Comprehensive security solution for all business sizes
Preventive Protection for Microsoft 365 applications
Protect your company cloud email and storage
The combination of spam filtering, anti‑malware scanning and anti‑phishing helps protect your company against disruption caused by email‑based attacks and malware.
One-click data encryption
Protect business data
Helps you comply with data regulations, thanks to full disk encryption capabilities on Windows and macOS.
Advanced multilayered technology
Secure computers, mobiles, file servers
Company endpoints and mobiles are protected via advanced multilayered technology, including file server security, now with secure banking protection.
Set up and deploy within minutes
Enjoy easy-to-use management
Single-pane-of-glass remote management for visibility of threats, users and quarantined items.
ESET PROTECT Complete
Complete protection for business, adding an extra layer of security to your Microsoft 365 cloud email and OneDrive.
Manage your endpoints wherever you are

Experience ESET PROTECT's console's full potential right now.
No need for installation or setup.
Single-click management
Actions such as 'create an exclusion', 'submit files for further analysis' or 'initiate a scan' are available within a single click.
Advanced reports
ESET PROTECT platform provides over 170 built-in reports and allows you to create custom reports from over 1000 data points.
Custom notifications
Use predefined notifications or create your own. The notification system features a full 'what you see is what you get' editor.
What IT pros are saying

"Runs better than ANY other AV I have EVER used, blocks the issues before the user can attempt to use the questionable files."
Read full review

"I enjoy the continuous protection, automatic updates, and small size of this program in comparison to other options."
Read full review

"The things I enjoy most about their products is how light they run on my clients' systems and how easy they are to manage and configure."
Read full review
Based on customer reviews, through G2 Crowd surveys that asked ESET business customers to rate their experiences using ESET Endpoint Security.
Get started

