on Windows 8.1 and Windows Server 2012 R2 IIS Version 8.0 on Windows 8 and Windows Server 2012 IIS Version 7.5 on Windows 7 and Windows Server 2008 R2 IIS Version 7.0 on Windows Vista and Windows Server 2008 IIS Version 6.0 on Windows Server 2003 IIS Version 5.1 on Windows XP SP3 The EPS installer will install required IIS Components. Java Runtime Environment (JRE) Requirements Java Runtime Environment (JRE) required to perform installation through Web page and Add Device functionalities are as follows: OS versions Requirements JRE 32-bit 32-bit JRE 7, JRE 8 64-bit 32-bit 32-bit JRE 7, 32-bit JRE 8 64-bit 64-bit JRE 7, 64-bit JRE 8

System requirements for EPS clients System requirements for clients are as follows: Component Processor RAM Hard disk space Web Browser Requirements 1 GHz 32-bit (x86) or 64-bit (x64) for Windows Vista or later 1 GB 3200 MB Internet Explorer 5.5 or later client can be installed on a computer system with any one of the following operating systems: Microsoft Windows 10 Home / Pro / Enterprise / Education (32-Bit / 64 -Bit) Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit) Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit) Microsoft Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate (32-bit/64-bit) Microsoft Windows Vista Home Basic / Home Premium / Business / Enterprise / Ultimate (32-bit/64-bit) Microsoft Windows XP Home (32-bit) / Professional Edition (32-bit / 64-bit) Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit) Microsoft Windows MultiPoint Server 2012 Standard (64-bit) Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit) Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit) Microsoft Windows SBS 2011 Standard / Essentials Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit) Microsoft Windows 2008 Server Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit) Microsoft Windows Server 2003 R2 Web / Standard / Enterprise /Datacenter Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit) Microsoft Windows 2000 SP 4 Professional / Server / Advanced Server

Microsoft Windows Server 2003 R2 Web / Standard / Enterprise /Datacenter Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit) Microsoft Windows 2000 SP 4 Professional / Server / Advanced Server System requirements for Mac OS Software and hardware requirements for EPS clients on Mac OS are as follows: Component Requirements MAC OS Mac OS OS X, 10.6, 10.7, 10.8, 10.9, 10.10, 10.11 Processor RAM Hard disk space Intel or compatible 512 MB 1200 MB

System requirements for Linux OS Software and hardware requirements for EPS clients on Linux OS are as follows: Component Linux OS versions Requirements Linux OS 32-bit BOSS 6 RHEL 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8 Fedora 14, 18, 19, 20, 21 opensuse 11.4, 12.2, 12.3 Linux Mint 13, 14, 15, 16, 17.3 Ubuntu 10.10, 11.4, 12.04 LTS, 12.04.3 LTS, 13.04, 13.10, 14.04, 14.10, and 15.04 CentOS 6.3, 6.4, 6.5 64-bit RHEL 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 7.0, 7.1, 7.2 Fedora 14, 18, 19, 20, 21 opensuse 11.4, 12.1, 12.2 SUSE Linux 11.00, 12.00 Linux Mint 13, 14, 15, 16, 17.3 Ubuntu 10.10, 11.4, 12.04.2 LTS, 13.04, 13.10, 14.04, 14.10, and 15.04 CentOS 6.3, 6.4, 6.5 Processor Intel or compatible RAM 512 MB Memory 300 MHz or higher Hard disk space 1200 MB Visit our website to view the complete list on System Requirements. Corporate Office Quick Heal Technologies Limited Marvel Edge, Office No.7010 C & D, 7th Floor, Viman Nagar, Pune - 411014, Maharashtra, India Email: info@seqrite.com Website: This document is current as of the initial date of publication and may be changed by Quick Heal at any time. Copyright 2016 Quick Heal Technologies Ltd. All rights reserved. All Intellectual Property Right(s) including trademark(s), logo(s) and copyright(s) are properties of their respective owners.