Home and Small Office
Small & Medium Business
Corporate / Enterprises
Write Review View Review
NOTE: Please enter a valid email address as a copy of download link will be sent
to the above email address.
NOTE: MicroWorld will not sell this email address to any third parties. The emails
sent by us will contain complete unsubscribe information, and you may opt-out of
receiving future emails at anytime.
eScan Enterprise Edition for Microsoft SBS Standard is a comprehensive Anti-Virus, Anti-Spam and Content Security solution that provides Zero Day Protection from Viruses, Spyware, Adware, Keyloggers, Rootkits, Botnets, Hacking, Spam, Phishing and Offensive Content. eScan ensures complete protection for computer systems and networks with its indigenous powerful technologies such as MicroWorld Winsock Layer (MWL) Technology, Non Intrusive Learning Pattern (NILP) Technology and sophisticated Anti-Virus Heuristic Algorithms.
eScan Enterprise Edition for Microsoft SBS Standard also includes MailScan, which is the world's most advanced Real-Time Anti-Virus and Anti-Spam solution for Mail Servers. MailScan safeguards organizations against Virus, Worm, Trojan and many other malware breeds with futuristic and proactive technologies.
GACENDERI - RAF, Rwanda
English, German, French, Nederlands, Italian, Portuguese, Spanish, Turkish, Chinese Simplified, Chinese Traditional, Greek, Korean, Norwegian, Russian, Polish and Latin Spanish
The new graphical user interface of eScan has been designed to suit the needs of both novice and expert users with a single screen access to both the virus monitor and on-demand scanner.
eScan's new On-Demand Scanner with Cache Technology leads to faster scan and is lighter on system resources. Now, it can also scan USB drives, Spyware and Adware.
eScan does Real-Time virus scanning of files, e-mails, e-mail attachments and websites including SMTP, POP3, HTTP and FTP traffic using the MWL Technology and Anti-Virus Heuristic Algorithms. It also scans content for confidential data, prohibited content, offensive and obscene language.
eScan's sophisticated Anti-Virus Heuristic Algorithm detects unknown viruses, that are being continuously released and protects the users from zero day threats.
eScan controls spam effectively using indigenous technologies such as NILP and sophisticated Heuristic filters that work on the basis of specific keywords and phrases.
eScan version 10 scans, monitors and warns the user about any suspicious applications.
eScan provides comprehensive web protection with an in-built Web Control that blocks offensive and unsuitable websites as per the user's choice and the effective Pop-up filter blocks all the pop-up saving bandwidth. With Privacy Protection, the users can prevent their private and confidential data from being stolen from the browser cache.
Endpoint security prevents data thefts and virus infections through USB / Firewire based portable devices such as flash drives, pen drives, portable hard disks, etc. Application Control allows you to block / permit applications on the networks / personal systems. Suspicious files / applications can also be detected. Windows 2008 NAP (Network Access Protection) support is available as default.
eScan's in-built firewall monitors & logs incoming outgoing network activities in the system and safeguards it from all network-based attacks.
Static Asset management is done via the System Information tool. This tool empowers the administrators to have complete information about the hardware and software deployed on the networks.
Logs and extensive reports are being created and displayed by all the modules for Protection, Scan and Update.
Easily create a Windows Based Rescue Disk file with the eScan Rescue File Creation wizard. The eScan Rescue Disk will help you to clean boot your Windows PC to scan and clean infected Windows systems from rootkits and file infectors that cannot be cleaned in the normal Windows mode.
The eScan Management Console (EMC) empowers system administrators to deploy from a central dashboard security measures such as updates of virus signatures & spam definitions, licenses, (un)installing and upgrading of eScan remotely, enabling or disabling of the eScan monitor, send alerts about virus outbreaks and security violations, and enforce an Integrated Security Policy across the network of an enterprise. Administrative tasks can also be performed via the web using a browser. EMC can also instantaneously display alerts about Live Applications, Live USB Detection and Live Site Browsing information, so that the system administrators can get an overview about the bandwidth usage, type and time of internet access by the individual users of the network. This facilitates a full-fledged dynamic audit of all the assets being used in the network of an enterprise.
Automatic Compressed Updates are being provided by eScan for both the software as well as the virus and spam definitions. The Virus signature / spam definitions are being automatically updated hourly for instant protection from existing and emerging threats.
*Note: Not all features are available on all platforms.
Microsoft® Windows® 2012 R2 / 2012 / SBS 2011 / Essential / 2008 R2 / 2008 / 2003 R2 / 2003 / 10 / 8.1 / 8 / 7 / Vista / XP SP 2 / 2000 Service Pack 4 and Rollup Pack 1 (For 32-Bit & 64-Bit Editions)
2GHz Intel™ Core™ Duo processor or equivalent
Memory: 4 GB & above
Disk Space: 8 GB & above
1.4 Ghz minimum (2.0 Ghz recommended) Intel Pentium or equivalent 1.0 GB minimum (1.5 GB recommended)
Disk space : 800 MB and more
eScan Console can be accessed by using below browsers:
Internet Explorer 7 / 8 / 9 / 10 Firefox 14 & above Google Chrome latest version
(Linux Endpoints) Platform Supported:
RHEL 4 & above (32 & 64 bit), CentOS 5.10 & above (32 & 64 bit), SLES 10 SP3 & above (32 & 64 bit), Debian 4.0 & above (32 & 64 bit), openSuSe 10.1 & above (32 & 64 bit), Fedora 5.0 & above (32 & 64 bit), Ubuntu 6.06 & above (32 & 64 bit)
Hardware Requirements (Endpoints) :
CPU: Intel® Pentium or compatible or equivalent.
Memory: 512 MB and above
Disk Space: 500 MB free hard drive space for installation of the application and storage of temporary files
(Mac Endpoints) Platforms Supported:
Mac OS X Snow Leopard (10.6 or later), or Mac OS X Lion (10.7 or ater), or Mac OS X Mountain Lion (10.8 or later), or OS X Mavericks (10.9 or later), or OS X Yosemite (10.10 or later), or OS X El Capitan (10.11 or later).
Hardware Requirements (Endpoints):
CPU: Intel based Macintosh
Memory: 1 GB and More recommended
Disk Space: 500 MB and above