SlideShare una empresa de Scribd logo
1 de 41
Descargar para leer sin conexión
ESET NOD32
The beginnings of ESET


The beginnings of ESET date back to 1987 when two young programming 
enthusiasts, Peter Paško and Miroslav Trnka, discovered one of the early 
computer viruses. They dubbed it “Vienna” and wrote a program for its 
detection. 
 
Many other virus discoveries quickly followed, which sparked the idea to 
devise a universal software solution to counter these then relatively 
unknown computer threats. 
  
 
   
Global Headquarters


           Bratislava, Slovakia
Regional Centers
Research and Development Centers
Presence in more than




countries worldwide
growth over the past 5 years
Protecting




Crore users worldwide
and it means




combined ESS/NOD32 installation
  share on all PCs and laptops
ESET India growth in 2010




 
More than 22 00 000 Indian users trust ESET* 
 
* Total number of Installations 
ESET World Map 2011
Countries where the brand ranks among top 3 (Online Security Brand Tracker 2011 survey)
Top 10 ESET Performance Markets 
  Russia                                                   49,850,000

   Brazil                                31,137,000

  Turkey                                30,415,000

Argentina                  22,782,000

  Mexico                  22,185,000

    India                21,222,000

    USA           18,182,000

Colombia     15,200,000

 Thailand    14,967,000                               Total Brand 
 Ukraine    14,000,000
                                                      Awareness 
ESET in India


 
ESET India growth in last two 
years 300% 
 
MORE than 22 00 000 Indian 
users trust ESET* 
 
* Total number of Installations 
  
ESET Technology
Real-Time Adaptive Scanning Technology


• Engineered to be fast, light and accurate
• ESET solutions are among most effective malware scanners in
  the industry.
• The ThreatSense® technology.
• Combined with global malware intelligence and unobtrusive
  updates
• ESET users get maximum protection at all times.
Real-Time Adaptive Scanning Technology




   VIRUS SIGNATURES       GENERIC SIGNATURES
    Common protection     Future mutations


      CODE ANALYSIS       EMULATION
        Static analysis   Advanced detection
ESET Heuristics
• Heuristics is a technique that implements a set of guidelines or
  rules to solve the problem of detecting known and unknown
  malicious program s. Heuristics helps to detect malware
  behavior, without need to uniquely identify the specific threat
  .
• ESET Smart Security and ESET NOD32 Antivirus use heuristics
  to detect both known and unknown threats and malware.
  Two forms of heuristics are used, passive and active.
Heuristic
Effectiveness
AV-comparatives.org retrospective
testing with detection and false
positives results (May 2007)
Passive heuristics
• Passive heuristics analyze a potential threat as it is scanned, tracing through
  the instructions in the program before passing the code to the processor for
  execution. Passive heuristics look for patterns, routines or program calls that
  indicate malicious behavior. Though an important tool, passive heuristics alone
  are only part of the solution, as there is no single action that a malicious
  program can perform that is not also allowed in a legitimate program. This is
  why the simultaneous use of active heuristics is important.
Active heuristics
• ESET's active heuristic technology creates a virtual computer within the
  scanning engine that allows the scanner to observe what the program might
  do if allowed to run on a real computer. This can reveal potentially malicious
  activities that other detection techniques would not identify.
ESET Live Grid




 Long before cloud computing gained traction in the antimalware industry,
ESET developed a unique cloud-based technology. ESET Live Grid serves as an
early warning system that intercepts hundreds of thousands of new threats
 daily across the globe to keep our clients secure in face of emerging threats.
LIVE GRID
UNILICENSE




ESET Unilicense – allows protecting multiple platforms with a
  single license. ESET security solutions can be deployed on
  operating systems of choice in a mix-and-match fashion.
UNILICENSE:
Multi-Platform Support
ESET for Consumers




 Smart Detection
 Small System Footprint
 Optimized Startup Procedure
V5 Security Features


