Gartner report 2018:
Magic Quadrant for Endpoint Protection Platforms
Eliminates all types of threats, including viruses, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection.
Monitors the behavior of malicious processes and scans them once they decloak, allowing for effective infection prevention, even from heavily obfuscated malware.
New detection technology that strengthens protection against targeted attacks and previously unknown exploits – i.e. zero-day attacks.
Provides most relevant critical malware standalone cleaners within the product interface for malware which cannot be removed by the regular cleaner.
ESET Shared Local Cache stores the metadata of scanned files so replica files on one machine are not scanned again on other virtual machines.
Easily set up on-demand scans of connected Network Attached Storage (NAS). Used with ESET Shared Local Cache, can hugely reduce disk input/output operations.
Interconnect several installed nodes of ESET File Security within a cluster and manage them as one, eliminating the need to replicate changes in configuration manually.
Monitors key functionalities of ESET File Security via WMI framework. This allows integration of ESET File Security into third-party management and SIEM software.
Scans Microsoft Windows® servers with enabled Hyper-V role for malware, without the need to have another instance of an antivirus product in place. For enhanced performance, scans can be carried out on virtual machines while they are turned off.
Allows you to choose to install only those components you need:
Collects all logs relevant for troubleshooting into one archive, which can be emailed or uploaded to a shared network drive to speed up the troubleshooting process.
Allows you to define processes which are ignored by the real-time protection module – especially useful for backup or live virtual machine migration.
Delivers proven protection while leaving more system resources for essential programs that end users depend on daily.
By hiding the GUI completely, the “egui.exe” process does not run at all, resulting in even lower system resource consumption by the ESET solution.