Seqrite Endpoint Protection is designed to provide flexible, centralized management and control for over a thousand endpoints. It brings all the essential security features under a single management console.
One single agent that consolidates firewall, IDS/IPS, application and advanced device control, rule-based web filtering to provide robust protection, monitoring and control of endpoint security. It also allows scanning of mobile devices. It provides multiple scanning methodologies to detect threats to safeguard workstations and deploy BYOD policies effectively within the network.
Features | Windows | MAC | Linux |
---|---|---|---|
Antivirus | Yes | Yes | Yes |
Anti Ransomware | Yes | No | No |
Email Protection | Yes | Yes | No |
IDS/IPS Protection | Yes | No | No |
Firewall Protection | Yes | No | No |
Phishing Protection | Yes | Yes | Yes |
Browsing Protection | Yes | Yes | Yes |
Vulnerability Scan | Yes | No | No |
Roaming Client | Yes | Yes | Yes |
Asset Management | Yes | Yes | Yes |
Spam Protection | Yes | Yes | No |
Web Security | Yes | Yes | Yes |
Advanced Device Control | Yes | Yes | Yes |
Application Control – Blocklist | Yes | No | No |
Application Control – Safelist | Yes | No | No |
Tuneup | Yes | No | No |
File Activity Monitor | Yes | Yes | No |
Feature Comparison with the OS
Features | Windows | MAC | Linux |
---|---|---|---|
Antivirus | Yes | Yes | Yes |
Anti Ransomware | Yes | No | No |
Email Protection | Yes | Yes | No |
IDS/IPS Protection | Yes | No | No |
Firewall Protection | Yes | No | No |
Phishing Protection | Yes | Yes | Yes |
Browsing Protection | Yes | Yes | Yes |
Vulnerability Scan | Yes | No | No |
Roaming Client | Yes | Yes | Yes |
Asset Management | Yes | Yes | Yes |
Spam Protection | Yes | Yes | No |
Web Security | Yes | Yes | Yes |
Advanced Device Control | Yes | Yes | Yes |
Application Control – Blocklist | Yes | No | No |
Application Control – Safelist | Yes | No | No |
Tuneup | Yes | No | No |
File Activity Monitor | Yes | Yes | No |
Patch Management | Yes | No | No |
Youtube Access Controller | Yes | No | No |
Google Access Controller | Yes | No | No |
Rapid Query to Endpoints | Yes | No | N/A |
Automated IoC Blocking | Yes | No | N/A |
Realtime IoC Blocking | Yes | No | NA |
Enterprise File Search | Yes | No | N/A |
Data Loss Protection | Yes | Yes | N/A |
File Sandbox | Yes | No | N/A |
Encryption | Yes | No | No |
Virtual Patching | Yes | Yes | Yes |
Centralized Quarantine Management | Yes | Yes | Yes |