You're developing for the future Our Software tools will get you there

eScan Enterprise Edition

Complete Antivirus and Content Security Solution for your computer

eScan Enterprise Edition is a complete security suite for Enterprises and Corporate which provides essential protection against viruses, objectionable content, hackers and privacy threats. eScan Enterprise edition also consists of MailScan for Mail Servers that provides protection to both the mail servers and file servers from information security threats.

 

New User Friendly GUI :

The new graphical user interface of eScan has been designed to suit the needs of both the novice and expert users with a single screen access to both the virus monitor and the on-demand scanner.

Faster On-Demand Scanning :

eScan’s new On-Demand Scanner with Cache Technology leads to faster scans and is light on system resources. Now, it can also scan USB drives, Spyware and Adware.

Real-Time Virus & Content Scanning :

eScan does real-time virus scanning of files, emails, email attachments and websites including SMTP, POP3, HTTP and FTP traffic using the MicroWorld Winsock Layer (MWL) Technology and AntiVirus Heuristic Algorithms. It also scans content for confidential data, prohibited content, offensive and obscene language.

Heuristic Scanning :

eScan’s sophisticated AntiVirus Heuristic Algorithm detects unknown viruses, that are being continuously released and protects the users from zero day threats.

AntiSpam :

eScan controls spam effectively using indigenous technologies such as Non Intrusive Learning Pattern (NILP) and sophisticated Heuristic filters that work on the basis of specific keywords and phrases.

Web Protection :

eScan provides comprehensive Web Protection with Internet Patrolling that blocks offensive and unsuitable websites as per the user’s choice and the effective Pop-up Filter blocks all the Pop-ups saving bandwidth. With the option Privacy Protection, the users can now prevent their private and confidential data from being stolen from the browser cache.

Proactive Protection :

eScan monitors the registry for any changes and warns the user on detecting any changes in the registry. eScan also detects and warns about the applications that are suspicious in nature.

Endpoint Security :

Endpoint Security prevents data thefts and virus infections through USB/Firewire based portable storage devices such as Flash Drives, Pen Drives, Portable Hard Disks etc. Application Control allows you to block/permit applications on the networks/personal systems. Suspicious files/applications can also be detected. Windows 2008 NAP (Network Access Protection) support is available as default.

Firewall :

eScan’s in-built two way firewall monitors and logs both incoming and outgoing network activities in the system and protects it from all network based attacks.

eScan Management Console :

The eScan Management Console (EMC) empowers system administrators to deploy from a central dashboard security measures such as updates of virus signatures & spam definitions, licenses, (un)installing and upgrading of eScan remotely, enabling or disabling of the eScan monitor, send alerts about virus outbreaks and security violations, and enforce an Integrated Security Policy across the network of an enterprise. Administrative tasks can also be performed via Web using a browser. EMC can also instantaneously display alerts about Live Applications, Live USB Detection and Live Site Browsing information, so that the system administrators can get an overview about the bandwidth usage, type and time of internet access by the individual users of the network. This facilitates a full-fledged dynamic audit of all the assets being used in the network of an enterprise.

Asset Management :

Static Asset management is done via the “System Information” tool. This tool empowers the administrators to have complete information about the hardware and software deployed on the networks.

Web Based Administration Console :

MailScan Administration Console can be accessed using a browser. MailScan’s operations can be managed from a central location using the web administration tool enabling remote administration of the application.

Integrated Security Policy Enforcement :

MailScan allows you to create policy-based rule sets on a universal or company specific basis.

Advanced AntiSpam and AntiPhishing :

Using a combination of technologies like Real-Time Blackhole List, SURBL Checking, MX/A DNS Record Verification, Reverse DNS, X-SPAM Rules Check, Sender Policy Framework and Non Intrusive Learning Pattern spam and phishing emails are blocked.

Real-Time Virus Scanning at the Mail Gateway :

MailScan scans all the email in real-time for Viruses, Worms, Trojans, Spyware, Adware and hidden malicious content using powerful, heuristic driven Dual AntiVirus engines. Thus, online threats are averted before they enter the network via emails.

Blocking Image Spam :

MailScan uses powerful in-built technologies to filter out image spam.

Real-Time Content Scanning :

All incoming and outgoing messages are scanned in real-time for offensive words and Adult Content, with the help of Security Policies.

Greylisting :

Mails from unknown senders are temporarily rejected, as most spamming servers do not try to send the same mails again if rejected for the first time. In case, the mail is legitimate, the originating server re-attempts to send the mail, which is then accepted.

LDAP & POP3 Authentication :

MailScan is powered with LDAP & POP3 Authenticated Web Administration. This authentication is required to restrict unauthorized access to mails.

Non Intrusive Learning Pattern (NILP) :

The NILP technology is an advanced spam filtering method with the intelligence to analyze and classify each mail as spam or ham according to the user’s behavioral patterns.

Autogenerated Spam Whitelist :

When a local user sends a mail to an email address, the system automatically adds that ID to the Spam Whitelist.

Attachment Filtering :

Attachments having file extensions such as EXE, COM, CHM or BAT can be blocked from being sent or received.

Clustering :

Clustering facilitates load balancing by distributing mails to multiple computers for scanning.

Relay Control :

This module prohibits spammers from using your organization’s IP addresses to send spam.

Comprehensive Attachment & Email Archiving :

There are customizable options to archive emails and attachments flowing in and out of the system. This feature also helps in comprehensive content auditing.

Customized Disclaimers :

This is an easy to use option to add customized disclaimers to all external and internal emails.

Virus Outbreak Alerts :

A Virus Outbreak Alert is sent to the administrator providing a detailed report of virus emails received within a defined span of time.

Extensive Reports :

Logs and extensive reports are being created and displayed by all the modules for PROTECTION, SCAN and UPDATE. Provides advanced analytical reports in graphical and non-graphical formats.

Automatic Compressed Updates :

Automatic Compressed Updates are being provided by eScan for both the software as well as the virus and spam definitions. The Virus signatures/Spam definitions are being automatically updated hourly for instant protection from existing and emerging threats.

24×7 Free Technical Support :

Free telephonic and online technical support (via email, chats & forums) is provided round the clock.

SYSTEM REQUIREMENTS AVAILABLE PLATFORMS
Pentium compatible processor 200 MHz or higher Windows 2000 (SP4)
RAM: 128 MB (256 MB recommended) Windows XP Home/Professional
800 X 600 or higher resolution. Windows XP 64-bit
Internet Explorer 5.0 Windows 2003 Enterprise/Standard (SP1)
150 MB of free Hard Disk Space Windows 2003 64-bit
CD-ROM DriveAlso supports AMD / Cyrix Processors Windows Vista Ultimate/Home Premium
Windows Vista Home Basic/Business/Enterprise
Windows 7
Windows 2008, Support for 98/ME/NT, will be provided soon

windows_logo1Version Info

Current Version – 8.0.671.1 – Multilingual

Note: The details about MicroWorld product and the other datas used are taken from MicroWorld website. The entire contents of these web pages remains property of MicroWorld. It’s a copyright of MicroWorld.