/seqrite-encryption/

Seqrite Encryption Manager

Seqrite Encryption solution protects corporate data residing on endpoints with a strong encryption algorithms such as AES, RC6, SERPENT and TWOFISH. Full disk encryption supports Microsoft Windows Desktops and Laptops and prevents data loss occurring from loss/theft of endpoint. Removable Media Encryption encrypts entire contents on removable devices such as Pen Drives, USB Drives and makes it accessible to only authorized users.

Seqrite Encryption

Key Benefits

Centralized Management and Control

Centralized management and control to deploy the clients across all workstations.

Full Disk Encryption

Full disk encryption with assured data protection and policy compliance.

Removable Media Encryption

Encrypts the removal media device data and makes it accessible to the authorized users. Thus, it gives security across multiple removal media devices.

Ease of Deployment and Rescue Methods

Ease of deployment and rescue methods.

Features

Full Disk Encryption

Encrypts entire contents of the hard drive. It secures all information on disk such as user files, system files, page files, operating system files, etc.

Removable Media Encryption

Encrypts contents of removable media devices such as USB Drives, Pen Drives, etc.

Access Data Securely

SEM ensures data protection at rest and in motion. Access the encrypted files from removable storage devices on system where encryption agent is not installed. It is useful when the user is travelling and wants to access the data from encrypted removable storage devices.

Remote Installation Tool

Allows remote deployment of Seqrite Volume Encryption across multiple endpoints at a time. Remote Installation Tool is integrated with SEM console and helps to deploy the client package on endpoints(s) and trigger the installation.

Scheduled Backup and Update

Administrators can schedule automatic update of the SEM software and also schedule automatic backups of the Seqrite Encryption Manager database.

Suspend Protection

This option allows the administrator to temporarily suspend client protection (i.e. remove boot-time authentication) In such cases, the volumes still remain encrypted. The feature is extremely beneficial when managing servers that are required to function around-the-clock.

Encryption Policies

SEM provides excellent default policies to encrypt or decrypt the local volumes and removable devices. The user also gets the privilege to create policies and manage volumes locally.

Group Management

The client computers can be managed with the help of groups and with different attributes. Both computer groups and the computers within the group are displayed alphabetically. Thus, encryption policies can be assigned easily to the group. It also benefits in suspend protection option for Seqrite Volume Encryption.

Reports

The Administrators can generate the reports for groups, user accounts, and computers in PDF or HTML format. The reports generally inform about the total number of computers, license information, information about all the computers, encryption policy, retrieval of rescue information, volume list, activity log etc.

System Requirements

Seqrite Encryption Manager should meet following prerequisites and supports the following:

Operating Systems

  • RAM 2 GB (min)
  • Free disk space 6 GB
  • Windows 10
  • Windows 8.x
  • Windows 7
  • Windows Vista SP2
  • Windows Server 2008 R2 SP1
  • Windows Server 2012 and 2012 R2
  • Windows Sever 2016 (Max supported Version 1709)
  • Windows XP (All Flavours)
  • Windows Vista (All Flavours)
  • Windows 7 (All Flavours)
  • Windows Server 2003 (All Flavors)
  • Windows server 2008 and 2008 R2
  • Windows 8.0 (All Flavours)
  • Windows 8.1 (All Flavours)
  • Windows server 2012 and 2012 R2
  • Windows 2016 (Max supported Version 1709)
  • Windows 10 RS4 and below
  • Oracle Java 8
  • MySQL Server v5.5+
  • Redis v2.8+
  • Net framework 4.0
  • Microsoft Visual C++ 2008
  • Redistributable 64 bit package

Supported Web Browsers for SEM Console

SEM Console will run on any one of the compatible, HTTPS enabled web browsers listed below, regardless of operating system.

  • IE 9, 10 & 11
  • Opera 53.0
  • Google Chrome 65, 66 & 67
  • Mozilla Firefox 58, 59 & 60
  • Safari 11
  • MS Edge
  • Android 4.2+
  • iOS 8+
  • HTTPS protocols must be enabled
  • JavaScript must be enabled
  • Cookies must be enabled
  • Images must not be blocked
Request for Demo

Request for Demo

Experience the best-in-class solutions offered by Seqrite and how they can address the security challenges of your enterprise. Explore our key features and capabilities with a demo.

Request A Demo
Ask an Expert

Ask an Expert

Get in touch with our in-house experts for queries regarding our security products, solutions or services.

Contact Now