eScan Corporate 360 (with MDM & Hybrid Network Support)
Awards
eScan VB100 awardeScan AV Comparison AwardeScan AV Test Award

eScan Corporate 360 - v22
(with MDM & Hybrid Network Support)

Ultimate Security For All The Computers, Servers & Mobile Devices In Your Business Network

Today, employees access their corporate data via mobile devices. This has brought in a new set of security risk for organizations who will now have to protect the mobile devices in the network along with the virtual or physical desktops and servers. eScan provides solutions to all these issues with its new security software, eScan Corporate 360 (with MDM & Hybrid Network Support).

eScan Corporate 360 is a comprehensive Anti-Virus and Information Security Solution that allows you to manage risk and protect your critical infrastructure efficiently. Moreover, the new eScan Management Console (EMC) module includes a Secure Web Interface that facilitates dynamic security management of the server, endpoints and mobile devices in the corporate network. It is an excellent combination of advanced and futuristic technologies that ensures protection to Windows as well as Macintosh, Linux and Android-based devices and endpoints in the corporate network. eScan Corporate 360 also includes Mobile Device Management module which is specifically designed with an aim to facilitate administrator to remotely monitor, secure and manage all Android-based devices in the network.

Advanced Protection against Ransomware Threats

Customer Testimonials


* Varies from person to person

Language Versions


English, French, Russian, German and Japanese


Benefits

Ensures Business Continuity

Ensures Business Continuity

Prevents Malware Outbreaks, Data theft, Productivity loss and Security violations.

Reduces IT Costs

Reduces IT Costs

Reduces Security Management costs through File Reputation Services, Asset Management, Print activity, ADS integration and Support for VMware, SYSLOG, SNMP, NAC and NAP.

Prevents Spreading Of Malware Infection On Networks

Prevents Spreading Of Malware Infection On Networks

Informs administrator about outbreaks in the network in order to take immediate action.

Monitor Devices Connected Within The Network

Monitor Devices Connected Within The Network

Assists in monitoring devices that are connected to the system. Using the Password Protection feature, unauthorized devices can be easily blocked.

Manage Backup For Mobile Devices

Manage Backup For Mobile Devices

Facilitates administrator to backup and restore SMSs and contacts from managed devices.

Efficiently Scans And Analyzes All The Incoming & Outgoing Mails

Efficiently Scans And Analyzes All The Incoming and Outgoing Mails

Scans all emails in real-time for Viruses, Worms, Trojans, Spyware, Adware and hidden malicious content using powerful, heuristic driven Dual Anti-Virus engines.

Key Features - eScan Management Console

New Secure Web Interface with Summarized Dashboard

New Secure Web Interface with Summarized Dashboard

eScan’s New Secure Web Interface uses SSL technology to encrypt all communications. A summarized dashboard provides administrator the status of managed clients in graphical formats such as deployment status, protection status and protection statistics.

Asset Management

Asset Management

eScan’s Asset Management module provides the entire hardware configuration and list of software installed on endpoints. This helps administrators to keep track of all the hardware as well as software resources installed on all the endpoints connected to the network.

Role Based Administration

Role Based Administration

Role based administration through eScan Management Console enables the administrator to share the configuration and monitoring responsibilities of the organization among several administrators. Using this feature, pre-defined roles can be assigned to the administrators, each with own set of rights, permissions and groups.

Mobile Device Management

Mobile Device Management

eScan’s Mobile Device Management feature allows administrator to create different groups for different location, add devices, move devices from one group to another group, define rules / policies for Anti-Virus, setting Call and SMS Filter, Web Protection, Anti-Theft, Password and Device Oriented policy. It also allows administrator to create new task, start an existing task, create group task, defines task settings and schedule task at a desired period of time.

Client Live Updater

Client Live Updater

With the help of eScan’s Client Live Updater, events related to eScan and security status of all endpoints are captured and recorded / logged and can be monitored in real-time. Also, the events can be filtered to retrieve exact required information to closely watch security level on all managed endpoints on a real-time basis.

Outbreak Prevention

Outbreak Prevention

This allows administrator to deploy outbreak prevention policies during an outbreak that restricts access to network resources from selected computer groups for a defined period of time.
The outbreak prevention policies will be enforced on all the selected computers or groups. Incorrect configuration of these policy settings can cause major problems with the computers.

Active Directory Synchronization

Active Directory Synchronization

With the help of Active Directory synchronization, the administrator can synchronize eScan Centralized Console groups with Active Directory containers.
New computers and containers discovered in Active Directory are copied into eScan Centralized Console automatically and the notification of the same can be sent to the system administrator. Administrator can also choose to Auto Install or Protect discovered Windows workstations automatically.

Policy Templates

Policy Templates

Policy deployment can be made easy through policy templates; this will allow the administrator to create policy templates and deploy it to the desired managed groups.

Auto grouping

Auto grouping

The administrators can define the settings to automatically add clients under desired sub groups. The administrators will have to Add Groups and also add client criteria under these groups based on host / host name with wild card / IP address / IP range.

Key Features - eScan Endpoints (Windows)

Data Leak Prevention (DLP) - Attachment Control

Data Leak Prevention (DLP) - Attachment Control

eScan empowers enterprises to minimize the risk of data theft with its advanced features like Attachment Control and Device Control. Through Attachment control the admin can block/allow all attachments the user tries to send through specific processes as well as trusted websites that you define. It is a pay and use feature.

eBackup

eBackup

eScan allows you to take a backup of your files on a scheduled basis, and is stored in an encrypted and compressed file format. It takes backup of these extensions - doc, docx, ods, wps, wpd, pdf, xls, xlsx, csv, odp, one, pptx, ppt, ppsx, pps, rels, and many more. The backup will be taken on the drive with the largest free storage available. The backup can also to be taken on network drive which is a pay and use feature.

Print Activity

Print Activity Monitoring

eScan comprises of Print Activity module that efficiently monitors and logs printing tasks done by all the managed endpoints. It also provides a detailed report in PDF, Excel or HTML formats of all printing jobs done by managed endpoints through any printer connected to any computer locally or to the network.
Note – Print Activity features are valid for endpoints with Windows Operating system only.

Update Agent

Update Agent

The administrator can add computers as Update Agents. This will reduce the traffic between the eScan Corporate Server and the client. Update Agent will take the signature updates & policies from eScan Corporate Server and distribute the same to other managed computers in the group (Bandwidth is saved).

One-Time Password

One-Time Password

Using One-Time password option, the administrator can disable any eScan module on any client computer for a desired period of time. This helps to restrict user access from violating a security policy deployed in a network.
Note – One Time Password features are valid for endpoints with Windows Operating system only.

Session Activity Report

Session Activity Report

eScan Management Console monitors and logs the session activity of the managed computers. It will display a report of the endpoint startup/ shutdown/ logon/ log off/ remote session connects/ disconnects. With this report the administrator can trace the user Logon and Logoff activity along with remote sessions that took place on all managed computers.

PBAE

Proactive Behavioral Analysis Engine (PBAE)

Proactive Behavioral Analysis Engine provides real time protection for organizations and users against Ransomware attacks. It monitors the activity of all processes and blocks the one whose behavior matches to a Ransomware.

TSPM

Terminal Services Protection Module (TSPM)

Terminal Services Protection Module by eScan not just detects the brute force attempts but also heuristically identifies suspicious IP Addresses / Hosts. It blocks any attempts to access the system.

eBackup

Two-Factor Authentication (2FA)

eScan 2FA feature mandates user to enter a Time-based One-Time Password (TOTP) after entering eScan credentials. So, even if somebody knows users' eScan credentials, the 2FA feature secures data against unauthorized logins. Only administrator can enable/disable the 2FA feature for all the added users as well. It is a pay and use feature.

Remote Monitoring Management (RMM)

Remote Monitoring Management (RMM)

Remote monitoring and management (RMM) is a type of remote IT management software used by Managed IT Service Providers (MSPs) to remotely monitor client endpoints, networks, and computers. It is a pay and use feature.

Advanced Anti-Spam

Advanced Anti-Spam

eScan checks the content of outgoing and incoming mails as well as scans all the emails in real-time for Viruses, Worms, Trojans and hidden malicious content using powerful, heuristic driven Dual Anti-Virus engines. Thus, online threats are averted before they enter the network via emails.

Privacy Control

Privacy Control

Privacy control allows scheduling the auto erase of your cache, ActiveX, cookies, plugins and history. It also helps you to permanently delete files and folders without the fear of having them retrieved through the use of third-party applications, thus preventing misuse of data.

On Demand Scanning

On-Demand Scanning

Being very light on system resources, eScan facilitates faster scan of endpoints. This ensures that endpoint does not slow down, even while eScan is performing an On-demand scan of the files / directories that you access or copy onto your endpoint. It even allows you to select different files / folders, directories or running processes in your endpoint and scan them for viruses.

Data Encryption

Data Encryption

The Data Encryption module lets you protect sensitive and confidential data from unauthorized access and data leak. With this module, the user can create a Vault that stores data in encrypted format on the endpoints connected to the network

Key Features - eScan Endpoints (Hybrid OS)

Advanced Web Protection

Advanced Web Protection

eScan comes with an advanced Web Protection feature that allows administrators to define the list of websites to be blocked or whitelisted on endpoints connected to the network where eScan is installed. For Windows endpoints eScan also provides the facility for time-based access restriction.

Device Control

Device Control

It helps in monitoring USB devices that are connected to Windows or Mac endpoints in the network. On Windows endpoints, administrators can allow or block access to USB devices. Unauthorized access to USB devices can be blocked using password protection, thus preventing data leakage.

Application Control

Application Control

It allows you to block / whitelist as well as define time restriction for allowing or blocking execution of applications on Windows endpoints. It helps in accessing only the whitelisted applications, while all other third-party applications are blocked. On Android by default, all downloaded applications are blocked and are whitelisted only by entering password.

