Professional Documents
Culture Documents
Feature
EPS 7.1 360
Core Protection
Antivirus, Antimalware
Provides real-time protection against threats arising from file transfers, internet downloads, email attachments,
archived files etc.
Email Protection
Blocks suspicious and infected mails before they reach your Inbox.
Attachment Control
Enables blocking of user specified attachment types
Spam Protection
Filters junk emails, allows you to create whitelists and blacklists of email addresses.
Self-Protection
Protects Seqrite system files/registry entries from getting tampered/terminated.
Ransomware Protection
Provides real time protection against threats arising due to ransomware.
Backup and Restore
Enables backing of critical data on specific endpoints and restores it in case of ransomware attack.
Patch Management
Checks and installs missing patches for Microsoft applications such as MS Office, Windows Operating Systems,
Internet Explorer etc. and 3rd party applications such as Adobe Reader, Acrobat, Flash Player, VLC, Mozilla Firefox,
Thunderbird, Java, Putty, Notepad++ etc. Gives a summarized view of critical, important, and moderate updates
required on endpoints. [eScan supports Patching of Windows vulnerabilities only]
Network Protection
Firewall
Monitors and controls incoming and outgoing connections based on predefined rules.
IDS/IPS
Detects malicious network traffic and prevents intrusion attempts to intrude into the network by exploiting
vulnerabilities.
Source of Infection
Helps to determine the source of infection.
Asset Management
Asset Management
Provides comprehensive information about System configuration, hardware configuration and softwares installed
on endpoints. Tracks hardware/software changes carried out on endpoints.
Example - RAM changed, Skype installed/uninstalled.
i. System Information
Based on RAM
Based on Processor
Web Security
Browsing Protection
Blocks malicious websites and thus provides safe browsing environment.
Phishing Protection
Blocks phishing and fraudulent websites which try to steal confidential information like login credentials, credit
card details etc.
Browser Sandbox
Provides virtualized environment to access the internet. When a website is accessed in browser sandbox, all
downloaded files like cookies, temporary internet files remain isolated from the system, preventing the system
from getting infected.
Safe Banking
Provides safe and isolated environment to perform banking and online transactions. Protects against data stealing
programs like Keyloggers, and blocks access to insecure payment websites.
Web Filtering
Allows you to block individual websites or categories of websites such as social networking, games etc. to limit web
access and increase employee productivity.
Restrict use of unauthorised devices in the network. Example USB Storage Device, Mobile Phones, Web Cameras,
Memory Card Readers, Printers, Scanners, etc.
ii. CD/DVD
v. Wi-Fi
vi. Bluetooth
x. Thunderbolt
xi. PCMCIA
xiv. iPhone/iPad/iPod
xv. Blackberry
xvi. Scanner & Imaging Devices
xvii. Webcam
DLP
DLP prevents data theft and leakage of confidential data, by monitoring various data transfer channels, through
which data can be transferred out of the network.
DLP monitors the following data transfer channels to prevent data leak:-
Print Screen
Monitors the 'Print Screen' functionality for Data Leak and provides real-time alerts when user tries to take
screenshot of sensitive data.
Removable Device
Network Share
Clipboard
Printer Activity
Monitors printing activity on each endpoint and controls the printing privileges provided to user.
DLP monitors data transferred through various applications such as Instant Messengers, File Sharing/Cloud
Services, Social Media, Web Browsers, Email Clients, etc.
Instant Messengers
Social Media
Web Browsers
Email Clients
File Types
Blocks transfer of different files such as MS Office files, graphics files, programming files etc. Custom extensions
can be added to monitor those file types not present in the pre-defined list.
Confidential Data
Blocks transfer of files containing confidential data like credit/debit card numbers, personal Information such as
PAN, Phone Number, SSN, Aadhar number, Passport, Vehicle Registration number, PIN code etc.
Blocks transfer of files containing user defined keywords and phrases (which are pre-configured in user-defined-
dictionaries).
Data-At-Rest Scan
Detects confidential data residing on local drives, folders, and removable devices connected to the endpoints.
Application Control
Blocks the use of unauthorized applications on the network. Allow or block access to pre-defined categories of
applications such as file sharing applications, games etc. or any user-defined applications.
Tuneup
Tuneup
Helps to improve system performance.
Disk Clean-up
Frees up disk space by removing junk files, temporary files, internet cache files etc.
Registry Clean-up
Removes obsolete and invalid registry entries which are created due to improper uninstallation of applications.
Defragmentation
Defragmentation re-organizes all the scattered fragments of data to improve system performance. On a hard disk,
data is distributed in small fragments at multiple locations. As usage goes up file fragments keep on increasing. Thus
the time taken to access any file also keeps on increasing, making the system slow.
Client Deployment
Active Directory
By synchronizing with Active Directory, the clients can be installed on all endpoints in the domain network
immediately. The domain network is periodically checked for new endpoints, and if detected, the client gets
deployed automatically on the new endpoints.
Remote Install/Uninstall
Remotely deploys EPS client by specifying host name, IP Address or by specifying IP range.
Notify Install
Sends email notification with link and instructions for client deployment.
Client Packager
Provision to create self-extracting EPS client package which can be distributed via storage devices, file sharing
applications, CD/DVDs, etc.
Login Script
A logon script is assigned to the endpoints in the domain based network, which is executed at each logon and
installs the EPS client as soon as the user logs in.
Disk Image
A disk image of Seqrite EPS client can be created using disk imaging tools.
Server Deployment
Deployment on server hosted on AWS/Azure
EPS is installed on Hostname or Public IP/FQDN of server hosted on Microsoft Azure and AWS Platform.
Scheduled Reports
SMS Notifications/Alerts
Email Alerts
News Alerts
Management
Dashboard
Dashboard is a web-based graphical user interface which displays the current status of endpoints, giving a bird’s
eye view of all protection modules.
Management Console
A web-based management console that can be accessed from any location in the network.
Updates
Update Manager
Enables automatic downloading of Seqrite EPS updates at a central location. These updates can then be fetched by
all endpoints.
Scheduled Updates
Allows the user to schedule the update frequency as required.
Bandwidth Control
Allows the user to allocate bandwidth to the Update Manager from the total available bandwidth.
Roaming Platform
Compatibility
Windows
MAC
Linux
Disclaimer: This Comparison is only for circulation to authorised partners of Quick Heal/Seqrite, and not for public at large. This Comparison is
for personal use and guidance only and does not constitute any contractual representation, warranty or obligation by Quick Heal/Seqrite’s part
and in no way a legal or a binding document on Quick Heal/Seqrite. Liability for errors, omissions or consequential loss is expressly disclaimed.
Quick Heal/Seqrite expressly disclaims all and any liability and responsibility to any persons referring this Comparison, and of any consequence
of anything, done or omitted to be done by any such person in reliance, whether wholly or partially, upon the whole or any part of the contents
of this Comparison. The contents of this Comparison are an assistance, but it is the sole responsibility of the person referring this Comparison,
to determine the appropriateness of such contents. Therefore Quick Heal/Seqrite will not be liable in respect of any use or application of such
contents. This Comparison has been created using public-domain information or documentation available via websites, brochures, data sheets,
admin guides, user guides, installation manuals, etc.