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 14,000 endpoints

ISP security partner since 2008
two million customer base
System requirements and licence information
Supported operating systems
For computers
- Microsoft Windows 10, 8.1, 8, 7, Vista
- macOS 10.9 and later
- Ubuntu Desktop 18.04 LTS 64-bit and RedHat Enterprise Linux (RHEL) Desktop 7 64-bit
For smartphones and tablets
- Android 5 (Lollipop) and later
- iOS 8 and later
For file servers
- Microsoft Windows Server 2019, 2016, 2012, 2008
- Microsoft Windows Storage Server 2016, 2012, 2008
- Microsoft Windows MultiPoint Server 2012, 2011, 2010
- Microsoft Windows Small Business Server 2011, 2008
- RedHat Enterprise Linux (RHEL) 7 64-bit
- CentOS 7 64-bit
- Ubuntu Server 16.04 LTS 64-bit, 18.04 LTS 64-bit
- Debian 9 64-bit
- SUSE Linux Enterprise Server (SLES) 12 64-bit, 15 64-bit
For mail servers
- Microsoft Windows Server 2016, 2012, 2008, 2003
- Microsoft Small Business Server 2011, 2008, 2003
- Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007
For virtual environments
- VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
- VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
- VMware Guest Introspection 6.2.4+, 6.3+, 6.4+
For cloud applications protection
- Subscription for Microsoft 365 to connect with the tenant (Exchange Online, OneDrive)
Licence information
Cloud and on-premise management included
Remote management platform is available as cloud-based or on-premises deployment. No need to buy or maintain additional hardware, reducing the total cost of ownership.
Flexible licencing
Mix and match your licences as needed
ESET Unilicense covers all the bases, allowing you to mix and match endpoint protection without wasting a single licence.
Add additional devices at any time
You can purchase licences for additional computers, laptops, mobile devices and servers any time.
Transfer a licence to another computer
You can transfer a valid ESET licence to a completely new computer from the original one. In addition, you can switch from one OS to another.
Switch to a different platform at any time
It's easy to switch your protection from one platform to another at any point during the licence term, without having to purchase additional licences.
Related resources and documents
Technology
How ESET's leading-edge technology goes far beyond the capabilities of basic antivirus.
Customer stories
What do our customers appreciate on ESET? Find the customer stories relevant to your industry.
Looking for more security options?
Not sure what solution is best for your business?
Are you an existing customer?
Renew today
Renew, upgrade or add devices to your existing ESET license.
Manage licences
ESET Business Account is a license management platform for business customers.
Installation
Install your purchased protection on additional devices.
Need assistance?
All ESET products include free technical support in your language.
Security management
ESET PROTECT Console
Offered as a service that ensures real-time visibility for all endpoints, as well as full reporting and security management for all OSes
- Cloud-based console with the option of on-premises deployment
- Provides real-time visibility for all endpoints: desktops, servers, virtual machines and even managed mobile devices
- Enables full reporting for ESET security solutions
- Controls endpoint prevention, detection & response layers across all platforms
- Connect anytime, anywhere from your favourite web browser
Comes automatically within all bundled solutions.
Explore features
Fully customizable notification system
From the main dashboard, an IT admin can quickly assess the situation and respond to issues. Actions such as create an exclusion, submit files for further analysis or initiate a scan are available within a single click. Exclusions can be made by threat name, URL, hash or combination.
Automation framework
Dynamic groups can sort computers based on current device status or defined inclusion criteria. Tasks can then be set up to trigger actions such as scans, policy changes or software installs / uninstalls based off dynamic group membership changes.
Dynamic and custom reporting
ESET PROTECT provides over 170 built-in reports and allows you to create custom reports from over 1000 data points. This allows organizations to create reports to look and feel exactly as they might want. Once created, reports can be set up to be generated and emailed at scheduled intervals.
Fully automated VDI support
A comprehensive hardware detection algorithm is used to determine the identity of the machine based on its hardware. This allows automated re-imaging and cloning of non-persistent hardware environments. Therefore, ESET’s VDI support requires no manual interaction and is fully automated.
Advanced RBAC
Starting with MFA-protected access, the console is equipped with an advanced Role-Based Access Control (RBAC) system. Assign admins and console users to specific network branches, groups of objects, and specify permission sets with a high degree of granularity.
Start within minutes
With a cloud console, time to protection is significantly shorter. No longer burning resources waiting for components to install, or even scheduling the installation on a server in the first place. Just open your account with ESET and add all the endpoints to be protected—it is as simple as that.
Fast troubleshooting
On the cloud console, ESET experts will be able to provide more effective support or troubleshooting if necessary—which is given by the simple fact that there will be no time wasted finding out what version you’re currently on, because you’re always on the latest one.
Always the latest features
Leave the updating of the console up to us. We’ll do it in the background, and you’ll always be on the latest version with the latest components. That way your organization will benefit from the latest features, and the admins can enjoy the most recent user experience improvements straight from our roadmap.
Lower total cost of ownership
When deciding whether to move from on-prem security console, cloud may seem expensive first. But think again—you’ll no longer need to maintain a server, and spend time with regular upgrades, patches, or restarts. Let alone server licences and backups; which makes cloud console a better deal within a short time span.
Proven and trusted over 30 years
