Quick Heal Endpoint Security 5.3
Managing Endpoint Security for Complex Next-Gen Networks made Simple.
All new and intuitive web based user interface simplifies security management from a single console.
- Award winning Quick Heal client protection prevents malicious threats from entering endpoints.
- Integrated multi-layered approach for securing applications and organizational data.
- Available in Total and Business flavors.
Enhanced Graphical Dashboard
Advanced Graphical Dashboard gives immediate status of health of endpoints and highlights critical security situations that need immediate attention.
Easy deployment and maintenance
Multiple methods of deploying clients. Deployment methods include:
Synchronization with Active Directory - Easy and hassle free deployment with full active directory integration and synchronization support.
Disk Imaging – Creation of a disk image of Endpoint Security 5.3 client and deployment of it across the network.
Remote install – Installation via remote access of web console on any system in the network.
Login script setup – Assigning login script for installation.
Client Packager –Creation of client installer for manual set up.
Notify Install –Installation via email notification (containing URL) for endpoint client installation.
Advanced defense blocks malicious network activity and attempts to exploit software vulnerabilities of applications. Port scan attack prevention blocks intruder attempts aimed at open ports. DDOS attack prevention thwarts any Distributed Denial of Service attacks (DDOS) that might result in a Denial of Service (DOS).
Blocks unauthorized access to business network. Allows customization rules to be set to either low, medium or high based on observed network traffic. Admin can also configure exceptions for specific IP addresses or ports to be allowed or blocked.
Blocks malware infected, phishing and malicious websites.
Allows blocking particular categories of websites (e.g. Social Networking, Games, etc.) or user-specified websites to limit web access and increase productivity.
Categories of applications can be either authorized or unauthorized from being executed in the network. This feature also gives the flexibility to add custom applications to existing blocked list.
Storage Device Control*
Prevents threats from the use of unauthorized devices and media (DVDs, CDs and USB devices). Allows policies to be set to give read only or complete access to USB devices and block DVDs/CDs. This robust feature also prevents data leak by making USB devices accessible only on systems within the organization's network.
This feature allows virus and malware scan of all networked computers from a central location. The scans can also be scheduled at a specific time.
Networked computers can be updated from a central location. Endpoints can also be configured to take updates at a specified time.
Group Policy Management
Different user groups can be defined and policies can be set accordingly.
Effectively scans your end-user inboxes for spam, phishing attacks and unsolicited e-mail messages. Allows White/black lists and self-learning to be set up separately for each user or group.
Multiple Update Managers
This feature allows deployment of multiple update managers across the network. This helps in load balancing and in avoiding network congestion that usually happens when there is a single update manager.
Email and SMS Notifications
This feature allows notifications to be sent to configured email addresses and numbers alerting them of critical network events.
This feature helps to improve the performance of computer systems by cleaning junk and invalid registry/disk entries. Tuneups can be carried out for all endpoints from the Endpoint Security Server. It can also be scheduled at a specific time and date.
Provides a range of graphical and tabular reports, which can also be exported and saved in a variety of formats (e.g. PDF, CSV). Reporting can be scheduled according to the requirements.
This feature scans known vulnerabilities of installed applications and operating systems in the network. It helps frame security measures against known vulnerabilities and protect against security breaches by threat agents.
Scans vulnerabilities in applications such as Adobe, Safari, Mozilla, Oracle, etc.
Notifies regarding unpatched operating systems of computers in the network.