ESET® SECURE BUSINESS BUNDLED SOLUTIONS

All-around security for your business with remote security management

  • On-premise management
  • Endpoint security
  • File server security
  • Mail security

30-days free trial

ESET Secure Business solution icon

ESET Secure Business

Complete bundled security solution for endpoints and file servers. Email-borne threats blocked at server level. Provides:

  • Protection against targeted attacks
  • Protection against ransomware
  • Prevention of fileless attacks
  • Protection of email gateway
  • Remote management

Bundled solution includes following products:

ESET’s award-winning endpoint protection solutions leverage multilayered technologies in dynamic equilibrium. Our on-premise and off premise solutions constantly balance performance, detection and false positives.

Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity.

ESET Mail Security filters out all spam and malware before they reach users’ mailboxes. Built using proven NOD32 technology, ESET Mail Security is a first line of defense complementing the security of your network.

Manage products via on-premise console

ESET Security Management Center is an easy to use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All these features are managed from one single pane of glass.

  • Complete network visibility
  • Full security management
  • Flexible reporting
  • Automated security management
AV Comparative Award 2019

ESET #1 in AV Comparatives Performance test in May 2019.

SE Labs Award - Endpoint protection AAA

ESET achieves highest score in SE Labs test in Q1 2019.

AV for Mac Comparatives 2019 Advanced

ESET Endpoint Security was named the best business antivirus for MacOS.

VB Award - spam+ verified

ESET ranked highest final score by VBSpam test in June 2019.

ESET SECURE BUSINESS

Make an enquiry

Leave us your contact details to receive an offer tailored for your company´s needs.

Try before you buy

Experience ESET products for 30 days with a free trial, to make sure they suit your needs. No commitment.

System requirements and license information

Supported operating systems

For computers

  • Microsoft Windows 10, 8.1, 8, 7, Vista
  • macOS 10.9 and later
  • Debian and RedHat based distributions (Ubuntu, OpenSuse, Fedora, Mandriva, RedHat etc.)
  • kernel 2.6.x and later
  • GNU C Library 2.3 or newer
  • GTK+ 2.6 or newer
  • LSB 3.1 compatibility recommended

For smartphones and tablets

  • Android 5 (Lollipop) and later
  • iOS 8 and later

For file servers

  • Microsoft Windows Server 2019, 2016, 2012, 2008
  • Microsoft Windows Storage Server 2016, 2012, 2008
  • Microsoft Windows MultiPoint Server 2012, 2011, 2010
  • Microsoft Windows Small Business Server 2011, 2008
  • Ubuntu 18.04 LTS, 14.04 LTS, 12.04 LTS
  • Red Hat Enterprise Linux 7, 6
  • Centos 7
  • FreeBSD 9
  • Sles 12

For mail servers

  • Microsoft Windows Server 2016, 2012, 2008, 2003
  • Microsoft Small Business Server 2011, 2008, 2003
  • Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

Flexible license

Mix and match your licenses as needed
ESET Unilicense covers all the bases, allowing you to mix and match endpoint protection without wasting a single license.

Add additional devices at any time
You can purchases licenses for additional computers, laptops, mobile devices and servers any time.

Transfer a license to another computer
You can transfer a valid ESET license to a completely new computer from the original one. In addition, you can switch from one OS to another.

Switch to a different platform at any time
It's easy to switch your protection from one platform to another any time during the license term, without having to purchase additional licenses.

 

ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally.

- Richard Ford, Head of IT at SWFC

Looking for more?

Upgrade to full-service protection

ESET Dynamic Endpoint Protection solution icon

ESET Dynamic Endpoint Protection

Comprehensive, easily managed protection, incorporating off-premise cloud sandboxing leveraging machine learning and behavior-based detection. Includes:

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis

Add data access protection

ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

Business solution for superior and enhanced protection of an organization’s data and intellectual property. Includes:

  • Two-factor Authentication
  • Endpoint Encryption

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Protect your smart home and online privacy while enhancing your digital experience with ESET solutions

ESET’s latest version of ESET Home Windows premium products – which include ESET Internet Security (EIS) and ESET Smart Security Premium (ESSP) – hold a myriad of new features

Options still remain for GandCrab’s SMB & MSP victims

GandCrab is a malware notorious for becoming one of the most highly detected families of ransomware since its arrival at the beginning of 2018. Luckily for victims, the FBI, in cooperation with...

See more

We Live Security blog

Inside consumer perceptions of security and privacy in the connected home

The ESET survey polled 4,000 people to get a sense of their attitudes towards the privacy and security implications of smart home technology

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples