Sécurité des serveurs de fichiers

ESET Server Security

Procure une protection avancée des données de votre entreprise passant par tous les serveurs généraux, le stockage de fichiers en réseau, y compris OneDrive, et les serveurs polyvalents pour assurer la continuité des activités.

  • Prévention des rançongiciels
  • Détection des menaces zero-day
  • Prévention des atteintes aux données
  • Protection du réseau de robots

Explore features

Machine learning

All ESET products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks.

Behavioural Detection - HIPS

ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognise and stop suspicious system behaviour.

Ransomware Shield

An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble the behaviour of ransomware.

Advanced Memory Scanner

ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory. Fileless malware operates without needing persistent components in the file system that can be detected conventionally. Only memory scanning can successfully discover and stop such malicious attacks.

Network Attack Protection

ESET Network Attack Protection improves detection of known vulnerabilities on the network level. It constitutes another important layer of protection against spreading malware, network-conducted attacks, and exploitation of vulnerabilities, for which a patch has not yet been released or deployed.

Protection for Linux servers

ESET provides installers for the most popular distributions of Unix-based systems, including the ‘Ready’ variations of RedHat and SuSE that comply with the File-System-Hierarchy standard. It requires no external libraries except for LIBC.

Botnet Protection

ESET Botnet Protection detects malicious communication used by botnets, and at the same time, identifies the offending processes. Any detected malicious communication is blocked and reported to the user.

Office 365 OneDrive Storage

After registration is done on a single server, ESET has the ability to scan OneDrive to provide visibility and monitor the trusted source of company storage.

Optional Cloud Sandbox Analysis

ESET Dynamic Threat Defense provides another layer of security for ESET File Security solutions by utilizing cloud-based sandboxing technology to detect new, never before seen type of threats.

AMSI/Protected Service Support

ESET products leverage the Antimalware Scan Interface (AMSI) to provide enhanced malware protection for users, data, applications, and workload. In addition, it utilizes the protected service interface that is a new security module built into Windows that only allows trusted, signed code to load and better protect against code injection attacks.

Exploit Blocker

ESET Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java and more), and instead of just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.

In-product Sandbox

ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware.

System requirements

Systèmes d'exploitation Windows pris en charge

  • Microsoft Windows Server 2019, 2016, 2012, 2008R2, 2008 SP2
  • Microsoft Windows Server Core 2016, 2012, 2008R2, 2008
  • Microsoft Small Business Server 2011, 2008

Produits inclus

  • ESET Server Security pour Microsoft Windows Server
  • ESET Server Security pour Linux
  • ESET Server Security pour Microsoft Azure

Configuration requise pour ESET Server Security for Linux

Prend en charge les principales distributions, notamment RedHat Enterprise Linux (RHEL), CentOS, Ubuntu Server, Debian, SUSE Linux Enterprise Server, Amazon Linux et Oracle Linux.

Pour les exigences détaillées, voir cette page.