Seqrite Endpoint Security

Similar documents
Quick Heal Exchange Protection 4.0

Worry-FreeTM. Business Security Standard and Advanced Editions. System Requirements. Administrator s Guide. Securing Your Journey to the Cloud8

escan Corporate Edition User Guide

Total Defense Endpoint Premium r12

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM



Endpoint protection for physical and virtual desktops

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition

Secure Your Mobile Workplace

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

Basic Administration Guide

Pearl Echo Installation Checklist

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

Endpoint protection for physical and virtual desktops

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Endpoint Protection Datasheet

Symantec Protection Suite Small Business Edition

Ad-Aware Management Server Installed together with Ad-Aware Business Client Ad-Aware Update Server Before You Start the Deployment...

Core Protection for Virtual Machines 1

Symantec Endpoint Protection

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Symantec Endpoint Protection

Charter Business Desktop Security Administrator's Guide

AVG 8.5 Anti-Virus Network Edition

Filter. SurfControl Filter 5.0 for SMTP Getting Started Guide. The World s #1 Web & Filtering Company

System Administration Training Guide. S100 Installation and Site Management

Symantec Mail Security for Domino

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

GFI Product Manual. Deployment Guide

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Netwrix Auditor for Exchange

Sage Grant Management System Requirements

Kaspersky Small Office Security User Guide

AVG 9.0 Internet Security Business Edition

Kaseya IT Automation Framework

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

AND SERVER SECURITY

AND SERVER SECURITY

Novell Open Workgroup Suite

Netwrix Auditor for Windows File Servers

USER S MANUAL Cloud Firewall Cloud & Web Security

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

anomaly, thus reported to our central servers.

Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide

BitDefender Client Security Workstation Security and Management

Kaspersky Total Security User Guide

Getting Started with Symantec Endpoint Protection

AVG AntiVirus. How does this benefit you?

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

Symantec AntiVirus Enterprise Edition

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange

Netwrix Auditor for SQL Server


GFI White Paper PCI-DSS compliance and GFI Software products

ESET Mobile Security Business Edition for Windows Mobile

Outpost Pro PC security products Security Suite, Antivirus, Firewall

Symantec Mail Security for Microsoft Exchange

Get Started Guide - PC Tools Internet Security

Endpoint Security Console. Version 3.0 User Guide

F-Secure Client Security. Administrator's Guide

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Kaspersky Internet Security

Trend Micro OfficeScan 10.6 SP3 System Requirements

TREND MICROTM ServerProtectTM for EMC Celerra TM

NetSupport Manager v11

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

ESET SMART SECURITY 6

Minimum System Requirements

End-user Security Analytics Strengthens Protection with ArcSight

Kaspersky Small Office Security USER GUIDE


Kaspersky Internet Security User Guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Spyware Doctor Enterprise Technical Data Sheet

System Requirements - CommNet Server

Your Assistant Collaboration Module

Compulink Advantage Online TM

SMART Classroom Suite 2011

PANDA CLOUD PROTECTION User Manual 1

Kaspersky Anti-Virus 2013 User Guide

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Hope is not a strategy. Jérôme Bei

What makes Panda Cloud Protection different? Is it secure? How messages are classified... 5

System Requirements - Table of Contents

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

Vector Asset Management User Manual

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide

F-Secure Internet Gatekeeper Virtual Appliance

Kaspersky Security 10 for Mobile Implementation Guide

CA Host-Based Intrusion Prevention System r8.1

Transcription:

Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Total Edition

Product Highlights Innovative endpoint security that prevents data leakage, monitors assets, file transfers and provides robust web security and antivirus features. Reduced security risks with Application Control and Advanced Device Control. Prevents data leakage with easily configurable Data Loss Prevention and File Activity Monitor. Maintains transparency of endpoints through in-depth Asset Management. Combines threat-centric intrusion prevention and other protection technologies. Simplified maintenance with flexible Group Redirection, Tuneup and Multiple Update Manager. Features ADVANCED DEVICE CONTROL Controls and configures various device types for Windows and Mac platforms. Separate access policies can be configured for storage devices, mobile phones, cameras, other wireless devices, card readers and many more. With the help of this feature, your network remains protected against unverified devices. Advaced Device control also allows you to manage the various devices that your employees use. The administrator can also create exception lists for specific devices. Each device can be granted the following access types: Allow Data can be transferred to and from the device. Block Data cannot be transferred to or from the device. Read Only Data can only be read from the device.

DATA LOSS PREVENTION* Stops data leakage within or outside the organization by regulating data transfer channels such as removable devices, network sharing, web apps, online services, print screen and system clipboard. DLP also provides the ability to monitor data based on its nature. The following channels can be regulated through DLP: Office files, Graphic files, Programming files and others can be monitored. Confidential data like credit/debit card data and personal files can be watched over. Customized user-defined dictionary can also be implemented. Instant alerts and cumulative reports can also be scrutinized to preside over data leakage. FILE ACTIVITY MONITOR Audits confidential files to monitor suspicious actions such as file copy, file rename or file delete. In this manner, internal and external threats can be blocked and confidential data leakage can be monitored. All files that are transferred to local drives, removable drives or network drives can also be policed. File activity monitor is an invaluable tool for auditing all the files that move in and out of the network and also for receiving a bird s eye view of all actions against confidential files of all formats within an organization. Administrator can specify folder paths to be excluded from being monitored by this feature.

ASSET MANAGEMENT Gives administrators comprehensive knowledge about the hardware and software configuration of every endpoint. Administrators can garner information such as hardware configuration, system information, updates installation and hardware/software changes pertinent for every system. Notifications are sent to the configured email addresses whenever any alteration to the hardware on any system takes place. For instance, if an endpoint updates its RAM a notification is sent. Similarly, notifications are received for new devices, hardware added/removed and hardware changes. This allows administrators to know all there is to know about every endpoint at all times. NEW DASHBOARD The updated graphical dashboard provides a hub to monitor overall network health, security status and compliance degree. Gives clear visibility and control with comprehensive reports so that critical actions can be taken. The following information can be obtained and acted upon from the dashboard: Number of clients deployed and protected. Number of clients online and offline. Number of clients that need their virus databases updated. Network health, top attacks and threats. Access to comprehensive and latest reports for all policies.

LICENSE HISTORY Provides an instant glimpse into product license history. Administrators can gather details such as license activation, reactivation, license renewal and additional feature pack details. REDIRECTION OF SPECIFIC GROUPS/CLIENTS Seamlessly redirects specific endpoint groups or clients to different servers. Enterprises with large numbers of endpoints, or low bandwidth, can easily migrate clients to a new server. Network Administrator can select and redirect specific clients or specific groups to ensure a smooth upgrade process in large networks. EASY DEPLOYMENT AND MAINTENANCE You now have multiple methods to deploy clients. These deployment methods include: Synchronization with Active Directory - Easy and hassle free deployment with full active directory integration and synchronization support. This allows the Administrator to synchronize the Active Directory groups with Endpoint Security. Synchronization helps to deploy endpoint security clients on all computers in the domain network. The client automatically gets deployed on any new system that is added to the existing group in the system. Disk Imaging Creation of a disk image of client and deployment of it across the network. Remote Install Installation through remote access of web console on any system in the network. Login Script Setup Assigning login script for installation. Client Packager Creation of client installer for manual set up.

Notify Install Installation through email notification (containing URL) for client installation. IDS / IPS Advanced defense detects attacks from various sources such as port scanning attack, Distributed Denial of Service (DDoS) and more. This detection implements a security layer to all communications and cordons your system from unwanted intrusions or attacks. Intrusion Prevention Blocks malicious network activities that attempt to exploit software vulnerabilities of the applications. Port Scanning Attack Prevention Essentially, a port scan attack consists of sending a message to each port in the network, one at a time. Depending on the response received the attacker determines if the port is being used and can be probed further for vulnerabilities. This feature blocks intruder attempts aimed at attacking any open port in the network. DDoS Attack Prevention DDoS (Distributed Denial of Service) is a type of DoS attack where multiple compromised systems which are usually infected with malware are used to target a single system, resulting in denial of service. successfully blocks any attempt to initiate any DDoS attack to any system in the network. INTELLIGENT FIREWALL Blocks unauthorized access to the business network. Allows customization rules to be set to Low, Medium, High or Block all based on observed network traffic. Administrators can also configure exceptions for specific IP addresses or ports to be allowed or blocked. The three Firewall customization levels are: Low Firewall configured at Low allows access to all incoming and outgoing traffic excluding added exceptions.

Medium Allows all outgoing traffic but blocks incoming traffic excluding added exceptions. High Blocks all incoming and outgoing traffic excluding added exceptions. Block all Blocks all incoming and outgoing traffic. This feature also gives the flexibility to configure exceptions to the Firewall rules. For instance, if the Firewall configuration has been set on High, an exception to allow all connections for a specific IP address or port can be added. WEB SECURITY Blocks malware infected, phishing and malicious websites from affecting the endpoints within the network. Antivirus engines prevent threats transferred through websites hosting malicious codes while accessing the Internet. Browsing Protection Thwarts attacks transferred through malicious websites. Phishing Protection Scans all web pages while accessing the Internet for fraudulent activity in order to protect against phishing attacks. WEB FILTERING Allows the blocking of particular categories of websites (e.g. Social Networking, Games, etc.) or individual user-specified websites to limit web access and increase productivity.

Swiftly and accurately filters millions of websites in more than 40+ categories such as crime and violence, pornography, games and so on without affecting bandwidth or productivity. Helps manage end user access to the Internet. Eliminates time wasted on social networking sites, streaming media, gaming etc. Administrators can allow access to certain websites that belong to blocked categories by creating an exclusion list. For example, if Social Networking and Chat categories are blocked, the administrator can allow access to Facebook by adding it in the Exclusion list. APPLICATION CONTROL Categories of applications can be either authorized or unauthorized from being executed within the network. This feature also gives the flexibility to add custom applications to an existing blocked list. Allows entire categories of applications to be either authorized or unauthorized. Custom applications that do not exist in the predefined blocked list can be added. Gives an extensive overview of all applications (authorized or unauthorized) installed within the network. SCAN This feature scans all the networked computers for viruses and malware from a central location. Customizable scans can also be scheduled for a specific day and time.

UPDATE Networked computers can be updated from a central location. Endpoints can also be configured to take updates at a specified time. GROUP POLICY MANAGEMENT Different user groups within the network can be defined and flexible policies can be set accordingly for each group. EMAIL SCAN Effectively scans your end-user inboxes for spam, phishing attacks and unsolicited email messages. Allows whitelists and blacklists and self-learning to be set up separately for certain email addresses or domains. MULTIPLE UPDATE MANAGERS This feature allows multiple update managers to be deployed across the network. This helps in load balancing and in avoiding network congestion as is usually the case for a single update manager.

EMAIL AND SMS NOTIFICATIONS This feature sends notifications to preconfigured email addresses and phone numbers. These notifications alert the network administrator about critical network events such as detection of viruses, virus out breaks, attempts to access an unauthorized device, license expiry date etc. TUNEUP This feature enhances the performance of computer systems in the network by cleaning junk files and deleting invalid registry/disk entries. Tuneup can be carried out for all endpoints from the Server. Maintenance can also be scheduled at a specific time and date. REPORTS Gives the ability to drill down from high level to more in-depth reports. Provides a range of graphical and tabular reports. Reports can be exported and saved in a variety of formats such as PDF and CSV. Reports can be scheduled according to customizable requirements. Automatic emails of reports can be sent to specific email addresses.

VULNERABILITY SCAN This feature scans known vulnerabilities of installed applications and operating systems in the network in real-time. It helps frame security measures against known vulnerabilities and protects against security breaches by threat agents. Scans vulnerabilities in applications such as Adobe, Safari, Mozilla, Oracle, etc. Sends notifications regarding unpatched operating systems working on computers within the network. ROAMING PLATFORM Roaming Platform is a cloud-based solution that allows enterprises to stay connected with and manage endpoints at all times, even when the endpoints are out of the local enterprise network. With the help of this feature, network administrators can rest assured as they can view the latest endpoint status, and easily perform the following activities on endpoints not connected to the network: Check the compliance status Apply security policies Scan for security threats Perform tune-ups to improve performance View reports

OTHERS Windows client builds and features are also integrated into. The following Windows client settings can also be configured from EPS server: Behavior Detection System settings These settings detect unknown viruses and malware and other threats in real- time by inspecting application behavior via heuristic scanning techniques. Safe Mode Protection settings These settings help avoid unauthorized access to computers when they are in safe mode. Certifications

Product Comparison Feature Business Total IDS/IPS Protection Firewall Protection Phishing Protection Browsing Protection SMS Notification Vulnerability Scan Asset Management Spam Protection Web Security Application Control Advanced Device Control PCTuner File Activity Monitor Roaming Platform *NOTE: Data Loss Prevention is not available in EPS Business or EPS Total by default. The feature is only available as an additional pack.

