We use cookies to make your experience better.
To comply with the new e-Privacy directive, you agree to the privacy policy and our use of cookies.
SEQRITE Endpoint Protection Cloud Standard
SKU
CU1LS51TO100
£38.81
£32.34
In stock
Endpoint Protection Cloud Standard, 51 - 100, 3 Years
- Centralized Management from a Single Console
- Real-Time Updates and Patching
- Improved Threat Detection and Response
- Reduced Infrastructure Costs
- No Hassle Scalability
- Secure Access from Anywhere, Any-time
- Quick Deployment and Configuration
- Seamless Integration with Cloud Ecosystem
Category: Antivirus Security Software
Type | Security management |
---|---|
SKU | CU1LS51TO100 |
Manufacturer | Seqrite |
Availability | Y |
Power Your Endpoint Protection with Cloud-based Security
Helps businesses accelerate digital transformation, eliminate complexity, and provide fool-proof security against the most advanced threats.
Integrated with Seqrite Centralized Security Management
Seqrite Endpoint Protection Cloud is seamlessly integrated with our centralized security management platform, offering businesses a real-time overview of their overall security posture.
Simplify
Simplify multiple point products security management from one consol
Consolidate
Streamline alerts and correlate data to make sensible deductions
Analyze
Gain real-time insights to make data-driven decisions
Act
Insights are designed for actual threat reduction and automate remediation actions
BitLocker Encryption Management for Data Security
Allows central management of BitLocker encryption policies, keys, and recovery options, ensuring robust data security and compliance with regulatory requirements.
Patch Management
Centralized patch management solution to patch vulnerabilities of Microsoft and non-Microsoft applications.
Application Control Safelist/Blocklist
Restricts application access based on Zero Trust methodology. Allows defining application permissions depending on the Operating System, including default OS and Seqrite applications. Offers a ‘Monitoring Only’ mode to record application access for administrative viewing without blocking it.
Google & YouTube Access Controller
Blocks Personal and allows Corporate Google Access based on the administrator’s chosen account domains. Blocks YouTube Videos depending on the Content Category, Publisher Name, etc.
File Sandboxing
Integrates with Seqrite Cloud Sandbox, that helps to detect malware in suspicious files. No reason to buy, manage, or configure hardware or software for Malware Analysis, just upload malicious content to Seqrite Cloud Sandbox to see the value immediately.
Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints.
Migration from v7.6
Facilitates migration of Endpoints, Users, Groups, and Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints.
Vulnerability Scan
By scanning known vulnerabilities of applications and operating systems, this feature allows users to update necessary security patches.
3rd Party App Remover
Seqrite Endpoint Protection Agent installation ensures effortless migration to Seqrite Endpoint Protection by removing earlier AVs on endpoints, thereby reducing the unprotected time duration.
Active Directory Integration
Seqrite Active Directory Tool helps you do a bulk installation of Seqrite clients within your domain network by Active Directory Integration.
Endpoint Antivirus
Offers malware protection verified by leading certification organisations.
Anti Ransomware
Protects your data from ransomware attacks and automatically takes the backup of files.
IDS/IPS
Detects malicious network activities to exploit application vulnerabilities and blocks intruder attempts.
Firewall
Monitors inbound and outbound network traffic based on rules.
Phishing Protection
Blocks phishing sites that try to steal your security passwords and other confidential details about your organisation.
Web Filtering
Blocks sites as per its categories. Our tool allows you to stop users from spying at certain URLs by averting their browsers from loading pages from suspicious websites.
Browsing Protection
Our comprehensive endpoint protection cloud system blocks malicious sites.
Advanced Device Control
Enforces policies regarding the use of storage devices, mobile and portable devices, wireless devices, network interfaces connected to endpoints.
Data Loss Prevention
Prevents data loss by monitoring confidential and user defined data shared through removable devices, network or various applications.
