SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
For Businesses with more than 25 seats

www.eset.com
ESET Endpoint Protection Standard
Whether your business is just starting or

Simple and Straightforward

established, there are a few things you expect

With ESET Business Solutions you can mix and match endpoint protection according to your actual needs, deploying it on a range of platforms
(Windows, Mac, and Linux) and devices: computers, smartphones, tablets, and servers.

from security software you use daily.
At ESET, we feel that running security software

Light on Your System

in the business environment should be easy

Our solutions are built for small footprint, which also makes them suitable for older hardware, saving IT-related costs on hardware upgrades.
In addition, program updates are small and can download from a cenral mirror server.

and simple. That’s why we have created ESET
Business Solutions, a perfect match for any
size business – utilizing our 25 years experience

Easy to Manage
Easily deploy, configure and manage your security software from a single console. It no longer takes a bunch of IT professionals to run your
company’s IT security – but from our remote management console your company security can be tweaked to every last detail.

pioneering the antivirus industry.

endpoint
antivirus

mobile
security

file
security

endpoint
security

mail
security

gateway
security

eset endpoint protection standard
eset endpoint protection advanced
eset secure business
eset secure enterprise
ESET Endpoint Protection Standard
Keep your network clean and protect your endpoints (computers, smartphones, tablets, and fileserver) against emerging threats. ESET
Endpoint Protection Standard provides essential protection for the company network that is easily manageable from a single console.
ESET Endpoint Protection Advanced
In addition to ESET Endpoint Protection Standard, the Advanced version comes with the powerful Web Control, Firewall and Anti-Spam
filter to provide additional layers of protection for the company network and your mobile workforce.

Enquire about ESET Premium
Support for priority access to
IT security professionals 365/24/7

ESET Secure Business
Eliminating email-borne threats at the server level, ESET Secure Business gives your company’s data an extra level of security that
complements the protection of computers, mobile devices and fileservers.
ESET Secure Enterprise
Choose this option if you operate your own Internet gateway server to safeguard your HTTP and FTP communications. In addition, ESET
Secure Enterprise gives you all the products and tools for the maximum level of protection on your endpoints and servers across multiple
platforms.

pioneer of the antivirus industry for 25 years
ESET Endpoint Protection Standard

Antivirus and Antispyware

Host-based Intrusion Prevention
System (HIPS)

Provides tamper protection and secures the system registry, processes, applications
and files from unauthorized modification. You can customize the behavior of the
system down to every last detail and detect even unknown threats based on suspicious
behavior.

Device Control

Lets you block unauthorized media and devices based on pre-set rules and parameters.
Set access permissions (read/write, read, block) for individual media, devices, users and
groups.

Auto-Scan of Removable Media

Automatically scans USBs, CDs, and DVDs for threats upon insertion to eliminate
autorun and other removable risks. Choose from these scanning options: start
automatically/notify (prompt user)/do not scan.

Cross-platform Protection

Exchange files and email attachments among Windows, Mac and Linux endpoints
with confidence that malware targeting any of these platforms will be automatically
detected and eliminated. Prevent Macs from turning into carriers of malware in the
company network.

Low System Demands

Leaves more system resources for programs you use daily. Our software also runs
smoothly on older hardware, saving your time and costs of having to upgrade your
endpoints.

Multiple Log Formats

Save logs in common formats - CSV, plain text, or Windows event log for immediate
analysis or harvesting. Take advantage of data being readable by 3rd party SIEM tools;
RSA enVision is supported directly via a plug-in.

Update Rollback

ESET Endpoint Antivirus

Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping
your network protected online and off.ESET’s cloud-powered reputation database
increases scanning speed and minimizes false positives.

Revert virus signature and module updates to a known good state in case of encountering
system incompatibilities. Opt to freeze updates temporarily or until manually changed.

ESET NOD32 Antivirus Business Edition for Mac OS X
ESET NOD32 Antivirus Business Edition for Linux Desktop
ESET Endpoint Security for Android
ESET Mobile Security Business Edition
ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris
ESET Remote Administrator

See the following pages for benefits and features of the
products that are color-coded in grey.

Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.

pioneer of the antivirus industry for 25 years
ESET Endpoint Protection Standard

Remote Lock

Remote Wipe

Safely deletes all contacts, messages and data on removable memory cards. Advanced
cleaning procedures ensure that it is not be possible to restore wiped data (Android 2.2 and
higher).

GPS Localization

Remotely locates the phone using a remote SMS command and tracks the phone’s GPS
coordinates.

SIM Matching

Stay in control of your company smartphones remotely, even when an unauthorized
SIM card is inserted. The Admin Contacts phone numbers will receive a wealth of
information about the inserted SIM, including the phone number, IMSI and IMEI codes.

Admin Contacts

Set up one or more Admin Contacts for your company mobile fleet to receive all the
important information in the event of a loss or theft.

Call Blocking

Blocks calls from unknown or hidden numbers and also calls to unwanted numbers.
Define a list of allowed/blocked contacts and keep your phone bills under control.

Uninstall Protection

One password controls it all. Only authorized persons will be able to uninstall ESET
Endpoint Security for Android (version 2.2 and higher).

SMS/MMS Antispam

Filters out unwanted SMS/MMS messages. Allows you to define custom blacklists/
whitelists or simply block all unknown numbers.

Real-time Protection

Protects all applications, files and memory cards with the ESET NOD32 proactive
technology optimized for mobile platforms.

Security Audit

An on-demand security audit checks the status of all vital phone functions, including
battery level, Bluetooth status, home network, disk space and running processes.

On-access Scanning

Advanced scanning protects company smartphones and tablets from threats
attempting to access the system via Bluetooth or Wi-Fi.

On-demand Scanning

On-demand Scanning provides reliable scanning and cleaning of integrated memory
and exchangeable media. Scanning of specific folders is also supported.

Remote Administration

Enables you to check the security status of your smartphone fleet, run on-demand
scans, push security policies and set uninstall password. Get overview of the platforms,
OS versions and other information and stay up-to-date on your smartphones’ security.

Administrator Message

ESET Endpoint Antivirus

Locks lost or stolen devices by a remote SMS command. After locking, no unauthorized
person will be able to access data stored on the device.

Allows administrator to push a message to the device with custom text via ESET
Remote Administrator. The message priority can be set to normal, warning or critical
warning.

ESET NOD32 Antivirus Business Edition for Mac OS X
ESET NOD32 Antivirus Business Edition for Linux Desktop
ESET Endpoint Security for Android
ESET Mobile Security Business Edition
ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris
ESET Remote Administrator

See the previous and following page(s) for benefits
and features of the products that are color-coded in grey.

Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.

pioneer of the antivirus industry for 25 years
ESET Endpoint Protection Standard

Antivirus and Antispyware

Eliminates all types of threats including viruses, rootkits, worms and spyware.
Provides real-time on-access scanning of the server-stored data.
ESET Self-defense prevents malware and unauthorized users from disabling the security
of the system.
Powered by the advanced ThreatSense® technology combining speed, accuracy and
minimal system impact.

Cross-platform Protection

Eliminates malware targeting all platforms, including Windows, Mac and Linux
operating systems.
Prevents malware from spreading from one platform to another.

Low System Demands

Smooth Operation
ESET Endpoint Antivirus
ESET NOD32 Antivirus Business Edition for Mac OS X
ESET NOD32 Antivirus Business Edition for Linux Desktop

Delivers proven protection while leaving more system resources for the server’s vital
tasks.
Identification of user accounts used in infiltration attempts.
Password protected uninstallation.
Automatically excludes critical server files.
Automatically detects server roles to exclude critical server files like data stores and
paging files from on-access scanning to decrease overhead.

ESET Endpoint Security for Android
ESET Mobile Security Business Edition
ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris
ESET Remote Administrator

See the previous and following page(s) for benefits
and features of the products that are color-coded in grey.

Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.

pioneer of the antivirus industry for 25 years
ESET Endpoint Protection Standard

Remote Administration

Manage all servers, endpoints, and even smartphones and virtual machines from a
single console. Support for IPv6 infrastructure makes management of network security
even easier. The comprehensive console interface lets you view all security-related
events, including logs from antivirus, firewall, web control, device control and others.

Real-time Web Dashboard

Access web-based dashboard from anywhere for quick at-a-glance security status using live
streaming of data. Customize the information displayed on the dashboard to get the most
up-to-date information on the security status from the server and clients.

Role-based Management

Assign privileges to different remote administration users and delegate responsibilities
accordingly. The built-in password strength checker and audit functionality ensure that
administrator accounts are properly secured.

Dynamic Client Groups

Create dynamic and static client groups for easier policy enforcement and to address
any pressing issues. Select from these parameters for groups: operating system, client
name mask, IP mask, recent threat detected, and many more. Clients are moved
automatically to the corresponding group if parameters change.

