This whitepaper explains how the ever-changing world of technology demands a centralised, multi-tenant platform for o
Key Benefits of SEQRITE Endpoint Security Cloud
Centralized Management from a Single Console
Real-Time Updates and Patching
Improved Threat Detection and Response
Reduced Infrastructure Costs
No Hassle Scalability
Secure Access from Anywhere, Any-time
Quick Deployment and Configuration
Seamless Integration with Cloud Ecosystem
Integrated with SEQRITE Centralized Security Management
SEQRITE Endpoint Security Cloud is seamlessly integrated with our centralized security management platform, offering businesses a real-time overview of their overall security posture.
Simplify
Simplify multiple point products security management from one consol
Consolidate
Streamline alerts and correlate data to make sensible deductions
Analyze
Gain real-time insights to make data-driven decisions
Act
Insights are designed for actual threat reduction and automate remediation actions
Features of SEQRITE Endpoint Security Cloud
Patch Management
Centralized patch management solution to patch vulnerabilities of Microsoft and non-Microsoft applications.
Application Control Safelist/Blocklist
Restricts application access based on Zero Trust methodology. Allows defining application permissions depending on the Operating System, including default OS and SEQRITE applications. Offers a ‘Monitoring Only’ mode to record application access for administrative viewing without blocking it.
Google & YouTube Access Controller
Blocks Personal and allows Corporate Google Access based on the administrator’s chosen account domains. Blocks YouTube Videos depending on the Content Category, Publisher Name, etc.
File Sandboxing
Integrate with SEQRITE Cloud Sandbox, that helps to detect malware in suspicious files. No reason to buy, manage, or configure hardware or software for Malware Analysis, just upload malicious content to SEQRITE Cloud Sandbox to see the value immediately.
Policies to the new EPS Server setup. It also allows migration in batches/groups of endpoints.
Migration from EPS v7.6 **
Facilitates migration of Endpoints, Users, Groups, and Policies to the new EPS Server setup. It also allows migration in batches/groups of endpoints.
Vulnerability Scan
By scanning known vulnerabilities of applications and operating systems, this feature allows users to update necessary security patches.
3rd Party App Remover
EPS Agent installation ensures effortless migration to SEQRITE EPS by removing earlier AVs on endpoints, thereby reducing the unprotected time duration.
Active Directory Integration
Seqrite Active Directory Tool helps you do a bulk installation of Seqrite clients within your domain network by Active Directory Integration.
Endpoint Antivirus
Our cloud-based endpoint security system offers malware protection verified by leading certification organisations.
Anti Ransomware
Seqrite’s endpoint security cloud solution protects your data from ransomware attacks and automatically takes the backup of files.
IDS/IPS
Seqrite endpoint security cloud solution detects malicious network activities to exploit application vulnerabilities and blocks intruder attempts.
Firewall
Our product monitors inbound and outbound network traffic based on rules.
Phishing Protection
The Seqrite security tool blocks phishing sites that try to steal your security passwords and other confidential details about your organisation.
Web Filtering
Blocks sites as per its categories. Our tool allows you to stop users from spying at certain URLs by averting their browsers from loading pages from suspicious websites.
Browsing Protection
Our comprehensive endpoint security cloud system blocks malicious sites.
Advanced Device Control
Enforce policies regarding the use of storage devices, mobile and portable devices, wireless devices, network interfaces connected to endpoints with this cloud-based tool.
Data Loss Prevention
Prevents data loss by monitoring confidential and user defined data shared through removable devices, network or various applications.
Asset Management
Gives total visibility of hardware and software running on endpoints, helps to track software/hardware changes on endpoints.
Tune-up
Clean junk files and delete invalid registry/disk entries to improve performance of endpoints.
Cloud Based Administration
Cloud based administration with graphical dashboard, group and policy management, email notification, easy deployment.
Group Policy Management
Administrators can define user groups based on the hierarchy within the organization and set flexible policies as per situational requirements.
Scheduled Internet Access
Schedule time-based internet access with Seqrite Endpoint Security Cloud system.
Seqrite Endpoint Protection Cloud At A Glance
Features | Standard | Advanced | Premium |
---|---|---|---|
Antivirus | |||
Anti Ransomware | |||
Email Protection | |||
IDS/IPS | |||
Firewall | |||
Browsing Protection | |||
Phishing Protection | |||
3rd Party App Remover | |||
GoDeep.AI | |||
Vulnerability Scan | |||
SIEM Integration | |||
Spam Protection | |||
Web Filtering | |||
Advanced Device Control | |||
Application Control - Blocklist | |||
Application Control - Safelist | |||
Disk Encryption Management | |||
Asset Management | |||
Tune-up | |||
YouTube Access Controller | |||
Google Access Controller | |||
Patch Management | |||
Data Loss Prevention | Add On Pack | Add On Pack | |
File Sandboxing | Add On Pack | Add On Pack | |
Buy Now |
Buy Now Buy Now | Buy Now Buy Now | Buy Now Buy Now |
System Requirements
The following Web browsers are supported for Seqrite Endpoint Security Cloud,
- Internet Explorer 10 and 11
- Microsoft Edge
- Google Chrome 60 and above
- Mozilla Firefox 55 and above
- Safari (Only Mac) 11 to 16
For Installing Seqrite Endpoint Security client through client install utility, the System requirements are as follows:
- Any one of the following operating systems:
Windows OS
- Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit)
- Microsoft Windows 7 Home Basic/ Premium / Professional / Enterprise / Ultimate (32-bit/64-bit)
- Microsoft Windows SBS 2011 Standard / Essentials
- Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)
- Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)
- Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)
- Microsoft Windows 10 Home / Pro / Enterprise / Education (32-Bit / 64 -Bit)
- Microsoft Windows 11
- Microsoft Windows Server 2016
- Microsoft Windows Server 2019 (64-bit)
- Windows 10 November 2019 Update
- Microsoft Windows Server 2022 Standard / Datacenter / Essentials
Mac
Linux 32 bit
Linux 64 bit
- General requirements
Windows
MAC
Linux
Note
- For installing the client on Window 2016 OS, uninstall Windows Defender with the following link,https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016#install-or-uninstall-windows-defender-av-on-windows-server-2016
- From EPS Cloud 1.6 onwards, Apple M1 chip is supported and from version 1.8 onwards, Apple M1, M2 chip is supported.
- From version 1.6 onwards, Seqrite EPS Cloud uses only SHA2 Certificate for code-signing. For more details on patches mandated by Microsoft, click here https://bit.ly/3vqRhKU
For installing the Patch server, the system requirements are as follows:
- Processor: 4 Core(x86-64) and above
- RAM: 8 GB or more
- Hard disk space:
- Minimum: 40 GB free disk space
- Recommended: 1 TB free disk space
- Display: 1024 x 768
- OS:
- Microsoft Windows 10 (64-bit) and above
- Microsoft Windows Server 2012 (64-bit) and above
- For more than 25 clients, Seqrite recommends installing a Patch Management server on the Windows Server operating system.
Note:
- The machine on which you are installing the Patch Management Server must be on the Public IP network.
- For more than 25 clients, Seqrite recommends installing a Patch Management server on the Windows Server operating system.
Experience the best-in-class solutions offered by Seqrite and how they can address the security challenges of your enterprise. Explore our key features and capabilities with a demo.
Request A DemoAdvanced protection that proactively detects and prevents malicious activity which may exploit application vulnerabilities.
Contact Now