ESET® MICRO UPDATES SERVICE

Up-to-date security for operations with limited internet access

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Micro Updates

Our solutions are suitable for industries with limited internet access or with strict update policies. It is important to keep security updates, and detection engine up-to-date, while balancing the cost and availability of an internet connection.


Why a Micro Updates Service?

Checkmark icon

Industries with very limited internet access

shipping or transportation
public infrastructure
banking (POS terminals) etc.

Checkmark icon

Production plants running older hardware or operating systems

manufacturing
automotive
aviation

Checkmark icon

Organizations applying very strict update policies

military
pharmaceuticals

Honda logo

protected by ESET since 2011
license prolonged 3x, enlarged 2x

Allianz Suisse logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-Com logo

ISP security partner since 2008
2 milion customer base

Benefit from the following features

Small update size

ESET Micro Updates are very small update files of 250 to 500 kilobytes per week. If for any reason you miss two consecutive updates, thus making a standard weekly update impossible, you can still download a differential update after 4 weeks (comprising around 1 to 2 megabytes). After that, you may resume downloading regular weekly updates as usual.

Distribution and update process

Once a week, ESET generates a special differential update, which contains all the essential changes from the previous week. The latest format is compatible with all Version 3 and later ESET products. The update process is then straightforward – simply unpack the contents of the archive to a mirror directory and update all client computers from that mirror.

Minimal system footprint

ESET software is well known for its small system footprint. This has two advantages: It allows you to use the full power of your hardware, even during scanning and updates; and it makes ESET software fully compatible with older machines.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Looking for the complete security of your network?

Related bundled solutions

ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

  • On-premise management
  • Endpoint security
  • File server security
ESET Endpoint Protection Standard solution icon

ESET Endpoint Protection Standard

  • On-premise management
  • Endpoint antivirus
  • File server security

Related SMB solutions

  • ESET Security Management Center
    Real-time network security visibility, reporting and management on a single screen.​​​​​​​
  • ESET Endpoint Security
    Award-winning multilayered technology combining machine learning, big data and human expertise.
  • ESET File Security
    Provides advanced protection to all general servers, network file storage, and multi-purpose servers.

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Press Releases

ESET achieves “Champion” status in latest EMEA Canalys Leadership Matrix

17 December 2018 - ESET, a global leader in cybersecurity, has achieved “Champion” status in Canalys’ 2018 Leadership Matrix for EMEA. This is the first time that ESET has been awarded this status and...

ESET named a Top Player in Radicati’s ‘Endpoint Security’ Market Quadrant

December 6, 2018 – Global cyber security firm ESET has been identified as a ‘Top Player’ in the latest edition of Radicati’s Market Quadrants SM, which covers the ‘Endpoint Security’ segment of the...

We Live Security blog

The most popular passwords of 2018 revealed: Are yours on the list?

Besides the usual suspects among the worst of passwords, a handful of notable – but similarly poor – choices make their debuts

How to protect yourself as the threat of scam apps grows

As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices?