Home and Small Office
Small & Medium Business
Corporate / Enterprises
Write Review View Review
NOTE: Please enter a valid email address as a copy of download link will be sent
to the above email address.
NOTE: MicroWorld will not sell this email address to any third parties. The emails
sent by us will contain complete unsubscribe information, and you may opt-out of
receiving future emails at anytime.
Ultimate Security For All The Computers, Servers & Mobile Devices In Your Business
Today, employees access their corporate data via mobile devices. This has brought
in a new set of security risk for organizations who will now have to protect the
mobile devices in the network along with the virtual or physical desktops and servers.
eScan provides solutions to all these issues with its new security software, eScan
Corporate 360 (with MDM & Hybrid Network Support).
eScan Corporate 360 is a comprehensive Anti-Virus and Information Security Solution
that allows you to manage risk and protect your critical infrastructure efficiently.
Moreover, the new eScan Management Console (EMC) module includes a Secure Web Interface
that facilitates dynamic security management of the server, endpoints and Mobile
devices in the corporate network. It is an excellent combination of advanced and
futuristic technologies that ensures protection to Windows as well as Macintosh,
Linux and Android-based devices and endpoints in the corporate network. eScan Corporate
360 also includes Mobile Device Management module which is specifically designed
with an aim to facilitate administrator to remotely monitor, secure and manage all
Android-based devices in the network.
I am impressed with the eScan product and the response from the support group is
brilliant. When the license expires, I am very sure our institution will renew it.
Victor Mwewa- Kitwe City Council, Zambia
I like this product!
Amalesh- Computer Sourse, Bangladesh
William Fredericks - SMTS Surface Mining Training Solutions (Pty)
Ltd, South Africa
English, French, Russian, German and Japanese
Prevents Malware Outbreaks, Data theft, Productivity loss and Security violations.
Reduces Security Management costs through File Reputation Services, Asset Management,
Print activity, ADS integration and Support for VMware, SYSLOG, SNMP, NAC and NAP.
Informs administrator about outbreaks in the network in order to take immediate
Assists in monitoring devices that are connected to the system. Using the Password
Protection feature, unauthorized devices can be easily blocked.
Facilitates administrator to backup and restore SMSs and contacts from managed devices.
Scans all emails in real-time for Viruses, Worms, Trojans, Spyware, Adware and hidden
malicious content using powerful, heuristic driven Dual Anti-Virus engines.
eScan’s new Secure Web Interface uses SSL technology to encrypt all communications.
A summarized dashboard provides administrator the status of managed clients in graphical
formats such as deployment status, protection status and protection statistics.
eScan’s Asset Management module provides the entire hardware configuration and list
of software installed on endpoints. This helps administrators to keep track of all
the hardware as well as software resources installed on all the endpoints connected
to the network.
Role based administration through eScan Management Console enables the administrator
to share the configuration and monitoring responsibilities of the organization among
several administrators. Using this feature, pre-defined roles can be assigned to
the administrators, each with own set of rights, permissions and groups.
eScan’s Mobile Device Management feature allows administrator to create different
groups for different location, add devices, move devices from one group to another
group, define rules / policies for Anti-Virus, setting Call and SMS Filter, Web
Protection, Anti-Theft, Password and Device Oriented policy. It also allows administrator
to create new task, start an existing task, create group task, defines task settings
and schedule task at a desired period of time.
With the help of eScan’s Client Live Updater, events related to eScan and security
status of all endpoints are captured and recorded / logged and can be monitored
in real-time. Also, the events can be filtered to retrieve exact required information
to closely watch security level on all managed endpoints on a real-time basis.
This allows administrator to deploy outbreak prevention policies during an outbreak that restricts access to network resources from selected computer groups for a defined period of time.
The outbreak prevention policies will be enforced on all the selected computers or groups. Incorrect configuration of these policy settings can cause major problems with the computers.
eScan comprises of Print Activity module that efficiently monitors and logs printing
tasks done by all the managed endpoints. It also provides a detailed report in PDF,
Excel or HTML formats of all printing jobs done by managed endpoints through any
printer connected to any computer locally or to the network.
Note – Print Activity features are valid for endpoints with Windows Operating system
Using One Time password option, the administrator can disable any eScan module on
any client computer for a desired period of time. This helps to restrict user access
from violating a security policy deployed in a network.
Note – One Time Password features are valid for endpoints with Windows Operating
eScan Management Console monitors and logs the session activity of the managed computers. It will display a report of the endpoint startup/ shutdown/ logon/ log off/ remote session connects/ disconnects. With this report the administrator can trace the user Logon and Logoff activity along with remote sessions that took place on all managed computers.
With the help of Active Directory synchronization, the administrator can synchronize eScan Centralized Console groups with Active Directory containers.
New computers and containers discovered in Active Directory are copied into eScan Centralized Console automatically and the notification of the same can be sent to the system administrator. Administrator can also choose to Auto Install or Protect discovered Windows workstations automatically.
Policy deployment can be made easy through policy templates; this will allow the administrator to create policy templates and deploy it to the desired managed groups.
It helps in monitoring USB devices that are connected to Windows or Mac endpoints
in the network. On Windows endpoints, administrators can allow or block access to
USB devices. Unauthorized access to USB devices can be blocked using password protection,
thus preventing data leakage.
eScan sends notifications to administrator of the web-console when any data (which
is not read-only) on the client system’s hard disk is copied to the USB.
It allows you to block / whitelist as well as define time restriction for allowing
or blocking execution of applications on Windows endpoints. It helps in accessing
only the whitelisted applications, while all other third-party applications are
blocked. On Android by default, all downloaded applications are blocked and are
whitelisted only by entering password.
eScan checks the content of outgoing and incoming mails as well as scans all the
emails in real-time for Viruses, Worms, Trojans and hidden malicious content using
powerful, heuristic driven Dual Anti-Virus engines. Thus, online threats are averted
before they enter the network via emails.
The two-way firewall with predefined rule sets will help you in putting up a restriction
to incoming and outgoing traffic as well as hacking. It provides the facility to
define the firewall settings as well as to define the IP range, permitted applications,
trusted MAC addresses and local IP addresses.
Privacy control allows scheduling the auto erase of your cache, ActiveX, cookies,
plugins and history. It also helps you to permanently delete files and folders without
the fear of having them retrieved through the use of third-party applications, thus
preventing misuse of data.
eScan comes with an advanced Web Protection feature that allows administrators to
define the list of websites to be blocked or whitelisted on endpoints connected
to the network where eScan is installed. For Windows endpoints eScan also provides
the facility for time-based access restriction.
Being very light on system resources, eScan facilitates faster scan of endpoints.
This ensures that endpoint does not slow down, even while eScan is performing an
On-demand scan of the files / directories that you access or copy onto your endpoint.
It even allows you to select different files / folders, directories or running processes
in your endpoint and scan them for viruses.
eScan comprises of Privacy Advisor that provides you the complete list of application
using device permissions in a classified format. This helps you to keep a check
on the security level of all applications installed.
eScan helps you in data blocking, data wiping, SIM watching and locating your Android-based
device through GPS finder. With its Anti-Theft feature, eScan ensures complete protection
to your Android from any unauthorized access on the event, if your device is lost
eScan offers you an option for scheduled scanning, which will run seamlessly in
the background without interrupting your current working environment. It performs
scheduled scans for selected files / folders or the entire system for the scheduled
period, thus providing you the best protection against cyber threats.
eScan facilitates content filtering of calls and SMSs based on parameters set through
its Whitelist and Blacklist feature. A user can block calls and SMSs from specified
numbers based on specific phrases / words / keywords.
*Note: Not all features are available on all platforms.
For Windows (Windows server & workstations) Platforms Supported
Microsoft® Windows® 2012 R2 / 2012 / SBS 2011 / Essential / 2008 R2 / 2008 / 2003
R2 / 2003 / 10 / 8.1 / 8 / 7 / Vista / XP SP 2 / 2000 Service Pack 4 and Rollup Pack
1 (For 32-Bit & 64-Bit Editions)
Hardware for Clients and Server (Server)
CPU: 2GHz Intel™ Core™ Duo processor or equivalent
Memory: 4 GB & above
Disk Space: 8 GB & above
1.4 Ghz minimum (2.0 Ghz recommended) Intel Pentium or equivalent 1.0 GB minimum
(1.5 GB recommended)
Disk space : 800 MB and more
eScan Console can be accessed by using below browsers:
Internet Explorer 7 / 8 / 9 / 10 Firefox 14 & above Google Chrome latest version
(Linux Endpoints) Platform Supported:
RHEL 4 & above (32 & 64 bit), CentOS 5.10 & above (32 & 64 bit), SLES 10 SP3 & above
(32 & 64 bit), Debian 4.0 & above (32 & 64 bit), openSuSe 10.1 & above (32 & 64
bit), Fedora 5.0 & above (32 & 64 bit), Ubuntu 6.06 & above (32 & 64 bit)
Hardware Requirements (Endpoints) :
CPU: Intel® Pentium or compatible or equivalent.
Memory: 512 MB and above
Disk Space: 500 MB free hard drive space for installation of the application and
storage of temporary files
(Mac Endpoints) Platforms Supported:
Mac OS X Snow Leopard (10.6 or later), or Mac OS X Lion (10.7 or ater), or Mac OS X Mountain Lion (10.8 or later), or OS X Mavericks (10.9 or later), or OS X Yosemite (10.10 or later), or OS X El Capitan (10.11 or later).
Hardware Requirements (Endpoints):
CPU: Intel based Macintosh
Memory: 1 GB and More recommended
Disk Space: 500 MB and above
Your Android based mobile device should have Android 2.3 OS and above or Cyanogen OS 12.0.
15-20 MB Storage Space is required to efficiently run eScan Mobile Security.
Note - Rooted devices are not supported