Event Notifications

Specify log and report parameters or choose from more than 50 templates. Have
notification sent immediately or in batches based on custom threshold for securityrelated events.

Randomized Task Execution

Minimizes AV storms on virtual endpoints and reduces resource contention on
networked drives. Random task execution helps offset the effect of simultaneous
system scans on the network performance.

Local Update Server

Have all clients update from a local mirror server and minimize Internet bandwidth
usage. For your mobile workforce define policies to update from ESET online servers
when outside of home network. The local update server supports secured (HTTPS)
communication channel.

Update Rollback

Revert virus signature and module updates to a known good state in case of
encountering system incompatibilities. Opt to freeze updates temporarily or until
manually changed.

Postponed updates

Opt to download from 3 specialized update servers: pre-release (beta users), regular
release (regular users) and postponed release (approx. 12 hours after regular release).
Apply antivirus updates to non-critical systems first, followed by critical ones with the
option of clearing the update cache.

Microsoft NAP Support

Helps resolve compliance issues with company network access policy. You can set
compliance requirements such as age of virus database, antivirus product version,
protection status, availability of antivirus protection, as well as firewall status − and
force database updates.

The ESET Remote Administrator tool comes standard
with each version of ESET Business Solutions.
Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.

Copyright © 1992–2012 ESET, spol. s r. o. ESET, logo ESET,
NOD32, ThreatSense, ThreatSense.Net and/or other
mentioned products of ESET, spol. s r. o., are registered
trademarks of ESET, spol. s r. o. Other here mentioned
companies or products might be registered trademarks of its
proprietors. Produced according to quality standards of ISO
9001:2000.

pioneer of the antivirus industry for 25 years

Más contenido relacionado

La actualidad más candente

Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-securityÜstün Koruma
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityseAppin Ara
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
StandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackStandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackHelpSystems
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportAjit Gaddam
 
IS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Brent Muir
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYRisman Hatibi
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresAlexander Benoit
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...Symantec
 
Security Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating SystemsSecurity Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating SystemsCisco Canada
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtityAhmed Sallam
 
Using Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksUsing Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksIBM Security
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)José Ferreiro
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 

La actualidad más candente (20)

Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
StandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackStandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech Pack
 
152 ready eng
152 ready eng152 ready eng
152 ready eng
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
IS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions Company Presentation
IS Decisions Company Presentation
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
 
Security Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating SystemsSecurity Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating Systems
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
Using Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksUsing Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style Attacks
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 

Similar a ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET

IT security for busines
IT security for businesIT security for busines
IT security for businesAdi Saputra
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint ProtectionDan Buckley
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Dan Buckley
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint ProtectionDan Buckley
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9Javier Arrospide
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US☁ ☁ Gautam T ☁☁
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General PresentationKsenia Kondratieva
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptxNBBNOC
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devicesHCL Technologies
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
Svarbiausios ESET technologijos
Svarbiausios ESET technologijosSvarbiausios ESET technologijos
Svarbiausios ESET technologijosBaltimax
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-enLee Dalton
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 

Similar a ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET (20)

IT security for busines
IT security for businesIT security for busines
IT security for busines
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
Onepager w10 security
Onepager w10 securityOnepager w10 security
Onepager w10 security
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Svarbiausios ESET technologijos
Svarbiausios ESET technologijosSvarbiausios ESET technologijos
Svarbiausios ESET technologijos
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-en
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 

