About ESET
WHEN TECHNOLOGY ENABLES PROGRESS, ESET® IS HERE TO PROTECT IT.
ESET brings over 30 years of technology-driven innovation and provides the most advanced cybersecurity solutions on the market. Our modern endpoint protection is powered by unique ESET LiveSense® multilayered security technologies, combined with the continuous use of machine learning and cloud computing.
Backed by the world’s best threat intelligence and research, ESET products offer the perfect balance of prevention, detection, and response capabilities. With high usability and unparalleled speed, we are dedicated to protecting the progress of our customers, ensuring maximum protection.
ESET IN NUMBERS
1bn+ protected internet users
400k+ business customers
195 countries and territories
13 global Research and Development centers
Multilayered protection for endpoints, cloud applications & email
- Console
- Modern endpoint protection
- Server security
- Advanced threat protection
- Full disk encryption
- Vulnerability and patch management
- Cloud application protection
- Mail Security
Add an extra layer of protection to your Microsoft 365 cloud email, collaboration and storage or mail servers. Protect your company computers, laptops, and mobiles with security products, all managed via a cloud or on prem console. The solution includes advanced threat defense technology, preventing new, never-before-seen types of threats, vulnerability & patch management to reduce your attack surface, and full disk encryption capability for enhanced data protection.
- Improved protection against ransomware and zero-day threats via cloud-based sandboxing technology.
- Helps comply with data regulations thanks to full disk encryption capabilities on Windows and macOS.
- Protection against disruption caused by email-based attacks and malware in Microsoft 365 cloud applications.
- Protection of your mail servers from malware, spam, or phishing attacks
- Easily accessible ESET PROTECT Cloud console improves TCO of security management.
- ESET Vulnerability & Patch Management actively tracks vulnerabilities in operating systems and common applications and provides automated patching across all endpoints.
- Company endpoints and mobiles are protected via advanced ESET LiveSense multilayered technology.
- ADVANCED THREAT DEFENSE WITH CLOUD SANDBOXING TO PREVENT RANSOMWARE
ESET LiveGuard Advanced provides proactive protection against new, never-before-seen threats,
by executing all submitted suspicious samples in an isolated and powerful cloud sandbox environment, in order to evaluate their behavior using threat intelligence feeds, ESET’s multiple internal tools for static and dynamic analysis, and reputation data.
- Advanced unpacking & scanning
- Cutting-edge machine learning
- In-depth behavioral analysis
- Cloud sandboxing
- MULTILAYERED ENDPOINT PROTECTION INCLUDING SERVER SECURITY
ESET Endpoint Security provides strong malware and exploit prevention and can detect malware before, during and after execution. Now it also features anti-password guessing technology.
ESET Server Security provides lightweight multilayered server protection, to ensure business continuity.
○ Block targeted attacks
○ Prevent data breaches
○ Stop fileless attacks
○ Detect advanced persistent threats
- CONSOLE—ESET’S UNIFIED PLATFORM INTERFACE
ESET PROTECT is a cloud-based or on-prem multifunctional remote network security management tool for ESET business security products across all operating systems. It enables one-click security deployment, and the cloud console gives you network visibility without the need to buy or maintain additional hardware, reducing total cost of ownership.
○ Seamless setup and deployment
○ Cloud deployment does not require additional hardware or software
○ Single point of network security management
○ Saves time with automated tasks
- POWERFUL ENCRYPTION MANAGED NATIVELY BY ESET PROTECT
ESET Full Disk Encryption is a feature native to the ESET PROTECT console. It allows one click, deployment, and encryption of data on connected Windows and Mac endpoints. ESET Full Disk Encryption significantly increases your organization’s data security and helps you comply with data protection regulations.
○ Manage encryption on Windows and macOS machines
○ Encrypt system disks, partitions, or entire drives
○ Deploy, activate, and encrypt devices in a single action
- ADVANCED PROTECTION FOR EMAIL AND CLOUD COLLABORATION OR STORAGE
ESET Cloud Office Security provides advanced protection for Microsoft 365 applications by means of an easy-to-use cloud console. The combination of spam filtering, anti-malware scanning, and anti-phishing helps to protect your company communications and cloud storage.
○ Includes advanced threat defense capability with ultimate protection against new, never-before seen threat types, especially ransomware
○ Visibility in detections and quarantine via anytime-accessible console
○ Automatic protection of new user mailboxes
○ Immediate notification when detection of malware occurs
ESET Mail Security provides an additional layer of defense at server level to prevent spam and malware from ever reaching users’ mailboxes.
- ACTIVELY ASSESS & FIX VULNERABILITIES ACROSS ALL YOUR ENDPOINTS
ESET Vulnerability & Patch Management actively tracks vulnerabilities in operating systems and
common applications and enables automated patching across all endpoints, managed via our unified platform.
○ Manage patching centrally from the ESET PROTECT Cloud console
○ Automate your scanning with customizable schedule settings
○ Filter, group, and sort vulnerabilities based on their severity
○ Choose from automatic and manual patching options
○ Customize your patching policies
Trend Micro™ DEEP SECURITY™
Advanced Threat Protection against Malware
- Protect your critical servers and applications with advanced security controls, including an intrusion prevention system (IPS), integrity monitoring, machine learning, application control, and more.
- Detect and block threats in real time, with minimal performance impact.
- Detect and block unauthorized software execution with multi-platform application control.
- Shield known and unknown vulnerabilities in web, enterprise applications, and operating systems through an IPS.
- Advanced threat detection and remediation of suspicious objects through sandbox analysis.
- Send alerts and trigger proactive prevention upon the detection of suspicious or malicious activity.
- Secure end-of-support systems with virtual patches delivered via an IPS, ensuring legacy systems stay protected from existing and future threats.
- Track website credibility and protect users from infected sites with web reputation threat intelligence from Trend Micro’s global domain reputation database.
- Identify and block botnet and targeted attack C&C communications.
- Secure against the latest threats using threat intelligence from the Trend Micro™ Smart Protection Network™, powered by Trend Micro’s market-leading threat research
Network security tools detect and stop network attacks and shield vulnerable applications and servers
*The SAP Scanner requires specialized functionality that must be purchased separately from your Deep Security Software license.
- Host-Based Intrusion Prevention:Detects and blocks network-based exploits of known vulnerabilities in popular applications and operating systems using IPS rules.
- Firewall:
Host-based firewall protects endpoints on the network using stateful inspection.
The Deep Security Firewall is a highly flexible Firewall that you can configure to be restrictive or permissive. Like the intrusion prevention and web reputation modules, the Firewall module can also be run in two modes: inline or tap.
- Vulnerability Scanning:
Performs a scan for known network-based vulnerabilities in the operating system and applications.
Malware prevention stops malware and targeted attacks
- Anti-Malware:
- File Reputation—blocks known-bad files using our antimalware signatures.
- Variant Protection — Looks for obscure, polymorphic, or variants of malware by using fragments of previously seen malware and detection algorithms.
- Behavioral Analysis:
Examines an unknown item as it loads and looks for suspicious behavior in the operating system, applications, and scripts, as well as how they interact, in order to block them.
- SAP Scanner*:
Enables anti-malware scanning for Netweaver through the SAP Virus Scan Interface (VSI).
- Machine Learning:
Analyzes unknown files and zero-day threats using machine learning algorithms to determine if the file is malicious.
- Web Reputation:
Blocks known-bad URLs and websites.
- Sandbox Analysis:
Suspicious objects can be sent to the Trend Micro™ Deep Discovery™ network sandbox for detonation and extensive analysis to determine if it is malicious. A confirmation and rapid response update is then provided back to Deep Security for the appropriate response.