Relying on powerful malware research at ESET for your enterprise defenses

Rene Holt

Malware research: the bedrock of ESET security products

At ESET, we believe in building the excellence of our security software products and services firmly on our ongoing efforts into malware research. This research is crucial to reveal how malware behaves, even as it tries to hide its presence with obfuscation or deception techniques. Leveraging such an in-depth understanding of the real-world behavior of malware then gives the ability to develop detection, scanning, blocking, scoring and other types of security software modules that detect and/or stop real malware in its tracks.

While this grounding in research is key, no one security module can act as the “silver bullet” for every form of malware. Each malware component demonstrates a specific behavior that requires specially crafted security modules apposite to deal with that behavior. That is why by leveraging fuller sets of modules – bundled as ESET products – businesses are better able to enjoy the protection they need against the varied cyber threats proliferating in the digital world.

Malware is not a static phenomenon, however. A host of black hat developers are out in the world right now updating and fine tuning their evil masterpieces. It is precisely here where a constant battle is raging between ESET researchers and malware developers. The “bad guys” are very much active in updating their tools for repeated attempts to infiltrate and/or take down high-value targets. ESET researchers, on the other hand, are resolutely and perseveringly lifting the fog on their malicious techniques.

You can keep track of the latest research from ESET at welivesecurity.com or follow ESET Research on Twitter.

Forrester names ESET a "Strong Performer" in endpoint security suites
Reflecting on the recent recognition of ESET as a “Strong Performer” in The Forrester Wave™: Endpoint Security Suites, Q3 2019, we believe the report brings to the forefront how the efforts of ESET researchers have positively impacted the development of ESET’s technologies and security products, as well as the continued protection of ESET’s customers. We believe that our approach stands out in the following ways:

  1. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus.
    This refers to the many advanced layers of defense built into ESET security products such as ESET Ransomware Shield, Advanced Memory Scanner, Advanced Machine Learning and ESET UEFI Scanner – the first of its kind to detect a UEFI rootkit in the wild called LoJax. ESET’s machine-learning engine recently detected a new malicious launcher belonging to the Winnti Group on computers at Hong Kong universities.

    *Forrester gave ESET the highest possible score in the malicious behavior protection criterion.

  2. ESET now offers a full portfolio of enterprise offerings.
    Mature security operations center (SOC) teams at enterprises require increasingly mature tools to protect their networks. ESET has developed a wide range of products to protect entire corporate networks, covering operating systems from Windows, Linux, macOS, Android, iOS or Lotus Domino to offering protection for endpoints and servers, as well as encryption and two-factor authentication solutions.

    For more advanced protection and detection capabilities, ESET also offers advanced cloud-sandboxing detection via ESET Dynamic Threat Defense, endpoint detection and response via ESET Enterprise Inspector and threat intelligence via ESET Threat Intelligence Data Feeds. By offering such a broad spectrum of products and services, ESET backs SOC teams with the advanced protection and increased visibility they need.

    View ESET’s entire business portfolio here.

  3. ESET continues its active contribution to important knowledge bases such as MITRE ATT&CK™
    MITRE ATT&CK has been an important initiative to collect open source data on threat actors and the tactics, techniques and procedures (TTPs) they are using to penetrate your security defenses. As part of furthering this worthy goal, ESET Research has contributed several previously unknown techniques and procedures to the knowledge base, one of the most recent being DePriMon, the first example of a malware using the Port Monitors technique ever to be publicly described.

    Consistently working together with the security community for over 30 years demonstrates a strong and authentic commitment from ESET to help everyone enjoy their technology safely.

Interested in getting your own copy of The Forrester Wave™: Endpoint Security Suites, Q3 2019 report? Click here.

Visit our enterprise product portfolio home page for a free trial of ESET’s bundled solutions for enterprise here.