Cloud sandbox analysis

ESET Dynamic Threat Defense

Provides another layer of security for ESET products like Mail Security and Endpoint products by utilizing cloud-based sandboxing technology to detect new, never-before-seen types of threats. Future-proof your organization's IT security with:

  • Behavior-Based Detection
  • Machine Learning
  • Zero-Day Threat Detection
  • Ransomware Prevention

Explore features

Ransomware and zero-day threats detection

Detect new, never-before-seen types of threats. ESET utilizes three different machine learning models once a file is submitted. After that, it runs the sample through a full sandbox, simulating user behavior to trick anti-evasive techniques. Next, a deep learning neural network is used to compare the behavior seen versus historical behavioral data. Finally, the latest version of ESET's scanning engine is used to take everything apart and analyze it for anything unusual.

Granular reports

An admin can create a report of ESET Dynamic Threat Defense data in the ESET PROTECT console. They can either use one of the pre-defined reports or make a custom one.

Transparent full visibility

Every analyzed sample status is visible in the ESET PROTECT console, which provides transparency to all data sent to ESET LiveGrid®.

Automatic protection

The endpoint or server product automatically decides whether a sample is good, bad or unknown. If the sample is unknown, it is sent to ESET Dynamic Threat Defense for analysis. Once the analysis is finished, the result is shared, and the endpoint products respond accordingly.

Mail Security protection

Not only does ESET Dynamic Threat Defense work with files, but it also works directly with ESET Mail Security, to ensure that malicious emails are not delivered to your organization.

Mobility

Nowadays, employees often do not work on the premises. The Cloud Sandbox analyzes files no matter where users are.

Proactive protection

If a simple is found suspicious, it is blocked from execution while ESET Dynamic Threat Defense analyzes it. That way, potential threats are prevented from wreaking havoc on the system.

Tailored customization

ESET allows per-computer detailed policy configuration for ESET Dynamic Threat Defense so the admin can control what is sent and what should happen based on the receiving result.

Manual submission

At any time, a user or admin can submit samples via an ESET compatible product for analysis and get the full result. Admins will see who sent what and what the result was directly in the ESET PROTECT console.

How does ESET Dynamic Threat Defense work?

Within Dynamic Threat Defense, ESET utilizes 3 different machine learning models once a file is submitted. After that, it runs the sample through a full sandbox which simulates user behavior to trick anti-evasive techniques. Next, a deep learning neural network is used to compare the behavior seen versus historical behavioral data. Last but not least, the latest version of ESET’s scanning engine is used to take everything apart and analyzed for anything unusual.

System requirements

  • A working ESET Business Account or ESET MSP Administrator account synchronized with a ESET management console
  • ESET PROTECT cloud or on-premises console deployed
  • Version 7.x of compatible ESET security products installed or newer
  • A Valid licence for ESET Dynamic Threat Defense or bundled solution licence with Cloud Sandbox component included
  • Activated Security products with ESET Dynamic Threat Defense Licence
  • ESET Dynamic Threat Defense enabled in policies for compatible Security products
  • Network requirements on opened ports