Quick Heal Endpoint Security 5.3

Quick Heal Endpoint Security 5.3
Product Code: Quick Heal Endpoint Security 5.3
Availability: In Stock

Managing Endpoint Security for Complex Next-Gen Networks made Simple.

All new and intuitive web based user interface simplifies security management from a single console.

  • Award winning Quick Heal client protection prevents malicious threats from entering endpoints.
  • Integrated multi-layered approach for securing applications and organizational data.
  • Available in Total and Business flavors.

Enhanced Graphical Dashboard

Advanced Graphical Dashboard gives immediate status of health of endpoints and highlights critical security situations that need immediate attention.

Easy deployment and maintenance

Multiple methods of deploying clients. Deployment methods include:

Synchronization with Active Directory - Easy and hassle free deployment with full active directory integration and synchronization support.

Disk Imaging – Creation of a disk image of Endpoint Security 5.3 client and deployment of it across the network.

Remote install – Installation via remote access of web console on any system in the network.

Login script setup – Assigning login script for installation.

Client Packager –Creation of client installer for manual set up.

Notify Install –Installation via email notification (containing URL) for endpoint client installation.

IDS/IPS

Advanced defense blocks malicious network activity and attempts to exploit software vulnerabilities of applications. Port scan attack prevention blocks intruder attempts aimed at open ports. DDOS attack prevention thwarts any Distributed Denial of Service attacks (DDOS) that might result in a Denial of Service (DOS).

Intelligent Firewall

Blocks unauthorized access to business network. Allows customization rules to be set to either low, medium or high based on observed network traffic. Admin can also configure exceptions for specific IP addresses or ports to be allowed or blocked.

Web Security

Blocks malware infected, phishing and malicious websites.

Web Filtering*

Allows blocking particular categories of websites (e.g. Social Networking, Games, etc.) or user-specified websites to limit web access and increase productivity.

Application Control*

Categories of applications can be either authorized or unauthorized from being executed in the network. This feature also gives the flexibility to add custom applications to existing blocked list.

Storage Device Control*

Prevents threats from the use of unauthorized devices and media (DVDs, CDs and USB devices). Allows policies to be set to give read only or complete access to USB devices and block DVDs/CDs. This robust feature also prevents data leak by making USB devices accessible only on systems within the organization's network.

Scan

This feature allows virus and malware scan of all networked computers from a central location. The scans can also be scheduled at a specific time.

Update

Networked computers can be updated from a central location. Endpoints can also be configured to take updates at a specified time.

Group Policy Management

Different user groups can be defined and policies can be set accordingly.

Email Scan*

Effectively scans your end-user inboxes for spam, phishing attacks and unsolicited e-mail messages. Allows White/black lists and self-learning to be set up separately for each user or group.

Multiple Update Managers

This feature allows deployment of multiple update managers across the network. This helps in load balancing and in avoiding network congestion that usually happens when there is a single update manager.

Email and SMS Notifications

This feature allows notifications to be sent to configured email addresses and numbers alerting them of critical network events.

Tuneup*

This feature helps to improve the performance of computer systems by cleaning junk and invalid registry/disk entries. Tuneups can be carried out for all endpoints from the Endpoint Security Server. It can also be scheduled at a specific time and date.

Reports

Provides a range of graphical and tabular reports, which can also be exported and saved in a variety of formats (e.g. PDF, CSV). Reporting can be scheduled according to the requirements.

Vulnerability Scan

This feature scans known vulnerabilities of installed applications and operating systems in the network. It helps frame security measures against known vulnerabilities and protect against security breaches by threat agents.

Scans vulnerabilities in applications such as Adobe, Safari, Mozilla, Oracle, etc.

Notifies regarding unpatched operating systems of computers in the network.