COMPLETE PROTECTION FOR BUSINESS

ESET PROTECT Complete

Cloud applications security backed by multilayered endpoint protection.

 

Comprehensive security solution for all business sizes 

Preventive Protection for Microsoft 365 applications

Protect your company cloud email and storage

The combination of spam filtering, anti‑malware scanning and anti‑phishing helps protect your company against disruption caused by email‑based attacks and malware.

One-click data encryption

Protect business data

Helps you comply with data regulations, thanks to full disk encryption capabilities on Windows and macOS.

Advanced multilayered technology

Secure computers, mobiles, file servers

Company endpoints and mobiles are protected via advanced multilayered technology, including file server security, now with secure banking protection.

Set up and deploy within minutes

Enjoy easy-to-use management

Single-pane-of-glass remote management for visibility of threats, users and quarantined items.

ESET PROTECT Complete

Complete protection for business, adding an extra layer of security to your Microsoft 365 cloud email and OneDrive.

Cloud-Based Console

Includes ESET PROTECT

Single-pane-of-glass remote management for visibility of threats, users and quarantined items.
Available as cloud or on-premise.
Learn more

Endpoint Protection

Includes ESET Endpoint Security

Advanced multilayered protection for computers, smartphones and virtual machines. Learn more

File Server Security

Includes ESET File Security

Real-time protection for your company’s data passing through all general servers. Learn more

Full Disk Encryption

Includes ESET Full Disk Encryption

Robust encryption solution for system disks, partitions or entire devices to achieve legal compliance. Learn more

Cloud Sandbox

Includes ESET Dynamic Threat Defense

Proactive protection against zero-day threats, that analyses suspicious samples in an isolated cloud sandbox environment. Learn more

Mail Security

Includes ESET Mail Security

Blocks all spam and malware at server level, before they reach users’ mailboxes. Learn more

Cloud App Protection

Includes ESET Cloud Office Security

Advanced preventive protection for your Microsoft 365 cloud email and storage. With a dedicated console. Learn more

Cloud-Based Console

Includes ESET PROTECT

Single-pane-of-glass remote management for visibility of threats, users and quarantined items.
Available as cloud or on-premise.
Learn more

Endpoint Protection

Includes ESET Endpoint Security

Advanced multilayered protection for computers, smartphones and virtual machines. Learn more

File Server Security

Includes ESET File Security

Real-time protection for your company’s data passing through all general servers. Learn more

Full Disk Encryption

Includes ESET Full Disk Encryption

Robust encryption solution for system disks, partitions or entire devices to achieve legal compliance. Learn more

Cloud Sandbox

Includes ESET Dynamic Threat Defense

Proactive protection against zero-day threats, that analyses suspicious samples in an isolated cloud sandbox environment. Learn more

Mail Security

Includes ESET Mail Security

Blocks all spam and malware at server level, before they reach users’ mailboxes. Learn more

Cloud App Protection

Includes ESET Cloud Office Security

Advanced preventive protection for your Microsoft 365 cloud email and storage. With a dedicated console. Learn more

Manage your endpoints wherever you are

Experience ESET PROTECT's console's full potential right now.
No need for installation or setup.

Single-click management

Actions such as 'create an exclusion', 'submit files for further analysis' or 'initiate a scan' are available within a single click.

Advanced reports

ESET PROTECT platform provides over 170 built-in reports and allows you to create custom reports from over 1000 data points.

Custom notifications

Use predefined notifications or create your own. The notification system features a full 'what you see is what you get' editor.

Easy installation

Deploy pre-configured live installers that automatically connect your endpoints to the proper cloud instance and valid licence.

What IT pros are saying

"Runs better than ANY other AV I have EVER used, blocks the issues before the user can attempt to use the questionable files."

Read full review

"I enjoy the continuous protection, automatic updates, and small size of this program in comparison to other options."

Read full review

"The things I enjoy most about their products is how light they run on my clients' systems and how easy they are to manage and configure."

Read full review
ESET Endpoint Security is a leader in Small-Business Endpoint Protection Suites on G2

Based on customer reviews, through G2 Crowd surveys that asked ESET business customers to rate their experiences using ESET Endpoint Security.