Último

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 

Último (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET

  • 1. For Businesses with more than 25 seats www.eset.com
  • 2. ESET Endpoint Protection Standard Whether your business is just starting or Simple and Straightforward established, there are a few things you expect With ESET Business Solutions you can mix and match endpoint protection according to your actual needs, deploying it on a range of platforms (Windows, Mac, and Linux) and devices: computers, smartphones, tablets, and servers. from security software you use daily. At ESET, we feel that running security software Light on Your System in the business environment should be easy Our solutions are built for small footprint, which also makes them suitable for older hardware, saving IT-related costs on hardware upgrades. In addition, program updates are small and can download from a cenral mirror server. and simple. That’s why we have created ESET Business Solutions, a perfect match for any size business – utilizing our 25 years experience Easy to Manage Easily deploy, configure and manage your security software from a single console. It no longer takes a bunch of IT professionals to run your company’s IT security – but from our remote management console your company security can be tweaked to every last detail. pioneering the antivirus industry. endpoint antivirus mobile security file security endpoint security mail security gateway security eset endpoint protection standard eset endpoint protection advanced eset secure business eset secure enterprise ESET Endpoint Protection Standard Keep your network clean and protect your endpoints (computers, smartphones, tablets, and fileserver) against emerging threats. ESET Endpoint Protection Standard provides essential protection for the company network that is easily manageable from a single console. ESET Endpoint Protection Advanced In addition to ESET Endpoint Protection Standard, the Advanced version comes with the powerful Web Control, Firewall and Anti-Spam filter to provide additional layers of protection for the company network and your mobile workforce. Enquire about ESET Premium Support for priority access to IT security professionals 365/24/7 ESET Secure Business Eliminating email-borne threats at the server level, ESET Secure Business gives your company’s data an extra level of security that complements the protection of computers, mobile devices and fileservers. ESET Secure Enterprise Choose this option if you operate your own Internet gateway server to safeguard your HTTP and FTP communications. In addition, ESET Secure Enterprise gives you all the products and tools for the maximum level of protection on your endpoints and servers across multiple platforms. pioneer of the antivirus industry for 25 years
  • 3. ESET Endpoint Protection Standard Antivirus and Antispyware Host-based Intrusion Prevention System (HIPS) Provides tamper protection and secures the system registry, processes, applications and files from unauthorized modification. You can customize the behavior of the system down to every last detail and detect even unknown threats based on suspicious behavior. Device Control Lets you block unauthorized media and devices based on pre-set rules and parameters. Set access permissions (read/write, read, block) for individual media, devices, users and groups. Auto-Scan of Removable Media Automatically scans USBs, CDs, and DVDs for threats upon insertion to eliminate autorun and other removable risks. Choose from these scanning options: start automatically/notify (prompt user)/do not scan. Cross-platform Protection Exchange files and email attachments among Windows, Mac and Linux endpoints with confidence that malware targeting any of these platforms will be automatically detected and eliminated. Prevent Macs from turning into carriers of malware in the company network. Low System Demands Leaves more system resources for programs you use daily. Our software also runs smoothly on older hardware, saving your time and costs of having to upgrade your endpoints. Multiple Log Formats Save logs in common formats - CSV, plain text, or Windows event log for immediate analysis or harvesting. Take advantage of data being readable by 3rd party SIEM tools; RSA enVision is supported directly via a plug-in. Update Rollback ESET Endpoint Antivirus Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your network protected online and off.ESET’s cloud-powered reputation database increases scanning speed and minimizes false positives. Revert virus signature and module updates to a known good state in case of encountering system incompatibilities. Opt to freeze updates temporarily or until manually changed. ESET NOD32 Antivirus Business Edition for Mac OS X ESET NOD32 Antivirus Business Edition for Linux Desktop ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Remote Administrator See the following pages for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features. pioneer of the antivirus industry for 25 years
  • 4. ESET Endpoint Protection Standard Remote Lock Remote Wipe Safely deletes all contacts, messages and data on removable memory cards. Advanced cleaning procedures ensure that it is not be possible to restore wiped data (Android 2.2 and higher). GPS Localization Remotely locates the phone using a remote SMS command and tracks the phone’s GPS coordinates. SIM Matching Stay in control of your company smartphones remotely, even when an unauthorized SIM card is inserted. The Admin Contacts phone numbers will receive a wealth of information about the inserted SIM, including the phone number, IMSI and IMEI codes. Admin Contacts Set up one or more Admin Contacts for your company mobile fleet to receive all the important information in the event of a loss or theft. Call Blocking Blocks calls from unknown or hidden numbers and also calls to unwanted numbers. Define a list of allowed/blocked contacts and keep your phone bills under control. Uninstall Protection One password controls it all. Only authorized persons will be able to uninstall ESET Endpoint Security for Android (version 2.2 and higher). SMS/MMS Antispam Filters out unwanted SMS/MMS messages. Allows you to define custom blacklists/ whitelists or simply block all unknown numbers. Real-time Protection Protects all applications, files and memory cards with the ESET NOD32 proactive technology optimized for mobile platforms. Security Audit An on-demand security audit checks the status of all vital phone functions, including battery level, Bluetooth status, home network, disk space and running processes. On-access Scanning Advanced scanning protects company smartphones and tablets from threats attempting to access the system via Bluetooth or Wi-Fi. On-demand Scanning On-demand Scanning provides reliable scanning and cleaning of integrated memory and exchangeable media. Scanning of specific folders is also supported. Remote Administration Enables you to check the security status of your smartphone fleet, run on-demand scans, push security policies and set uninstall password. Get overview of the platforms, OS versions and other information and stay up-to-date on your smartphones’ security. Administrator Message ESET Endpoint Antivirus Locks lost or stolen devices by a remote SMS command. After locking, no unauthorized person will be able to access data stored on the device. Allows administrator to push a message to the device with custom text via ESET Remote Administrator. The message priority can be set to normal, warning or critical warning. ESET NOD32 Antivirus Business Edition for Mac OS X ESET NOD32 Antivirus Business Edition for Linux Desktop ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Remote Administrator See the previous and following page(s) for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features. pioneer of the antivirus industry for 25 years
  • 5. ESET Endpoint Protection Standard Antivirus and Antispyware Eliminates all types of threats including viruses, rootkits, worms and spyware. Provides real-time on-access scanning of the server-stored data. ESET Self-defense prevents malware and unauthorized users from disabling the security of the system. Powered by the advanced ThreatSense® technology combining speed, accuracy and minimal system impact. Cross-platform Protection Eliminates malware targeting all platforms, including Windows, Mac and Linux operating systems. Prevents malware from spreading from one platform to another. Low System Demands Smooth Operation ESET Endpoint Antivirus ESET NOD32 Antivirus Business Edition for Mac OS X ESET NOD32 Antivirus Business Edition for Linux Desktop Delivers proven protection while leaving more system resources for the server’s vital tasks. Identification of user accounts used in infiltration attempts. Password protected uninstallation. Automatically excludes critical server files. Automatically detects server roles to exclude critical server files like data stores and paging files from on-access scanning to decrease overhead. ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Remote Administrator See the previous and following page(s) for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features. pioneer of the antivirus industry for 25 years
  • 6. ESET Endpoint Protection Standard Remote Administration Manage all servers, endpoints, and even smartphones and virtual machines from a single console. Support for IPv6 infrastructure makes management of network security even easier. The comprehensive console interface lets you view all security-related events, including logs from antivirus, firewall, web control, device control and others. Real-time Web Dashboard Access web-based dashboard from anywhere for quick at-a-glance security status using live streaming of data. Customize the information displayed on the dashboard to get the most up-to-date information on the security status from the server and clients. Role-based Management Assign privileges to different remote administration users and delegate responsibilities accordingly. The built-in password strength checker and audit functionality ensure that administrator accounts are properly secured. Dynamic Client Groups Create dynamic and static client groups for easier policy enforcement and to address any pressing issues. Select from these parameters for groups: operating system, client name mask, IP mask, recent threat detected, and many more. Clients are moved automatically to the corresponding group if parameters change. Event Notifications Specify log and report parameters or choose from more than 50 templates. Have notification sent immediately or in batches based on custom threshold for securityrelated events. Randomized Task Execution Minimizes AV storms on virtual endpoints and reduces resource contention on networked drives. Random task execution helps offset the effect of simultaneous system scans on the network performance. Local Update Server Have all clients update from a local mirror server and minimize Internet bandwidth usage. For your mobile workforce define policies to update from ESET online servers when outside of home network. The local update server supports secured (HTTPS) communication channel. Update Rollback Revert virus signature and module updates to a known good state in case of encountering system incompatibilities. Opt to freeze updates temporarily or until manually changed. Postponed updates Opt to download from 3 specialized update servers: pre-release (beta users), regular release (regular users) and postponed release (approx. 12 hours after regular release). Apply antivirus updates to non-critical systems first, followed by critical ones with the option of clearing the update cache. Microsoft NAP Support Helps resolve compliance issues with company network access policy. You can set compliance requirements such as age of virus database, antivirus product version, protection status, availability of antivirus protection, as well as firewall status − and force database updates. The ESET Remote Administrator tool comes standard with each version of ESET Business Solutions. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features. Copyright © 1992–2012 ESET, spol. s r. o. ESET, logo ESET, NOD32, ThreatSense, ThreatSense.Net and/or other mentioned products of ESET, spol. s r. o., are registered trademarks of ESET, spol. s r. o. Other here mentioned companies or products might be registered trademarks of its proprietors. Produced according to quality standards of ISO 9001:2000. pioneer of the antivirus industry for 25 years