Asset Management
Gives total visibility of hardware and software running on endpoints, helps to track software/hardware changes on endpoints.
Tune-up
Helps clean junk files and delete invalid registry/disk entries to improve performance of endpoints
Cloud Based Administration
Cloud based administration with graphical dashboard, group and policy management, email notification, easy deployment
Group Policy Management
Administrators can define user groups based on the hierarchy within the organization and set flexible policies as per situational requirements.
Scheduled Internet Access
Schedules time-based internet access
Helps businesses accelerate digital transformation, eliminate complexity, and provide fool-proof security against the most advanced threats.
Integrated with Seqrite Centralized Security Management
Seqrite Endpoint Protection Cloud is seamlessly integrated with our centralized security management platform, offering businesses a real-time overview of their overall security posture.
Simplify
Simplify multiple point products security management from one consol
Consolidate
Streamline alerts and correlate data to make sensible deductions
Analyze
Gain real-time insights to make data-driven decisions
Act
Insights are designed for actual threat reduction and automate remediation actions
BitLocker Encryption Management for Data Security
Allows central management of BitLocker encryption policies, keys, and recovery options, ensuring robust data security and compliance with regulatory requirements.
Patch Management
Centralized patch management solution to patch vulnerabilities of Microsoft and non-Microsoft applications.
Application Control Safelist/Blocklist
Restricts application access based on Zero Trust methodology. Allows defining application permissions depending on the Operating System, including default OS and Seqrite applications. Offers a ‘Monitoring Only’ mode to record application access for administrative viewing without blocking it.
Google & YouTube Access Controller
Blocks Personal and allows Corporate Google Access based on the administrator’s chosen account domains. Blocks YouTube Videos depending on the Content Category, Publisher Name, etc.
File Sandboxing
Integrates with Seqrite Cloud Sandbox, that helps to detect malware in suspicious files. No reason to buy, manage, or configure hardware or software for Malware Analysis, just upload malicious content to Seqrite Cloud Sandbox to see the value immediately.
Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints.
Migration from v7.6
Facilitates migration of Endpoints, Users, Groups, and Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints.
Vulnerability Scan
By scanning known vulnerabilities of applications and operating systems, this feature allows users to update necessary security patches.
3rd Party App Remover
Seqrite Endpoint Protection Agent installation ensures effortless migration to Seqrite Endpoint Protection by removing earlier AVs on endpoints, thereby reducing the unprotected time duration.
Active Directory Integration
Seqrite Active Directory Tool helps you do a bulk installation of Seqrite clients within your domain network by Active Directory Integration.
Endpoint Antivirus
Offers malware protection verified by leading certification organisations.
Anti Ransomware
Protects your data from ransomware attacks and automatically takes the backup of files.
IDS/IPS
Detects malicious network activities to exploit application vulnerabilities and blocks intruder attempts.
Firewall
Monitors inbound and outbound network traffic based on rules.
Phishing Protection
Blocks phishing sites that try to steal your security passwords and other confidential details about your organisation.
Web Filtering
Blocks sites as per its categories. Our tool allows you to stop users from spying at certain URLs by averting their browsers from loading pages from suspicious websites.
Browsing Protection
Our comprehensive endpoint protection cloud system blocks malicious sites.
Advanced Device Control
Enforces policies regarding the use of storage devices, mobile and portable devices, wireless devices, network interfaces connected to endpoints.
Data Loss Prevention
Prevents data loss by monitoring confidential and user defined data shared through removable devices, network or various applications.
Asset Management
Gives total visibility of hardware and software running on endpoints, helps to track software/hardware changes on endpoints.
Tune-up
Helps clean junk files and delete invalid registry/disk entries to improve performance of endpoints
Cloud Based Administration
Cloud based administration with graphical dashboard, group and policy management, email notification, easy deployment
Group Policy Management
Administrators can define user groups based on the hierarchy within the organization and set flexible policies as per situational requirements.
