We use cookies to make your experience better.
To comply with the new e-Privacy directive, you agree to the privacy policy and our use of cookies.
SEQRITE Endpoint Protection Cloud Standard
SKU
CU1LS26TO50
Special Price
£36.96
Regular Price
£67.20
In stock
Endpoint Protection Cloud Standard, 26 - 50, 3 Years
Category: Security Software
Power Your Endpoint Protection with Cloud-based Security
Helps businesses accelerate digital transformation, eliminate complexity, and provide fool-proof security against the most advanced threats.
Integrated with Seqrite Centralized Security Management
Seqrite Endpoint Protection Cloud is seamlessly integrated with our centralized security management platform, offering businesses a real-time overview of their overall security posture.
Simplify
Simplify multiple point products security management from one consol
Consolidate
Streamline alerts and correlate data to make sensible deductions
Analyze
Gain real-time insights to make data-driven decisions
Act
Insights are designed for actual threat reduction and automate remediation actions
BitLocker Encryption Management for Data Security
Allows central management of BitLocker encryption policies, keys, and recovery options, ensuring robust data security and compliance with regulatory requirements.
Patch Management
Centralized patch management solution to patch vulnerabilities of Microsoft and non-Microsoft applications.
Application Control Safelist/Blocklist
Restricts application access based on Zero Trust methodology. Allows defining application permissions depending on the Operating System, including default OS and Seqrite applications. Offers a ‘Monitoring Only’ mode to record application access for administrative viewing without blocking it.
Google & YouTube Access Controller
Blocks Personal and allows Corporate Google Access based on the administrator’s chosen account domains. Blocks YouTube Videos depending on the Content Category, Publisher Name, etc.
File Sandboxing
Integrates with Seqrite Cloud Sandbox, that helps to detect malware in suspicious files. No reason to buy, manage, or configure hardware or software for Malware Analysis, just upload malicious content to Seqrite Cloud Sandbox to see the value immediately.
Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints.
Migration from v7.6
Facilitates migration of Endpoints, Users, Groups, and Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints.
Vulnerability Scan
By scanning known vulnerabilities of applications and operating systems, this feature allows users to update necessary security patches.
3rd Party App Remover
Seqrite Endpoint Protection Agent installation ensures effortless migration to Seqrite Endpoint Protection by removing earlier AVs on endpoints, thereby reducing the unprotected time duration.
Active Directory Integration
Seqrite Active Directory Tool helps you do a bulk installation of Seqrite clients within your domain network by Active Directory Integration.
Endpoint Antivirus
Offers malware protection verified by leading certification organisations.
Anti Ransomware
Protects your data from ransomware attacks and automatically takes the backup of files.
IDS/IPS
Detects malicious network activities to exploit application vulnerabilities and blocks intruder attempts.
Firewall
Monitors inbound and outbound network traffic based on rules.
Phishing Protection
Blocks phishing sites that try to steal your security passwords and other confidential details about your organisation.
Web Filtering
Blocks sites as per its categories. Our tool allows you to stop users from spying at certain URLs by averting their browsers from loading pages from suspicious websites.
Browsing Protection
Our comprehensive endpoint protection cloud system blocks malicious sites.
Advanced Device Control
Enforces policies regarding the use of storage devices, mobile and portable devices, wireless devices, network interfaces connected to endpoints.
Data Loss Prevention
Prevents data loss by monitoring confidential and user defined data shared through removable devices, network or various applications.
Asset Management
Gives total visibility of hardware and software running on endpoints, helps to track software/hardware changes on endpoints.
Tune-up
Helps clean junk files and delete invalid registry/disk entries to improve performance of endpoints
Cloud Based Administration
Cloud based administration with graphical dashboard, group and policy management, email notification, easy deployment
Group Policy Management
Administrators can define user groups based on the hierarchy within the organization and set flexible policies as per situational requirements.
Scheduled Internet Access
Schedules time-based internet access
Helps businesses accelerate digital transformation, eliminate complexity, and provide fool-proof security against the most advanced threats.
Integrated with Seqrite Centralized Security Management
Seqrite Endpoint Protection Cloud is seamlessly integrated with our centralized security management platform, offering businesses a real-time overview of their overall security posture.
Simplify
Simplify multiple point products security management from one consol
Consolidate
Streamline alerts and correlate data to make sensible deductions
Analyze
Gain real-time insights to make data-driven decisions
Act
Insights are designed for actual threat reduction and automate remediation actions
BitLocker Encryption Management for Data Security
Allows central management of BitLocker encryption policies, keys, and recovery options, ensuring robust data security and compliance with regulatory requirements.
Patch Management
Centralized patch management solution to patch vulnerabilities of Microsoft and non-Microsoft applications.
Application Control Safelist/Blocklist
Restricts application access based on Zero Trust methodology. Allows defining application permissions depending on the Operating System, including default OS and Seqrite applications. Offers a ‘Monitoring Only’ mode to record application access for administrative viewing without blocking it.