Advanced HIPS Functionality customize the behavior of the system in greater
detail:
Out of Home Network Detection Alerts the user when connecting to an
unknown network prompting to switch to the Strict Protection mode
Parental Control Protects your family from potentially offensive web content
Enhanced Media Control Automatically scans all USB flash discs, memory cards
and CDs/DVDs for threats.
Gamer Mode Streamlines protection during online sessions for continual security
Putting the user in Control the tools pane view is highly intuitive and
transparent, allowing for quick navigation.
ESET Smart Security 5
 All-in-one internet security suite



      Feature Highlights

      •   Antispam
      •   Antispyware
      •   Anti-rootkit
      •   Personal Firewall
      •   Parental Control
      •   Host Intrusion Prevention System
      •   Gamer Mode
      •   Available in 1 user & 3 user pack
      •   ESET Smart Security 1 user: MRP : Rs. 999
      •   ESET Smart Security 3 user: MRP : Rs. 1999
ESET NOD32 Antivirus 5
Professional Protection for Home Computer, Notebook or Workstation!




                       Feature Highlights

                       •   Antispyware
                       •   Anti-rootkit
                       •   Cloud-Powered Scanning
                       •   Removable Media Management
                       •   Host Intrusion Prevention System
                       •   Gamer Mode
                       •   Low System Footprint
                       •   Available in 3 user pack
                       •   MRP : Rs. 1699
ESET NOD32 Antivirus vs.
                            ESET Smart Security

                                           Safer Malware Protection
Antivirus (ThreatSense® technology)

Antispyware

Host-Based Intrusion Prevention System (HIPS)

Cloud-Enhanced Whitelisting

Removable Media Control

Antirootkit

                                            Smarter Online Safety

Antispam

Intelligent Firewall

Gamer Mode

                                  Stronger Parental Controls and Education

Parental Controls
ESET Mobile Security
Key Features

    ANTI‐THEFT FEAUTRES 
     Remote Lock 
     Remote Wipe 
     GPS Localization 
     SIM Matching 
     Trusted Friend 
     Call Blocking 
     Uninstall Protection 
     
    SECURITY FEATURES 
     SMS/MMS Antispam 
     Realtime Protection 
     Security Audit 
     Onaccess Scanning 
     On demand Scanning 
ESET: SOLUTION FOR SMB

  -- NEW LAUNCH -- 




           18 months of validity 
Endpoint Solutions comes in two versions:
                     ESET Endpoint Security
              ESET Endpoint Antivirus (Lighter version)

  Both solutions combine cloud-powered scanning technology and the
award-winning ThreatSense scanning engine for optimized performance.
Key Features




ESET Remote Administrator: centralized and remote
management software, with role-based privileges,
dynamic client groups, remote installation, notifications,
updates management, web dashboard, and everything the
IT administrator need to keep the endpoints secure and up-   ESET provides Endpoint Security software for Windows, Mac
to-date!                                                     and Linux under the Unilicense concept
ESET Gateway/ File/ Mail Security
                   for Windows/ Linux




Provides proactive and              Delivers comprehensive             Safeguards your email 
lightweight security as your        antimalware protection for your    communication channels with 
business network’s first line of    vital business data in a small     award‐winning antivirus and 
defense against malware and         footprint that ensures             antispam technology that 
other cyberthreats                  optimal server performance         proactively detects known and 
                                                                       emerging malware  
Technology Quadrants

                                                                                                                Extensive Proactive Protection
                             Unreliable Technology                 Well-balanced Protection
  High 




                                                                                                                Detecting Unknown Threats

                                                                                                                False positives <–> High Detection
  Proactive Detection Rate




                                                                                                                Rate

                                              BitDefender                                                       Technologically superior product
                                     GDATA 

                                              Alwil                            Kaspersky           Microsoft 
                                                                                               McAfee 
                                                                    Grisoft AVG 
                                                       Norman                               Symantec 
                                                                                      F‐Secure 
                                                                                             Norman 
  Low 




                             Poor Technology                               Inefficient Technology

                             High                        False Positives                           Low 



Source: AV-Comparatives 2008-2011
 
Virus Bulletin VB100 Awards
Long track record of excellent results Highest Number of VB100 Awards
Highest Number of Advance+ Awards
Performance Overhead

