Future ready cybersecurity for enterprise

Your business partner trusted by analysts and customers alike

Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

Greenpeace logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon MJ Group logo

protected by ESET since 2016
more than 14,000 endpoints

T-Com logo

ISP security partner since 2008
2 million customer base

ESET zählt zu den 2019 Gartner Peer Insights Customers' Choice für Endpoint Protection-Plattformen

Mehr erfahren

ESET Enterprise Inspector gilt als Highlight im Forrester Now Tech: Enterprise Detection and Response, Bericht Q1 2020

Mehr erfahren

ESET recognized as a Top Player in Radicati’s 2020 Market Quadrant APT Protection Report

Learn more

ESET ist als einziger Challenger im Gartner Magic Quadrant for Endpoint Protection Platforms Report 2019

Mehr erfahren

ESET gilt als "Strong Performer" im The Forrester Wave™: Endpoint Security Suites Q3 2019 Report

Mehr erfahren

ESET wird zum 2. Mal in Folge als "Top Player" eingestuft und erhöht die Gesamtbewertung im Radicati's 'Endpoint Security' Market Quadrant

Mehr erfahren

ESET Enterprise Inspector featured in KuppingerCole Executive View report 2020

Learn more

ESET Endpoint Protection, Detection and Response offering featured in KuppingerCole Market Compass 2020 for its universal coverage.

Learn more

ESET reaffirmed 'Champion' status in Canalys Global Cybersecurity Leadership Matrix 2020

Learn more

ESET ranked #1 endpoint protection suite by G2 Crowd

Learn more

Die Vorteile im Überblick

Machine Learning und menschliches Know-how

Lösungen
für alle Betriebssysteme

Support

Deutschsprachiger 
Kundendienst

Feather

geringe
Systembelasung

Ausgezeichneter 
Maleware-Schutz

ESET shares its knowledge and experience of security in the broadest sense of the word. They are not just concerned with their own products, but with what they can truly do for the customer.

Rick van de Westelaken, De Volksbank

ESET has brought reliability and stability and therefore a great trust in the product to us and much peace of mind. And all of this for a price that is very cost-effective!

Eric Mattioni, IS Operations Manager, The Hospital Center of Luxembourg

I thought it was a given that security software installed on PCs caused slowdowns. But with ESET the difference is very clear – it runs in the background without us even noticing.

Hirokazu Minoguchi, IT Division Expert, Mitsubishi Motors Corporation

Since the installation of ESET, we’ve seen virtually no performance issues, and more CPU time is now available to applications and users on servers.

Christian Jandl, Systems Engineer, SPAR

Three pillars of ESET's unique combined technology

LiveGrid®

ESET LiveGrid® is a preventative system that gathers information about threats from ESET users around the world. The LiveGrid® database contains reputation information about potential threats, detects and blocks recently introduced threats making it highly effective against rapidly changing threats.

Machine Learning

ESET's in-house machine learning engine uses the combined power of neural networks (deep learning and long short-term memory) and handpicked algorithms to generate a consolidated output and correctly label incoming samples as clean, potentially unwanted or malicious.

Human expertise

Human Expertise

Our World-class security researchers in 13 globally distributed R&D centers share our elite know-how and intelligence to ensure the best round-the-clock threat intelligence. Read their expert analysis of cybersecurity news in our corporate blog and in welivesecurity.com.

Cybersecurity experts on your side

  • With 30 years of industry-leading IT security innovation, ESET has delivered uninterrupted revenue growth and worldwide expansion since the 1990’s.
  • ESET is owned by cybersecurity experts, the architects of our original award-winning software. We're one of a select few global, private IT security companies.
  • More than 110M users and 400K business customers in 200+ countries and territories place their trust in ESET security solutions.

Bundle-Lösungen für Enterprises

Perfekt auf Ihr Unternehmensnetzwerk zugeschnitten

Security Management Remote Management entweder on-premise oder in der Cloud.

Endpoint
Protection Innovativer Mehrschicht-Schutz für Rechner, Mobilgeräte und VMs.

File Server
Security Hochleistungs-Schutz in Echtzeit für alle Daten auf Ihren Unternehmensservern.

Full Disk
Encryption Starke Verschlüsselung von Festplatten, Partitionen oder ganzen Geräten entsprechend den Vorgaben des DSGVO.

Cloud Sandbox Verdächtige Samples werden in einer isolierten Sandbox-Umgebung ausgeführt, um selbst unbekannte Bedrohungen zu erkennen.

Mail Security Erkennt und isoliert Spam und Malware bereits auf Serverebene, bevor diese die Posteingänge von Nutzern erreichen.

Cloud App Security Umfassender und präventiver Schutz für Ihre Microsoft Microsoft 365-Anwendungen.

Endpoint Detection & Response Flexible EDR-Lösung, die verdächtige Samples sofort identifiziert, eine eingehende Analyse ermöglicht sowie zukünftige Schutzmaßnahmen vereinfacht.

*Verwaltung nur on-premise per ESET PROTECT-Konsole möglich.

Cybersecurity professional services

Implementation service white icon

Implementation services

Tap into the know-how of our teams to solve the unique information security challenges your business might have and ensure you are set up for success by having the solution configured properly the first time.

 

Security Service white icon

Security services

Our highly trained cybersecurity and threat professionals are at your disposal providing immediate response and expert training to face new, unknown or advanced threats.

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

When printing got dangerous: A PrintNightmare

ESET offers product configuration tips to keep you safe from PrintNightmare exploits while retaining functional network printing.

What is the Zero Trust security model, and why is its adoption growing?

What is Zero Trust, what is needed to implement it, and why is interest in it growing?

See more