Endpoint protection
ESET Endpoint Security
Leverages a multilayered approach that utilizes multiple technologies working together to balance performance, detection and false positives, and with automated malware removal and mediation.
- Protect against ransomware
- Block targeted attacks
- Prevent data breaches
- Stop fileless attacks
- Detect advanced persistent threats
- Mobile protection and MDM
Explore features
Managed from a unified console
All ESET endpoints, including endpoints and mobiles, can be managed from our cloud-based unified management console ESET PROTECT.
Stop fileless attacks
ESET endpoint protection platforms have mitigations in place to detect malformed or hijacked applications to protect against fileless attacks. Dedicated scanners were also created to constantly check memory for anything suspicious.
Block targeted attacks
ESET’s endpoint protection solutions use threat intelligence information based on their global presence to prioritize and effectively block the newest threats prior to their delivery anywhere else in the world. In addition, our solutions feature cloud-based updating to respond quickly in the case of a missed detection without having to wait for a regular update.
Safeguard the web browser
Designed to protect an organization’s assets with a special layer of protection that focuses on the browser, as the main tool used to access critical data inside the intranet perimeter and in the cloud. Secure Browser provides enhanced memory protection for the browser process, coupled with keyboard protection, and lets admins add URLs to be protected by it.
Network Attack Protection
ESET Network Attack Protection improves detection of known vulnerabilities on the network level.
Botnet Protection
ESET Botnet Protection detects malicious communication used by botnets, and at the same time, identifies the offending processes. Any detected malicious communication is blocked and reported to the user.
Machine learning
All ESET Endpoint products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks. For an in-depth inspection of the network, admins can turn on the special aggressive machine learning mode that works even without an internet connection.
Automatic protection
With this option enabled, admins can be sure that new users created within the Microsoft 365 tenant will be automatically protected without the need to go to the console to add them separately.
Quarantine manager
An admin can inspect objects in this storage section and decide to delete or release them. This feature offers simple management of emails and files that have been quarantined by our security product. On top of that, the admin can download quarantine items and investigate them with other tools locally.
Multitenancy
Add unlimited tenants and serve multiple companies from a single dedicated ESET Cloud Office Security console.
Rules
ESET’s comprehensive rule system allows administrators to manually define email filtering conditions and actions to take with the filtered emails.
User reports with quarantine release (NEW)
An admin can let employees have visibility into what is kept in quarantine. Once an email or any kind of object is put into quarantine, employees can receive an email with information about what has been quarantined and why. For spam detections, the end-user can also release an email from quarantine instead of an admin.