          Superior performance and small footprint at the same time

                                                                                                                                                 Boot Time Test        File Copying         Encoding/Transcoding




                                                                                                            106%




                                                                                                                                                                                                     161%
                                                                                60%
                                            66%




                                                                                                                                                     49%




                                                                                                                                                                         58%




                                                                                                                                                                                               56%
                          45%




                                                                                                 39%




                                                                                                                                                                               63%
                                                                                                                               29%
                                                                                                                   28%
                                                        70%




                                                                          70%




                                                                                                                                     35%
                                                              53%
                                      25%




                                                                                                                                                           52%
                                                                                           32%
                    22%




                                                                                                                         10%




                                                                                                                                                                                      10%
                                                                                                                                           19%
                                                  16%




                                                                    14%
         31%




                                                                                                                                                                                                            31%
                                13%
   12%




                                                                                      9%




                                                                                                                                                                  6%
               3%




                                                                                                       7%




Source: AV-Comparatives 2004-2011
Latest Awards and Achievements




The only company with unbroken             All certification from AV-Test and TUV,
string of 49 VB100 awards (70 overall)   first and only certified Mac OS X product




      Scores high in all tests                Second in Stiftung Warentest
      14 Advanced+ Awards                         and Consumer Reports
Thank You

Más contenido relacionado

La actualidad más candente

Ağ Protokollerine Yönelik Adli Bilişim Analizi
Ağ Protokollerine Yönelik Adli Bilişim AnaliziAğ Protokollerine Yönelik Adli Bilişim Analizi
Ağ Protokollerine Yönelik Adli Bilişim AnaliziBGA Cyber Security
 
Company profile interior
Company profile interiorCompany profile interior
Company profile interiorKlik Homes
 
Bilgisayar AğLari Ve YöNetimi Sunum
Bilgisayar AğLari Ve YöNetimi SunumBilgisayar AğLari Ve YöNetimi Sunum
Bilgisayar AğLari Ve YöNetimi Sunumlaika
 
Software, clasificacion y tipos
Software, clasificacion y tiposSoftware, clasificacion y tipos
Software, clasificacion y tiposSandra Mendoza
 
Pfsense Firewall ve Router Eğitimi
Pfsense Firewall ve Router EğitimiPfsense Firewall ve Router Eğitimi
Pfsense Firewall ve Router EğitimiBGA Cyber Security
 
Dbms Existentes
Dbms ExistentesDbms Existentes
Dbms Existenteseder8
 
Web Application Vulnerabilities
Web Application VulnerabilitiesWeb Application Vulnerabilities
Web Application VulnerabilitiesPreetish Panda
 
bilgi-guvenligi-farkindalik-egitimi------2pptx.pptx
bilgi-guvenligi-farkindalik-egitimi------2pptx.pptxbilgi-guvenligi-farkindalik-egitimi------2pptx.pptx
bilgi-guvenligi-farkindalik-egitimi------2pptx.pptxssuser1205cb
 
Electronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRMElectronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRMRob Robinson
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusSpencerLuke2
 
Web Uygulamalarında Kayank Kod Analizi – II
Web Uygulamalarında Kayank Kod Analizi – IIWeb Uygulamalarında Kayank Kod Analizi – II
Web Uygulamalarında Kayank Kod Analizi – IIMehmet Ince
 
Arnaque et Internet
Arnaque et InternetArnaque et Internet
Arnaque et InternetGerard Haas
 
Some Tatbikatları ve SIEM Testleri İçin Siber Saldırıları Nasıl Optimize Ederiz?
Some Tatbikatları ve SIEM Testleri İçin Siber Saldırıları Nasıl Optimize Ederiz?Some Tatbikatları ve SIEM Testleri İçin Siber Saldırıları Nasıl Optimize Ederiz?
Some Tatbikatları ve SIEM Testleri İçin Siber Saldırıları Nasıl Optimize Ederiz?BGA Cyber Security
 
