ESET® ENTERPRISE INSPECTOR

Uncover the unknown in your network with our EDR solution

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Enterprise Inspector

An Endpoint Detection & Response tool designed to exploit ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analysis and remediation of any security issue in the network enabling organizations to take immediate action to:

Checkmark icon

Detect advanced persistent threats

Checkmark icon

Stop file less attacks

Checkmark icon

Block zero-day threats

Checkmark icon

Protect against ransomware

Checkmark icon

Neutralize state-sponsored attacks


Open architecture & integrations

ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning or easily created to match the needs of specific enterprise environments, including SIEM integrations.

Adjustable sensitivity

Utilize ESET’s Endpoint Detection and Response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name / path / hash / command line / signer to fine-tune the trigger conditions.

Synchronized response

ESET’s Endpoint Detection and Response tool is built on top of existing ESET endpoint security solutions, creating a consistent ecosystem that allows cross-linking of all relevant objects and synchronized remediation of incidents.

Use cases

PROBLEM
Threat Hunting & Blocking

Your early warning system or Security Operation Center (SOC) delivers a new threat warning. What are your next steps?

SOLUTION

  • Leverage early warning system to retrieve data on upcoming or new threats.
  • Search all computers for existence of new threat.
  • Search all computers for indicators of compromise that threat existed prior to warning.
  • Block threat from being able to infiltrate network or execute within organization.

Honda logo

protected by ESET since 2011
license prolonged 3x, enlarged 2x

Allianz Suisse logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-Com logo

ISP security partner since 2008
2 milion customer base

The ESET difference

Investigation and Remediation

Use a built-in set of rules or create your own rules to respond to detected incidents. Each triggered alarm features a proposed next step to be performed for remediation. This quick response functionality helps to ensure that any single incident will not fall through the cracks.

In cloud or on-premise

Taking advantage of ESET’S flexible and secure architecture, ESET Enterprise Inspector allows on-premise as well as cloud deployment for better scalability based on the company size and needs.

Incident Detection (Root cause analysis)

Quickly and easily view all security incidents in the alarms section. With a few clicks security teams can see a full root cause analysis that includes: what was affected, where and when the executable, script, or action was performed.

Company Policy Violation

Block malicious modules from being executed on any computer in your organization’s network. ESET Enterprise Inspector’s open architecture offers the flexibility to detect violations of policies about using specific software like torrent applications, cloud storages, tor browsing or other unwanted software.

Anomaly and behavior detection

Check actions that were carried out by an executable and utilize ESET’s LiveGrid® Reputation system to quickly assess if executed processes are safe or suspicious. Grouping of computers by user, department or other criteria allows security teams to quickly identify if the user is entitled to perform a specific action or if an action is out of the ordinary.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Press Releases

No More Ransom, a global anti-ransomware initiative, announces ESET as new partner

20 December 2018: ESET – a global leader in information security software – has been announced as the latest partner of No More Ransom, an international initiative between Europol, the Dutch National...

Cryptojacking shows no signs of slowing down in 2019, says ESET

 18th December 2018 – Cases of cryptocurrency mining and cryptojacking will continue to grow in 2019, as attackers target smart devices and home assistants to build cryptomining farms, according to...

We Live Security blog

Google: Here’s how we cracked down on bad apps last year

Apps downloaded from Google Play were eight times less likely to compromise a device than apps from other sources

Smoke damage and hard drives

A closer look at the damage caused by smoke particles and some steps you can take to aid recovery