Your simple path to
ESSENTIAL EIGHT ALIGNMENT

What Are the Essential Eight?

The Essential Eight was introduced by the Australian Cyber Security Centre (ACSC) in 2017. Starting with a holistic list of 37 strategies that can mitigate cybersecurity incidents, the ACSC categorised each based on its relevance to Australian businesses, ranging from ‘Essential’ to ‘Limited’. The strategies classed as ‘Essential’ became the Essential Eight.

Each strategy includes a variety of prescriptive controls for technical implementation, along with stipulated timeframes for specific processes and initiation activities.

The Essential Eight cybersecurity strategies come in four Maturity Levels (numbered zero to three). Each level represents progressively robust cybersecurity defences, meeting increasing minimum criteria, and provides protection against adversaries of rising sophistication and determination.

As your organisation advances through the maturity levels, the number of controls required for each mitigation strategy increases, and the criteria to meet controls fulfilled at earlier maturity stages become increasingly strict.

The ACSC encourages every business to select a target maturity level based on its unique risks and the likelihood that different types of adversaries will target it.

Get Access to the whitepaper

Out-of-the-box protection for all types of endpoints

Endpoint & data protection against ransomware

Multi-vector protection reducing attack surface

All-in-one protection with XDR to prevent breaches

Console Unified cybersecurity platform interface providing superior network visibility and control. Available as cloud or on-prem deployment.

Modern Endpoint Protection Advanced multilayered protection for computers and smartphones powered by unique ESET LiveSense technology.

Next-Generation
Antivirus Next-gen antivirus protection for business that helps you stay ahead of known and emerging threats with our AI-native, prevention-first approach.

Network Attack
Protection Fortifies your network infrastructure by blocking harmful network traffic directly on endpoints.

Device Control Enables restriction of unauthorized devices, such as USB flash drives or CDs, to prevent access to sensitive data, mitigating the risk of data breaches and insider threats.

Anti-Phishing Safeguards sensitive company data from phishing, spear phishing and other types of social engineering attacks.

Server Security Real-time protection for your company’s data passing through all general servers.

Mobile Threat Defense Robust security for all Android and iOS mobile devices within the organization. Equip your mobile fleet with Antimalware, Anti-Theft and MDM capabilities.

Available as on demand upgrade providing additional protection layer. Click here and contact a sales person to receive an offering tailored to your individual needs. No commitment.

Full Disk Encryption Robust encryption solution for system disks, partitions or entire devices to achieve legal compliance.

Advanced Threat Defense Proactive cloud-based prevention against ransomware or never-before-seen threat types with autonomous remediation capabilities.

Vulnerability & Patch Management Actively track & fix vulnerabilities in operating systems and applications across all endpoints.

Available as on demand upgrade providing additional protection layer. Click here and contact a sales person to receive an offering tailored to your individual needs. No commitment.

Available as on demand upgrade providing additional protection layer. Click here and contact a sales person to receive an offering tailored to your individual needs. No commitment.

Mail Server Security An additional layer of security, protecting Exchange and IBM email servers from threats entering the network on top of the standard endpoint and file server protection.

Features advanced anti-phishing, anti-malware, and anti-spam combined with cloud-powered proactive threat defense. Provides you with robust quarantine management and rule definition/filtering system.

Prevents ransomware and other email-borne attacks without compromising email's speed.

Available as on demand upgrade providing additional protection layer. Click here and contact a sales person to receive an offering tailored to your individual needs. No commitment.

Available as on demand upgrade providing additional protection layer. Click here and contact a sales person to receive an offering tailored to your individual needs. No commitment.

Cloud App Protection Advanced protection for Microsoft 365 and Google Workspace apps, with additional proactive threat defense.

Available as on demand upgrade providing additional protection layer. Click here and contact a sales person to receive an offering tailored to your individual needs. No commitment.

Available as on demand upgrade providing additional protection layer. Click here and contact a sales person to receive an offering tailored to your individual needs. No commitment.

Extended Detection
and Response 
Additional platform capability to proactively detect threats, effectively identify anomalous behavior in the network and realize timely remediation, preventing breaches and business disruption.

ESET Inspect, the XDR-enabling cloud-based tool, provides outstanding threat and system visibility, allowing risk managers and security professionals to perform fast and in-depth root cause analysis and immediately respond to incidents.

Unlock a higher protection tier with the added advantage of EDR included. Click here and reach out to our dedicated sales team to explore a tailored offering that meets your unique requirements. No commitment.

Starting at 25 devices.

Multi-Factor
Authentication
 Single-tap, mobile-based multi-factor authentication that protects organizations from weak passwords and unauthorized access.

Available as on demand upgrade providing additional protection layer. Click here and contact a sales person to receive an offering tailored to your individual needs. No commitment.

Available as on demand upgrade providing additional protection layer. Click here and contact a sales person to receive an offering tailored to your individual needs. No commitment.

Available as on demand upgrade providing additional protection layer. Click here and contact a sales person to receive an offering tailored to your individual needs. No commitment.

Looking for specific areas of protection?

Security solution

Cyber risk management and visibility into IT environment, including Endpoint Detection and Response.

Learn more

Security solution

Secured email communication with cloud-based sandboxing.

Learn more

Protection category

Identity & data protection

Comply with data regulations thanks to our Encryption and 2-Factor Authentication solutions.

Learn more

Protection category

Cloud sandbox analysis

Advanced preventive protection for your Microsoft 365 cloud email and storage.

Learn more

Protection category

File server security

Protect your file servers, SharePoint or Gateway servers with multi-layered protection.

Learn more

Protection category

Cybersecurity services

Browse our security services such as Threat Hunting or our professional services like Deployment or Premium Support.

Learn more

ANSWER A FEW QUESTIONS AND FIND YOUR IDEAL SECURITY SOLUTION.

Let us help you find the right solution

 

STEP 1 OF 5

What is your current role?

Meet ESET

For more than 30 years, ESET® has been developing industry-leading IT security software and services to deliver comprehensive, multilayered protection against cybersecurity threats for businesses and consumers worldwide. ESET has long pioneered machine learning and cloud technologies that prevent, detect, and respond to malware. ESET is a privately owned company that promotes scientific research and development worldwide.

0bn+
internet users protected by ESET technology
1
R&D centers worldwide
0k
business customers in 200+ countries and territories

"We are dedicated to protecting the progress that technology enables."
Richard Marko, CEO, ESET

"We are dedicated to protecting the progress that technology enables."
Richard Marko, CEO, ESET