/seqrite-encryption/

Seqrite Encryption Manager

Encryption isn’t an option anymore; it is a business necessity. Seqrite’s Endpoint Encryption is a one-stop security solution for companies looking to bolster their data security, foster customer confidence by securely handling their data and ensure compliance with data protection laws. With strong encryption algorithms such as AES, RC6, SERPENT, and TWOFISH, Seqrite Encryption Manager protects all corporate data residing on endpoints without impacting performance.

Seqrite Encryption

Key Benefits

Full Disk Encryption

Full disk encryption with assured data protection and policy compliance.

Removable Media Encryption

Encrypt removal media device and make it accessible only to authorized users.

Ease of Deployment and Rescue Methods

Ease of deployment and rescue methods

Features

Full Disk Encryption

Encrypts the entire hard disk inclusive of user files, system media files, operating system files, etc.

Removable Media Encryption

Encrypts contents of all USB Drives, Pen Drives etc.

Secure Data Access

Access encrypted files while traveling from removable storage on a system without an encryption agent.

Single Sign-on

SEM can optionally ask for only one password at the time of the system starting-up as opposed to a two-step password verification model.

Fail Safe Mode

Guarantees unauthorized login attempts are blocked and the admin is notified of the break-in attempts.

Scheduled Backup and Update

Administrators can schedule automatic update of the SEM software and also schedule automatic backups of the volume being encrypted by the Seqrite Encryption Manager database.

Optional Suspension

Administrator can temporarily suspend client protection (i.e. remove boot-time authentication). In such cases, the volumes still remain encrypted.

Encryption Policies

Excellent default policies to encrypt or decrypt the local volumes and removable devices. The user also gets the privilege to create policies and manage volumes locally.

Remote Installation Tool/Active Directory

Allows administrators to install SEM and its upgrades to any number of endpoints at a time from a centralized location or remotely anywhere.

Reports

Generate the reports for groups, user accounts, and computers in PDF or HTML format.

Group Management

Preset or Custom Encryption policies (created based on attributes) can be assigned very easily to the groups.

Pre-check Installer

SEM installer checks the health of your system before proceeding with installation.

System Requirements

Seqrite Encryption Manager should meet following prerequisites and supports the following:

Operating Systems

  • RAM 2 GB (min)
  • Free disk space 6 GB
  • RAM 512MB
  • Minimum Disk Space 250MB
  • Windows 10 RS5
  • Windows 8.x
  • Windows 7
  • Windows Vista SP2
  • Windows Server 2008 R2 (Minimum sp1)
  • Windows Server 2012 and 2012 R2
  • Windows Sever 2016
  • Windows Sever 2019 (Max Version 1809)
  • Windows XP (All Flavours)
  • Windows Vista (All Flavours)
  • Windows 7 (All Flavours)
  • Windows Server 2003 (All Flavors)
  • Windows server 2008 and 2008 R2
  • Windows 8 (All Flavours)
  • Windows 8.1 (All Flavours)
  • Windows server 2012 and 2012 R2
  • Windows 2016
  • Windows 10 RS5 and below
  • Windows 2019 (Max supported Version 1809)
  • Oracle Java 8
  • MySQL Server v5.5+
  • Redis v2.8+
  • Net framework 4.0
  • Microsoft Visual C++ 2008 Redistributable 64 bit package

Supported Web Browsers for SEM Console

SEM Console will run on any one of the compatible, HTTPS enabled web browsers listed below, regardless of operating system.

  • Google Chrome 69, 70, and 71
  • Mozilla Firefox 61, 62, and 63
  • Internet Explorer 9, 10 & 11
  • Opera 59
  • MS Edge
  • HTTPS protocols must be enabled
  • JavaScript must be enabled
  • Cookies must be enabled
  • Images must not be blocked
Request for Demo

Request for Demo

Experience the best-in-class solutions offered by Seqrite and how they can address the security challenges of your enterprise. Explore our key features and capabilities with a demo.

Demo Request
Ask an Expert

Ask an Expert

Advanced protection that proactively detects and prevents malicious activity which may exploit application vulnerabilities.

Contact Now
Phone Request a Call