ESET® THREAT HUNTING SERVICE

Expert on-demand network threat search and detection

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Threat Hunting Service

ESET Threat Hunting service, available only in conjunction with ESET's EDR - Enterprise Inspector, helps investigate a specific set of data, events, and alarms generated by ESET Enterprise Inspector.


Why a Threat Hunting Service?

Checkmark icon

Lack of Manpower

Organizations wish to benefit from an EDR solution but lack the resources required. It can take months to hire and train a team to implement and monitor an EDR technology.

Checkmark icon

Initial learning curve

While ESET products in general are designed to be intuitive to use, without dedicated professionals, customers could be missing out on many game-changing advanced features.

Checkmark icon

Lack of expertise

Keeping up with the rapidly changing cyber threat landscape can be challenging and sometimes best left to experts. At ESET we live and breathe cybersecurity for over 30 years.

Checkmark icon

Long term costs

Setting up dedicated teams and/or hiring specialists to perform niche tasks can incur high long-term costs and create unnecessary management and personnel complications.

Honda logo

protected by ESET since 2011
license prolonged 3x, enlarged 2x

Allianz Suisse logo

protected by ESET since 2008
license prolonged/enlarged 10x

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-com logo

ISP security partner since 2008
2 milion customer base

Benefit from the following features

On-Demand

Organizations contact ESET Threat Hunting operators exactly as and when they require the service.

Subscription Based

Organizations purchase ESET Threat Hunting service in time blocks during which the customer can request assistance.

Secure Data Exchange

All threat and organization data stay only on premise as a secure connection is set up between ESET and the organization (VPN).

Root Cause Analysis

ESET Threat Hunting operators review highlighted alarms and investigate their root cause.

Actionable Advice Analysis

ESET operators review alarms and compile their findings into a comprehensible status report as well as providing actionable advice to the organization.

Services background image

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Looking for the complete security of your network?

Related enterprise-grade solutions

ESET Targeted Attack Protection solution icon

ESET Targeted Attack Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis
  • Endpoint Detection & Response
ESET Dynamic Mail Protection solution icon

ESET Dynamic Mail Protection

  • Security Management Center
  • Mail Security
  • Cloud Sandbox Analysis

Related SMB solutions

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Shining a light on Computer Security Day 2018

They say that a dog is for life and not just for Christmas, and in much the same way cybersecurity is something we should consider year-round.

ESET Internet Security wins MRG Effitas Online Banking Award

We are thrilled to announce that ESET Internet Security has been awarded this year's MRG Effitas Online Banking Award.

See more

We Live Security blog

Google+ to shut earlier as new bug exposed data of 52.5 million users

There is no evidence that the flaw was misused during the six days it was alive, said the tech giant

Android Trojan steals money from PayPal accounts even with 2FA on

ESET researchers discovered a new Android Trojan using a novel Accessibility-abusing technique that targets the official PayPal app, and is capable of bypassing PayPal’s two-factor authentication