RainScapes Manual Montgomery County MD Department of Environmental Protection
RainScapes Manual    Montgomery County MD Department of Environmental ProtectionRainScapes Manual    Montgomery County MD Department of Environmental Protection
RainScapes Manual Montgomery County MD Department of Environmental ProtectionAnn English
 

La actualidad más candente (20)

Ağ Protokollerine Yönelik Adli Bilişim Analizi
Ağ Protokollerine Yönelik Adli Bilişim AnaliziAğ Protokollerine Yönelik Adli Bilişim Analizi
Ağ Protokollerine Yönelik Adli Bilişim Analizi
 
Company profile interior
Company profile interiorCompany profile interior
Company profile interior
 
Bilgisayar AğLari Ve YöNetimi Sunum
Bilgisayar AğLari Ve YöNetimi SunumBilgisayar AğLari Ve YöNetimi Sunum
Bilgisayar AğLari Ve YöNetimi Sunum
 
E-Mail Forensics
E-Mail ForensicsE-Mail Forensics
E-Mail Forensics
 
Software, clasificacion y tipos
Software, clasificacion y tiposSoftware, clasificacion y tipos
Software, clasificacion y tipos
 
Ossec - Host Based Saldırı Tespit Sistemi
Ossec - Host Based Saldırı Tespit SistemiOssec - Host Based Saldırı Tespit Sistemi
Ossec - Host Based Saldırı Tespit Sistemi
 
Pfsense Firewall ve Router Eğitimi
Pfsense Firewall ve Router EğitimiPfsense Firewall ve Router Eğitimi
Pfsense Firewall ve Router Eğitimi
 
Dbms Existentes
Dbms ExistentesDbms Existentes
Dbms Existentes
 
Presentacion+cisco
Presentacion+ciscoPresentacion+cisco
Presentacion+cisco
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Web Application Vulnerabilities
Web Application VulnerabilitiesWeb Application Vulnerabilities
Web Application Vulnerabilities
 
bilgi-guvenligi-farkindalik-egitimi------2pptx.pptx
bilgi-guvenligi-farkindalik-egitimi------2pptx.pptxbilgi-guvenligi-farkindalik-egitimi------2pptx.pptx
bilgi-guvenligi-farkindalik-egitimi------2pptx.pptx
 
Electronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRMElectronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRM
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skus
 
Web Uygulamalarında Kayank Kod Analizi – II
Web Uygulamalarında Kayank Kod Analizi – IIWeb Uygulamalarında Kayank Kod Analizi – II
Web Uygulamalarında Kayank Kod Analizi – II
 
Mobile security
Mobile securityMobile security
Mobile security
 
Arnaque et Internet
Arnaque et InternetArnaque et Internet
Arnaque et Internet
 
Some Tatbikatları ve SIEM Testleri İçin Siber Saldırıları Nasıl Optimize Ederiz?
Some Tatbikatları ve SIEM Testleri İçin Siber Saldırıları Nasıl Optimize Ederiz?Some Tatbikatları ve SIEM Testleri İçin Siber Saldırıları Nasıl Optimize Ederiz?
Some Tatbikatları ve SIEM Testleri İçin Siber Saldırıları Nasıl Optimize Ederiz?
 
RainScapes Manual Montgomery County MD Department of Environmental Protection
RainScapes Manual    Montgomery County MD Department of Environmental ProtectionRainScapes Manual    Montgomery County MD Department of Environmental Protection
RainScapes Manual Montgomery County MD Department of Environmental Protection
 

Similar a Eset India General Presentation

Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-securityÜstün Koruma
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product InformationZeeshan Humayun
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That WorksBrett L. Scott
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
ESET Technology: The multi-layered approach and its effectiveness
ESET Technology: The multi-layered approach and its effectivenessESET Technology: The multi-layered approach and its effectiveness
ESET Technology: The multi-layered approach and its effectivenessESET Middle East
 

Similar a Eset India General Presentation (20)

Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
cb-EDR-V7_a4_Digital
cb-EDR-V7_a4_Digitalcb-EDR-V7_a4_Digital
cb-EDR-V7_a4_Digital
 
