Protection des points terminaux

ESET Endpoint Security

Exploite une approche multicouche qui utilise plusieurs technologies en équilibre dynamique pour équilibrer constamment les performances, la détection et les faux positifs, ce qui permet aux organisations:

  • Protection contre les logiciels de rançon
  • Bloquer les attaques ciblées
  • Prévenir les violations de données
  • Arrêter les attaques sans fichier
  • Détecter les menaces persistantes avancées
  • Protection mobile et MDM

Explore features

Managed from a unified console

All ESET endpoints, including endpoints and mobiles, can be managed from our cloud-based unified management console ESET PROTECT.

Stop fileless attacks

ESET endpoint protection platforms have mitigations in place to detect malformed or hijacked applications to protect against fileless attacks. Dedicated scanners were also created to constantly check memory for anything suspicious.

Block targeted attacks

ESET’s endpoint protection solutions use threat intelligence information based on their global presence to prioritize and effectively block the newest threats prior to their delivery anywhere else in the world. In addition, our solutions feature cloud-based updating to respond quickly in the case of a missed detection without having to wait for a regular update.

Safeguard the web browser

Designed to protect an organization’s assets with a special layer of protection that focuses on the browser, as the main tool used to access critical data inside the intranet perimeter and in the cloud. Secure Browser provides enhanced memory protection for the browser process, coupled with keyboard protection, and lets admins add URLs to be protected by it.

Network Attack Protection

ESET Network Attack Protection improves detection of known vulnerabilities on the network level.

Botnet Protection

ESET Botnet Protection detects malicious communication used by botnets, and at the same time, identifies the offending processes. Any detected malicious communication is blocked and reported to the user.

Machine learning

All ESET Endpoint products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks. For an in-depth inspection of the network, admins can turn on the special aggressive machine learning mode that works even without an internet connection.

In-product Sandbox

ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware.

Ransomware Shield

An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble ransomware behavior.

Behavioral Detection - HIPS

ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognize and stop suspicious system behavior.

UEFI Scanner

ESET is the first endpoint security provider to add a dedicated layer into its solution that protects the Unified Extensible Firmware Interface (UEFI). ESET UEFI Scanner checks and enforces the preboot environment's security and is designed to monitor the integrity of the firmware. If modification is detected, it notifies the user.

Advanced Memory Scanner

ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory. Fileless malware operates without needing persistent components in the file system that can be detected conventionally. Only memory scanning can successfully discover and stop such malicious attacks.

Exploit Blocker

ESET Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java and more), and instead of just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.

How does ESET Endpoint Security work?

ESET uses multilayered technologies to go far beyond the capabilities of basic antivirus. See various core ESET technologies and an approximation of when and how they can detect and/or block a threat during its lifecycle in the system.

System requirements

Produits inclus

 

Pour les ordinateurs

  • ESET Endpoint Security for Windows
  • ESET Endpoint Security for Mac
  • ESET Endpoint Antivirus for Windows
  • ESET Endpoint Antivirus for Mac
  • ESET Endpoint Antivirus for Linux

Pour les smartphones et les tablettes

  • ESET Endpoint Security for Android
  • ESET MDM for iOS & iPadOS 

 

Télécharger la présentation complète du produit

Systèmes d'exploitation pris en charge

 

Pour les ordinateurs

  • Microsoft Windows 11, 10, 8.1, 8, 7
  • ARM64 : Veuillez noter que sur Microsoft® Windows® on ARM, certaines caractéristiques et fonctionnalités ne sont pas prises en charge. Lire la suite
  • macOS 10.12 et plus
  • Ubuntu Desktop 18.04 LTS 64-bit et RedHat Enterprise Linux (RHEL) Desktop 7 64-bit

Pour les smartphones et les tablettes

  • Android 5 (Lollipop) et plus
  • iOS 9 et plus