Security updates without the headache. Learn more
How to become
cybersecurity compliant
Laws and regulations affecting data can vary widely, depending on where your operate, which sectors you are active in, and the sensitivity of the data you handle.
ESET empowers you with clear guidance, robust tools, and effective solutions to navigate these complexities, giving you and your users peace of mind.
REGULATION
CIPA
U.S. law requiring schools and libraries that receive federal funding for internet access to filter and block inappropriate online content.
REGULATION
Cyber insurance
Insurance that provides coverage against corporate losses resulting from cyber attacks or data breaches.
REGULATION
FedRAMP
U.S. program to standardize security assessment, authorization, and continuous monitoring of cloud products and services used by federal agencies.
REGULATION
FERPA
U.S. law that protects the privacy of student education records, giving parents certain rights and restricting disclosure without parental consent.
REGULATION
GDPR
European Union regulation to protect privacy and personal data. It imposes strict requirements in the processing and protection of such data.
REGULATION
GLBA
U.S. federal law that requires financial institutions to protect the security and confidentiality of non-public customer information.
REGULATION
HECVAT
Framework used in higher education to assess and communicate the security and privacy practices of third-party service providers.
REGULATION
HIPAA
U.S. federal law that establishes standards for the privacy and security of protected health information and governs the transmission of health data.
REGULATION
HITECH
U.S. federal law affecting health information technology, including the exchange of electronic health records, and strengthening HIPAA provisions.
REGULATION
ISO 15408
Also known as the Common Criteria; an international standard for evaluating and certifying security features of IT products and systems.
REGULATION
ISO 27001
International standard for information security management systems. The year denotes the version of the standard.
REGULATION
ISO 9001
Widely used international standard for quality management systems, applicable to various industries.
REGULATION
NIST
Institute that provides standards, guidelines, and best practices for information security management, including for U.S. federal security systems.
REGULATION
NIS2
The Network and Information Security Directive 2 is an EU law, expanding the original NIS, designed to boost cybersecurity across member states.
REGULATION
PCI DSS
A set of security standards designed to ensure security among all companies that accept, process, store, or transmit credit card information.
REGULATION
SOC2
Framework for managing and securing data, focusing on the security, availability, processing integrity, confidentiality, and privacy of customer data.
REGULATION
SOX
U.S. federal law that sets security standards for public company boards and public accounting firms, requiring internal controls and procedures.
REGULATION
VPAT
A document explaining how information and communication technology products are made accessible to people with disabilities.
Explore certifications
from external validation and accreditation bodies
External validation and accreditation is critically important to organizations that rely on ESET's capabilities and technology to secure their data and comply with regulatory requirements.
What this means for you
- As a cybersecurity provider, ESET naturally treats the security of its own data and that of its users as a core priority.
- As evidence, observe how we have designed our own security practices and controls so that they protect customer information confidentiality, integrity, and availability: on this page we explain how ESET PROTECT, our main B2B cybersecurity platform, is designed to ensure compliance.
Enhanced Security
ESET's development, sales, and delivery of security solutions adhere to best practices for information security.
Data Protection
Your confidential information is safeguarded by our robust security protocols.
Continued Trust
Our commitment to information security is independently verified through regular audits.
CERTIFICATION
ISO 27001:2013
ESET strengthens security with ISO 27001:2013 certification.
We're committed to providing the highest level of information security. That's why ESET has achieved ISO 27001:2013 certification for our core processes and services.
This internationally recognized standard verifies that we implement rigorous information security controls to protect your data.
CERTIFICATION
ISO 9001:2015
ESET is proud to announce that our commitment to quality has been recognized with ISO 9001:2015 certification.
This internationally-renowned standard verifies that our processes for developing, selling, and servicing security solutions meet the highest standards.
This ongoing commitment ensures we continuously improve our processes to deliver the best possible experience for our customers.
Let our experts build the right solution to meet your needs.
What others say about ESET
Frequently asked questions
What industry certifications does ESET have?
ESET is ISO 27001:2013 and ISO 9001:2015 certified. Please click on the Certification/Compliance badges above for more information, or contact your local ESET Distributor regarding our certificates.
How does ESET ensure quality, information security, and efficient implementation of its security solutions?
ESET has an Integrated Management System Policy (Security Policy) which:
- defines general quality management and information security management frameworks,
- defines responsibilities with regard to quality assurance management and information security management,
- defines the basic objectives of the integrated management system.
Please contact your local ESET Distributor to obtain a public version of the Integrated Management System Policy.
Does ESET have a documented and approved business continuity/disaster recovery plan with a designated owner?
Yes, ESET has a Business Continuity Policy and Business Continuity Plan in place and our Business Continuity documentation is:
- periodically reviewed by senior management
- tested on an annual basis
- updated with lessons learned
Please contact your local ESET Distributor regarding the public version of our Business Continuity Plan.
Does ESET have a formal incident response plan?
Yes, ESET has an Incident Response Plan (IRP) whose purpose is to describe incident response processes and procedures for incident resolution within ESET. Incidents are handled by our 24/7 Security Operations Center.
ESET's IRP covers:
- incident reporting
- our incident response team, with clearly defined roles
- regular testing (on an annual basis)
- capability to respond to incidents (24/7/365)
- incident response process (phases and flow)
- incident types
- incident triage
Please contact your local ESET Distributor regarding the public version of our Incident Response Plan.