Home and Small Office
Small & Medium Business
Corporate / Enterprises
Write Review View Review
NOTE: Please enter a valid email address as a copy of download link will be sent
to the above email address.
NOTE: MicroWorld will not sell this email address to any third parties. The emails
sent by us will contain complete unsubscribe information, and you may opt-out of
receiving future emails at anytime.
Simplifies Security Management and Works Seamlessly with Other Anti-Virus!
With an aim to provide high-level security for businesses, organizations need a
proactive solution that can efficiently secure and manage the protection of the
server and endpoints. eScan Endpoint Security (with Hybrid Network Support) offers
cogent method in order to block access to unauthorized USB devices on managed endpoints
with Windows or Mac Operating system and restrict execution of unauthorized applications
on endpoints with Windows Operating system. It also provides comprehensive Software
and Hardware Asset Management for Windows, Mac, Linux or Android endpoints. This
helps to tackle your system in an efficient manner by providing total control over
Application and Device control on Windows, Mac as well as Android endpoints. It
is equipped with advanced Mobile Device Management system that provides highly advanced
features to manage and secure Android endpoints accessing corporate network.
Victor Mwewa- Kitwe City Council, Zambia
Amalesh- Computer Sourse, Bangladesh
William Fredericks - SMTS Surface Mining Training Solutions (Pty)
Ltd, South Africa
English and Japanese
Prevents Data theft, Productivity loss and Security violations.
Reduces Security Management costs through File Reputation Services, Asset Management,
Print activity, ADS integration and Support for VMware, SYSLOG, SNMP, NAC and NAP
Assists in monitoring devices that are connected to the system. Using the password
protection feature, unauthorized devices can be easily blocked.
Administrator can backup and restore SMSs and contacts from managed devices in the
The new Secure Web Interface uses SSL technology to encrypt all communications.
eScan’s summarized dashboard provides administrators the status of the managed endpoints
in graphical format such a deployment status, protection status, as well as protection
eScan’s Asset Management module provides the entire hardware configuration and list
of software installed on endpoints. This helps administrators to keep track of all
the hardware as well as software resources installed on all the endpoints connected
to the network.
With the help of eScan’s Client Live Updater, events related to eScan and security
status of all endpoints are captured logged and monitored on real-time as it displays
live events of USB and web access captured from managed endpoints. These events
can be filtered to retrieve required information ensuring total control over USB
and web access on endpoints. It also allows to export reports in excel format that
can further be used for audit compliance.
Mobile Device Management feature of eScan allows administrator to create different
groups for different location, add devices, move devices from one group to another
group, define rules / policies for setting Call and SMS Filter, Web Protection,
Anti-Theft, Password and Device Oriented policy.
eScan comprises of Print Activity module that efficiently monitors and logs printing
tasks done by all the managed endpoints. It provides you a detailed report in PDF,
Excel or HTML formats of all printing jobs done by managed endpoints through any
printer connected to any endpoint locally or to the network.
Note – Print Activity features are valid for endpoints with Windows
Operating system only.
Using One Time Password option, the administrator can enable or disable any eScan
module on any endpoint for a desired period of time. It restricts user access from
violating a group security policy deployed in a network.
Note – One Time Password features are valid for endpoints with
Windows Operating system only.
This allows administrator to deploy outbreak prevention policies during an outbreak that restricts access to network resources from selected computer groups for a defined period of time.
The outbreak prevention policies will be enforced on all the selected computers or groups. Incorrect configuration of these policy settings can cause major problems with the computers.
eScan Management Console monitors and logs the session activity of the managed computers. It will display a report of the endpoint startup/ shutdown/ logon/ log off/ remote session connects/ disconnects. With this report the administrator can trace the user Logon and Logoff activity along with remote sessions that took place on all managed computers.
With the help of Active Directory synchronization, the administrator can synchronize eScan Centralized Console groups with Active Directory containers.
New computers and containers discovered in Active Directory are copied into eScan Centralized Console automatically and the notification of the same can be sent to the system administrator. Administrator can also choose to Auto Install or Protect discovered Windows workstations automatically.
Policy deployment can be made easy through policy templates; this will allow the administrator to create policy templates and deploy it to the desired managed groups.
It helps in monitoring USB devices that are connected to Windows or Mac endpoints
in the network. On Windows endpoints administrators can allow or block access to
USB devices. Unauthorized access to USB devices can be blocked using password protection
thus preventing data leakage.
It allows you to block / whitelist and define time restrictions for allowing or
blocking execution of applications on Windows endpoints. It helps in accessing only
the whitelisted applications, while all other third-party applications are blocked.
On Android by default, all downloaded applications are blocked and are whitelisted
only by entering password.
eScan comes with an advanced Web Protection feature that allows administrators to
define the list of websites to be blocked or whitelisted on endpoints connected
to the network where eScan is installed. For Windows endpoints, eScan also provides
the facility for time-based access restriction.
eScan comprises of Privacy Advisor that provides you the complete list of application
using device permissions in a classified format. This helps you to keep a check
on the security level of all applications installed.
eScan helps you in data blocking, data wiping, SIM watching, and locating your Android-based
device through GPS finder. With its Anti-Theft feature, eScan ensures complete protection
to your Android from any unauthorized access on the event, if your device is lost
eScan facilitates content filtering of calls and SMSs based on parameters set through
its Whitelist and Blacklist feature. A user can block calls and SMSs from specified
numbers based on specific phrases/words/keywords.
Windows Operating (Windows Server & Workstations) Platforms Supported
Microsoft® Windows® 2012 / SBS 2011 / Essential / 2008 R2/ 2008 / 2003 R2/ 2003 R2/ 2003/ Windows 10 / Windows 8.1 / Windows 8 / Windows 7 / Windows Vista / Windows XP SP 2 / Windows 2000 Service Pack 4 and Rollup pack 1 (For 32-Bit and 64-Bit Editions Only)
Hardware for Clients and Server (Server)
CPU: 2GHz Intel™ Core™ Duo processor or equivalent
Memory: 4 GB & above
Disk Space: 8 GB & above
CPU: 1.4 Ghz minimum (2.0 Ghz recommended) Intel Pentium or equivalent
Memory: 1 GB minimum (1.5GB recommended)
Disk space : 800 MB and more
eScan Console can be accessed by using below browsers:
Internet Explorer 7 / 8 / 9 / 10, Firefox 14 & above, Google Chrome latest version
(Linux Endpoints) Platform Supported:
RHEL 4 & above (32 & 64 bit), CentOS 5.10 & above (32 & 64 bit), SLES 10 SP3 & above
(32 & 64 bit), Debian 4.0 & above (32 & 64 bit), openSuSe 10.1 & above (32 & 64
bit), Fedora 5.0 & above (32 & 64 bit), Ubuntu 6.06 & above (32 & 64 bit)
Hardware Requirements (Endpoints) :
CPU: Intel® Pentium or compatible or equivalent.
Memory: 512 MB and above
Disk Space: 500 MB free hard drive space for installation of the application and
storage of temporary files
(Mac Endpoints) Platforms Supported:
Mac OS X Snow Leopard (10.6 or later), or Mac OS X Lion (10.7 or ater), or Mac OS X Mountain Lion (10.8 or later), or OS X Mavericks (10.9 or later), or OS X Yosemite (10.10 or later), or OS X El Capitan (10.11 or later).
Hardware Requirements (Endpoints):
CPU: Intel based Macintosh
Memory: 1 GB and More recommended
Disk Space: 500 MB and above
(Android Endpoints) Platforms Supported: Android Version 2.2 & above
Minimum Disk Space: 2.1 MB
Others: Internet connection