Seqrite | Cybertronix Technologies LLC

Seqrite Endpoint Protection

This solution provides state-of-the-art defense for your network and connected devices against today’s advanced cyber threats. It encompasses a collection of tools and practices designed to detect, prevent, and respond to malicious activities targeting endpoints. Equipped with cutting-edge features like detection scans and asset management, Seqrite Endpoint Protection ensures holistic security for enterprises’ digital assets.
Powered by

Key Benefits of Seqrite Endpoint Protection

Endpoint Detection and Response (EDR) identifies and mitigates potential threats and proactively assists in reporting such incidents following compliance standards.

Comprehensive endpoint and data protection End-to-end endpoint and data protection integrated into a single solution offer comprehensive security for businesses of any scale.

Provides increased scalability and heightened security across Windows and Mac platforms, with added support for Linux-based systems.

Patch management Enhances productivity and security measures with a streamlined and centralized approach to patch management.

Enhanced device control Improved device control functionalities decrease business security risks.

Advanced security improvements fulfill enterprise compliance requirements.

Robust antivirus, intrusion detection, firewall, and more ensure thorough endpoint protection.

Identifies unforeseen vulnerabilities and minimizes unauthorized installations with proactive scans on installed applications.

Uninterrupted protection Protects from malicious websites, phishing attacks, and other threats.

Cloud-based access to the dashboard for imposing policies and compliance.

Consistent asset regulation via comprehensive insights into each connected endpoint.

Key Benefits of Seqrite Endpoint Protection

Multi-Site Management

Enhances overall network control and efficiency with High Availability and Hierarchical Multi-Server Deployment, consolidating control over dispersed locations. Flexible Policy Management from the Control Center maintains consistency across endpoints, while Single Sign-On (SSO) simplifies server navigation. Centralized License Management streamlines operations by efficiently allocating and managing licenses across sites.

Application Control Safelist/Blocklist

Enforces application access restrictions following the Zero Trust methodology. Enables customization of application permissions according to the Operating System, including default OS and Seqrite applications. Provides a "Monitoring Only" mode to log application access for administrative review without blocking it.

Google and YouTube Access Controller

Restricts personal Google access while permitting corporate access based on administrator-selected account domains. Filters YouTube videos based on content categories, publisher names, and other criteria.

Enterprise File Search (EFS)

EFS is an effective way to find files that match malicious hashes across your endpoints. Based on the hashes provided by a user, EFS detects hidden attacks and helps hunt them down before they harm the system.

Automated IoC Search

Integrates with MISP server for Threat Feeds and searches MISP File Hashes periodically; the findings are published in reports.

Real-time IoC Blocking

Submit file hashes for ongoing investigation of malicious content and real-time blocking.

Migration from v7.6

Enables smooth endpoints, users, groups, and policies migration to the new Endpoint Protection Server configuration. Additionally, it supports migration in batches or groups of endpoints for added convenience.

Rapid Query to Endpoint

Retrieves endpoints in real-time to collect information from predefined data sources on the endpoints.

File Sandboxing

Integrates with Seqrite Cloud Sandbox to analyze suspicious files for malware without any additional tool for Malware Analysis.

High Availability (HA)

High Availability guarantees continuous user access to services, applications, and data, even in the event of hardware failures and software glitches, thereby reducing system downtime.

Ransomware Protection

Utilizes Seqrite's behavior-based detection technology to identify and prevent ransomware threats and backs up data in a protected location, enabling file restoration in the event of a ransomware attack.

Advanced Device Control

Establishes device policies tailored to different device types on Windows and Mac platforms, ensuring network protection against unauthorized devices.

Web Filtering

Limits web access for employees by blocking Websites individually or as per categories.

Asset Management

Continuously monitors hardware and software configurations of every endpoint, enabling administrators to promptly detect and respond to changes within the company's systems.

Vulnerability Scan

Scans for known vulnerabilities in applications and operating systems allow users to update essential security patches promptly.

Patch Management

A centralized patch management solution addresses all Microsoft application vulnerability patching requirements.

Data Loss Prevention

Prevents financial losses by protecting confidential data and mitigating the risk of business secrets leakage. Enables scanning of data-at-rest on endpoints and removable devices.

File Activity Monitor

Meticulously oversees confidential company files, promptly alerting administrators to any copying, renaming, or deleting of such files.

IDS / IPS Protection

Proactively identifies and thwarts malicious activities exploiting application vulnerabilities.

Group Policy Management

Helps Administrators meticulously define user groups based on organizational hierarchy and establish adaptable policies tailored to situational requirements.

Spam Protection

Diligently scans endpoint inboxes for spam, phishing attacks, and unsolicited emails, bolstering defenses against email-borne threats.

Third-party Antivirus Removal

If another antivirus solution is detected during the Endpoint Protection client installation, its uninstaller will be activated or automatically removed. The installation of Seqrite EPP will not proceed until the previously installed antivirus is eliminated from the system.

Browsing Protection

Safeguards endpoint clients against attacks from malicious websites accessed within the network, fortifying defenses against web-based threats.

Phishing Protection

Prevents phishing attacks originating from malicious codes over the Internet from infiltrating the network and spreading.

Firewall Protection

Monitors inbound and outbound network traffic, allowing or disallowing applications based on defined rules, enhancing network security.

Tuneup

Enhances endpoint performance by cleaning junk files and deleting invalid registry/disk entries within the network, optimizing system efficiency.

Multiple Update Managers

Helps deploy multiple update managers to achieve load balancing and prevent network congestion, ensuring seamless distribution of updates.

Roaming Platform

The cloud-based solution enables continuous endpoint management, even outside the network, allowing administrators to maintain oversight, apply policies, and ensure compliance.

Email and SMS Notifications

Preconfigured notifications about critical network events reach appropriate parties via email or text, ensuring timely response to potential security incidents.

Compare Seqrite Endpoint Protection Products

Features

SME

Business

Total

Enterprise Suite

EDR

All Core Protection (Antivirus, IDS/IPS Protection, Email Protection, Phishing Protection, Browsing Protection, SMS Notification*, Vulnerability Scan, Roaming Platform)
Anti Ransomware
Firewall Protection
GoDeep.AI*
Multi-Site Management
Asset Management
Spam Protection
Web Filtering
Advanced Device Control
SIEM Integration
Application Control – Blocklist
Application Control – Safelist
File Activity Monitoring
Tuneup*
Patch Management
YouTube Access Controller
Google Access Controller
Disk Encryption Management
Rapid Query to Endpoints
Automated IoC Search
Realtime IoC Search
Enterprise File Search (EFS)
Data Loss Prevention
ADD-ON
ADD-ON
File Sandboxing
ADD-ON
ADD-ON
ADD-ON
ADD-ON
Refer our user guide for information regarding installation and use of Seqrite Endpoint Protection
Download product features, comparison sheet and system requirement information
View the information on the features and improvements in each product release
Stay updated about the latest security threats with our Quarterly reports

BITS Pilani K. K. Birla, Goa Campus

BITS Pilani K. K. Birla Goa Campus secures their endpoints with unparalleled manageability offered by Seqrite EPS.

Emami Cement Ltd.

Emami Cement Ltd. secures their business-critical assets with the help of Seqrite Endpoint Security

Optical Character Recognition at Endpoints

Optical Character Resolution (OCR) has been around for quite some time in the industry. Performing OCR at endpoints h

MongoDB's makeover uplifts Seqrite's award-winning Endpoint Security

Seqrite Endpoint Security Cloud’s latest release, version 1.3, comes with improved scalability that lets enterprises

Protecting Your Enterprise from Ransomware Attacks

This whitepaper explains the different types of prevalent ransomware, and steps enterprises can take to stay protecte

System Requirement

Seqrite Endpoint Protection Standalone Setup

Seqrite Endpoint Protection Distributed Setup

Seqrite Endpoint Protection Multisite Setup

Note: Site Server Configuration will be similar to the Standalone recommendation

System requirements for Seqrite Endpoint Protection clients

Important to Know:

  • SEPS client can not be installed on Windows 7 and Microsoft Windows Server 2008 R2 if these updates are not installed:Install them by clicking on the link OR
    Install Internet Explorer 11 to get the updates automatically. After installing the KB articles, you need to restart the system.
  • For Windows 2016, Windows Server 2019 and Server 2022, you need to uninstall Windows Defender. Post the uninstallation, make sure that you restart the system.
  • Debian 9, 10
  • Ubuntu 14.04,16.04
  • Boss 6.0
  • Linux Mint 19.3
  • Fedora 30, 32
  • Linux Mint 19.3, 20, 21.3
  • Ubuntu 16.04, 18.04, 20.4, 22.04
  • Debian 9, 10
  • CentOS 7.8, 8.2
  • RHEL 7.5, 7.8, 8.2 & 8.6 Enterprise, 9.0, 9.1, 9.2, 9.3
  • SUSE Linux 12. SP4 / Enterprise Desktop 15
  • Rocky Linux 8.4
  • Boss 6.0, 8.0, 9.0
  • Oracle Linux 7.1, 7.9 and 8.1
Windows
  • Minimum: 1 GHz 32-bit (x86) or 64-bit (x64) processor
  • Recommended: 2 GHz 32-bit (x86) or 64-bit (x64) processor
  • Minimum: 1 GB
  • Recommended: 2 GB free RAM
  • 3200 MB free space
  • Internet Explorer 7 or later
  • TLS 1.2
MAC
  • Processor: Intel core or Apple’s M1, M2, M3 chip compatible
  • Minimum: 512 MB
  • Recommended: 2 GB free RAM
  • 1200 MB free space
MAC
  • Intel or compatible
  • Minimum: 512 MB
  • Recommended: 1 GB free RAM
  • 1200 MB free space

System requirements for Patch Management server

  • Microsoft Windows 10 (64-bit) and above
  • Microsoft Windows Server 2012 (64-bit) and above
  • Minimum: 40 GB
  • Recommended: 1 TB
  • 8 GBs or above
  • 4 Core(x86-64), 2.60GHz or above

Note:

  • For more than 25 clients, Seqrite recommends installing Patch Management server on the Windows Server operating system.

System requirements for deployment of Seqrite Endpoint Protection server via OVA file

  • Product Key
  • Static IP Address
  • Gateway
  • Subnet mask
  • DNS

Note:

System requirements for Seqrite Endpoint Protection server

Note: The following operating systems support only Master Servers without any Secondary Server,

  • Microsoft Windows XP 64-bit SP1 and SP2 / Professional Edition (64-bit)
  • Microsoft Windows Server 2003 Web / Standard / Enterprise (64-bit)
The computer where Seqrite Endpoint Protection server is to be installed must meet the following requirements.
  • Minimum: 1 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium
  • Recommended: 2 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium or higher
  • Minimum: 2 GB
  • Recommended: 4 GB or more
    Seqrite Endpoint Protection server may require additional RAM as per the requirements of installed applications
  • Minimum: 4800 MB free disk space
  • Recommended: 10000 MB free disk space
  • Internet Explorer 10 or 11
  • Google Chrome 62, 63, 64 or 65
  • Mozilla Firefox 56, 57, 58, 59, 62, 64 or 65
  • 1024 x 768

Note:

  • For more than 25 clients, Seqrite recommends installing Seqrite Endpoint Protection Server and Patch Management server on the Windows Server operating system

  • For more than 500 clients, Seqrite recommends a dedicated Web server (IIS).

  • Seqrite recommends deploying a separate/dedicated Alternate Update manager for a group of up to 200 clients for proper load balancing.

Java Runtime Environment (JRE) required to perform installation through Web page and Add Device functionalities are as follows:
  • 32-bit JRE 7, 32-bit JRE 8
  • 32-bit JRE 7, 32-bit JRE 8
  • 64-bit JRE 7, 64-bit JRE 8
Seqrite Endpoint Protection server needs to have Microsoft IIS Web server as well as Microsoft .NET Framework 4.0 on your computer system.

Note: The Seqrite Endpoint Protection installer will install required IIS Components.

System requirements for Seqrite Endpoint Protection clients

Seqrite Endpoint Protection client can be installed on a computer system with any one of the following operating systems:

Note:

  • For Windows 2016 Server and Windows 2019 Server, uninstall Windows Defender before installing Seqrite Endpoint Protection client.
  • If you are upgrading the Seqrite Endpoint Protection client to Windows 2016 Server or Windows 2019 Server, uninstall Windows Defender after upgrade.
The computer where Seqrite Endpoint Protection server is to be installed must meet the following requirements.
  • Minimum: 1 GHz 32-bit (x86) or 64-bit (x64) processor for Windows Vista
  • Recommended: 2 GHz 32-bit (x86) or 64-bit (x64) processor for Windows Vista or higher
  • Minimum: 1 GB
  • Recommended: 2 GB or more
  • 3200 MB
  • Internet Explorer 5.5 or later
Software and hardware requirements for Seqrite Endpoint Protection clients on Mac OS are as follows.
  • Mac OS X 10.12, 10.13, 10.14, 10.15, 11, 12, 13, 14 and 15
  • Intel core or Apple’s M1, M2, M3 chip compatible
  • Minimum: 512 MB
  • Recommended: 2 GB or more
  • 1200 MB
Software and hardware requirements for Seqrite Endpoint Protection clients on Linux OS are as follows:
  • RHEL 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9
  • BOSS 6
  • Fedora 14, 18, 19, 20, 21, 22, 23, 24, 25
  • openSUSE 11.4, 12.2, 12.3, 13.2, 42.2
  • Linux Mint 13, 14, 15, 16, 17.3, 18
  • Ubuntu 10.10, 11.4, 12.04 LTS, 12.04.3 LTS, 13.04, 13.10, 14.04, 14.10, 15.04, 16.04 LTS, 16.10, 17.04
  • CentOS 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9
  • RHEL 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 7.0, 7.1, 7.2, 7.3
  • Boss: 7.0, 8.0
  • Fedora 14, 18, 19, 20, 21, 22, 23, 24, 25
  • openSUSE 11.4, 12.2, 12.3, 42.3
  • Linux Mint 13, 14, 15, 16, 17.3, 18
  • Ubuntu 10.10, 11.4, 12.04.2 LTS, 13.04, 13.10, 14.04, 14.10, 15.04, 16.04 LTS, 16.10, 17.04, 17.10, 18.04, 20.04 LTS
  • CentOS 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 7.0, 7.4, 8.0, 8.1
  • SUSE Linux 11.00, 12.00, 12.2
  • Intel core compatible
  • Minimum: 512 MB
  • Recommended: 1 GB or more
  • 1200 MB

The Seqrite Endpoint Protection client supports the above-mentioned distribution. The clients also support the other versions if the following prerequisites are met,

  • GNU C Library 2.11 and above

  • SAMBA version 3.5.x to 4.5.x, 4.10.x, 4.11.x.

  • GNU C Library 2.5 and above

  • SAMBA version 3.5.x to 4.5.x, 4.10.x, 4.11.x.

In case of the clients with other than above mentioned Linux operating system, Seqrite recommends to validate the clients in a non-production environment before deploying in the production environment.