Sophos
SophosSophos
Sophos
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
ESET Technology: The multi-layered approach and its effectiveness
ESET Technology: The multi-layered approach and its effectivenessESET Technology: The multi-layered approach and its effectiveness
ESET Technology: The multi-layered approach and its effectiveness
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 
K7 Total Security Datasheet
K7 Total Security DatasheetK7 Total Security Datasheet
K7 Total Security Datasheet
 

Eset India General Presentation

  • 2. The beginnings of ESET The beginnings of ESET date back to 1987 when two young programming  enthusiasts, Peter Paško and Miroslav Trnka, discovered one of the early  computer viruses. They dubbed it “Vienna” and wrote a program for its  detection.    Many other virus discoveries quickly followed, which sparked the idea to  devise a universal software solution to counter these then relatively  unknown computer threats.          
  • 3. Global Headquarters Bratislava, Slovakia
  • 6. Presence in more than countries worldwide
  • 7. growth over the past 5 years
  • 9. and it means combined ESS/NOD32 installation share on all PCs and laptops
  • 10. ESET India growth in 2010   More than 22 00 000 Indian users trust ESET*    * Total number of Installations 
  • 11. ESET World Map 2011 Countries where the brand ranks among top 3 (Online Security Brand Tracker 2011 survey)
  • 12. Top 10 ESET Performance Markets  Russia 49,850,000 Brazil 31,137,000 Turkey 30,415,000 Argentina 22,782,000 Mexico 22,185,000 India 21,222,000 USA 18,182,000 Colombia 15,200,000 Thailand 14,967,000 Total Brand  Ukraine 14,000,000 Awareness 
  • 15. Real-Time Adaptive Scanning Technology • Engineered to be fast, light and accurate • ESET solutions are among most effective malware scanners in the industry. • The ThreatSense® technology. • Combined with global malware intelligence and unobtrusive updates • ESET users get maximum protection at all times.
  • 16. Real-Time Adaptive Scanning Technology VIRUS SIGNATURES GENERIC SIGNATURES Common protection Future mutations CODE ANALYSIS EMULATION Static analysis Advanced detection
  • 17. ESET Heuristics • Heuristics is a technique that implements a set of guidelines or rules to solve the problem of detecting known and unknown malicious program s. Heuristics helps to detect malware behavior, without need to uniquely identify the specific threat . • ESET Smart Security and ESET NOD32 Antivirus use heuristics to detect both known and unknown threats and malware. Two forms of heuristics are used, passive and active.
  • 18. Heuristic Effectiveness AV-comparatives.org retrospective testing with detection and false positives results (May 2007)
  • 19. Passive heuristics • Passive heuristics analyze a potential threat as it is scanned, tracing through the instructions in the program before passing the code to the processor for execution. Passive heuristics look for patterns, routines or program calls that indicate malicious behavior. Though an important tool, passive heuristics alone are only part of the solution, as there is no single action that a malicious program can perform that is not also allowed in a legitimate program. This is why the simultaneous use of active heuristics is important. Active heuristics • ESET's active heuristic technology creates a virtual computer within the scanning engine that allows the scanner to observe what the program might do if allowed to run on a real computer. This can reveal potentially malicious activities that other detection techniques would not identify.
  • 20. ESET Live Grid Long before cloud computing gained traction in the antimalware industry, ESET developed a unique cloud-based technology. ESET Live Grid serves as an early warning system that intercepts hundreds of thousands of new threats daily across the globe to keep our clients secure in face of emerging threats.
  • 22. UNILICENSE ESET Unilicense – allows protecting multiple platforms with a single license. ESET security solutions can be deployed on operating systems of choice in a mix-and-match fashion.
  • 24. ESET for Consumers  Smart Detection  Small System Footprint  Optimized Startup Procedure
