End Point Security




Seqrite Total Security has been updated with End Point Security
And is creative in disclosing information, monitoring system assets and transferring files
Prevents and powerfully secures web and network systems.
• Minimizes the risk of network security risk by using applications and equipment control.
• Using Data Loss Prevention and File Activity Monitor feature, information disclosure is easily prevented.
Provides complete information on network systems using asset management.
• Integrates protection technologies against central threats, including intrusion and prevention, with other protection technologies.
• Using the central update management system, the system for setting and transferring workgroups simplifies the maintenance of the collection.
Attributes
Control and configuration of various devices with Windows or Mac platform Separate access policies can be configured for memory devices, mobile phones, cameras, wireless equipment, card readers, etc.
This feature protects your network against invalid equipment. Advanced equipment control also enables you to manage the various devices that users use in a network environment. The system administrator can also create exception lists for specified equipment.
Each device can include one of the following features.
Permission access: Data can be transferred to a device.
Blocked access: Data cannot be transferred to a device.
Read-only access: Data can only be viewed by the device.
Prevent data disclosure
Prevent the disclosure of information inside and outside the organization through common channels of data transmission, including Flash, network sharing, web applications, online services, clipboard, and Snapshot. DLP also provides data monitoring capability. The following can be provided using DLP:
Office files, graphic files and other program files can be monitored.
Confidential information such as credit cards and personal files can be monitored.
User-customized dictionary can be implemented. Instant alerts and comprehensive reports can also be sent to prevent disclosure of information.
Monitor the activity of files
Using this feature, you can monitor the behavior of files to identify suspicious items, such as: copy the file, delete and rename the file. In this case, internal and external threats can be blocked and the disclosure of confidential information can be investigated. All files being transferred to local drives, flash drives and network drives can be managed.
File activity monitoring is a valuable tool for checking all the files that are transferred in and out of the network and a report of all the activities that people do with confidential files in all formats can be provided. The system administrator can find the folder path To be further investigated.
Asset management
This feature gives the system administrator complete information about how to configure the hardware and software of systems on the network. Network administrators can have a graphical representation of hardware configuration information, system information, hardware upgrade status, and software of all systems. As soon as a hardware alert occurs, notifications will be sent to the pre-specified email address.
For example, if a user upgrades their system RAM, this message will be sent to the system administrator. This notification can subsequently be removed by adding equipment to the hardware, deleting or modifying them. This allows the system administrator to be informed of the current state of the network at any time.
New dashboard
Updated graphical dashboard provides information on general health status, security status and nodes installed on the network. This feature provides a clear view and a complete report of the existing network, and, of course, it will be possible to react appropriately when a crisis occurs. The updated graphical dashboard provides the following features.
• The number of users who are installed and their system is protected.
• Number of online or offline users
• Number of users whose antivirus needs updating.
• Network health status, latest threats and attacks
• Comprehensive access to the latest reports for all policies
License history
This feature allows you to view the moment of the product license history. System administrators can view the details listed, including license validity, renewal, and the status of added licenses.
Transfer specific users and groups
Integratively transfers specified user groups and users to different servers. Organizations that have a large number of users or a small bandwidth can easily transfer specific users or workgroups to a new server to increase network performance.
Simple development and maintenance
Currently with End Point Security Quick Heal you have several ways to install users. These methods include:
• Active Directory synchronization: Very simple installation and development can be performed using full Active Directory synchronization. This feature allows the system administrator to synchronize Active Directory user groups with Seqrite End Point Security. This synchronization to the development of all End Point Security users on the network
And helps in the domain. Users are automatically expanded as each system is added to the existing workgroup.
• Disk Image: Create a disk image and use it on the network
• Remote installation: Remote installation using web console on all systems in the network
Launch Login Script: Assign Login Script for installation
• Client Packager: Create user installation file manually
Notify Install: Install via the link sent from the email
IDS / IPS: Advanced threat defense system from various sources such as port scanning attack, DDos, etc. This method implements a security layer for all communications and protects your system against threats and unwanted attacks.
• Intrusion prevention: Blocks malicious network activities that lead to the destruction of software and applications.
Prevent port scanning: A port scanning attack involves sending a message to any of the ports on the network at a glance. Based on the response received by the attacker, it is determined that the port is in use and can be used for disruption. Using this feature, intrusive attacks on the network through a free port can be prevented.
Prevent DDos attack: DDos is a type of dos attack in which a set of systems infected with malware attacks the target system and disrupts its performance. Seqrite End Point Security comprehensively prevents such attacks from occurring at the network level.
