Feature
Seqrite EPS 7.1
Escan Enterprise 360
Core Protection Antivirus, Antimalware Provides real-time protection against threats arising from file transfers, internet downloads, email attachments, archived files etc.
Email Protection Blocks suspicious and infected mails before they reach your Inbox.
Attachment Control Enables blocking of user specified attachment types
Behaviour Detection System Monitors application activity for suspicious behaviour.
Spam Protection Filters junk emails, allows you to create whitelists and blacklists of email addresses.
Auto run Protection Protects the system from malicious programs that are automatically executed whenever an external device (CD/DVD/USB) is plugged into a system.
Safe Mode Protection Prevents accessing the system in Safe Mode.
Self-Protection Protects Seqrite system files/registry entries from getting t ampered/terminated.
Removal of Conflicting Software Facilitates removal of 3rd party Antivirus/Endpoint Protection Solution before installation of Seqrite EPS Clients.
Ransomware Protection Provides real time protection against threats ar ising due to ransomware.
Backup and Restore Enables backing of critical data on specific endpoints and restores it in case of ransomware attack.
Vulnerability Scan & Patch Management Vulnerability Scan Scans endpoints for known vulnerabilities and helps to identify vulnerabilities present in various applications. Gives brief overview of vulnerabilities having High, Medium and Low level severity.
Patch Management Checks and installs missing patches for Microsoft applications such as MS Office, Windows Operating Systems, Internet Explorer etc. and 3rd party applications such as Adobe Reader, Acrobat, Flash Player, VLC, Mozilla Firefox, Thunderbird, Java, Putty, Notepad++ etc. Gives a summarized view of critical, important, and moderate updates required on endpoints. [eScan supports Patching of Windows vulnerabilities only]
Offline Patch Management Patching of applications on air gapped endpoints, which don’t have (or may have limited) connectivity to the central EPS server.
Network Protection Firewall Monitors and controls incoming and outgoing connections based on predefined rules.
IDS/IPS Detects malicious network traffic and prevents intrusion attempts to intrude into the network by exploiting vulnerabilities.
Port Scan Attack Detection Detects attempts to access the system through open ports .
DDOS Attack Detection Detects DDOS (Distributed Denial of Service) attacks on your network.
Source of Infection
Helps to determine the source of infection.
Asset Management Asset Management Provides comprehensive information about System configuration, hardware configuration and softwares installed on endpoints. Tracks hardware/software changes carried o ut on endpoints. Example - RAM changed, Skype installed/uninstalled.
i.
System Information
ii.
Track Hardware changes on Endpoints
iii.
Track Software changes on Endpoints
iv.
Display Windows OS Product Key (last 4 digits)
Display MS Office Product Key (last 4 digits)
Customized Reports based on multiple parameters
Based on Operating System
Based on Application Name
Based on System Manufacturer
Based on RAM
Based on Processor
Based on Last Shutdown time
Web Security Browsing Protection Blocks malicious websites and thus provides safe browsing environment.
Phishing Protection Blocks phishing and fraudulent websites which try to steal confidential information like login credentials, credit card details etc.
Browser Sandbox
Provides virtualized environment to access the internet. When a website is accessed in browser sandbox, all downloaded files like cookies, temporary internet files remain isolated from the system, preventing the system from getting infected.
Safe Banking Provides safe and isolated environment to perform banking and online transactions. Protects against data stealing programs like Keyloggers, and blocks access to insecure payment websites.
Scheduled Internet Access Allows you to set schedule for the users to access internet on specified days and for specific time period.
Web Filtering Allows you to block individual websites or categories of websites such as social networking, games etc. to limit web access and increase employee productivity.
Advanced Device Control Restrict use of unauthorised devices in the network. Example USB Storage Device, Mobile Phones, Web Cameras, Memory Card Readers, Printers, Scanners, etc.
i.
USB Storage Device
ii.
CD/DVD
iii.
Internal Card Reader (SD Cards, Memory Cards)
iv.
Floppy Drive
v.
Wi-Fi
vi.
Bluetooth
vii.
Firewire Bus
viii.
Serial Port
ix.
SATA Controller
x.
Thunderbolt
xi.
PCMCIA
xii.
Card Reader Device (MTD/SCSI)
xiii.
Windows Portable Device (Digicams, Smartphones)
xiv.
iPhone/iPad/iPod
xv.
Blackberry
xvi.
Scanner & Imaging Devices
xvii.
Webcam
xviii.
Local Printers
xix.
Teensy Board
xx.
Network Share
Temporary USB Storage Access Allows administrator to provide authorised users access to USB storage devices for a limited duration.
Data Loss Prevention (DLP) DLP DLP prevents data theft and leakage of confidential data, by monitoring various data transfer channels, through which data can be transferred out of the network. DLP monitors the following data transfer channels to prevent data leak:
Print Screen
Monitors the 'Print Screen' functionality for Data Leak and provides real-time alerts when user tries to take screenshot of sensitive data.
Removable Device
Monitors data transferred to removable devices such as pen drives, CDs/DVDs
Network Share
Monitors data transferred to network locations.
Clipboard
Monitors data getting copied to clipboard.
Printer Activity
Monitors printing activity on each endpoint and controls the printing privileges provided to user.
