ESET® ENDPOINT PROTECTION STANDARD CLOUD

Secure your network, with cloud-based security management

  • Cloud-based management
  • Endpoint antimalware
  • File server security
  • Full disk encryption add-on
ESET Endpoint Protection Standard Cloud solution icon

ESET Endpoint Protection Standard Cloud

Keep your network clean. Protect your endpoints (computers and file server) against threats and data theft with easy to use cloud-based security management. Benefit from:

  • Light footprint on endpoints
  • Reliable antimalware protection
  • Prevention of fake websites
  • Cloud-based remote management

Bundled solution includes following products:

Robust multi-platform antimalware protection. Our award-winning anti-phishing engine protects sensitive company information, such as usernames and passwords, against fake websites. Other advanced technologies inside include cloud-powered scanning and device control.

Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity.


Enhance bundled solution with an advanced feature
ESET Full Disk Encryption

ESET Full Disk Encryption product, badge, Endpoint protection
  • Comply with data protection regulations like GDPR, PCI and others
  • Monitor encryption on user machines remotely
  • Protect company data with a simple yet powerful solution

Explore ESET Full Disk Encryption

Manage products via the cloud

ESET Cloud Administrator web-based console enables you to remotely manage all products of your company’s network security. This service gets rid of the need to buy, install or maintain additional hardware. So you reduce the total cost of ownership. It's easy to use. So you can concentrate on your important work.

  • All your network security management in one place
  • Secure access via web browser
  • Always the latest version – updates automatically
  • No need for extra hardware
  • Comply with data protection regulations with remotely manageable ESET Full Disk Encryption add-on
ESET Cloud Administrator image

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

System requirements and license information

Supported operating systems

For computers

  • Microsoft Windows 10, 8.1, 8, 7, Vista
  • macOS 10.9 and later
  • Debian and RedHat based distributions (Ubuntu, OpenSuse, Fedora, Mandriva, RedHat etc.)
  • kernel 2.6.x and later
  • GNU C Library 2.3 or newer
  • GTK+ 2.6 or newer
  • LSB 3.1 compatibility recommended

For smartphones and tablets

  • Android 5 (Lollipop) and later
  • iOS 8 and later

For file servers

  • Microsoft Windows Server 2019, 2016, 2012, 2008
  • Microsoft Windows Storage Server 2016, 2012, 2008
  • Microsoft Windows MultiPoint Server 2012, 2011, 2010
  • Microsoft Windows Small Business Server 2011, 2008
  • Ubuntu 18.04 LTS, 14.04 LTS, 12.04 LTS
  • Red Hat Enterprise Linux 7, 6
  • Centos 7
  • FreeBSD 9
  • Sles 12

For mail servers

  • Microsoft Windows Server 2016, 2012, 2008, 2003
  • Microsoft Small Business Server 2011, 2008, 2003
  • Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

Flexible license

Mix and match your licenses as needed
ESET Unilicense covers all the bases, allowing you to mix and match endpoint protection without wasting a single license.

Add additional devices at any time
You can purchases licenses for additional computers, laptops, mobile devices and servers any time.

Transfer a license to another computer
You can transfer a valid ESET license to a completely new computer from the original one. In addition, you can switch from one OS to another.

Switch to a different platform at any time
It's easy to switch your protection from one platform to another any time during the license term, without having to purchase additional licenses.

 

ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally.

- Richard Ford, Head of IT at SWFC

Looking for more?

Upgrade - protection against ransomware

ESET Endpoint Protection Advanced Cloud solution icon

ESET Endpoint Protection Advanced Cloud

Multilayered technology, machine learning and human expertise combined to incorporate the best level of protection, with simple-to-use cloud-based security management.

  • Cloud-based management
  • Endpoint security
  • File server security

Add data access protection

Two Factor Authentication turquoise icon

ESET Secure Authentication

A simple, effective way for businesses of all sizes to implement multi-factor authentication across commonly utilized systems.

  • Prevent data breaches
  • Meet compliance requirements
  • Easily manage authentication

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Press Releases

ESET Becomes Founding Member of Google’s App Defense Alliance; ESET to Proactively Protect Mobile Applications on the Google Play Store

ESET, a global leader in cybersecurity, today announced it has become a founding member of the Google App Defense Alliance to protect the Google Play Store. ESET will provide its award-winning...

 

 

ESET named a Top Player in Radicati’s ‘Endpoint Security’ Market Quadrant for the second year running

For the second consecutive year, Radicati’s Market Quadrant rated ESET as a ‘Top Player’, a classification reserved for market leaders with a solid vision for the future that provide a broad range of...

We Live Security blog

Inside consumer perceptions of security and privacy in the connected home

The ESET survey polled 4,000 people to get a sense of their attitudes towards the privacy and security implications of smart home technology

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples