Our global research labs drive the development of ESET's unique technology

Botnet Protection

Botnet protection provides another, network-based, layer of detection to reveal possible running threats. It searches outgoing network communications for known malicious patterns, and matches the remote site against a blacklist of malicious ones. Any detected malicious communication is blocked and reported to the user.


Related products - Botnet Protection is used in:

SHOW MORE

SHOW LESS

Vulnerability Shield

Vulnerability shield is an extension of firewall and improves detection of known vulnerabilities on the network level. By detecting common vulnerabilities in widely used protocols, such as SMB, RPC and RDP, it constitutes another important layer of protection against spreading malware, network-conducted attacks and exploitation of vulnerabilities for which a patch has not yet been released or deployed.


Related products: Vulnerability Shield is used in

SHOW MORE

SHOW LESS

Anti-Phishing

Anti-Phishing technology protects you from attempts by fake websites, masquerading as legitimate ones, to acquire passwords, banking data and other sensitive information.
When a user’s computer attempts to access a URL, ESET systems compare it against our database of known phishing sites. If a match is found, connection to the URL is aborted and a warning message is displayed. At this point, the user has the option to proceed to the URL at his/her own risk or report the URL to us as a potential false positive warning.

The Anti-Phishing database is updated regularly by ESET (users’ computers receive data about new phishing threats every 20 minutes).

Along with this straightforward approach, ESET Anti-Phishing implements specific proactive algorithms. These inspect the visual design of websites in an effort to eliminate those mimicking their genuine counterparts. This approach is used to detect, for example, fake Internet banking forms.


Related products - Anti-Phishing Technology is used in:

SHOW MORE

SHOW LESS

Signature types

ESET’s scanning engine uses several types of detection signatures for detecting malicious objects (files, processes, URLs, etc.).
The signature types range from very specific hashes (useful, for example, in targeting specific malicious binaries, specific versions of malware, for statistical purposes, or simply for giving a more precise detection names to malware that we have been detecting heuristically) to DNA-based Smart Signatures, which are rather complex definitions of malicious behavior and malware characteristics. These signatures also rely on heuristics and emulation to evaluate the scanned sample.

The strength of ESET’s proactive detection lies in the Smart DNA signatures. They ensure that the detection is effective, as well as efficient – a single well-crafted signature can detect thousands of related malware variants and enables our antivirus software not only to detect malware that we already know of, or have seen before, but also new, previously unknown variants.


Related products:

SHOW MORE

SHOW LESS

Icon: Signature types

Advanced Heuristics

Advanced Heuristics is one of the technologies used for proactive detection. It provides the ability to detect unknown malware based on its functionality through emulation. The latest version introduces a completely new way of code emulation based on binary translation.
This new binary translator helps to bypass anti-emulation tricks used by malware writers. Along with these improvements, DNA-based scanning has also been extended significantly. This allows for better detections which address current malware more accurately.


Related products:

SHOW MORE

SHOW LESS

We Live Security

Get in the know about the latest in IT security – news, analyses and views, and how-tos from our experts.

Go to welivesecurity.com

ESET Security Forum

Join in the discussion with professionals from ESET community – on a broad range of topics.

Visit ESET Security Forum

ESET Community

Join us on Facebook and stay in the loop with everything ESET – including unique fan content!

Visit us on Facebook