Get started

Buy online

ESET PROTECT Complete

Complete business protection against zero-day threats, malware, phishing and spam, managed from an easy‑to‑use cloud-based console.

  • Endpoint Protection Platform
  • File Server Security
  • Cloud Sandbox
  • Full Disk Encryption
  • Mail Security
  • Cloud App Protection
 

Try before you buy

Try out the ESET PROTECT platform in action

  • One-click access to interactive demo
  • No installation needed
  • Experience cloud management first-hand
ESET Cloud Administrator image

Full 30-day free trial

  • Trial a full licence, no commitment
  • Install and deploy our protection solutions
  • Experience the light footprint on your systems

Contact Sales

Make an inquiry

Are you interested in additional discounts or higher quantities?
Leave us your contact details to receive an offer tailored for your company's needs.
No commitment. 

Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

Greenpeace logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon MJ Group logo

protected by ESET since 2016
more than 14,000 endpoints

T-Com logo

ISP security partner since 2008
two million customer base

System requirements and licence information

Supported operating systems

For computers

  • Microsoft Windows 10, 8.1, 8, 7, Vista
  • macOS 10.9 and later
  • Ubuntu Desktop 18.04 LTS 64-bit and RedHat Enterprise Linux (RHEL) Desktop 7 64-bit

For smartphones and tablets

  • Android 5 (Lollipop) and later
  • iOS 8 and later

For file servers

  • Microsoft Windows Server 2019, 2016, 2012, 2008
  • Microsoft Windows Storage Server 2016, 2012, 2008
  • Microsoft Windows MultiPoint Server 2012, 2011, 2010
  • Microsoft Windows Small Business Server 2011, 2008
  • RedHat Enterprise Linux (RHEL) 7 64-bit
  • CentOS 7 64-bit
  • Ubuntu Server 16.04 LTS 64-bit, 18.04 LTS 64-bit
  • Debian 9 64-bit
  • SUSE Linux Enterprise Server (SLES) 12 64-bit, 15 64-bit

For mail servers

  • Microsoft Windows Server 2016, 2012, 2008, 2003
  • Microsoft Small Business Server 2011, 2008, 2003
  • Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

For cloud applications protection

  • Subscription for Microsoft 365 to connect with the tenant (Exchange Online, OneDrive)

Licence information

Cloud and on-premise management included

Remote management platform is available as cloud-based or on-premises deployment. No need to buy or maintain additional hardware, reducing the total cost of ownership.

Flexible licencing

Mix and match your licences as needed
ESET Unilicense covers all the bases, allowing you to mix and match endpoint protection without wasting a single licence.

Add additional devices at any time
You can purchase licences for additional computers, laptops, mobile devices and servers any time.

Transfer a licence to another computer
You can transfer a valid ESET licence to a completely new computer from the original one. In addition, you can switch from one OS to another.

Switch to a different platform at any time
It's easy to switch your protection from one platform to another at any point during the licence term, without having to purchase additional licences.

Related resources and documents

Solution overview

Download the full solution overview of ESET PROTECT Complete.

Download PDF

Use cases

Learn more about how ESET can support an understaffed IT department.

Download case study

Technology

How ESET's leading-edge technology goes far beyond the capabilities of basic antivirus.

Learn more

Customer stories

What do our customers appreciate on ESET? Find the customer stories relevant to your industry.

Learn more

Looking for more security options?

Security Management Remote management available as cloud‑based or on‑premises deployment.

Endpoint Protection Advanced multilayered protection for computers, smartphones and virtual machines.

File Server Security Real-time protection for your company’s data passing through all general servers.

Full Disk Encryption Robust encryption solution for system disks, partitions or entire devices to achieve legal compliance.

Cloud Sandbox Proactive protection against zero-day threats, that analyses suspicious samples in an isolated cloud sandbox environment.

Mail Security Blocks all spam and malware at server level, before they reach users’ mailboxes.

Cloud App Protection Advanced preventive protection for your Microsoft 365 cloud email and storage. With a dedicated console.

 

RECOMMENDED

 
 

Not sure what solution is best for your business?

Are you an existing customer?

Renew today

Renew, upgrade or add devices to your existing ESET license.

Manage licences

ESET Business Account is a license management platform for business customers.