  • 25. V5 Security Features Advanced HIPS Functionality customize the behavior of the system in greater detail: Out of Home Network Detection Alerts the user when connecting to an unknown network prompting to switch to the Strict Protection mode Parental Control Protects your family from potentially offensive web content Enhanced Media Control Automatically scans all USB flash discs, memory cards and CDs/DVDs for threats. Gamer Mode Streamlines protection during online sessions for continual security Putting the user in Control the tools pane view is highly intuitive and transparent, allowing for quick navigation.
  • 26. ESET Smart Security 5 All-in-one internet security suite Feature Highlights • Antispam • Antispyware • Anti-rootkit • Personal Firewall • Parental Control • Host Intrusion Prevention System • Gamer Mode • Available in 1 user & 3 user pack • ESET Smart Security 1 user: MRP : Rs. 999 • ESET Smart Security 3 user: MRP : Rs. 1999
  • 27. ESET NOD32 Antivirus 5 Professional Protection for Home Computer, Notebook or Workstation! Feature Highlights • Antispyware • Anti-rootkit • Cloud-Powered Scanning • Removable Media Management • Host Intrusion Prevention System • Gamer Mode • Low System Footprint • Available in 3 user pack • MRP : Rs. 1699
  • 28. ESET NOD32 Antivirus vs. ESET Smart Security Safer Malware Protection Antivirus (ThreatSense® technology) Antispyware Host-Based Intrusion Prevention System (HIPS) Cloud-Enhanced Whitelisting Removable Media Control Antirootkit Smarter Online Safety Antispam Intelligent Firewall Gamer Mode Stronger Parental Controls and Education Parental Controls
  • 30. Key Features ANTI‐THEFT FEAUTRES   Remote Lock   Remote Wipe   GPS Localization   SIM Matching   Trusted Friend   Call Blocking   Uninstall Protection    SECURITY FEATURES   SMS/MMS Antispam   Realtime Protection   Security Audit   Onaccess Scanning   On demand Scanning 
  • 31. ESET: SOLUTION FOR SMB -- NEW LAUNCH --  18 months of validity 
  • 32.
  • 33. Endpoint Solutions comes in two versions:  ESET Endpoint Security  ESET Endpoint Antivirus (Lighter version) Both solutions combine cloud-powered scanning technology and the award-winning ThreatSense scanning engine for optimized performance.
  • 34. Key Features ESET Remote Administrator: centralized and remote management software, with role-based privileges, dynamic client groups, remote installation, notifications, updates management, web dashboard, and everything the IT administrator need to keep the endpoints secure and up- ESET provides Endpoint Security software for Windows, Mac to-date! and Linux under the Unilicense concept
  • 35. ESET Gateway/ File/ Mail Security for Windows/ Linux Provides proactive and  Delivers comprehensive  Safeguards your email  lightweight security as your  antimalware protection for your  communication channels with  business network’s first line of  vital business data in a small  award‐winning antivirus and  defense against malware and  footprint that ensures  antispam technology that  other cyberthreats   optimal server performance  proactively detects known and  emerging malware  
  • 36. Technology Quadrants Extensive Proactive Protection Unreliable Technology Well-balanced Protection High  Detecting Unknown Threats False positives <–> High Detection Proactive Detection Rate Rate BitDefender  Technologically superior product GDATA  Alwil  Kaspersky  Microsoft  McAfee  Grisoft AVG  Norman  Symantec  F‐Secure  Norman  Low  Poor Technology Inefficient Technology High  False Positives Low  Source: AV-Comparatives 2008-2011  
  • 37. Virus Bulletin VB100 Awards Long track record of excellent results Highest Number of VB100 Awards
  • 38. Highest Number of Advance+ Awards
  • 39. Performance Overhead Superior performance and small footprint at the same time Boot Time Test File Copying Encoding/Transcoding 106% 161% 60% 66% 49% 58% 56% 45% 39% 63% 29% 28% 70% 70% 35% 53% 25% 52% 32% 22% 10% 10% 19% 16% 14% 31% 31% 13% 12% 9% 6% 3% 7% Source: AV-Comparatives 2004-2011
  • 40. Latest Awards and Achievements The only company with unbroken All certification from AV-Test and TUV, string of 49 VB100 awards (70 overall) first and only certified Mac OS X product Scores high in all tests Second in Stiftung Warentest 14 Advanced+ Awards and Consumer Reports