Feature Pack Get additional Feature Packs for Total Edition at an extra cost. Feature Pack Features DLP Data Loss Prevention System Requirements server can be installed on a system with any one of the following operating systems: Microsoft Windows 2000 SP4 Professional / Server / Advanced Server Microsoft Windows XP Professional (32-bit/64-bit) Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit) Microsoft Windows Vista Home Basic / Home Premium / Business / Enterprise / Ultimate (32-bit/64-bit) Microsoft Windows 2008 Server Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit) Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit) Microsoft Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate (32-bit/64-bit) Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit) Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit) Microsoft Windows SBS 2011 Standard / Essentials

Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit) Microsoft Windows MultiPoint Server 2012 Standard (64-bit) Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit) Minimum System Requirement for Console System 1 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium processor or equivalent 1 GB of RAM 2000 MB of free disk space Monitor that supports 1024 x 768 resolution in 256-color mode Additional Software Required for Console System Console needs to have Web server services of either Microsoft IIS or Apache Web server on the system. If Microsoft IIS is to be configured as Web server, the version requirements are as follows: IIS Version 5.0 on Windows 2000 IIS Version 5.1 on Windows XP IIS Version 6.0 on Windows Server 2003 IIS Version 7.0 on Windows Vista and Windows Server 2008 IIS Version 7.5 on Windows 7 and Windows Server 2008 R2

IIS Version 8.0 on Windows 8 and Windows Server 2012 IIS Version 8.5 on Windows 8.1 and Windows Server 2012 R2 If Apache is to be configured as Web server, the version requirement is as follows: Apache Web Server 2.0 or later Other Essential Configuration on Console System Administrator or Domain Administrator access on the console system. File and printer sharing for Microsoft Networks installed. Transmission Control Protocol/Internet Protocol (TCP/IP) support installed. Internet Explorer Version 7, 8, 9, 10, or 11. Network Deployment Scenarios If the network is configured using DHCP, the server system on which EPS will be installed and the DHCP server system should be configured using a static IP address. If EPS is to be installed on a server with two network cards and client agents are to be deployed on both the networks, then during installation of EPS the administrator has to configure Domain Name based communication.

Endpoint Side requirements Windows Workstations supported Microsoft Windows 2000 SP 4 Professional / Server / Advanced Server Microsoft Windows XP Home (32-bit) / Professional Edition (32-bit/64-bit) Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit) Microsoft Windows Vista Home Basic / Home Premium / Ultimate / Business / Enterprise (32-bit/64-bit) Microsoft Windows Server 2008 Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit) Microsoft Windows Server 2008 R2 Web / Standard / Enterprise / Datacenter (64-bit) Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate (32-bit/64-bit) Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit) Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit) Microsoft Windows SBS 2011 Standard / Essentials Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit) Microsoft Windows MultiPoint Server 2012 Standard (64-bit) Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit) Mac Workstations supported Mac OS X 10.6, 10.7, 10.8, 10.9. 10.10 Mac Computer with Intel Processor

Linux Workstations supported 32-Bit: Supported Versions: GNU C Library 2.11 and above Supported Distributions: Fedora 14, 19 64-Bit: Supported Versions: GNU C Library 2.5 and above Supported Distributions: opensuse 11.4, 12.2, 12.3 Fedora 14, 18, 19 Ubuntu 10.10, 12.04 LTS, 12.04.3 LTS, 13.04, 13.10 opensuse 12.1 Ubuntu 12.04.2 LTS, 13.04, 13.10 CentOS 6.3 Minimum System Requirements for Windows Endpoint 1 GB of RAM 1800 MB of free disk space 1 GHz 32-bit (x86) or 64-bit (x64) processor for Windows Vista, Windows 2008 Server and Windows 7 For Windows 2000 Service Pack 4 or later Internet Explorer 5.5 or later Administrative privilege is required for installation

Minimum System Requirements for Mac Endpoint 512 MB of RAM 1200 MB free hard disk space Mac Computer with Intel Processor Minimum System Requirements for Linux Endpoint 1 GB hard disk space 512 MB RAM or higher Intel based processor (or compatible), 300 MHz or Higher Headquarter Quick Heal Technologies (P) Ltd. 603, Mayfair Tower II, Wakdewadi, Shivajinagar, Pune - 411 005, India. All Intellectual Property Right(s) including trademark(s), logo(s) and copyright(s) is property of their respective owners. Copyright 2015 Quick Heal Technologies (P) Ltd. All rights reserved.