Installation

Install your purchased protection on additional devices.

Need assistance?

All ESET products include free technical support in your language.

ESET vs. Symantec

Why do businesses choose ESET over Symantec?

  • Award-winning endpoint protection
  • Better speed & performance
  • Easy implementation and full support
  • Competitive displacement offers
Security management

ESET PROTECT Console

Offered as a service that ensures real-time visibility for all endpoints, as well as full reporting and security management for all OSes

  • Cloud-based console with the option of on-premises deployment
  • Provides real-time visibility for all endpoints: desktops, servers, virtual machines and even managed mobile devices
  • Enables full reporting for ESET security solutions
  • Controls endpoint prevention, detection & response layers across all platforms
  • Connect anytime, anywhere from your favourite web browser

 

Comes automatically within all bundled solutions.

Explore features

Fully customizable notification system

From the main dashboard, an IT admin can quickly assess the situation and respond to issues. Actions such as create an exclusion, submit files for further analysis or initiate a scan are available within a single click. Exclusions can be made by threat name, URL, hash or combination.

Automation framework

Dynamic groups can sort computers based on current device status or defined inclusion criteria. Tasks can then be set up to trigger actions such as scans, policy changes or software installs / uninstalls based off dynamic group membership changes.

Dynamic and custom reporting

ESET PROTECT provides over 170 built-in reports and allows you to create custom reports from over 1000 data points. This allows organizations to create reports to look and feel exactly as they might want. Once created, reports can be set up to be generated and emailed at scheduled intervals.

Fully automated VDI support

A comprehensive hardware detection algorithm is used to determine the identity of the machine based on its hardware. This allows automated re-imaging and cloning of non-persistent hardware environments. Therefore, ESET’s VDI support requires no manual interaction and is fully automated.

Advanced RBAC

Starting with MFA-protected access, the console is equipped with an advanced Role-Based Access Control (RBAC) system. Assign admins and console users to specific network branches, groups of objects, and specify permission sets with a high degree of granularity.

Start within minutes

With a cloud console, time to protection is significantly shorter. No longer burning resources waiting for components to install, or even scheduling the installation on a server in the first place. Just open your account with ESET and add all the endpoints to be protected—it is as simple as that.

Fast troubleshooting

On the cloud console, ESET experts will be able to provide more effective support or troubleshooting if necessary—which is given by the simple fact that there will be no time wasted finding out what version you’re currently on, because you’re always on the latest one.

Always the latest features

Leave the updating of the console up to us. We’ll do it in the background, and you’ll always be on the latest version with the latest components. That way your organization will benefit from the latest features, and the admins can enjoy the most recent user experience improvements straight from our roadmap.

Lower total cost of ownership

When deciding whether to move from on-prem security console, cloud may seem expensive first. But think again—you’ll no longer need to maintain a server, and spend time with regular upgrades, patches, or restarts. Let alone server licences and backups; which makes cloud console a better deal within a short time span.

Proven and trusted over 30 years

ESET has been in the security industry for over 30 years, and we continue to evolve our technology to stay one step ahead of the newest threats. This has led us to be trusted by over 110 million users worldwide. Our technology is constantly scrutinized and validated by third-party testers who show how effective our approach is at stopping the latest threats.

MSP ready

If you’re a Managed Service Provider (MSP) taking care of your clients’ networks, you’ll appreciate the full multi-tenancy capabilities of ESET PROTECT. MSP licences are automatically detected and synced with the licensing server, and the console lets you do advanced actions such as install/remove any 3rd party application, run scripts, remote commands, list running processes, HW configurations, etc.

System requirements

Cloud deployment

  • Internet connection

Supported browsers

  • Mozilla Firefox
  • Microsoft Edge
  • Google Chrome
  • Safari
  • Opera

See detail specifications

On-premise deployment

Supported operating systems

  • Windows Server 2012, 2012 R2, 2016, 2019
  • Windows Storage Server 2012 R2, 2016
  • Microsoft SBS 2008, 2011
  • Ubuntu, RHEL Server, CentOS, SLED, SLES, OpenSUSE, Debian

See detail specifications

Deployment in Microsoft Azure

See ESET's remote management console as a virtual machine in Microsoft Azure Marketplace.

Endpoint protection

ESET Endpoint Security

Leverages a multilayered approach that utilises multiple technologies in dynamic equilibrium to constantly balance performance, detection and false positives, enabling organisations to:

  • Protect against ransomware
  • Block targeted attacks
  • Prevent data breaches
  • Stop fileless attacks
  • Detect advanced persistent threats
  • Ensure mobile protection and MDM

Explore features

Managed from a unified console

All ESET endpoints, including endpoints and mobiles, can be managed from our cloud-based unified management console ESET PROTECT.

Stop fileless attacks

ESET endpoint protection platforms have mitigations in place to detect malformed or hijacked applications to protect against fileless attacks. Dedicated scanners were also created to constantly check memory for anything suspicious.

Block targeted attacks

ESET’s endpoint protection solutions use threat intelligence information based on their global presence to prioritize and effectively block the newest threats prior to their delivery anywhere else in the world. In addition, our solutions feature cloud-based updating to respond quickly in the case of a missed detection without having to wait for a regular update.

Safeguard the web browser

Designed to protect an organization’s assets with a special layer of protection that focuses on the browser, as the main tool used to access critical data inside the intranet perimeter and in the cloud. Secure Browser provides enhanced memory protection for the browser process, coupled with keyboard protection, and lets admins add URLs to be protected by it.

Network Attack Protection

ESET Network Attack Protection improves detection of known vulnerabilities on the network level.

Botnet Protection

ESET Botnet Protection detects malicious communication used by botnets, and at the same time, identifies the offending processes. Any detected malicious communication is blocked and reported to the user.

Machine learning

All ESET Endpoint products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks. For an in-depth inspection of the network, admins can turn on the special aggressive machine learning mode that works even without an internet connection.

In-product Sandbox

ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware.

Ransomware Shield

An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble ransomware behavior.

Behavioral Detection - HIPS

ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognize and stop suspicious system behavior.

UEFI Scanner

ESET is the first endpoint security provider to add a dedicated layer into its solution that protects the Unified Extensible Firmware Interface (UEFI). ESET UEFI Scanner checks and enforces the preboot environment's security and is designed to monitor the integrity of the firmware. If modification is detected, it notifies the user.

Advanced Memory Scanner

ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory. Fileless malware operates without needing persistent components in the file system that can be detected conventionally. Only memory scanning can successfully discover and stop such malicious attacks.

Exploit Blocker

ESET Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java and more), and instead of just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.

How does ESET Endpoint Security work?

ESET uses multilayered technologies to go far beyond the capabilities of basic antivirus. See various core ESET technologies and an approximation of when and how they can detect and/or block a threat during its lifecycle in the system.

System requirements

Included products

 

For computers

  • ESET Endpoint Security for Windows
  • ESET Endpoint Security for Mac
  • ESET Endpoint Antivirus for Windows
  • ESET Endpoint Antivirus for Mac
  • ESET Endpoint Antivirus for Linux

For smartphones and tablets

  • ESET Endpoint Security for Android
  • ESET Mobile Device Management for Apple iOS 

 

Download full product overview

Supported operating systems

 

For computers

  • Microsoft Windows 10, 8.1, 8, 7, Vista
  • macOS 10.9 and later
  • Ubuntu Desktop 18.04 LTS 64-bit and RedHat Enterprise Linux (RHEL) Desktop 7 64-bit

For smartphones and tablets

  • Android 5 (Lollipop) and later
  • iOS 8 and later. ESET MDM for iOS requires ESET PROTECT management console installed on-premises.
File server security

ESET File Security

Provides advanced protection for your company’s data passing through all general servers, network file storage including OneDrive, and multi-purpose servers to ensure business continuity.

  • Ransomware prevention
  • Zero-day threats detection
  • Data breaches prevention
  • Botnet protection

Explore features

Machine learning

All ESET products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks.

Behavioural Detection - HIPS

ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognise and stop suspicious system behaviour.

Ransomware Shield

An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble the behaviour of ransomware.

Advanced Memory Scanner

ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory. Fileless malware operates without needing persistent components in the file system that can be detected conventionally. Only memory scanning can successfully discover and stop such malicious attacks.