ESET® DYNAMIC THREAT DEFENSE

Prevent zero-day threats with powerful cloud-based sandboxing

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Dynamic Threat Defense

provides another layer of security for ESET products like Mail Security and Endpoint products by utilizing a cloud-based sandboxing technology to detect new, never before seen type of threats. Future proof your company IT security with:

Checkmark icon

Behavior-based Detection

Checkmark icon

Machine Learning

Checkmark icon

Zero-day Threats Detection

Checkmark icon

Cloud Sandbox


Multilayered protection

Within ESET Dynamic Threat Defenses, ESET utilizes 3 different machine learning models once a file is submitted. After this process the sample is run through a full sandbox which simulates user behavior to trick anti-evasive techniques.

ESET Dynamic Threat Defense - screenshot

Unparalleled speed

Every minute counts. That is why ESET Dynamic Threat Defense is designed to analyze the majority of samples in under 5 minutes. If samples were previously analyzed, it simply takes a few seconds until all devices at your organization are protected.

Full visibility

Every sample analyzed by ESET Dynamic Threat Defense is listed in the “Submitted files” section of ESET Security Management Center, which also provides transparency for all data sent to ESET LiveGrid® - cloud malware protection system.

Use cases

PROBLEM

Ransomware tends to enter unsuspecting users’ mailboxes through email.

SOLUTION

  • ESET Mail Security automatically submits suspicious email attachments to ESET Dynamic Threat Defense.
  • ESET Dynamic Threat Defense analyzes the sample, then submits the result back to Mail Security usually within 5 minutes.
  • ESET Mail Security detects and automatically remediates attachments that contain the malicious content.
  • The malicious attachment never reaches the recipient.
Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-com logo

ISP security partner since 2008
2 million customer base

The ESET difference

Automatic protection

The endpoint or server product automatically decides whether a sample is good, bad or unknown. If the sample is unknown, it is sent to ESET Dynamic Threat Defense for analyzing. Once analysis is finished, the result is shared and the endpoint products respond accordingly.

Mail Security protection

Not only does ESET Dynamic Threat Defense work with files, but it also works directly with ESET Mail Security, to ensure that malicious emails are not delivered to your organization.

Mobility

Nowadays, employees are constantly traveling and not on premise. That is why ESET Dynamic Threat Defense is able to analyze files no matter where users are. The best part is that if anything malicious is detected, the whole company is immediately protected.

Tailored customization

ESET allows per-computer detailed policy configuration for ESET Dynamic Threat Defense so the admin can control what is sent, and what should happen based off the received result.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Looking for the complete security of your network?

Related products and services

  • ESET Security Management Center
    Real-time network security visibility, reporting and management on a single screen.​​​​​​​
  • ESET Dynamic Threat Defense
    Cloud-based sandboxing technology detects never before seen or zero-day threats.
  • ESET Mail Security
    Powerful server malware protection, spam filtering and email scanning for all major email platforms.
  • Premium support
    Gives you 365/24/7 access to customer care specialists with years of experience in IT security.

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Cyber Fraud: what is it, and what can you do to protect yourself?

It is International Fraud Awareness Week (IFAW), an annual campaign that encourages businesses and individuals to proactively take steps to minimize the impact of fraud. Since fraud has moved online...

Android challenges Apple’s iOS for a higher seat in security reputation

Traditionally, Apple’s iOS built-in security features have always been regarded as light-years ahead of Android’s, but Google’s revelations have shown a few chinks in Apple’s armor.

See more

We Live Security blog

Inside consumer perceptions of security and privacy in the connected home

The ESET survey polled 4,000 people to get a sense of their attitudes towards the privacy and security implications of smart home technology

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples