X WAIT DONT GO...
50% OFF NEXT DAY DELIVERY!
Simply enter your email below and we'll send over the code.
Submit
* Please enter a vaild email
No Thanks, I would like to continue shopping

G-forbes Seqrite EPS Business 26-50 On Prem 1

Quick Code: Q1394117Part Code: CIR26TO50Seqrite
Videos & images may be added by customers.
Please check the specifications
Seqrite CIR26TO50
 
Product Image
 
Product Image
 
Product Image
 
G-forbes Seqrite EPS Business 26-50 On Prem 1
Quick Code: Q1394117Part Code: CIR26TO50
  • Type: Security management
G-forbes Seqrite EPS Business 26-50 On Prem 1
Quick Code: Q1394117Part Code: CIR26TO50
Quick Code: Q1394117Part Code: CIR26TO50Seqrite
Quick Code: Q1394117
Out of stock
Sorry, No restock date available

Enter your email below and we'll let you know when it's available
Consumers may return unwanted items within 14 days of delivery.
Faulty items can be returned within 30 days of delivery.

Returns can be processed online or you can contact our customer service team. For more information see our returns section
was £25.00 SAVE 22%
£16.15 ex. VAT
£19.38




We'll notify you when this product is available.
We won't use your email address for any other purpose.
Wishlist addFavourite

Overview



This solution provides state-of-the-art defense for your network and connected devices against today’s advanced cyber threats. It encompasses a collection of tools and practices designed to detect, prevent, and respond to malicious activities targeting endpoints. Equipped with cutting-edge features like detection scans and asset management, Seqrite Endpoint Protection ensures holistic security for enterprises’ digital assets.

Endpoint Threat Hunting
Endpoint Detection and Response (EDR) identifies and mitigates potential threats and proactively assists in reporting such incidents following compliance standards.

Comprehensive endpoint and data protection
End-to-end endpoint and data protection integrated into a single solution offer comprehensive security for businesses of any scale.

Higher scalability and enhanced security
Provides increased scalability and heightened security across Windows and Mac platforms, with added support for Linux-based systems.

Patch management
Enhances productivity and security measures with a streamlined and centralized approach to patch management.

Enhanced device control
Improved device control functionalities decrease business security risks.

Competitive security enhancements
Advanced security improvements fulfill enterprise compliance requirements.

Advanced endpoint protection
Robust antivirus, intrusion detection, firewall, and more ensure thorough endpoint protection.

Proactive scanning
Identifies unforeseen vulnerabilities and minimizes unauthorized installations with proactive scans on installed applications.

Uninterrupted protection
Protects from malicious websites, phishing attacks, and other threats.

Cloud-based access
Cloud-based access to the dashboard for imposing policies and compliance.

Connected Endpoint
Consistent asset regulation via comprehensive insights into each connected endpoint.

Application Control Safelist/Blocklist
Enforces application access restrictions following the Zero Trust methodology. Enables customization of application permissions according to the Operating System, including default OS and Seqrite applications. Provides a "Monitoring Only" mode to log application access for administrative review without blocking it.

Google and YouTube Access Controller
Restricts personal Google access while permitting corporate access based on administrator-selected account domains. Filters YouTube videos based on content categories, publisher names, and other criteria.

Endpoint Threat Hunting
Scans endpoints to identify files matching malicious hashes using Endpoint Threat Hunting (ETH). By leveraging user-provided hashes, ETH uncovers stealthy attacks and helps mitigate them before they harm the system.

Automated IoC Search
Integrates with MISP server for Threat Feeds and searches MISP File Hashes periodically; the findings are published in reports.

Real-time IoC Blocking
Submit file hashes for ongoing investigation of malicious content and real-time blocking.

Migration from v7.6
Enables smooth endpoints, users, groups, and policies migration to the new Endpoint Protection Server configuration. Additionally, it supports migration in batches or groups of endpoints for added convenience.

Rapid Query to Endpoint
Retrieves endpoints in real-time to collect information from predefined data sources on the endpoints.

File Sandboxing
Integrates with Seqrite Cloud Sandbox to analyze suspicious files for malware without any additional tool for Malware Analysis.

High Availability (HA)
High Availability guarantees continuous user access to services, applications, and data, even in the event of hardware failures and software glitches, thereby reducing system downtime.

Ransomware Protection
Utilizes Seqrite's behavior-based detection technology to identify and prevent ransomware threats and backs up data in a protected location, enabling file restoration in the event of a ransomware attack.

Advanced Device Control
Establishes device policies tailored to different device types on Windows and Mac platforms, ensuring network protection against unauthorized devices.

Web Filtering
Limits web access for employees by blocking Websites individually or as per categories.

Asset Management
Continuously monitors hardware and software configurations of every endpoint, enabling administrators to promptly detect and respond to changes within the company's systems.

Vulnerability Scan
Scans for known vulnerabilities in applications and operating systems allow users to update essential security patches promptly.

Patch Management
A centralized patch management solution addresses all Microsoft application vulnerability patching requirements.

Data Loss Prevention
Prevents financial losses by protecting confidential data and mitigating the risk of business secrets leakage. Enables scanning of data-at-rest on endpoints and removable devices.

File Activity Monitor
Meticulously oversees confidential company files, promptly alerting administrators to any copying, renaming, or deleting of such files.

