Protect your organization and add value to corporate solutions

saugių vartotojų visame pasaulyje

verslo klientų

šalių bei teritorijų

pasaulinių mokslo ir tyrimų centrų

ESET Anti-Malware SDK

Available for both Windows and Linux platforms, ESET Anti-Malware SDK provides multilayered, cross-platform protection for a wide range of applications and integration scenarios. Provides:

Checkmark icon

Multiple licensing

Checkmark icon


Checkmark icon


Checkmark icon


Cross-platform threat detection

While the SDK supports Windows and Linux, the scanning engine also blocks mobile malware (Android, iOS) and threats targeting macOS, providing for a fully fledged cross-platform protection.

Anti-malware SDK scheme

Add anti-malware capabilities

Whether intended for your organizations’ internal use or for your customers, the SDK easily integrates ESET's scanning engine to fend off all types of threats, including ransomware and zero-day malware.

Complete control

You have full control over the implementation process and which functionality you decide to use. The solution offers a wide range of options, supported with extensive documentation and ESET engineers ready to assist you in case you need help.

Use cases


How to add value to products and services your organization provides?

Your organization is competing in a tough market and needs to enhance its products, services and solutions.


  • Build products with excellent protection within.

Offer products with excellent-quality in-built protection. To gain a head start on your rivals, enhance your products, services and solutions with ESET anti-malware. Depending on the type of product or service your organization provides, choose the ESET Anti-Malware SDK functionality that suits best and offers most value to your customers.

Honda logo

ESET renkasi jau nuo 2011 metų
licenciją atnaujino 3 kartus, praplėtė 2 kartus

Allianz Suisse logo

ESET renkasi jau nuo 2008 metų
licenciją praplėtė ir atnaujino 10 kartų

Canon logo

ESET apsaugą renkasi nuo 2016 metų
apsaugota 14,000 įrenginių

T-Com logo

ISP saugumo programos partneris nuo 2008 metų
2 millijonai klientų

ESET: pajuskite skirtumą

DNA detections

Detection types range from very specific hashes to ESET DNA Detections, which are complex definitions of malicious behavior and malware characteristics.

While the malicious code can be easily modified or obfuscated by attackers, the behavior of objects cannot be changed so easily and ESET DNA Detections are designed to take advantage of this principle.

In-product sandbox

Today’s malware is often heavily obfuscated and tries to evade detection as much as possible. To see through this and identify the real behavior hidden underneath the surface, we use in-product sandboxing.

With the help of this technology, ESET solutions emulate different components of computer hardware and software to execute a suspicious sample in an isolated virtualized environment.

Scans files and blocks of data

Analyzes hundreds of different file formats (executables, installers, scripts, archives, documents and bytecodes, as well as blocks of data) in order to accurately detect embedded malicious components.

URL and IP address scanning

ESET Anti-Malware SDK also provides URL and IP address scanning to identify and block phishing sites and addresses containing dangerous payload.

Išbandykite mūsų saugumo sprendimus

Nurodykite savo kontaktinius duomenis ir mes Jums pateiksime pritaikytą pasiūlymą su tinkamiausiais saugumo sprendimais.
Jokių įsipareigojimų.

Kibernetinio saugumo naujienos

Pranešimai rengiami pagal apdovanojimus pelniusių ir pripažintų ESET tyrėjų surinktus duomenis iš net 13 tarptautinių ESET tyrimų ir mokslo centrų.

Pranešimai spaudai

Atsakymai į ESET renginio metu užduotus klausimus: Oleksandr Illiusha

Ar stebite, kas vyksta Ukrainos tinkluose ar atakuojamuose targeted stack?

Mes tiesiogiai stebime mūsų didžiųjų Ukrainos klientų, ypač tų, kurie jau buvo atakuoti, apsaugos būklę.


Atsakymai į ESET renginio metu užduotus klausimus: Matej Zachar

Kodėl Safetica nerenka įrodymų?

Safetica renka informaciją, kuri gali būti naudojama kaip įrodymas vidiniame arba teisiniame tyrime. Viskas priklauso nuo konkrečių nustatymų.

Ar gali Safetica...

Corporate blog

Have AI’s promises fallen to the margins?

Claims about Next-Gen, AI and Machine Learning had considerable impact on the way endpoint security has been framed over the last two to three years; at least from marketing perspective, which has...

Convergence - technology vs monetization & destruction

Technology alone won’t break the quagmire of the dark arts of malware, but informed choices might

See more

We Live Security blog

Bristol airport takes flight screens offline after apparent ransomware attack

The screens in “key locations” are back up and running again, while the airport paid no ransom to return its systems to working order

One in three UK orgs hit by cryptojacking in previous month, survey finds

Conversely, only a little over one-third of IT executives believe that their systems have never been hijacked to surreptitiously mine digital currencies