Google & YouTube Access Controller
Blocks Personal and allows Corporate Google Access based on the administrator’s chosen account domains. Blocks YouTube Videos depending on the Content Category, Publisher Name, etc.
File Sandboxing
Integrates with Seqrite Cloud Sandbox, that helps to detect malware in suspicious files. No reason to buy, manage, or configure hardware or software for Malware Analysis, just upload malicious content to Seqrite Cloud Sandbox to see the value immediately.
Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints.
Migration from v7.6
Facilitates migration of Endpoints, Users, Groups, and Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints.
Vulnerability Scan
By scanning known vulnerabilities of applications and operating systems, this feature allows users to update necessary security patches.
3rd Party App Remover
Seqrite Endpoint Protection Agent installation ensures effortless migration to Seqrite Endpoint Protection by removing earlier AVs on endpoints, thereby reducing the unprotected time duration.
Active Directory Integration
Seqrite Active Directory Tool helps you do a bulk installation of Seqrite clients within your domain network by Active Directory Integration.
Endpoint Antivirus
Offers malware protection verified by leading certification organisations.
Anti Ransomware
Protects your data from ransomware attacks and automatically takes the backup of files.
IDS/IPS
Detects malicious network activities to exploit application vulnerabilities and blocks intruder attempts.
Firewall
Monitors inbound and outbound network traffic based on rules.
Phishing Protection
Blocks phishing sites that try to steal your security passwords and other confidential details about your organisation.
Web Filtering
Blocks sites as per its categories. Our tool allows you to stop users from spying at certain URLs by averting their browsers from loading pages from suspicious websites.
Browsing Protection
Our comprehensive endpoint protection cloud system blocks malicious sites.
Advanced Device Control
Enforces policies regarding the use of storage devices, mobile and portable devices, wireless devices, network interfaces connected to endpoints.
Data Loss Prevention
Prevents data loss by monitoring confidential and user defined data shared through removable devices, network or various applications.
Asset Management
Gives total visibility of hardware and software running on endpoints, helps to track software/hardware changes on endpoints.
Tune-up
Helps clean junk files and delete invalid registry/disk entries to improve performance of endpoints
Cloud Based Administration
Cloud based administration with graphical dashboard, group and policy management, email notification, easy deployment
Group Policy Management
Administrators can define user groups based on the hierarchy within the organization and set flexible policies as per situational requirements.
Scheduled Internet Access
Schedules time-based internet access
SEQRITE Endpoint Protection Cloud Standard Specifications
License | |
---|---|
Type | Security management |
License quantity | 26 - 50 license(s) |
License type | Base |
Software type | License |
License term in years | 3 year(s) |
Features | |
---|---|
Distribution type | Download |
Type | Security management |
System requirements | |
Minimum storage drive space | 3200 MB |
Minimum RAM | 1024 MB |
Minimum processor | 1 GHz 32-bit (x86) or 64-bit (x64), Intel core or Apple’s M1, M2, M3 |
Minimum processor speed | 1000 MHz |
Windows operating systems supported | Windows 10, Windows 10 Education, Windows 10 Education x64, Windows 10 Enterprise, Windows 10 Enterprise x64, Windows 10 Home, Windows 10 Home x64, Windows 10 Pro, Windows 10 Pro x64, Windows 10 x64, Windows 11, Windows 11 Enterprise x64, Windows 11 x64, Windows 7 Enterprise, Windows 7 Enterprise x64, Windows 7 Home Basic, Windows 7 Home Basic x64, Windows 7 Home Premium, Windows 7 Home Premium x64, Windows 7 Professional, Windows 7 Professional x64, Windows 7 Ultimate, Windows 7 Ultimate x64, Windows 8.1, Windows 8.1 Enterprise, Windows 8.1 Enterprise x64, Windows 8.1 Pro, Windows 8.1 Pro x64, Windows 8.1 x64 |
Mac operating systems supported | Mac OS X 10.12 Sierra, Mac OS X 10.13 High Sierra, Mac OS X 10.14 Mojave, Mac OS X 10.15 Catalina, Mac OS X 11.0 Big Sur, Mac OS X 12.0 Monterey, Mac OS X 13.0 Ventura, Mac OS X 14.0 Sonoma |
Linux operating systems supported | Debian 10, Fedora 32, SUSE Linux Enterprise Desktop 15, SuSE Linux 12.0, Ubuntu 14.04, Ubuntu 16.04, Ubuntu 22.04 |
Server operating systems supported | Windows SBS 2011 Essentials, Windows SBS 2011 Standard, Windows Server 2008 R2 x64, Windows Server 2012, Windows Server 2012 R2 x64, Windows Server 2016, Windows Server 2019, Windows Server 2022 |
Recommended RAM | 2048 MB |
Recommended processor | 2 GHz 32-bit (x86) or 64-bit (x64) |
Minimum system requirements | Internet Explorer 7+, TLS 1.2 |