eScan Corporate 360
eScan Corporate 360
with MDM & Hybrid Network Support
Ultimate Security For all The Computers,Servers and Mobile Devices In Your Business Network

Worried about the security of your business network across every endpoint – including physical & virtual machines, servers, storage devices, email, and Internet? Use the new and improved eScan Corporate Edition (with Hybrid Network Support) that safeguards your corporate network from all kinds of cyber security attacks. As information technology is a key backbone of any business, today IT security is considered as a key part of business strategy by the organizations. With the constantly increasing threats in the cyber security landscape, protection of valuable intellectual property and business data against theft/misuse without interrupting business continuity is a critical issue. Eliminating threats is a challenge; hence businesses consider protection against such threats as a top management issue.

The new eScan Corporate Edition strengthens the cyber security capabilities of the businesses by providing multi-layered protection to complex threats and secure critical business information effectively without constraining business growth. It is an excellent combination of advanced and futuristic technologies that provides protection to Windows as well as Macintosh and Linux computers in the network.

  eScan Free Trial 

 

Features


 

Ensures Business Continuity

Prevents Malware Outbreaks, Data theft, Productivity loss and Security violations.

Manage Backups For Managed Devices

Administrator can backup and restore SMSs and contacts from managed devices.
       

Prevents Spreading Of Malware Infection On Networks

Administrator is informed about outbreaks in the network to take immediate action.

Monitor Devices Connected Within The Network

eScan assists in monitoring devices that are connected to the system. Using the password protection feature, unauthorized devices can be easily blocked.

       

Reduces IT Costs

Reduces Security Management costs through File Reputation Services, Asset Management, Print activity, ADS integration and Support for VMware, SYSLOG, SNMP, NAC and NAP.

Efficiently Scans And Analyzes All The Incoming & Outgoing Mails

eScan scans all the emails in real-time for Viruses, Worms, Trojans, Spyware, Adware and hidden malicious content using powerful, heuristic driven Dual Anti-Virus engines.

 



Key Features

  

New Secure Web Interface

New Secure Web Interface

eScan’s new Secure Web Interface uses SSL technology to encrypt all communications. A summarized dashboard provides administrator the status of the managed clients in graphical formats such as deployment status, protection status and protection statistics.

Asset Management

eScan’s Asset Management module provides the entire hardware configuration and list of software installed/uninstalled on client computers. This helps administrators to keep track of all the hardware as well as software resources installed/uninstalled on all the client computers connected to the network.

       

Client Live Updater

With the help of eScan’s Client Live Updater, events related to eScan & security status of all endpoints are captured and recorded/logged and can be monitored in real-time. Also, the events can be filtered to retrieve exact required information to closely watch security level on all managed endpoint on a realtime basis, thus ensuring total security on all managed endpoints. It also facilitates export of the reports in Excel format that can further be used for audit compliance.

Network Outbreak Prevention, Live Alerts and Reports

Network Outbreak Prevention, Live Events and Reports

eScan prevents spreading of malware infection on networks and send events to the administrator about the outbreaks in the network. It can instantaneously display live events about Applications, USB/Flash device, and Site Browsing information of the endpoints. It also allows creation of customized reports templates for eScan module activity on managed endpoints.

       
Summarized Dashboard for better Security Management

Role Based Administration

Role based Administration through eScan Management Console enables the administrator to share the configuration and monitoring responsibilities of the organization among several administrators. Using this feature, pre-defined roles can be assigned to the administrators, each with own set of rights, permissions and groups.

Network Outbreak Prevention, Live Alerts and Reports

Print Activity

eScan comprises of Print Activity module that efficiently monitors and logs printing tasks done by all the managed endpoints. It also provides a detailed report in PDF, Excel or HTML formats of all printing jobs done by managed endpoints through any printer connected to any computer locally or to the network.
Note: Print Activity feature is valid for endpoints with Windows Operating system only.

       

Mobile Device Management

eScan’s Mobile Device Management feature allows administrator to create different groups for different location, add devices, move devices from one group to another group, define rules/policies for Anti-Virus, setting Call & SMS Filter, Web Protection, Anti-Theft, Password, and Device Oriented policy. It also allows administrator to create New Task, Start an existing Task, create Group Task, define Task Settings, and Schedule Task at a desired period of time.

Network Outbreak Prevention, Live Alerts and Reports

One-Time Password

Using One Time password option, the administrator can disable any eScan module on any client computer for a desired period of time. This helps to restrict user access from violating a security policy deployed in a network.