Enhanced Two-way Firewall

Enhanced Two-way Firewall

The two-way firewall with predefined rule sets will help you in putting up a restriction to incoming and outgoing traffic as well as hacking. It provides the facility to define the firewall settings as well as to define the IP range, permitted applications, trusted MAC addresses and local IP addresses.

Anti-Theft

Anti-Theft

eScan helps you in data blocking, data wiping, SIM watching and locating your Android-based device through GPS finder. With its Anti-Theft feature, eScan ensures complete protection to your Android from any unauthorized access on the event, if your device is lost or stolen.

Schedule scan

Schedule scan

eScan offers you an option for scheduled scanning, which will run seamlessly in the background without interrupting your current working environment. It performs scheduled scans for selected files / folders or the entire system for the scheduled period, thus providing you the best protection against cyber threats.

Windows OS and App Patch/Update Management

Windows OS and App Patch/Update Management

eScan's Patch Management Module auto-updates Windows OS security patch from Cloud or from EMC Console, on PC’s those are part of DMZ/Air-Gapped Networks. The module also reports patching availability for Critical Apps like Adobe, Java, etc.

Key Features - Mobile Device Management

MDM

Android

- Kiosk Mode / Privacy Advisor / Web Control
- Device-oriented policy / WiFi-App N/w blocking
- Fencing Locations and more

iOS

- Device Restriction Policy
- Web Clip, Email, WiFi Protection
- Content Library and more

LOAD MORE FEATURES

Other Highlights

  • State-of-the-art Anti-Malware with signature & behavior based protection.
  • Unified Console for Windows, Android, Mac and Linux
  • eScan Cloud Security
  • Set advanced security policies
  • Secure Web Interface
  • License Management
  • Send Message
  • Task deployment
  • Rescue Mode for Windows and Linux
  • File Reputation Services for Windows and Linux
  • Malware URL Filter
  • Sophisticated File Blocking and Folder Protection
  • Powerful Heuristic Scanning for Proactive Protection
  • Auto Back-up and Restore of Critical System files
  • Export and Import of Settings
  • Inbuilt eScan Remote Support
  • 24x7 FREE Online Technical Support through e-mail, Chat and Forums

*Note: Not all features are available on all platforms.

 

Will Your System Support This Software? You can find it here…

Operating Systems:

For Windows (Windows server & workstations) Platforms Supported

  • Microsoft® Windows® 2019 / 2016 / 2012 / SBS 2011 / Essential / 2008 R2 / 2008 / 2003 R2 / 2003 / 11 / 10 / 8.1 / 8 / 7 / Vista / XP SP 2 / 2000 Service Pack 4 and Rollup Pack 1 (For 32-Bit and 64-Bit Editions)

For Server

  • CPU: 3GHz Intel™ Core™ Duo processor or equivalent
  • Memory: 4 GB & above
  • Disk Space: 8 GB & above

For Endpoints (Windows):

  • CPU: 2.0 Ghz recommended Intel Pentium or equivalent
  • Memory: 1.0 GB and above
  • Disk Space (Free) – 1 GB and above

eScan Console can be accessed by using below browsers:

  • Google Chrome & all chromium-based browsers
  • Firefox 14 and above
  • Internet Explorer 9 and above

For Linux
(Linux Endpoints) Platform Supported:

  • RHEL 4 and above (32 and 64 bit) CentOS 5.10 and above (32 and 64 bit) SLES 10 SP3 and above (32 and 64 bit) Debian 4.0 and above (32 and 64 bit) openSuSe 10.1 and above (32 and 64 bit) Fedora 5.0 and above (32 and 64 bit) Ubuntu 6.06 and above (32 and 64 bit), Mint 12 and above (32 and 64 bit).

Hardware Requirements (Endpoints) :

  • CPU: Intel® Pentium or compatible or equivalent.
  • Memory: 1 GB and above
  • Disk Space: 1 GB free hard drive space for installation of the application and storage of temporary files

For Mac
(Mac Endpoints) Platforms Supported:

  • OS X Snow Leopard (10.6 or later), OS X Lion (10.7 or later), OS X Mountain Lion (10.8 or later ), OS X Mavericks (10.9 or later) OS X Yosemite (10.10 or later), OS X El Capitan (10.11 or later), macOS Sierra (10.12 or later), macOS High Sierra (10.13 or later), macOS Mojave (10.14 or later), macOS Catalina (10.15 or later).

Hardware Requirements (Endpoints):

  • CPU: Intel based Macintosh
  • Memory: 1 GB and More recommended
  • Disk Space: 1 GB and above

For Android
(Android Endpoints) Platforms Supported :

  • Operating System: Android 4.4 and above
  • Others: Internet Connection

iPhone & iPad
(iPhone & iPad Endpoints) Platforms Supported

  • Compatible OS: iOS 10.3 or later
  • Device Space: 40-50 MB space
  • Memory: 20-50 MB (varies by device)

Other:

  • 3G/4G (LTE) or Wi-Fi Internet
  • connection required for download.
Live Chat
Top