A summarized dashboard provides administrator the status of managed clients in graphical formats such as deployment status, protection status and protection statistics.
This helps administrators to keep track of all the hardware as well as software resources installed on all the endpoints connected to the network. Role based administration through eScan Management Console enables the administrator to share the configuration and monitoring responsibilities of the organization among several administrators. Using this feature, pre-defined roles can be assigned to the administrators, each with own set of rights, permissions and groups.
Also, the events can be filtered to retrieve exact required information to closely watch security level on all managed endpoints on a real-time basis. This allows administrator to deploy outbreak prevention policies during an outbreak that restricts access to network resources from selected computer groups for a defined period of time.
The outbreak prevention policies will be enforced on all the selected computers or groups. Incorrect configuration of these policy settings can cause major problems with the computers. It also provides a detailed report in PDF, Excel or HTML formats of all printing jobs done by managed endpoints through any printer connected to any computer locally or to the network. Note — Print Activity features are valid for endpoints with Windows Operating system only. Using One-Time password option, the administrator can disable any eScan module on any client computer for a desired period of time.
This helps to restrict user access from violating a security policy deployed in a network. With this report the administrator can trace the user Logon and Logoff activity along with remote sessions that took place on all managed computers. With the help of Active Directory synchronization, the administrator can synchronize eScan Centralized Console groups with Active Directory containers.
New computers and containers discovered in Active Directory are copied into eScan Centralized Console automatically and the notification of the same can be sent to the system administrator. Administrator can also choose to Auto Install or Protect discovered Windows workstations automatically. Policy deployment can be made easy through policy templates; this will allow the administrator to create policy templates and deploy it to the desired managed groups.
On Windows endpoints, administrators can allow or block access to USB devices. Unauthorized access to USB devices can be blocked using password protection, thus preventing data leakage.
It helps in accessing only the whitelisted applications, while all other third-party applications are blocked. Thus, online threats are averted before they enter the network via emails.
The Two-way Firewall with predefined rule sets will help you in putting up a restriction to incoming and outgoing traffic as well as hacking. Heuristic Scanning eScan's sophisticated Anti-Virus Heuristic Algorithm detects unknown viruses, that are being continuously released and protects the users from zero day threats.
Anti-Spam eScan controls spam effectively using indigenous technologies such as NILP and sophisticated Heuristic filters that work on the basis of specific keywords and phrases. Pro-Active Protection eScan version 10 scans, monitors and warns the user about any suspicious applications. Web Protection eScan provides comprehensive web protection with an in-built Web Control that blocks offensive and unsuitable websites as per the user's choice and the effective pop-up filter blocks all the pop-up saving bandwidth.
Enhanced Firewall eScan's in-built firewall monitors and logs incoming outgoing network activities in the system and safeguards it from all network-based attacks. Logs and Extensive Reports Logs and extensive reports are being created and displayed by all the modules for Protection, Scan and Update. Automatic Compressed Updates Automatic Compressed Updates are being provided by eScan for both the software as well as the virus and spam definitions. Other Highlights. You can find it here….
Memory: 1 GB and above Disk Space: 1 GB free hard drive space for installation of the application and storage of temporary files. Careers eScan. We use cookies to make your experience of our websites better. By using and further navigating this websites, you accept that some of your browsing activity may be recorded in cookies. The solution protects your Windows-based desktop and servers against ever-more frequent and threatening attacks. With new Advanced Virus Control technology and highly sophisticated Heuristics Algorithms, eScan effectively scans and detects unknown malware and even detects and warns users about applications that behave in a suspicious manner.
Being light on the system resources, it ensures that the performance of your computer is not affected even while eScan is performing thorough system scans. It defends the computer from all forms of network-based attacks by filtering incoming and outgoing network activities. It also includes a set of predefined access control rules that the user can customize to filter network traffic. It is an advanced feature which allows user to boot into a secure environment during system startup without using any optical media.
Email address. Buy Now. Try Now. Valid number of users are 5, 10, 15, 20, 25, 30, 35, 40, 45, For more than 50 users, please write to us at sales escanav. Valid number of users are 1, 5 - Valid number of users are 1, Valid number of users are Careers eScan. We use cookies to make your experience of our websites better.
0コメント