 

Key Features - eScan Endpoints

  

Enhanced Endpoint Security

Device Control
eScan’s advanced device control feature helps in monitoring USB devices that are connected to Windows or Mac endpoints in the network. On Windows endpoints administrators can allow or block access to USB devices such as webcams, CD-ROMs, Composite devices, Bluetooth devices, SD Cards or Imaging device. Unauthorized access to USB devices can be blocked using password protection thus preventing data leakage and stopping malware infection through USB devices. On Mac endpoints administrators can block USB access.

Application Control
eScan’s effective Application Control module allows you to block/whitelist and define time restrictions for allowing or blocking execution of applications on Windows endpoints. It helps in accessing only the whitelisted applications, while all other third-party applications are blocked. On Android endpoints, by default all downloaded applications are blocked and are allowed only by entering password. Clubbed together, these features enhance the application control functionality which leverages maximum control over the usage of applications.

Advanced Anti-Spam

eScan prevents you from receiving spam mails with its advanced Anti-Spam feature. It checks the content of outgoing and incoming mails as well as quarantines advertisement mails.

Moreover, eScan scans all the emails in real-time for Viruses, Worms, Trojans, Spyware, Adware and hidden malicious content using powerful, heuristic driven Dual Anti-Virus engines.

Thus, online threats are averted before they enter the network via emails.

       

Advanced Web Protection

eScan comes with an advanced Web Protection feature that allows administrators to define the list of sites to block or whitelist on endpoints connected to the network where eScan is installed. For Windows endpoints eScan also provides the facility fortime-based access restriction.

On Demand Scanning

Being very light on system resources, eScan facilitates faster scan of endpoints. This ensures that endpoint does not slow down, even while eScan is performing an on-demand scan of the files/directories that you access or copy onto your endpoint. It allows you to select different files/folders, directories or running processes in your endpoint and scan them for viruses.

       

Privacy Advisor

eScan comprises of Privacy Advisor that provides you the complete list of application using device permissions in a classified format. This helps you to keep a check on the security level of all applications installed.

Anti-Theft

eScan helps you in blocking, data wiping, SIM watching, and locating your Android-based device through GPS finder. With its Anti-Theft feature, eScan ensures complete protection to your Android from any unauthorized access on the event if your device is lost or stolen.

       

Schedule Scan

eScan offers you an option for scheduled scanning, which will run seamlessly in the background without interrupting your current working environment. It performs scheduled scans for selected files/folders or the entire system for the scheduled period, thus providing you the best protection against cyber threats.

Enhanced Two-way Firewall

The two-way Firewall with predefined rule sets will help you in putting up a restriction to incoming and outgoing traffic and hacking. It provides the facility to define the firewall settings as well as define the IP range, permitted applications, trusted MAC addresses and local IP addresses.

       

Call and SMS Filter

eScan facilitates content filtering of calls and SMSs based on parameters set through its Whitelist and Blacklist feature. A user can block calls and SMSs from specified numbers based on specific phrases/words/keywords.

Privacy Control

Privacy control allows scheduling the auto erase of your cache, ActiveX, cookies, plugins, and history. It also helps to permanently delete files and folders without the fear of having them retrieved through the use of third-party applications, thus preventing misuse of data.

 

UP


Other Highlights

 

  • Unified Console for Windows, Mac and Linux

  • Cloud Security

  • Set advanced security policies

  • Secure Web Interface

  • License Management

  • Export & Import of Settings

  • Task deployment

  • Manage updates

  • File Reputation Services

  • Real-Time Protection against Malware

  • Sophisticated File Blocking & Folder Protection

  • Powerful Heuristic Scanning for Proactive Protection

  • Auto Back-up and Restore of Critical System files

  • Wizard to create a Windows®-based Rescue Disk to clean Rootkits & File infectors

  • Inbuilt eScan Remote Support

  • 24x7 FREE Online Technical Support through e-mail, Chat & Forums

Note: * Not all features are available on all platforms.