IDS / IPS Protection
Proactively identifies and thwarts malicious activities exploiting application vulnerabilities.

Group Policy Management
Helps Administrators meticulously define user groups based on organizational hierarchy and establish adaptable policies tailored to situational requirements.

Spam Protection
Diligently scans endpoint inboxes for spam, phishing attacks, and unsolicited emails, bolstering defenses against email-borne threats.

Third-party Antivirus Removal
If another antivirus solution is detected during the Endpoint Protection client installation, its uninstaller will be activated or automatically removed. The installation of Seqrite EPP will not proceed until the previously installed antivirus is eliminated from the system.

Browsing Protection
Safeguards endpoint clients against attacks from malicious websites accessed within the network, fortifying defenses against web-based threats.

Phishing Protection
Prevents phishing attacks originating from malicious codes over the Internet from infiltrating the network and spreading.

Firewall Protection
Monitors inbound and outbound network traffic, allowing or disallowing applications based on defined rules, enhancing network security.

Tuneup
Enhances endpoint performance by cleaning junk files and deleting invalid registry/disk entries within the network, optimizing system efficiency.

Multiple Update Managers
Helps deploy multiple update managers to achieve load balancing and prevent network congestion, ensuring seamless distribution of updates.

Roaming Platform
The cloud-based solution enables continuous endpoint management, even outside the network, allowing administrators to maintain oversight, apply policies, and ensure compliance.

Email and SMS Notifications
Preconfigured notifications about critical network events reach appropriate parties via email or text, ensuring timely response to potential security incidents.




Specification


Technical Description: Seqrite EPS Business 26-50 On Prem 1

Features
Distribution type:
Download

License
License term in years:The terms of the contract to use the product e.g. software license.
1 year(s)
License quantity:The number of software licenses, which are contracts which allow a business or individual to use a piece of software.
26 - 50 license(s)
License type:There are various types of software licence, including free software (open source) where the user does not have to pay, and click-wrap, which is presented to the user on-screen during installation of (paid-for) software.
Base
Software type:The category of software.
License
Type:Characteristics of the device.
Security management

System requirements
Minimum system requirements:
Internet Explorer 7+, TLS 1.2
Recommended processor:
2 GHz 32-bit (x86) or 64-bit (x64)
Recommended RAM:
2048 MB
Server operating systems supported:
Windows SBS 2011 Essentials, Windows SBS 2011 Standard, Windows Server 2008 R2 x64, Windows Server 2012, Windows Server 2012 R2 x64, Windows Server 2016, Windows Server 2019, Windows Server 2022
Linux operating systems supported:8 RT. Linux (9.4, 9.5), Red Hat Enterprise Linux 5.0 (supported with a pre-built package); SUSE Linux (10.3, 11.0, 11, 11.1, 11.2), Fedora (9, 9.0, 10, 10.0, 11.0, 11, 12, 12.0), Ubuntu (8.04, 8.04.1, 8.04.2, 8.10, 9.04, 9.10, 10.04), Debian (5.0, 5.0.1, 5.0.2, 5.0.3)
Debian 10, Debian 9.4, Debian 9.5, Debian 9.6, Fedora 32, SUSE Linux Enterprise Desktop 15, SuSE Linux 12.0, SuSE Linux 12.3, Ubuntu 14.04, Ubuntu 16.04, Ubuntu 22.04
Mac operating systems supported:Mac operating systems e.g. OS X can be used with the device.
Mac OS X 10.10 Yosemite, Mac OS X 10.11 El Capitan, Mac OS X 10.12 Sierra, Mac OS X 10.13 High Sierra, Mac OS X 10.14 Mojave, Mac OS X 10.15 Catalina, Mac OS X 10.15.3 Catalina, Mac OS X 10.9 Mavericks, Mac OS X 11.0 Big Sur, Mac OS X 12.0 Monterey, Mac OS X 13.0 Ventura, Mac OS X 14.0 Sonoma
Minimum processor speed:
1000 MHz
Minimum processor:The lowest speed that the computer processor can run at, or the minimum amount of processing capacity that can be used, for the computer and particular program(s) to function.
1 GHz 32-bit (x86) or 64-bit (x64), Intel core or Apple's M1, M2 chip
Minimum RAM:The lowest RAM (memory) required to run a computer program or operating system.
1024 MB
Minimum storage drive space:
3200 MB


Delivery Options

3 Working Days £4.95
Next Working Day £7.95
More delivery info

Product details


CIR26TO50 Seqrite

Seqrite EPS Business 26-50 On Prem 1

£19.38 and

SKUCIR26TO50

Email me for later Close Email me for later Open
Email me a link to this page for later
Note: Your email address will not be used for any other purpose
Continue
Cookies help us deliver the best experience on our website. By using our website, you agree to our use of cookies

This site uses cookies. Some of these cookies are essential, while others help us to improve your experience by providing insights into how the site is being used. Read more about our privacy policy.

Some necessary cookies enable core functionality. The website cannot function properly without these cookies, and can only be disabled by changing your browser preferences.
Analytical and Functional cookies
Analytical cookies for us to better craft the user experience based on your page view experiences.
Social and Chat Cookies
We use some social sharing plugins. These plugins may place cookies on your device.