ESET has been in the security industry for over 30 years, and we continue to evolve our technology to stay one step ahead of the newest threats. This has led us to be trusted by over 110 million users worldwide. Our technology is constantly scrutinized and validated by third-party testers who show how effective our approach is at stopping the latest threats.
MSP ready
If you’re a Managed Service Provider (MSP) taking care of your clients’ networks, you’ll appreciate the full multi-tenancy capabilities of ESET PROTECT. MSP licences are automatically detected and synced with the licensing server, and the console lets you do advanced actions such as install/remove any 3rd party application, run scripts, remote commands, list running processes, HW configurations, etc.
System requirements
Cloud deployment
- Internet connection
Supported browsers
- Mozilla Firefox
- Microsoft Edge
- Google Chrome
- Safari
- Opera
On-premise deployment
Supported operating systems
- Windows Server 2012, 2012 R2, 2016, 2019
- Windows Storage Server 2012 R2, 2016
- Microsoft SBS 2008, 2011
- Ubuntu, RHEL Server, CentOS, SLED, SLES, OpenSUSE, Debian
Deployment in Microsoft Azure
See ESET's remote management console as a virtual machine in Microsoft Azure Marketplace.
Endpoint protection
ESET Endpoint Security
Leverages a multilayered approach that utilises multiple technologies in dynamic equilibrium to constantly balance performance, detection and false positives, enabling organisations to:
- Protect against ransomware
- Block targeted attacks
- Prevent data breaches
- Stop fileless attacks
- Detect advanced persistent threats
- Ensure mobile protection and MDM
Explore features
Managed from a unified console
All ESET endpoints, including endpoints and mobiles, can be managed from our cloud-based unified management console ESET PROTECT.
Stop fileless attacks
ESET endpoint protection platforms have mitigations in place to detect malformed or hijacked applications to protect against fileless attacks. Dedicated scanners were also created to constantly check memory for anything suspicious.
Block targeted attacks
ESET’s endpoint protection solutions use threat intelligence information based on their global presence to prioritize and effectively block the newest threats prior to their delivery anywhere else in the world. In addition, our solutions feature cloud-based updating to respond quickly in the case of a missed detection without having to wait for a regular update.
Safeguard the web browser
Designed to protect an organization’s assets with a special layer of protection that focuses on the browser, as the main tool used to access critical data inside the intranet perimeter and in the cloud. Secure Browser provides enhanced memory protection for the browser process, coupled with keyboard protection, and lets admins add URLs to be protected by it.
Network Attack Protection
ESET Network Attack Protection improves detection of known vulnerabilities on the network level.
Botnet Protection
ESET Botnet Protection detects malicious communication used by botnets, and at the same time, identifies the offending processes. Any detected malicious communication is blocked and reported to the user.
Machine learning
All ESET Endpoint products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks. For an in-depth inspection of the network, admins can turn on the special aggressive machine learning mode that works even without an internet connection.
In-product Sandbox
ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware.
Ransomware Shield
An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble ransomware behavior.
Behavioral Detection - HIPS
ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognize and stop suspicious system behavior.
UEFI Scanner
ESET is the first endpoint security provider to add a dedicated layer into its solution that protects the Unified Extensible Firmware Interface (UEFI). ESET UEFI Scanner checks and enforces the preboot environment's security and is designed to monitor the integrity of the firmware. If modification is detected, it notifies the user.
Advanced Memory Scanner
ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory. Fileless malware operates without needing persistent components in the file system that can be detected conventionally. Only memory scanning can successfully discover and stop such malicious attacks.
Exploit Blocker
ESET Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java and more), and instead of just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.
How does ESET Endpoint Security work?
ESET uses multilayered technologies to go far beyond the capabilities of basic antivirus. See various core ESET technologies and an approximation of when and how they can detect and/or block a threat during its lifecycle in the system.
System requirements
Included products
For computers
- ESET Endpoint Security for Windows
- ESET Endpoint Security for Mac
- ESET Endpoint Antivirus for Windows
- ESET Endpoint Antivirus for Mac
- ESET Endpoint Antivirus for Linux
For smartphones and tablets
- ESET Endpoint Security for Android
- ESET Mobile Device Management for Apple iOS
Supported operating systems
For computers
- Microsoft Windows 10, 8.1, 8, 7, Vista
- macOS 10.9 and later
- Ubuntu Desktop 18.04 LTS 64-bit and RedHat Enterprise Linux (RHEL) Desktop 7 64-bit
For smartphones and tablets
- Android 5 (Lollipop) and later
- iOS 8 and later. ESET MDM for iOS requires ESET PROTECT management console installed on-premises.
File server security
ESET File Security
Provides advanced protection for your company’s data passing through all general servers, network file storage including OneDrive, and multi-purpose servers to ensure business continuity.
- Ransomware prevention
- Zero-day threats detection
- Data breaches prevention
- Botnet protection
Explore features
Machine learning
All ESET products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks.
Behavioural Detection - HIPS
ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognise and stop suspicious system behaviour.
Ransomware Shield
An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble the behaviour of ransomware.
Advanced Memory Scanner
ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory. Fileless malware operates without needing persistent components in the file system that can be detected conventionally. Only memory scanning can successfully discover and stop such malicious attacks.