 

UP


Compare Products

 

eScan Features

eScan
Corporate
360

eScan
Corporate
Edition
eScan
Endpoint
Security
Unified Console for Windows, Mac and Linux
Cloud Security Network  
Set Advanced Security Policies
Secure Web Interface
Personalized Dashboard
Report Templates
Privacy Advisor  
Report Scheduler
Network Based Outbreak Prevention  
Real-Time AV Scanning  
Malware URL Filter  
Winsock Layer Protection  
Advanced Proactive Detection  
Anti-Spyware, Anti-KeyLogger, Anti-Rootkit  
On-Demand Scan  
Anti-Spam (NILP, RBL, SURBL)  
Two Way Firewall  
Mail Anti-Phishing  
Malware URL Filter  
Safe Mode Boot Protection
Rescue Mode  
Print Activity
USB Vaccination
Sample Upload  
Web Protection
Web Anti – Phishing
Import & Export Security Settings  
Endpoint Security
Device Control
USB Blocking with Password Management
Blocking of AutoPlay of USB Devices
Recording of Files Copied to USB
Blocking of CD/DVD
Disabling of Web Cam
Disabling of SD Cards
Read-Only USB
USB Whitelisting / Scanning
Bluetooth Control
Wi-Fi Control
Proxy Setting Protection  
IP Protection  
Update Agent  
File Access Rights  
File Modification Prevention  
Secure Delete  
Application Control
Grid-based Web Access Timing
History / Reports
Web Based Help
Manage updates
Event Caching for Offline Endpoints
Virtual Keyboard  
Silent Mode  
User Defined File & Folder Protection  
Creating / Burning Bootable Rescue CD  
Automatic Patching of Windows® Operating System Vulnerabilities
Laptop Battery Power Saving Mode for Schedule Scan  
Advanced Self-Protection Feature
Registry Monitoring  
Real-Time eMail Scan  
Password Protection
Heuristic Scanning  
Pulse / Push Updates  
SNMP Trap Management
NAC & NAP Support  
SYSLOG Event Management
Role Based Privilege for EMC  
ADS Integration
VMWare Support
Registration / Activation: (via Web / eMail)

Management Console

Secure Web Based Management Console (SSL)
Remote Installation of Clients
Remote Installation of Third Party Software
Automated Un-installation of Known Antivirus Software  
Centralized Reporting Feature
Top Ten Summary Reports
Email Based Event Alerts
Detailed System Information of all Clients on Console (Asset Management)
Hardware/Software Installation / Un-installation Events
Document Printing Events
Client Live Updater
License Management
Reports and Notifications
Task deployment

Mobile Device Management

Anti-Theft (Locate, Lock, Notification, Scream)    
Manage Backup / Restore for managed devices    
Call & SMS filter    
App Store    
On-Demand Scan    
Parental Control    
Application control    
Location Awareness    
Volume Deployment    

 

UP


System Requirements

For Windows (Windows server & workstations) Platforms Supported

Operating System: Microsoft® Windows® 2012 / SBS 2011 / Essential / 2008 R2 / 2008 / 2003 R2 / 2003 / 8.1 / 8 / 7 / Vista / XP SP 2 / 2000 Service Pack 4 and Rollup Pack 1 (For 32-Bit & 64-Bit Editions)

CPU: 2GHz Intel™ Core™ Duo processor or equivalent.

Memory: 4 GB & above

Disk Space: 8 GB & above

(Endpoints) : 1.4 Ghz minimum(2.0 Ghz recommended) Intel Pentium or equivalent 1.0 GB minimum (1.5GB recommended)

Disk Space: 800 MB and more

eScan Console can be accessed by using below browsers:
• Internet Explorer 7 / 8 / 9 / 10
• Firefox 14 & above
• Google Chrome latest version

 

For Linux

(Linux Endpoints) Platform Supported:
• RHEL 4 & above (32 & 64 bit )
• CentOS 5.10 & above (32 & 64 bit)
• SLES 10 SP3 & above (32 & 64 bit)
• Debian 4.0 & above (32 & 64 bit)
• openSuSe 10.1 & above ( 32 & 64 bit )
• Fedora 5.0 & above ( 32 & 64 bit )
• Ubuntu 6.06 & above ( 32 & 64 bit )

Hardware Requirements (Endpoints):
CPU: Intel® Pentium or compatible or equivalent.

Memory: 512 MB and above

Disk Space: 500 MB free hard drive space for installation of the application and storage of temporary files

 

For Mac

(Mac Endpoints) Platforms Supported:
• Mac OS X 10.9 - Mavericks
• Mac OS X 10.8 - Mountain Lion
• Mac OS X 10.7 - Lion
• Mac OS X 10.6 – Snow Leopard

Hardware Requirements (Endpoints):
CPU: Intel based Macintosh.

Memory: 1 GB and More recommended

Disk Space: 500 MB and above

 

For Android

(Android Endpoints) Platforms Supported: Android Version 2.2 & above 

Minimum Disk Space: 2.1 MB 

Others: Internet connection 

 

UP

 

 

Home