Release Note - EPS
View the information on the features and improvements in each product release
360-degree data security for businesses of all sizes. Comprehensive endpoint and data protection in one integrated solution.
Higher scalability and enhanced security for Windows and Mac platforms. Supports Linux-based systems as well.
Simplified and centralized patch management strategy for higher productivity and robust security.
Reduced business security risks with enhanced device control features.
Competitive security enhancements to meet enterprise’s compliance needs.
Advanced endpoint protection with antivirus, intrusion detection, firewall and more.
Proactive scanning of installed applications to detect unforeseen vulnerabilities and reduce unauthorized installations.
Uninterrupted protection against malicious websites, phishing attacks and more.
Cloud-based access to control dashboard to enforce policies and compliance.
Detailed insights into every connected endpoint for uniform asset regulation.
Configures device policies for various device types for Windows and Mac platforms to safeguard the network against unverified devices.
Websites can be blocked individually or as per categories to limit web access for employees.
The feature uses Seqrite’s behavior-based detection technology to detect and block ransomware threats. As an added layer of protection, it also backs up your data in a secured location to help you restore your files in case of a ransomware attack.
Enforce control over the use of unauthorized applications within the network.
Vigilant monitoring of hardware and software configurations of every endpoint allows administrators to stay in-the-know of any alterations on company systems.
By scanning known vulnerabilities of applications and operating systems, this feature allows users to update necessary security patches.
Centralized patch management solution for all Microsoft application vulnerability patching needs.
Secures confidential data and prevents the leakage of business secrets to avoid losses. Data-at-rest can also be scanned on endpoints and removable devices. See how it works in this Seqrite DLP video
Monitors confidential company files and notifies administrators when such files are copied, renamed or deleted.
Advanced protection that proactively detects and prevents malicious activity which may exploit application vulnerabilities.
Administrators can define user groups based on the hierarchy within the organization and set flexible policies as per situational requirements.
Scans your endpoint inboxes for spam, phishing attacks and unsolicited emails that sneak through network defenses.
During the EPS client installation, if another antivirus solution is detected its uninstaller will be launched, or it will automatically be uninstalled. The Seqrite EPS installation will not proceed unless the previously installed antivirus is removed from the system.
Endpoint clients can be safeguarded against attacks originating from malicious websites accessed from within the network.
Phishing attacks that originate from malicious codes over the Internet are thwarted before they can enter the network and spread.
Monitors inbound and outbound network traffic. Allow/Disallow applications based on rules.
Clean junk files and delete invalid registry/disk entries within the network for enhanced performance of endpoints.
Multiple update managers can be deployed to achieve load-balancing and to avoid network congestion caused by a single update manager.
Cloud-based solution that allows enterprises to manage endpoints at all times, even when they are out of the network. Admins can view the latest status, apply policies, redirect clients and maintain compliance.
Notifications about critical network events can be preconfigured to reach appropriate parties via email or text messages.
Features | Endpoint Security SME | Endpoint Security Business | Endpoint Security Total | Endpoint Security Enterprise Suite |
---|---|---|---|---|
Antivirus | ||||
Anti Ransomware | ||||
Email Protection | ||||
IDS/IPS Protection | ||||
Firewall Protection | ||||
Phishing Protection | ||||
Browsing Protection | ||||
SMS Notification | ||||
Vulnerability Scan | ||||
Roaming Platform | ||||
GoDeep.AI | ||||
Asset Management | ||||
Spam Protection | ||||
Web Filtering | ||||
Advanced Device Control | ||||
Application Control | ||||
Tuneup | ||||
File Activity Monitor | ||||
Patch Management | ||||
Data Loss Prevention | ||||
Try IT now | Try IT now |
Note:
The computer where SEPS server is to be installed must meet the following requirements.
Note:
For more than 25 clients, Seqrite recommends installing EPS Server and Patch Management server on the Windows Server operating system.
For more than 500 clients, Seqrite recommends a dedicated Web server (IIS).
Seqrite recommends deploying a separate/dedicated Alternate Update manager for a group of up to 200 clients for proper load balancing.
Java Runtime Environment (JRE) required to perform installation through Web page and Add Device functionalities are as follows:
Seqrite EPS server needs to have Microsoft IIS Web server as well as Microsoft .NET Framework 4.0 on your computer system.
Note: The EPS installer will install required IIS Components.
Seqrite Endpoint Security client can be installed on a computer system with any one of the following operating systems:
Note:
The computer where SEPS client is to be installed must meet the following requirements.
Software and hardware requirements for Seqrite EPS clients on Mac OS are as follows.
Software and hardware requirements for Seqrite EPS clients on Linux OS are as follows:
The EPS client supports the above-mentioned distribution. The clients also support the other versions if the following prerequisites are met,
GNU C Library 2.11 and above
SAMBA version 3.5.x to 4.5.x, 4.10.x, 4.11.x.
GNU C Library 2.5 and above
SAMBA version 3.5.x to 4.5.x, 4.10.x, 4.11.x
In case of the clients with other than above mentioned Linux operating system, Seqrite recommends to validate the clients in a non-production environment before deploying in the production environment.
Experience the best-in-class solutions offered by Seqrite and how they can address the security challenges of your enterprise. Explore our key features and capabilities with a demo.
Request a DemoAdvanced protection that proactively detects and prevents malicious activity which may exploit application vulnerabilities.
Contact Now