Scheduled Internet Access
Schedules time-based internet access
License | |
---|---|
Type | Security management |
License quantity | 51 - 100 license(s) |
License type | Base |
Software type | License |
License term in years | 3 year(s) |
Features | |
---|---|
Distribution type | Download |
Type | Security management |
System requirements | |
Minimum storage drive space | 3200 MB |
Minimum RAM | 1024 MB |
Minimum processor | 1 GHz 32-bit (x86) or 64-bit (x64), Intel core or Apple’s M1, M2, M3 |
Minimum processor speed | 1000 MHz |
Windows operating systems supported | Windows 10, Windows 10 Education, Windows 10 Education x64, Windows 10 Enterprise, Windows 10 Enterprise x64, Windows 10 Home, Windows 10 Home x64, Windows 10 Pro, Windows 10 Pro x64, Windows 10 x64, Windows 11, Windows 11 Enterprise x64, Windows 11 x64, Windows 7 Enterprise, Windows 7 Enterprise x64, Windows 7 Home Basic, Windows 7 Home Basic x64, Windows 7 Home Premium, Windows 7 Home Premium x64, Windows 7 Professional, Windows 7 Professional x64, Windows 7 Ultimate, Windows 7 Ultimate x64, Windows 8.1, Windows 8.1 Enterprise, Windows 8.1 Enterprise x64, Windows 8.1 Pro, Windows 8.1 Pro x64, Windows 8.1 x64 |
Mac operating systems supported | Mac OS X 10.12 Sierra, Mac OS X 10.13 High Sierra, Mac OS X 10.14 Mojave, Mac OS X 10.15 Catalina, Mac OS X 11.0 Big Sur, Mac OS X 12.0 Monterey, Mac OS X 13.0 Ventura, Mac OS X 14.0 Sonoma |
Linux operating systems supported | Debian 10, Fedora 32, SUSE Linux Enterprise Desktop 15, SuSE Linux 12.0, Ubuntu 14.04, Ubuntu 16.04, Ubuntu 22.04 |
Server operating systems supported | Windows SBS 2011 Essentials, Windows SBS 2011 Standard, Windows Server 2008 R2 x64, Windows Server 2012, Windows Server 2012 R2 x64, Windows Server 2016, Windows Server 2019, Windows Server 2022 |
Recommended RAM | 2048 MB |
Recommended processor | 2 GHz 32-bit (x86) or 64-bit (x64) |
Minimum system requirements | Internet Explorer 7+, TLS 1.2 |
You may also be interested in
Product |
![]() New
SEQRITE Endpoint Protection Cloud Stan...
£38.81
£32.34
|
![]()
£43.40
£36.17
|
![]()
£39.61
£33.01
|
![]() Recommended
McAfee MTP00UNR3RDD security software...
£36.08
£30.07
|
![]()
£39.98
£33.32
|
![]() Popular
Lenovo 4ZN0K81422 security software Se...
