ESET® ENDPOINT PROTECTION ADVANCED BUNDLED SOLUTIONS

Complete multilayered protection with remote security management

  • On-premise management
  • Endpoint security
  • File server security
  • Full disk encryption add-on

30-days free trial

ESET Endpoint Protection Advanced

Multilayered technology, machine learning and human expertise combined with automated security management. Provides:

  • Protection against targeted attacks
  • Protection against ransomware
  • Prevention of fileless attacks
  • Remote management

Bundled solution includes following products:

ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives.

Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity.


Enhance bundled solution with an advanced add-on
ESET Full Disk Encryption

  • Comply with data protection regulations like GDPR, PCI and others
  • Monitor encryption on user machines remotely
  • Protect company data with a simple yet powerful solution

Explore ESET Full Disk Encryption

Manage products via on-premise console

ESET Security Management Center is an easy to use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All these features are managed from one single pane of glass.

  • Complete network visibility
  • Full security management
  • Flexible reporting
  • Automated security management
  • Comply with data protection regulations with remotely manageable ESET Full Disk Encryption add-on

Outstanding results of ESET Endpoint Security solution in the recent Real-World Protection Test

ESET achieves highest score in SE Labs test in Q1 2020

ESET recognised for peak excellence in the category of usability in the AV Test annual test results

ESET achieved the highest final score in the latest VBSpam test

ESET ENDPOINT PROTECTION ADVANCED

Make an enquiry

Leave us your contact details to receive an offer tailored for your company´s needs.

Try before you buy

Experience ESET products including ESET Full Disk Encryption for 30 days with a free trial, to make sure they suit your needs. All you need is ESET Business Account.

No commitment

System requirements and license information

Supported operating systems

For computers

  • Microsoft Windows 10, 8.1, 8, 7, Vista
  • macOS 10.9 and later
  • Ubuntu Desktop 18.04 LTS 64-bit and RedHat Enterprise Linux (RHEL) Desktop 7 64-bit

For smartphones and tablets

  • Android 5 (Lollipop) and later
  • iOS 8 and later

For file servers

  • Microsoft Windows Server 2019, 2016, 2012, 2008
  • Microsoft Windows Storage Server 2016, 2012, 2008
  • Microsoft Windows MultiPoint Server 2012, 2011, 2010
  • Microsoft Windows Small Business Server 2011, 2008
  • RedHat Enterprise Linux (RHEL) 7 64-bit
  • CentOS 7 64-bit
  • Ubuntu Server 16.04 LTS 64-bit, 18.04 LTS 64-bit
  • Debian 9 64-bit
  • SUSE Linux Enterprise Server (SLES) 12 64-bit, 15 64-bit

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

Flexible license

Mix and match your licenses as needed
ESET Unilicense covers all the bases, allowing you to mix and match endpoint protection without wasting a single license.

Add additional devices at any time
You can purchase licenses for additional computers, laptops, mobile devices and servers any time.

Transfer a license to another computer
You can transfer a valid ESET license to a completely new computer from the original one. In addition, you can switch from one OS to another.

Switch to a different platform at any time
It's easy to switch your protection from one platform to another any time during the license term, without having to purchase additional licenses.

 

ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally.

- Richard Ford, Head of IT at SWFC

Looking for more?

Upgrade to full-service protection

ESET Secure Business

As well as protecting all your computers, laptops, and fileservers, make your email gateway impenetrable. ESET mail security eliminates email-borne malware at the server level, before it can do any damage.

  • On-premise management
  • Endpoint security
  • File server security
  • Mail security

Add data access protection

ESET Secure Authentication

A simple, effective way for businesses of all sizes to implement multi-factor authentication across commonly utilized systems.

  • Prevent data breaches
  • Meet compliance requirements
  • Easily manage authentication

Looking for renewal of your current
ESET® ENDPOINT PROTECTION STANDARD?
See solution page

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Imagine vacationing without a smartphone — cybercriminals can’t

With all of the fake websites and apps out there, critical cybersecurity for travelers begins at home before the trip even starts.

Prevention-first security begins with data-enhanced insight: Meet ESET Threat Intelligence

Supporting threat hunters and incident response teams with hands-on data is crucial, as it not only safeguards organizations but provides the basis for a proactive prevention-first security strategy.

See more

We Live Security blog

Major phishing-as-a-service platform disrupted – Week in security with Tony Anscombe

The investigation uncovered at least 40,000 phishing domains that were linked to LabHost and tricked victims into handing over their sensitive details

Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals

Python’s versatility and short learning curve are just two factors that explain the language’s 'grip' on cybersecurity