Zecurit delivers comprehensive security and compliance capabilities to protect your endpoints and secure your IT environment. Our platform is built with multiple layers of security controls, continuous monitoring, and granular access management to keep your organization safe.
Add an extra layer of protection to every user account with email-based one-time passcodes.
How It Works:
Mandatory for all users once enabled by Super Admin
One-time passcode (OTP) sent to registered email
15-minute OTP validity window
Account lockout after 5 failed attempts
Protects against credential compromise
Benefits:
Prevents unauthorized access even if passwords are stolen
Organization-wide enforcement for consistent security
Simple setup process for users
Email-based delivery requires no additional apps
The all-in-one endpoint management solution. Everything in Asset Manager plus advanced deployment, security controls, automation, and remote management capabilities.
Protection Controls:
Prevent agent uninstallation via Control Panel or system settings
Block users from stopping agent services
Prevent process termination via Task Manager
Maintain continuous endpoint monitoring
Why It Matters:
Ensures the agent remains active and functional on all managed endpoints, maintaining consistent device visibility and policy enforcement even in environments where users have administrative access.
Control platform access by allowing login only from approved IP addresses or ranges.
Access Control:
Whitelist specific IP addresses
Define IP ranges for office locations
Block all unauthorized network locations
Apply restrictions globally across all users
Use Cases:
Restrict access to corporate networks only
Enable VPN-only access for remote workers
Prevent access from untrusted locations
Enhance security for sensitive environments
Manage user session behavior to prevent unauthorized access on unattended devices.
Configurable Controls:
Session Expiry Period - Maximum login duration (default: 15 days)
Session Idle Timeout - Auto-logout after inactivity (default: 6 hours)
Concurrent Sessions Limit - Control simultaneous logins (default: 3)
Security Benefits:
Automatic logout on inactive sessions
Prevent session hijacking
Limit account sharing
Reduce risk from unattended workstations
Complete audit trail of every action taken within your Zecurit environment.
What Gets Logged:
User actions and configuration changes
Module-specific activities (Enrollment, Settings, Reports)
Date/time stamps and user attribution
IP addresses for all actions
Log severity levels (Info, Warning, Critical)
Audit Capabilities:
Track security events and policy changes
Investigate suspicious activities
Export logs for compliance reporting (CSV/PDF)
Filter by module, user, date range, or log type
Monitor agent installations and removals
Retention: Activity logs are retained based on your organization's Data Cleanup settings, with a default of 15 days.
Manage data retention policies to optimize storage and maintain compliance with privacy regulations.
Configurable Retention Periods:
User Logon History (default: 7 days)
System Uptime History (default: 7 days)
Scheduled Reports (default: 15 days)
Alerts (default: 15 days)
Activity Logs (default: 15 days)
Geo-Location History (default: 15 days)
Compliance Benefits:
Align with data privacy regulations (GDPR, etc.)
Automated data lifecycle management
Reduce storage overhead
Maintain audit-ready retention policies
All communications between Zecurit components are encrypted and secured:
Granular permission management ensures users have appropriate access levels:
Real-time visibility into your security posture:
Zecurit provides the tools and reports you need for compliance audits:
Activity Logging
Complete audit trails of all platform actions
Exportable logs in multiple formats
Detailed user and system activity records
Timestamped security events
Reporting Capabilities
Pre-built security reports
Hardware and software inventory
License compliance tracking
User logon and access reports
Custom report creation
Data Governance
Configurable data retention policies
Automated data cleanup
Privacy-compliant data handling
Export capabilities for audit evidence
While Zecurit doesn't hold specific compliance certifications, our platform provides security controls that support compliance with:
GDPR - Data retention, cleanup, and privacy controls
SOC 2 - Activity logging, access controls, and monitoring
HIPAA - Audit trails, data retention, and access management
ISO 27001 - Information security controls and documentation
NIST - Cybersecurity framework alignment
Note: Organizations are responsible for their own compliance. Zecurit provides tools and controls to support your compliance efforts.
Define exactly what each user can do within the platform:
Custom role creation with specific permissions
Module-level access control
Action-level restrictions
User and role management
Permission audit logging
Multiple layers of identity verification:
Username and password authentication
Two-factor authentication (2FA)
IP-based access restrictions
Session management and timeouts
Failed login attempt tracking
Comprehensive data handling and retention:
Configurable retention periods for all data types
Automated cleanup based on policies
Historical data preservation options
Export capabilities for archival
Secure data deletion
Monitor device locations while respecting privacy:
Geo-location history retention controls
Configurable tracking periods
Export capabilities for asset tracking
Privacy-compliant data handling
Enable All Core Protections:
Turn on Two-Factor Authentication for all users
Enable Agent Protection on production devices
Configure IP Restrictions for corporate networks
Set appropriate Session Timeout values
Review Activity Logs regularly
Regular Security Reviews:
Weekly review of Activity Logs for suspicious events
Monthly audit of user permissions and roles
Quarterly review of data retention policies
Regular export of audit logs for archival
Layered Security Approach: Combine multiple security features for defense in depth:
2FA + IP Restrictions for access control
Agent Protection + Activity Logging for endpoint security
Session Settings + Monitoring for usage control
Data Cleanup + Audit Logging for compliance
Experience enterprise-grade security for your IT environment. Start protecting your endpoints with Zecurit's comprehensive security and compliance features today.
Only Super Admins can configure most security settings including 2FA, IP Restrictions, Agent Protection, Session Settings, and Data Cleanup.
OTP codes are valid for 15 minutes. If you don't receive it, check your spam folder. After 5 failed attempts, contact your Super Admin to unlock your account.
No, IP restrictions apply globally to all users including Super Admins to maintain consistent security.
By default, activity logs are retained for 15 days. This can be adjusted in Data Cleanup settings.
Once data exceeds the configured retention period, it is permanently deleted and cannot be recovered. Export important data before cleanup if needed.
No, only Super Admins can disable Agent Protection. Once enabled, end users cannot uninstall or stop the agent.