Smart firewall:
 Blocks unauthorized access to the commercial network. Possibility of customizing the rules can be implemented by setting low, medium, high or blocking all items on the network traffic. System administrators can also make exceptions for IP addresses or ports. Three custom firewall steps include:
Low: Firewall that is configured with low monitoring allows access to all incoming and outgoing traffic except for pre-defined exceptions.
Medium: By setting the firewall in this way, it allows all external traffic to operate, but prevents external traffic from entering the network (except for the specified exceptions).
• High: Blocks all incoming and outgoing traffic. (Except for specified exceptions)
• Complete block: Blocks all incoming and outgoing traffic.
This feature is also very flexible in adding exceptions to firewall commands. For example, if the firewall configuration is set to High, you can allow the exchange of information to a specific IP address or port by adding an exception to the firewall command.
Web Security
 Block malware, phishing and infected websites against network-level systems. Antivirus engines prevent attacks that enter the network through malicious code and infected websites.
Browser protection: Protection against attacks made through infected websites.
• Phishing protection: Scans all websites to prevent phishing attacks when using the Internet.
Web filtering:
Allows you to block certain groups of websites (for example: social networks, games, etc.) or a specific user-defined website to increase productivity.
• Highly and accurately classify millions of websites that are classified into more than 40 groups, including criminal, violent, immoral, games, etc., without the slightest change in product performance and network bandwidth. They block.
• Helps manage users' access to the Internet. Prevents wasting time on social networks, game websites, etc.
By adding an exception, system administrators can access sites that are blocked in categories. For example, if social networks and chat sites are blocked, the system administrator can access them by adding Facebook to the list of exceptions.
Control applications:
Grouping applications can be both licensed and unlicensed to run on the network. This feature also makes it possible to add custom applications to the blacklist.
• Issues access permissions or non-access permissions for all groups of applications.
• Custom applications that are not in the desired list can be added to the blacklist.
• Using this feature, it is possible to view information from all applications (licensed or unauthorized) installed within the network.
scan
Using this feature, it is possible to scan all computers on the network to find viruses or malware from a central point. Customized scans can also be scheduled at specific times and days.
Update
Computers on the network can be upgraded from a central point. Systems on the network can also be configured to receive updated files at specified times.
Management of policy groups
Different user groups within the network can be defined, and flexibility policies are subsequently set for each user group.
Scan email
Effectively scans existing emails to scan for spam, phishing attacks and unsolicited messages. Allow whitelist, blacklist, and select list to be set separately for email or centeral domain, provides.
Multiple update servers
This feature allows the development of multiple update servers at the network level. This increases the load balancing power and prevents congestion at the network level.
Email and SMS notification
With this feature, it is possible to send pre-set items to the desired email address or phone number.
• This message notifies the network system administrator of critical network events such as virus detection, virus spread, attempted unauthorized access to networked device, expiring license, and so on.
Tune-ups
Using this feature, the performance of computer systems at the network level is improved by clearing additional files and removing inefficient registry and disk data.
Tune-ups can run on all systems supported by Endpoint Security Server
• Systems can be maintained at a specific date and time.
reports
Using this feature, it is possible to receive general and detailed reports. Reports can be downloaded graphically and tabularly.
• Reports can be prepared in various formats, including PDF, CSV, etc.
• Reports can be received at specific times according to requirements.
• Automatic report emails can be sent to your email address at specific times.
Scan vulnerabilities
Using this feature, vulnerability scanning of installed applications and operating systems is enabled instantly. This feature creates a layer of security against known vulnerabilities and protection against security breaches associated with external threats.
• Scan vulnerabilities in applications such as Adobe, Safari, Mozilla, Oracle, etc.
• Send alerts about non-virtual operating systems running on the network.
Roaming Platform
Seqrite Roaming Platform is a web-based solution that allows organizations to connect to and manage all systems at any time, even when users are outside the confines of the organization's internal network. With the help of this feature, network administrators can be aware of the latest status of all existing systems and easily apply the following activities to systems that are not present in the internal network:
• Assess the compliance status of security policies
• Scan for security threats Execute the Tune-ups command to improve system performance
• View relevant reports
Other features
The user version of the Windows Seqirite operating system also interacts with Endpoint security. The following settings can also be configured from the EPS server:
File Scan Recognition System Settings (DNA Scan): Using this feature, unknown viruses and malware and other threats can be detected by exploring the behavior of applications (through exploratory scanning technique).
Safe settings in Safe Mode Using this feature, it is not possible to enter Safe Mode without permission.