End Point Security (EPS)

Seqrite endpoint security is a simple and comprehensive platform which integrates innovative technologies like Anti Ransomware, Advance DNA Scan, Behavioural detection system to protect your network from today’s advanced threats. It offers a wide range of advanced features under a single platform to enable organizations to ensure complete security and enforce control.

Key Benefits

Comprehensive endpoint and data protection

Comprehensive endpoint and data protection in one integrated solution.

Higher scalability and enhanced security

Higher scalability and enhanced security for Windows and Mac platforms.

Patch management

Simplified and centralized patch management strategy for higher productivity.

Enhanced device control

Reduced business security risks with enhanced device control features.

Competitive security enhancements

Competitive security enhancements to meet enterprise compliance needs.

Advanced endpoint protection

Advanced endpoint protection with antivirus, intrusion detection, firewall and more.

Proactive scanning

Proactive scanning of installed applications to detect unforeseen vulnerabilities.

Uninterrupted protection

Uninterrupted protection against malicious websites, phishing attacks and more.

Cloud-based access

Cloud-based access to control dashboard to enforce policies and compliance.

Connected Endpoint

Detailed insights into every connected endpoint for uniform asset regulation.

Features

Advanced Device Control

Configures device policies for various device types for Windows and Mac platforms to safeguard the network against unverified devices.

Web Filtering

Websites can be blocked individually or as per categories to limit web access for employees.

Ransomware Protection

Ransomware Protection

The feature uses Seqrite’s behavior-based detection technology to detect and block ransomware threats. As an added layer of protection, it also backs up your data in a secured location to help you restore your files in case of a ransomware attack.

Application Control

Application Control

Categories of applications can be authorized or unauthorized from being executed within the network.

Asset Management

Asset Management

Vigilant monitoring of hardware and software configurations of every endpoint allows administrators to stay in-the-know of any alterations on company systems.

Vulnerability Scan

Vulnerability Scan

By scanning known vulnerabilities of applications and operating systems, this feature allows users to update necessary security patches.

Patch Management

Patch Management

Centralized patch management solution for all Microsoft application vulnerability patching needs.

Data Loss Prevention

Data Loss Prevention*

Secures confidential data and prevents the leakage of business secrets to avoid losses. Data-at-rest can also be scanned on endpoints and removable devices. See how it works in this Seqrite DLP video

File Activity Monitor

File Activity Monitor

Monitors confidential company files and notifies administrators when such files are copied, renamed or deleted.

IDS / IPS Protection

IDS / IPS Protection

Advanced protection that proactively detects and prevents malicious activity which may exploit application vulnerabilities.

Group Policy Management

Group Policy Management

Administrators can define user groups based on the hierarchy within the organization and set flexible policies as per situational requirements.

Spam Protection

Spam Protection

Scans your endpoint inboxes for spam, phishing attacks and unsolicited emails that sneak through network defenses.

Third-party Antivirus Removal

Third-party Antivirus Removal

During the EPS client installation, if another antivirus solution is detected its uninstaller will be launched, or it will automatically be uninstalled. The Seqrite EPS installation will not proceed unless the previously installed antivirus is removed from the system.

Browsing Protection

Browsing Protection

Endpoint clients can be safeguarded against attacks originating from malicious websites accessed from within the network.

Phishing Protection

Phishing Protection

Phishing attacks that originate from malicious codes over the Internet are thwarted before they can enter the network and spread.

Firewall Protection

Firewall Protection

Administrators can customize permission-based rules in line with observable network traffic and configure exceptions.

Tuneup

Tuneup

Clean junk files and delete invalid registry/disk entries within the network for enhanced performance of endpoints.

Multiple Update Managers

Multiple Update Managers

Multiple update managers can be deployed to achieve load-balancing and to avoid network congestion caused by a single update manager.

Roaming Platform

Roaming Platform

Cloud-based solution that allows enterprises to manage endpoints at all times, even when they are out of the network. Admins can view the latest status, apply policies, redirect clients and maintain compliance.

Email and SMS Notifications

Email and SMS Notifications

Notifications about critical network events can be preconfigured to reach appropriate parties via email or text messages.

Compare Products

Features Endpoint Security SME Endpoint Security Business Endpoint Security Total Endpoint Security Enterprise Suite
Antivirus
Email Protection
IDS/IPS Protection
Firewall Protection
Phishing Protection
Browsing Protection
SMS Notification
Vulnerability Scan
Roaming Platform
Asset Management
Spam Protection
Web Filtering
Advanced Device Control
Application Control
Tuneup
File Activity Monitor
Patch Management
Data Loss Prevention
      Try IT now Try IT now

System Requirement

For Endpoint Security Server

  • Microsoft Windows 10 Home / Pro / Enterprise / Education (32-Bit / 64-Bit)
  • Microsoft Windows 8.1 Professional / Enterprise (32-bit / 64-bit)
  • Microsoft Windows 8 Professional / Enterprise (32-bit / 64-bit)
  • Microsoft Windows 7 Home Premium / Professional / Enterprise / Ultimate (32-bit / 64-bit)
  • Microsoft Windows Vista Home Premium / Business / Enterprise / Ultimate (32-bit / 64-bit)
  • Microsoft Windows XP 32-bit SP3, 64-bit SP1 and SP2 / Professional Edition (32-bit / 64-bit)
  • Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)
  • Microsoft Windows MultiPoint Server 2012 Standard (64-bit)
  • Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)
  • Microsoft Windows SBS 2011 Standard / Essentials
  • Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit)
  • Microsoft Windows 2008 Server Web / Standard / Enterprise (32-bit / 64-bit) / Datacenter (64-bit)
  • Microsoft Windows Server 2003 R2 Web / Standard / Enterprise / Datacenter
  • Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit / 64-bit)

Note:

  • For more than 25 clients, Seqrite recommends to install EPS Server and Patch Management server on the Windows Server operating system
  • For more than 500 clients, Seqrite recommends a dedicated Web server (IIS)
  • Processor:
    • Minimum: 1 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium
    • Recommended: 2 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium or higher
  • RAM:
    • Minimum: 2 GB
    • Recommended: 4 GB or more
  • Hard disk space:
    • Minimum: 4800 MB free disk space
    • Recommended: 10000 MB free disk space
  • Internet Explorer 7 or above
  • Monitor that supports 1024 x 768 resolution in 256-color mode

Requirements to perform installation through webpage, notify install, and add device functionality are as follows:

  • On 32-bit Windows operating system
    • To perform above operations, JRE 7 or JRE 8 should be installed
  • On 64-bit Windows operating system
    • To perform above operations from 32-bit browsers, 32-bit JRE 7 or JRE 8 should be installed
    • To perform above operations from 64-bit browsers, 64-bit JRE 7 or JRE 8 should be installed

Seqrite EPS server needs to have Microsoft IIS Web Server as well as Microsoft .NET Framework 4.0 on the computer system. For Microsoft IIS the version requirements are as below:

  • IIS Version 10 on Windows 10
  • IIS Version 8.5 on Windows 8.1 and Windows Server 2012 R2
  • IIS Version 8.0 on Windows 8 and Windows Server 2012
  • IIS Version 7.5 on Windows 7 and Windows Server 2008 R2
  • IIS Version 7.0 on Windows Vista and Windows Server 2008
  • IIS Version 6.0 on Windows Server 2003
  • IIS Version 5.1 on Windows XP SP3

For instructions on how to install IIS, please click here.