DLP monitors data transferred through various applications such as Instant Messengers, File Sharing/Cloud Services, Social Media, Web Browsers, Email Clients, etc.
Instant Messengers
File Sharing/Cloud Services
Social Media
Web Browsers
Email Clients
DLP monitors the following data types:
File Types
Blocks transfer of different files such as MS Off ice files, graphics files, programming files etc. Custom extensions can be added to monitor those file types not present in the pre-defined list.
Confidential Data
Blocks transfer of files containing confidential data like credit/debit card numbers, personal Information such as PAN, Phone Number, SSN, Aadhar number, Passport, Vehicle Registration number, PIN code etc.
User Defined Dictionaries
Blocks transfer of files containing user defined keywords and phrases (which are pre-configured in user-defineddictionaries).
Data-At-Rest Scan Detects confidential data residing on local drives, folders, and removable devices connected to the endpoints.
File Activity Monitor File Activity Monitor Monitors file activities like copying, renaming and deletion of files on local drives, removable drives, and network drives. Enables administrators to easily track and audit files in the network.
Application Control Application Control Blocks the use of unauthorized applications on the network. Allow or block access to pre-defined categories of applications such as file sharing applications, games etc. or any user-defined applications.
Tuneup Tuneup Helps to improve system performance.
Disk Clean-up
Frees up disk space by removing junk files, temporary files, internet cache files etc.
Registry Clean-up
Removes obsolete and invalid registry entries which are created due to improper uninstallation of applications.
Defragmentation
Defragmentation re-organizes all the scattered fragments of data to improve system performance. On a hard disk, data is distributed in small fragments at multiple locations. As usage goes up file fragments keep on increasing. Thus the time taken to access any file also keeps on increasing, making the system slow.
Client Deployment Supports multiple deployment methods for EPS Client Installation.
Active Directory By synchronizing with Active Directory, the clients can be installed on all endpoints in the domain network immediately. The domain network is periodically checked for new endpoints, and if detected, the client gets deployed automatically on the new endpoints.
Remote Install/Uninstall Remotely deploys EPS client by specifying host name, IP Address or by specifying IP range.
Notify Install Sends email notification with link and instructions for client deployment.
Client Packager Provision to create self-extracting EPS client package which can be distributed via storage devices, file sharing applications, CD/DVDs, etc.
Login Script A logon script is assigned to the endpoints in the domain based network, which is executed at each logon and installs the EPS client as soon as the user logs in.
Disk Image A disk image of Seqrite EPS client can be c reated using disk imaging tools.
Server Deployment Deployment on server hosted on AWS/Azure EPS is installed on Hostname or Public IP/FQDN of server hosted on Microsoft Azure and AWS Platform .
Reports Notifications & Logs Reports and logs for various protection modules can be fetched manually or scheduled to be emailed at periodic intervals. The reports can be viewed, printed, or exported in the .csv or .pdf formats. Notifications of various incidents like virus outbreak, Port scan attack detection, Device control policy violations etc. can be sent via email or SMS to multiple email addresses and phone numbers.
Export Reports (csv/pdf)
Scheduled Reports
SMS Notifications/Alerts
Email Alerts
News Alerts
Management Dashboard Dashboard is a web-based graphical user interface which displays the current status of endpoints, giving a bird’s eye view of all protection modules.
Management Console A web-based management console that can be ac cessed from any location in the network.
Cloud Management Platform Seqrite cloud is a cloud-based management platform to manage multiple EPS installed at different geographical locations.
Groups & Policies Multiple groups and subgroups can be created for different departments of an organization. Policies can be customized as per group’s requirement.
Updates Update Manager Enables automatic downloading of Seqrite EPS updates at a central location. These updates can then be fetched by all endpoints.
Multiple Update Manager Allows multiple update managers to be deployed across the network. Update Manager helps to manage load balancing of updates in a large network.
Scheduled Updates Allows the user to schedule the update frequency as required.
Bandwidth Control Allows the user to allocate bandwidth to the Update Manager from the total available bandwidth.
Roaming Platform Cloud Platform to manage Roaming Clients Roaming Platform is a cloud-based solution, which enables the administrator to manage the client endpoints, when they are outside the local network. With the roaming platform, you can enforce policies and obtain the status of roaming endpoints.
Compatibility Windows MAC Linux
Disclaimer: This
Comparison is only for circulation to authorised partners of Quick Heal/Seqrite, and not for public at large. This Comparison is for personal use and guidance only and does not constitute any contractual representation, warranty or obligation by Quick Heal/Seqrite’s part and in no way a legal or a binding document on Quick Heal/Seqrite. Liability for errors, omissions or consequential loss is expressly disclaimed. Quick Heal/Seqrite expressly disclaims all and any liability and responsibility to any persons referring this Comparison, and of any consequence of anything, done or omitted to be done by any such person in reliance, whether wholly or partially, upon the whole or any pa rt of the contents of this Comparison. The contents of this Comparison are an assistance, but it is the sole responsibility of the person referring this Comparison, to determine the appropriateness of such contents. Therefore Quick Heal/Seqrite will not be liable in respect of any use or a pplication of such contents. This Comparison has been created using public-domain information or documentation available via websites, brochures, data sheets, admin guides, user guides, installation manuals, etc.