How do we utilize technology to ensure we have the best possible future?

Ayana Elizabeth Johnson - Marine biologist, ocean policy expert Dr. Ayana Elizabeth Johnson is co-founder of Urban Ocean Lab, a think tank for coastal cities, and co-creator of the Spotify/Gimlet podcast How to Save a Planet on climate solutions. She co-edited the bestselling climate anthology All We Can Save and co-founded The All We Can Save Project. She is on the 2021 Time 100 Next List and was named one of Elle’s 27 Women Leading on Climate. She publishes widely, including in The New York Times, Washington Post, and Scientific American.

 


 

 

 

Ayana Elizabeth Johnson
Marine biologist

 

How do we utilize technology to ensure we have the best possible future?

Ayana Elizabeth Johnson - Marine biologist

"When it comes to climate solutions, the question is how we deploy technology and transform society. It’s time for governments to play their role, and corporations to step up. We must harness human ingenuity to create the future that we want to live in."

Illustration by: Bruno Mangyoku

 

Shape

When technology enables progress,
ESET is here to protect it

Homes

Businesses

Governments


1bn+

Protected users worldwide

300,000+

Unique new malware
samples detected daily

600+

Research and development experts

400,000+

Business customers in 195
countries and territories

Technology can change the world. Protecting technology is our world.

ESET has been at the forefront of digital security innovation for more than three decades. We provide our global customers with the best possible protection of technologies that help them build a better world and a brighter future for everyone.

Driving progress via thought leadership

We use our expertise to create a safer digital environment and enable progress in all walks of life.

We educate the public and share our insights and malware discoveries on our dedicated news website.

We created EECD to broadcast to government bodies the expert view on current cybersecurity topics.

Our mission is to recognize and support exceptional scientists and their achievements.

Protecting the progress of our customers

Our business customers deliver amazing innovations to their clients, communities and markets. We are proud to protect their technologies.

What customers say about ESET?

"ESET shares its knowledge and experience of security in the broadest sense of the word. They are not just concerned with their own products, but with what they can truly do for the customer."

De Volksbank,  The Netherlands

"The biggest thing that stands out is its strong technical advantage over other products in the marketplace. ESET offers us reliable security, meaning that I can work on any project at any time knowing our computers are protected 100%."

Mercury Engineering, Ireland

"IT, project management? First-class. Deployment? Brilliant. Technical resources? Fabulous. Users? They never even noticed a change in the environment. For us, that's key."

CCS Media, UK

Enable progress, rely on ESET

ESET Prevention, Detection and Response

Holistic multilayered cybersecurity solution for enterprise, combining products, services and research.

Machine learning & human expertise

Cross-platform solutions for all OSes

Locally-based customer care

Signature-light footprint

Top-rated detection

Respected by industry analysts

Awarded in independent tests

ESET PROTECT Advanced is a leader in Endpoint Protection Suites on G2

Appreciated by customers worldwide

Referenced and active contributor

Useful resources to keep your technologies safe

Top five security challenges for CISOs

What to look out for in the post-pandemic era, where to anticipate risk, and which measures can best mitigate it.

RDP: Configuring security for a remote but not distant future

Leveraging RDP to manage your network? Use this guide to help efficiently secure your computers from RDP attacks.

From Crisis Response to Transformation

This handbook can assist and inspire you on your digital transformation journey towards secure IT solutions.

Ransomware

A look at the criminal art of malicious code, pressure and manipulation.