  • Ensure that the following IIS components are configured:
    • IIS Management Console
    • Default Document
    • Static Content
    • CGI
    • ASP.NET 4.0 or later versions

For Endpoint System

  • Microsoft Windows 10 Home / Pro / Enterprise / Education (32-Bit/64-Bit)
  • Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)
  • Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit)
  • Microsoft Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate (32-bit/64-bit)
  • Microsoft Windows Vista Home Basic / Home Premium / Business / Enterprise / Ultimate (32-bit/64-bit)
  • Microsoft Windows XP Home (32-bit) / Professional Edition (32-bit/64-bit)
  • Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)
  • Microsoft Windows MultiPoint Server 2012 Standard (64-bit)
  • Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)
  • Microsoft Windows SBS 2011 Standard / Essentials
  • Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit)
  • Microsoft Windows 2008 Server Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit)
  • Microsoft Windows Server 2003 R2 Web / Standard / Enterprise / Datacenter
  • Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit)
  • Microsoft Windows 2000 SP 4 Professional / Server / Advanced Server

Note:

  • For Windows 2016 Server, uninstall Windows Defender before installing Seqrite EPS client.
  • If you are upgrading the EPS client to Windows 2016 Server, uninstall Windows Defender after upgrade.
  • Administrator or Domain Administrator access on the console system
  • File and printer sharing for Microsoft Networks installed
  • Transmission control Protocol/Internet Protocol (TCP/IP) support installed
  • Internet Explorer version 7, 8, 9, 10, or 11
  • EPS website is also best viewed in Google Chrome version 45, 46, or 47 or Mozilla Firefox version 38, 39, or 40

Requirements to perform installation through webpage, notify install, and add device functionality are as follows:

  • Processor:
    • Minimum: 1 GHz 32-bit (x86) or 64-bit (x64) processor for Windows Vista
    • Recommended: 2 GHz 32-bit (x86) or 64-bit (x64) processor for Windows Vista or higher
  • RAM:
    • Minimum: 1 GB
    • Recommended: 2 GB or more
  • Hard disk space:
    • Minimum: 3200 MB free disk space
  • Mac OS X 10.6, 10.7, 10.8, 10.9, 10.10, 10.11, 10.12
  • Intel or compatible processor
  • RAM:
    • Minimum: 512 MB
    • Recommended: 2 GB or more
  • 1200 MB free hard disk space
  • 300 MHz or higher Intel or compatible processor
  • RAM:
    • Minimum: 512 MB
    • Recommended: 2 GB or more
  • 1200 MB free hard disk space

32-bit

  • RHEL 6.1, 6.2, 6.3, 6.4, 6.6, 6.7, 6.8
  • BOSS 6
  • Fedora 14, 18, 19, 20, 21, 25
  • openSUSE 11.4, 12.2, 12.3, 13.2, 42.2
  • Linux Mint 13, 14, 15, 16, 17.3, 18
  • Ubuntu 10.10, 11.4, 12.04 LTS, 12.04.3 LTS, 13.04, 13.10, 14.04, 14.10, 15.04, 16.10
  • CentOS 6.3, 6.4, 6.5

64-bit

  • RHEL 6.1, 6.2, 6.3, 6.4, 6.6, 6.7, 6.8, 7.0, 7.1, 7.2, 7.3
  • Fedora 14, 18, 19, 20, 21
  • openSUSE 11.4, 12.2, 12.2
  • Linux Mint 13, 14, 15, 16, 17.3, 18
  • Ubuntu 10.10, 11.4, 12.04.2 LTS, 13.04, 13.10, 14.04, 14.10, 15.04, 16.10
  • CentOS 6.3, 6.4, 6.5, 7.0
  • SUSE Linux 11.00, 12.00, 12.2

The EPS client supports the above mentioned distribution. The clients also support the other versions if the following prerequisites are met,

GNU C Library 2.11 and above

GNU C Library 2.5 and above

In case of the clients with other than above mentioned Linux operating system, Seqrite recommends to validate the clients in a non-production environment before deploying in the production environment.

Please refer product manual for a complete list of system requirements and more details.

Request for Demo

Request for Demo

Experience the best-in-class solutions offered by Seqrite and how they can address the security challenges of your enterprise. Explore our key features and capabilities with a demo.

Request A Demo
Ask an Expert

Ask an Expert

Advanced protection that proactively detects and prevents malicious activity which may exploit application vulnerabilities.

Contact Now
Scroll to Top