|  |
 |
| Item number: CIEN8-120398828 Manufacturer no.: CU1LS1000+ EAN/GTIN: n/a |
| |
|
|  |  |
 | Power Your Endpoint Protection with Cloud-based Security Helps businesses accelerate digital transformation, eliminate complexity, and provide fool-proof security against the most advanced threats.
Integrated with Seqrite Centralized Security Management Seqrite Endpoint Protection Cloud is seamlessly integrated with our centralized security management platform, offering businesses a real-time overview of their overall security posture.
Simplify Simplify multiple point products security management from one consol
Consolidate Streamline alerts and correlate data to make sensible deductions
Analyze Gain real-time insights to make data-driven decisions
Act Insights are designed for actual threat reduction and automate remediation actions
BitLocker Encryption Management for Data Security Allows central management of BitLocker encryption policies, keys, and recovery options, ensuring robust data security and compliance with regulatory requirements.
Patch Management Centralized patch management solution to patch vulnerabilities of Microsoft and non-Microsoft applications.
Application Control Safelist/Blocklist Restricts application access based on Zero Trust methodology. Allows defining application permissions depending on the Operating System, including default OS and Seqrite applications. Offers a ‘Monitoring Only’ mode to record application access for administrative viewing without blocking it.
Google & YouTube Access Controller Blocks Personal and allows Corporate Google Access based on the administrator’s chosen account domains. Blocks YouTube Videos depending on the Content Category, Publisher Name, etc.
File Sandboxing Integrates with Seqrite Cloud Sandbox, that helps to detect malware in suspicious files. No reason to buy, manage, or configure hardware or software for Malware Analysis, just upload malicious content to Seqrite Cloud Sandbox to see the value immediately.
Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints.
Migration from v7.6 Facilitates migration of Endpoints, Users, Groups, and Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints.
Vulnerability Scan By scanning known vulnerabilities of applications and operating systems, this feature allows users to update necessary security patches.
3rd Party App Remover Seqrite Endpoint Protection Agent installation ensures effortless migration to Seqrite Endpoint Protection by removing earlier AVs on endpoints, thereby reducing the unprotected time duration.
Active Directory Integration Seqrite Active Directory Tool helps you do a bulk installation of Seqrite clients within your domain network by Active Directory Integration.
Endpoint Antivirus Offers malware protection verified by leading certification organisations.
Anti Ransomware Protects your data from ransomware attacks and automatically takes the backup of files.
IDS/IPS Detects malicious network activities to exploit application vulnerabilities and blocks intruder attempts.
Firewall Monitors inbound and outbound network traffic based on rules.
Phishing Protection Blocks phishing sites that try to steal your security passwords and other confidential details about your organisation.
Web Filtering Blocks sites as per its categories. Our tool allows you to stop users from spying at certain URLs by averting their browsers from loading pages from suspicious websites.
Browsing Protection Our comprehensive endpoint protection cloud system blocks malicious sites.
Advanced Device Control Enforces policies regarding the use of storage devices, mobile and portable devices, wireless devices, network interfaces connected to endpoints.
Data Loss Prevention Prevents data loss by monitoring confidential and user defined data shared through removable devices, network or various applications.
Asset Management Gives total visibility of hardware and software running on endpoints, helps to track software/hardware changes on endpoints.
Tune-up Helps clean junk files and delete invalid registry/disk entries to improve performance of endpoints
Cloud Based Administration Cloud based administration with graphical dashboard, group and policy management, email notification, easy deployment
Group Policy Management Administrators can define user groups based on the hierarchy within the organization and set flexible policies as per situational requirements.
Scheduled Internet Access Schedules time-based internet access More information: Features | Distribution type | Download | System requirements | Minimum storage drive space | 3200 MB |  | Minimum RAM | 1024 MB |  | Minimum processor | 1 GHz 32-bit (x86) or 64-bit (x64), Intel core or Apple’s M1, M2, M3 |  | Minimum processor speed | 1000 MHz |  | Windows operating systems supported | Windows 10, Windows 10 Education, Windows 10 Education x64, Windows 10 Enterprise, Windows 10 Enterprise x64, Windows 10 Home, Windows 10 Home x64, Windows 10 Pro, Windows 10 Pro x64, Windows 10 x64, Windows 11, Windows 11 Enterprise x64, Windows 11 x64, Windows 7 Enterprise, Windows 7 Enterprise x64, Windows 7 Home Basic, Windows 7 Home Basic x64, Windows 7 Home Premium, Windows 7 Home Premium x64, Windows 7 Professional, Windows 7 Professional x64, Windows 7 Ultimate, Windows 7 Ultimate x64, Windows 8.1, Windows 8.1 Enterprise, Windows 8.1 Enterprise x64, Windows 8.1 Pro, Windows 8.1 Pro x64, Windows 8.1 x64 |  | Mac operating systems supported | Mac OS X 10.12 Sierra, Mac OS X 10.13 High Sierra, Mac OS X 10.14 Mojave, Mac OS X 10.15 Catalina, Mac OS X 11.0 Big Sur, Mac OS X 12.0 Monterey, Mac OS X 13.0 Ventura, Mac OS X 14.0 Sonoma |  | Linux operating systems supported | Debian 10, Fedora 32, SUSE Linux Enterprise Desktop 15, SuSE Linux 12.0, Ubuntu 14.04, Ubuntu 16.04, Ubuntu 22.04 |  | Server operating systems supported | Windows SBS 2011 Essentials, Windows SBS 2011 Standard, Windows Server 2008 R2 x64, Windows Server 2012, Windows Server 2012 R2 x64, Windows Server 2016, Windows Server 2019, Windows Server 2022 |  | Recommended processor | 2 GHz 32-bit (x86) or 64-bit (x64) |  | Recommended RAM | 2048 MB |  | Minimum system requirements | Internet Explorer 7+, TLS 1.2 | License | Type | Security management |  | Software type | License |  | License type | Base |  | License quantity | 1000 license(s) |  | License term in years | 3 year(s) |
|
|  |  |
 | |  |  |
 | Other search terms: virus scanner, virus, anti-virus, anti virus, security, antispam, anti-spam, Content Security, internet security, antivirus, security software, security management, access control, firewall, proxy |
|  |  |
| |