Identity & data protection

Seamless and fully validated encryption and two-factor authentication are solutions to ensure an organizations' data is protected in accordance with compliance requirements.


Why do customers appreciate our identity and data protection?

Common use cases

What makes our solutions a perfect fit for your needs?

Explore ESET Full Disk Encryption features

System requirements



Explore ESET Endpoint Encryption features

System requirements

Identity and data protection

ESET Secure Authentication

A simple, effective way for businesses of all sizes to implement multi-factor authentication across commonly uses systems. Enables your organization to:

  • Prevent data breaches
  • Meet compliance requirements
  • Manage centrally from your browser
  • Use your phone, or HW tokens

Explore ESET Secure Authentication features

System requirements

  • Server side:
    32 and 64-bit versions of Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2012 Essentials, 2012 R2 Essentials, 2016, 2016 Essentials, 2019, 2019 Essentials, Small Business Server 2008 & 2011
  • Client side:
    iOS (iPhone), Android, Windows 10 Mobile
  • Hardware token support: While the solution doesn't require HW tokens to work, it supports all event-based HOTP tokens that are OATH-compliant, TOTP tokens, as well as FIDO2 and FIDO U2F hardware keys

Committed to the highest industry standards

Respected by industry analysts

Learn more

AV Comparatives Real World Protection JUN 2020

Awarded in independent tests

See test results

ESET PROTECT Advanced is a leader in Small-Business for Endpoint Protection Suites on G2

Appreciated by customers worldwide

Read full reviews

Purchase your identity and data protection today

ESET's identity and data protection is available in the following solutions

ESET Technology Alliance solutions

Backup and recovery


Total protection, backup and recovery of your business data onsite or in the cloud. Advanced cloud backup for computers, servers and virtual environment, Xopero offers comprehensive data. Benefit from:

  • Complete protection for critical files
  • Control over all backups
  • Easy to use and cost savings
  • Remote management

Download product overview

Data loss prevention


Prevent expensive data leaks, lost time and unnecessary personnel expense and enable your organization to:

  • Cover all data leak channels
  • Identify suspicious trends and activities
  • Save the cost of repairing a data breach
  • Reduce personnel costs

Download product overview

Additional areas of protection