Is it true that ESET is the only endpoint security solutions vendor whose customers can have their UEFI firmware scanned for malicious components? If so, what is the reason for ESET's competitors not having such technology in place?
ESET is the only vendor among Top 20 endpoint security solutions vendors by revenue providing its users with a UEFI scanning technology implemented in its endpoint protection solutions. While some other vendors may have some technologies with “UEFI” in their title, their purpose is different from the function an authentic firmware scanner should perform.
As for the reason ESET is the only vendor in its field securing its customers' UEFI firmware, this illustrates ESET's responsible approach to protection. Yes, UEFI firmware-facilitated attacks are sporadic, and up to now, were mostly limited to physical tampering with the target computer. However, such an attack, should it succeed, would lead to total control of the machine, with nearly complete persistence. So ESET made the decision to invest its resources into the capability to protect its customers from UEFI firmware-facilitated attacks.
The recent discovery of LoJax, the first-ever UEFI rootkit detected in a real computer attack shows that, unfortunately, UEFI rootkits may become a regular part of advanced computer attacks.
Fortunately, thanks to the ESET UEFI Scanner, our customers are in an excellent position to spot such attacks and defend themselves against them.