Seqrite | Cybertronix Technologies LLC

Seqrite Endpoint Protection Cloud

Power Your Endpoint Protection with Cloud-based Security

Helps businesses accelerate digital transformation, eliminate complexity, and provide fool-proof security against the most advanced threats.

Top Score in AV-TEST's Advanced Threat Protection Test for Unrivalled Defence Against Data Stealers and Ransomware Techniques

Key Benefits of Seqrite Endpoint Protection Cloud

Centralized Management from a Single Console

Real-Time Updates and Patching

Improved Threat Detection and Response

Reduced Infrastructure Costs

No Hassle Scalability

Secure Access from Anywhere, Any-time

Quick Deployment and Configuration

Seamless Integration with Cloud Ecosystem

Integrated with Seqrite Centralized Security Management

Seqrite Endpoint Protection Cloud is seamlessly integrated with our centralized security management platform, offering businesses a real-time overview of their overall security posture.

Simplify

Simplify multiple point products security management from one consol

Consolidate

Streamline alerts and correlate data to make sensible deductions

Analyze

Gain real-time insights to make data-driven decisions

Act

Insights are designed for actual threat reduction and automate remediation actions

Features of Seqrite Endpoint Protection Cloud

Centralized Endpoint Log Collection

Facilitates easier troubleshooting by allowing administrators to collect debugging logs directly from the EPP console.

Dedicated Server Security Policy

Offers specialized policies for Windows Servers, accessible via the console, to address their environment’s unique security needs.

Enhanced Device Control for Mac

Extends full device control capabilities to Apple’s M1, M2, and M3 devices, ensuring comprehensive endpoint security.

BitLocker Encryption Management for Data Security

Allows central management of BitLocker encryption policies, keys, and recovery options, ensuring robust data security and compliance with regulatory requirements.

Patch Management

Centralized patch management solution to patch vulnerabilities of Microsoft and non-Microsoft applications.

Application Control Safelist/Blocklist

Restricts application access based on Zero Trust methodology. Allows defining application permissions depending on the Operating System, including default OS and Seqrite applications. Offers a ‘Monitoring Only’ mode to record application access for administrative viewing without blocking it.

Google & YouTube Access Controller

Blocks Personal and allows Corporate Google Access based on the administrator’s chosen account domains. Blocks YouTube Videos depending on the Content Category, Publisher Name, etc.

File Sandboxing

Integrates with Seqrite Cloud Sandbox, that helps to detect malware in suspicious files. No reason to buy, manage, or configure hardware or software for Malware Analysis, just upload malicious content to Seqrite Cloud Sandbox to see the value immediately.

Migration from v7.6

Facilitates migration of Endpoints, Users, Groups, and Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints.

Vulnerability Scan

By scanning known vulnerabilities of applications and operating systems, this feature allows users to update necessary security patches.

3rd Party App Remover

Seqrite Endpoint Protection Agent installation ensures effortless migration to Seqrite Endpoint Protection by removing earlier AVs on endpoints, thereby reducing the unprotected time duration.

Active Directory Integration

Seqrite Active Directory Tool helps you do a bulk installation of Seqrite clients within your domain network by Active Directory Integration.

Endpoint Antivirus

Offers malware protection verified by leading certification organisations.

Anti Ransomware

Protects your data from ransomware attacks and automatically takes the backup of files.

IDS/IPS

Detects malicious network activities to exploit application vulnerabilities and blocks intruder attempts.

Firewall

Monitors inbound and outbound network traffic based on rules.

Phishing Protection

Blocks phishing sites that try to steal your security passwords and other confidential details about your organisation.

Web Filtering

Blocks sites as per its categories. Our tool allows you to stop users from spying at certain URLs by averting their browsers from loading pages from suspicious websites.

Browsing Protection

Our comprehensive endpoint protection cloud system blocks malicious sites.

Advanced Device Control

Enforces policies regarding the use of storage devices, mobile and portable devices, wireless devices, network interfaces connected to endpoints.

Data Loss Prevention

Automatically assigns DLP licenses to matching endpoints, streamlining deployment. Supports RegEx for precise rules, allows data-type-specific actions, and monitors custom applications for broader protection.

Asset Management

Gives total visibility of hardware and software running on endpoints, helps to track software/hardware changes on endpoints.

Tune-up

Helps clean junk files and delete invalid registry/disk entries to improve performance of endpoints.

Cloud Based Administration

Cloud based administration with graphical dashboard, group and policy management, email notification, easy deployment.

Group Policy Management

Administrators can define user groups based on the hierarchy within the organization and set flexible policies as per situational requirements.

Scheduled Internet Access

Schedules time-based internet access.

Refer our user guide for information regarding installation and use of Seqrite Endpoint Protection
Download product features, comparison sheet and system requirement information
View the information on the features and improvements in each product release
Stay updated about the latest security threats with our Quarterly reports

Advantages of Seqrite UEM

This whitepaper explains how the ever-changing world of technology demands a centralised, multi-tenant platform for o

Seqrite Endpoint Protection Cloud At A Glance

Features

Standard

Advanced

Premium

Antivirus
Anti Ransomware
Email Protection
IDS/IPS
Firewall
Browsing Protection
Phishing Protection
3rd Party App Remover
GoDeep.AI
Vulnerability Scan
SIEM Integration
Spam Protection
Web Filtering
Advanced Device Control
Application Control – Blocklist
Application Control – Safelist
Disk Encryption Management
Asset Management
Tune-up
YouTube Access Controller
Google Access Controller
Patch Management
Data Loss Prevention
ADD-ON
ADD-ON
File Sandboxing
ADD-ON
ADD-ON

System Requirements

The following Web browsers are supported for Seqrite Endpoint Protection Cloud,
For Installing Seqrite Endpoint Protection client through client install utility, the System requirements are as follows:
Windows OS
Mac
Linux 32 bit
  • Debian 9, 10
  • Ubuntu 14.04,16.04
  • Boss 6.0
  • Linux Mint 19.3
Note: Linux Client Agent (v10.11) and above supports deployments only on Linux 64-bit OSs. The existing deployed agents on Linux 32-bit (v10.9) will continue to function as expected.
Linux 64 bit
  • Fedora 30, 32, 35
  • Linux Mint 19.3, 20, 21.3
  • Ubuntu 16.04, 18.04, 20.4, 22.04, 24.04
  • Debian 9, 10
  • CentOS 7.8, 8.2
  • RHEL 7.5, 7.8, 8.2, 8.6, 8.8, 9.0, 9.1, 9.2 and 9.3 Enterprise
  • SUSE Linux 12. SP4 / Enterprise Desktop 15
  • Rocky Linux 8.4
  • Boss 6.0, 8.0, 9.0 (Desktop), 8.0 (Server)
  • Oracle Linux 7.1, 7.9, and 8.1
Windows

Processor:

  • Minimum: 1 GHz 32-bit (x86) or 64-bit (x64) processor
  • Recommended: 2 GHz 32-bit (x86) or 64-bit (x64) processor

RAM:

  • Minimum: 1 GB
  • Recommended: 2 GB free RAM

Hard disk space:

  • 3200 MB free space

Web Browser:

  • Internet Explorer 7 or later

Network protocol:

  • TLS 1.2
MAC

Processor:

  • Intel core or Apple’s M1, M2, M3 chip compatible

RAM:

  • Minimum: 512 MB
  • Recommended: 2 GB free RAM

Hard disk space:

  • 1200 MB free space
Linux

Processor:

  • Intel or compatible

RAM:

  • Minimum: 512 MB
  • Recommended: 1 GB free RAM

Hard disk space:

  • 1200 MB free space
For installing the Patch server, the system requirements are as follows:
  • Minimum: 40 GB free disk space
  • Recommended: 1 TB free disk space
  • Microsoft Windows 10 (64-bit) and above
  • Microsoft Windows Server 2012 (64-bit) and above
  • For more than 25 clients, Seqrite recommends installing a Patch Management server on the Windows Server operating system.

Note:

  • The machine on which you are installing the Patch Management Server must be on the Public IP network.
  • For more than 25 clients, Seqrite recommends installing a Patch Management server on the Windows Server operating system.