£41.68
£34.73
|
---|---|---|---|---|---|---|
SKU |
CU1LS51TO100
|
FP-AMP-1Y-S2
|
MTP00UNRXRDD
|
MTP00UNR3RDD
|
L-CESP-AT200-1Y-S1
|
4ZN0K81422
|
Description |
Power Your Endpoint Protection with Cloud-based Security
Helps businesses accelerate digital transformation, eliminate complexity, and provide fool-proof security against the most advanced threats. Integrated with Seqrite Centralized Security Management Seqrite Endpoint Protection Cloud is seamlessly integrated with our centralized security management platform, offering businesses a real-time overview of their overall security posture. Simplify Simplify multiple point products security management from one consol Consolidate Streamline alerts and correlate data to make sensible deductions Analyze Gain real-time insights to make data-driven decisions Act Insights are designed for actual threat reduction and automate remediation actions BitLocker Encryption Management for Data Security Allows central management of BitLocker encryption policies, keys, and recovery options, ensuring robust data security and compliance with regulatory requirements. Patch Management Centralized patch management solution to patch vulnerabilities of Microsoft and non-Microsoft applications. Application Control Safelist/Blocklist Restricts application access based on Zero Trust methodology. Allows defining application permissions depending on the Operating System, including default OS and Seqrite applications. Offers a ‘Monitoring Only’ mode to record application access for administrative viewing without blocking it. Google & YouTube Access Controller Blocks Personal and allows Corporate Google Access based on the administrator’s chosen account domains. Blocks YouTube Videos depending on the Content Category, Publisher Name, etc. File Sandboxing Integrates with Seqrite Cloud Sandbox, that helps to detect malware in suspicious files. No reason to buy, manage, or configure hardware or software for Malware Analysis, just upload malicious content to Seqrite Cloud Sandbox to see the value immediately. Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints. Migration from v7.6 Facilitates migration of Endpoints, Users, Groups, and Policies to the new Seqrite Endpoint Protection server setup. It also allows migration in batches/groups of endpoints. Vulnerability Scan By scanning known vulnerabilities of applications and operating systems, this feature allows users to update necessary security patches. 3rd Party App Remover Seqrite Endpoint Protection Agent installation ensures effortless migration to Seqrite Endpoint Protection by removing earlier AVs on endpoints, thereby reducing the unprotected time duration. Active Directory Integration Seqrite Active Directory Tool helps you do a bulk installation of Seqrite clients within your domain network by Active Directory Integration. Endpoint Antivirus Offers malware protection verified by leading certification organisations. Anti Ransomware Protects your data from ransomware attacks and automatically takes the backup of files. IDS/IPS Detects malicious network activities to exploit application vulnerabilities and blocks intruder attempts. Firewall Monitors inbound and outbound network traffic based on rules. Phishing Protection Blocks phishing sites that try to steal your security passwords and other confidential details about your organisation. Web Filtering Blocks sites as per its categories. Our tool allows you to stop users from spying at certain URLs by averting their browsers from loading pages from suspicious websites. Browsing Protection Our comprehensive endpoint protection cloud system blocks malicious sites. Advanced Device Control Enforces policies regarding the use of storage devices, mobile and portable devices, wireless devices, network interfaces connected to endpoints. Data Loss Prevention Prevents data loss by monitoring confidential and user defined data shared through removable devices, network or various applications. Asset Management Gives total visibility of hardware and software running on endpoints, helps to track software/hardware changes on endpoints. Tune-up Helps clean junk files and delete invalid registry/disk entries to improve performance of endpoints Cloud Based Administration Cloud based administration with graphical dashboard, group and policy management, email notification, easy deployment Group Policy Management Administrators can define user groups based on the hierarchy within the organization and set flexible policies as per situational requirements. Scheduled Internet Access Schedules time-based internet access |
Organizations today are under the constant threat of cyber attack, and security breaches happen every day. Cisco Advanced Malware Protection (AMP) for Endpoints is a cloud-managed endpoint security solution that provides the visibility, context and control to not only prevent cyber attacks, but also rapidly detect, contain, and remediate advanced threats if they evade front-line defenses and get inside—all cost-effectively, without affecting operational efficiency, and before damage can be done.
AMP for Endpoints prevents attacks by providing the latest global threat intelligence to strengthen defenses, a built-in antivirus (AV) engine to detect and block attacks at point-of-entry, built-in sandboxing technology to analyze unknown files, and proactive protection capabilities that close attack pathways and minimize vulnerabilities. But if malware evades these prevention measures and gets inside, AMP for Endpoints continuously monitors and records all file activity to quickly detect malicious behavior, retrospectively alert security teams, and then provide deep visibility and a detailed recorded history of the malware’s behavior over time—where it came from, where it’s been, and what it’s doing. AMP can then automatically contain and remediate the threat. AMP protects endpoints—like laptops, workstations, servers, and mobile devices—running Windows, Mac OS, Linux, Android and iOS. Understand AMP for Endpoints in 5 minutes. - Protection that goes beyond prevention: Cisco AMP for Endpoints goes beyond just preventing attacks. It analyzes files and traffic continuously. This capability helps enable retrospective security. You can look back in time and trace processes, file activities, and communications to understand the full extent of an infection, establish root causes, and perform remediation. The result: more effective, efficient, and pervasive protection for your organization. - Monitoring that enables unmatched visibility: Cisco AMP for Endpoints offers more than retrospection. It introduces a new level of intelligence, linking and correlating various forms of retrospection into a lineage of activity available for analysis in real time. It can then look for patterns of malicious behavior from an individual endpoint or across the environment of endpoints. - Advanced analysis that looks at behaviors over time: Cisco AMP for Endpoints provides automation through advanced behavioral detection capabilities that deliver a prioritized and collated view of top areas of compromise and risk. - Investigation that turns the hunted into the hunter: Cisco AMP for Endpoints shifts activity from looking for facts and clues as part of an investigation to a focused hunt for breaches based on actual events like malware detections and behavioral indications of compromise (IoCs). - Containment that is truly simple: Cisco AMP for Endpoints provides visibility into the chain of events and context that complements its dashboards and trajectory views. AMP provides the ability to target specific applications, files, malware, and other root causes. Breaking the attack chain is not only quick but also easy. - Dashboards that are actionable and contextual: Reports are not limited to event enumeration and aggregation. Cisco AMP for Endpoints’ actionable dashboards allow for streamlined management and faster response. (see Figure 1) - Integrated platforms that work better together: Cisco AMP for Endpoints can be fully integrated with the Cisco AMP for Networks solution, and other AMP deployments, to further increase visibility and control across your organization. |
It’s more than just antivirus software—it’s peace of mind
Defend yourself and the entire family against the latest virus, malware, spyware and ransomware attacks while staying on top of your privacy and identity. Comprehensive internet security McAfee Total Protection goes beyond our award-winning antivirus to provide a wide array of protections to help secure your devices, privacy and identity. Multi-faceted privacy protection Gain the upper hand against digital identity thieves by protecting or shredding sensitive files, deleting cookies, and more. On-the-go Secure Wi-Fi Keep your browsing habits and data safe from prying eyes when connected to public Wi-Fi. Beyond just antivirus Among our McAfee security solutions, McAfee Total Protection stands tall with its combination of antivirus, privacy and identity tools and features. Defend yourself against the latest virus, malware, ransomware and spyware attacks, while keeping your identity and privacy close and personal. And now, when you’re enrolled in auto-renewal**, you’ll gain access to our secure VPN, which provides bank-grade encryption to keep your personal information and online habits protected. Try out McAfee Total Protection for free Take us for a test drive with a free 30-day trial to run antivirus scans, remove threats and discover how we can protect your PC better than other security products. No credit card is required and you’ll be able to protect up to ten devices, whether they’re running Windows, Mac OS, iOS or Android. Download our free antivirus software trial and enjoy protection from viruses, ransomware, and other threats, all without compromising your devices’ performance. Multi-device protection for your modern connected family With all the Windows PCs, Macs, tablets and smartphones that help power your family’s day-to-day, it’s hard enough to keep track of their devices, much less protect them. With a single McAfee Total Protection subscription, you can protect five or ten devices without skipping a beat and most importantly, without slowing the family down Identity Theft Protection Included when you’re enrolled in auto-renewal**, McAfee® ID Theft Protection Essentials helps you stay ahead of fraud with Dark Web monitoring to check if your personal info may be at risk, SSN Trace to alert you to potential synthetic identity fraud, access to 24/7/365 dedicated identity agents and more.‡ Antivirus for a PC We recommend using a comprehensive antivirus solution to protect your Windows PCs. Although Windows Defender is built into Windows 10, its anti-malware capabilities may not be sufficient to combat ever-evolving threats. McAfee Total Protection goes beyond antivirus with tools to protect against threats like malicious web pages, phishing and much more. |
It’s more than just antivirus software—it’s peace of mind
Defend yourself and the entire family against the latest virus, malware, spyware and ransomware attacks while staying on top of your privacy and identity. Comprehensive internet security McAfee Total Protection goes beyond our award-winning antivirus to provide a wide array of protections to help secure your devices, privacy and identity. Multi-faceted privacy protection Gain the upper hand against digital identity thieves by protecting or shredding sensitive files, deleting cookies, and more. On-the-go Secure Wi-Fi Keep your browsing habits and data safe from prying eyes when connected to public Wi-Fi. Beyond just antivirus Among our McAfee security solutions, McAfee Total Protection stands tall with its combination of antivirus, privacy and identity tools and features. Defend yourself against the latest virus, malware, ransomware and spyware attacks, while keeping your identity and privacy close and personal. And now, when you’re enrolled in auto-renewal**, you’ll gain access to our secure VPN, which provides bank-grade encryption to keep your personal information and online habits protected. Try out McAfee Total Protection for free Take us for a test drive with a free 30-day trial to run antivirus scans, remove threats and discover how we can protect your PC better than other security products. No credit card is required and you’ll be able to protect up to ten devices, whether they’re running Windows, Mac OS, iOS or Android. Download our free antivirus software trial and enjoy protection from viruses, ransomware, and other threats, all without compromising your devices’ performance. Multi-device protection for your modern connected family With all the Windows PCs, Macs, tablets and smartphones that help power your family’s day-to-day, it’s hard enough to keep track of their devices, much less protect them. With a single McAfee Total Protection subscription, you can protect five or ten devices without skipping a beat and most importantly, without slowing the family down Identity Theft Protection Included when you’re enrolled in auto-renewal**, McAfee® ID Theft Protection Essentials helps you stay ahead of fraud with Dark Web monitoring to check if your personal info may be at risk, SSN Trace to alert you to potential synthetic identity fraud, access to 24/7/365 dedicated identity agents and more.‡ Antivirus for a PC We recommend using a comprehensive antivirus solution to protect your Windows PCs. Although Windows Defender is built into Windows 10, its anti-malware capabilities may not be sufficient to combat ever-evolving threats. McAfee Total Protection goes beyond antivirus with tools to protect against threats like malicious web pages, phishing and much more. |
Advanced email security protection
Attackers rely primarily on email to distribute spam, malware, and other threats. To prevent breaches, you need a powerful email security solution. Cisco Email Security is your defense against phishing, business email compromise, and ransomware. Get threat intelligence updates every three to five minutes through Cisco Talos for the most up-to-date protection. Cisco Advanced Malware Protection protects against stealthy malware in attachments, and industry-leading URL intelligence combats malicious links. Cisco Email Security also enhances Office 365 email security. Protecting outgoing email is important too. Cisco Email Security has robust data loss prevention and content encryption capabilities to safeguard sensitive information. This helps you comply with government and industry regulations. |
Lenovo 4ZN0K81422. License term in years: 3 year(s), Software type: License
|
Short Description |
Endpoint Protection Cloud Standard, 51 - 100, 3 Years
|
Advanced Malware Protection 1YR, 100-499 Nodes
|
McAfee Total Protection Digital Download for 10 Devices - One Time Purchase, 1 Y
|
Digital Download for 3 Devices - One Time Purchase, 1Y
|
Cloud Email Security Advanced Malware Protection, Threat Grid - Premium File Analysis, 200 Files Per Day, 1Y, 100-199 Users
|
Lenovo 4ZN0K81422, 3 year(s)
|
Manufacturer |
Seqrite
|
Cisco
|
McAfee
|
McAfee
|
Cisco
|
Lenovo
|
Please complete your information below to login.
Sign In
Create New Account