حماية نقطة النهاية
ESET Endpoint Security
يستفيد من نهج متعدد الطبقات يستخدم تقنيات متعددة تعمل معًا لتحقيق التوازن بين الأداء والكشف والإيجابيات الخاطئة، بالإضافة إلى إزالة البرامج الضارة والوساطة تلقائيًا.
- الحماية من برامج الفدية
- منع الهجمات المستهدفة
- منع خروقات البيانات
- أوقف الهجمات الخالية من الملفات
- اكتشاف التهديدات المستمرة المتقدمة
- حماية الأجهزة المحمولة و MDM
Explore features
Managed from a unified console
All ESET endpoints, including endpoints and mobiles, can be managed from our cloud-based unified management console ESET PROTECT.
Stop fileless attacks
ESET endpoint protection platforms have mitigations in place to detect malformed or hijacked applications to protect against fileless attacks. Dedicated scanners were also created to constantly check memory for anything suspicious.
Block targeted attacks
ESET’s endpoint protection solutions use threat intelligence information based on their global presence to prioritize and effectively block the newest threats prior to their delivery anywhere else in the world. In addition, our solutions feature cloud-based updating to respond quickly in the case of a missed detection without having to wait for a regular update.
Safeguard the web browser
Designed to protect an organization’s assets with a special layer of protection that focuses on the browser, as the main tool used to access critical data inside the intranet perimeter and in the cloud. Secure Browser provides enhanced memory protection for the browser process, coupled with keyboard protection, and lets admins add URLs to be protected by it.
Network Attack Protection
ESET Network Attack Protection improves detection of known vulnerabilities on the network level.
Botnet Protection
ESET Botnet Protection detects malicious communication used by botnets, and at the same time, identifies the offending processes. Any detected malicious communication is blocked and reported to the user.
Machine learning
All ESET Endpoint products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks. For an in-depth inspection of the network, admins can turn on the special aggressive machine learning mode that works even without an internet connection.
In-product Sandbox
ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware.
Ransomware Shield
An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble ransomware behavior.
Ransomware Remediation
Provides comprehensive rollback through seamless, automated file restoration from secure backups, minimizing business impact in the event of a ransomware attack. This proprietary feature complements the Ransomware Shield protection by utilizing advanced detection and remediation technologies surpassing the Volume Shadow Copy Service other solutions use. Foster your cyber resilience and never pay a ransom again.
Note: Included in ESET PROTECT Advanced and higher subscription tiers
Behavioral Detection - HIPS
ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognize and stop suspicious system behavior.
UEFI Scanner
ESET is the first endpoint security provider to add a dedicated layer into its solution that protects the Unified Extensible Firmware Interface (UEFI). ESET UEFI Scanner checks and enforces the preboot environment's security and is designed to monitor the integrity of the firmware. If modification is detected, it notifies the user.
Advanced Memory Scanner
ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory. Fileless malware operates without needing persistent components in the file system that can be detected conventionally. Only memory scanning can successfully discover and stop such malicious attacks.
Exploit Blocker
ESET Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java and more), and instead of just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.
Brute Force Attack Protection
Detects and blocks automated attacks that try to use password guessing techniques to gain access to your network.
متطلبات النظام
المنتجات المضمنة
لأجهزة الكمبيوتر
- ESET Endpoint Security لنظام التشغيل Windows
- ESET Endpoint Security لنظام التشغيل Mac
- ESET Endpoint Antivirus لنظام التشغيل Windows
- ESET Endpoint Antivirus لنظام التشغيل Mac
- ESET Endpoint Antivirus لنظام التشغيل Linux
للهواتف الذكية والأجهزة اللوحية
- ESET Endpoint Security لنظام Android
- ESET MDM لنظام التشغيل iOS & نظام تشغيل آيباد
تنزيل نظرة عامة على حماية نقطة النهاية
تنزيل نظرة عامة على حماية الهاتف المحمول
أنظمة التشغيل المدعومة
لأجهزة الكمبيوتر
- مايكروسوفت ويندوز 11، 10، 8.1، 8، 7
- ARM64: يرجى ملاحظة أنه في Microsoft® Windows® على ARM، لا يتم دعم بعض الميزات والوظائف. اقرأ المزيد
- نظام التشغيل MacOS 10.12 والإصدارات الأحدث. يوفر ESET Endpoint Antivirus لنظام التشغيل macOS الإصدار 7 وما بعده دعمًا أصليًا لشرائح Apple المستندة إلى ARM.
- Ubuntu Desktop 18.04 LTS 64 بت وRedHat Enterprise Linux (RHEL) Desktop 7 64 بت
للهواتف الذكية والأجهزة اللوحية
- Android 5 (Lollipop) والإصدارات الأحدث
- iOS 9 والإصدارات الأحدث
ملاحظة: قد تختلف الميزات والوظائف الدقيقة وفقًا لنظام التشغيل والإصدار المستخدم.
