ESET® MICRO UPDATES SERVICE

Up-to-date security for operations with limited internet access

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Micro Updates

Our solutions are suitable for industries with limited internet access or with strict update policies. It is important to keep security updates, and detection engine up-to-date, while balancing the cost and availability of an internet connection.


Why a Micro Updates Service?

Checkmark icon

Industries with very limited internet access

shipping or transportation
public infrastructure
banking (POS terminals) etc.

Checkmark icon

Production plants running older hardware or operating systems

manufacturing
automotive
aviation

Checkmark icon

Organizations applying very strict update policies

military
pharmaceuticals

Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

Allianz Suisse logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-com logo

ISP security partner since 2008
2 milion customer base

Benefit from the following features

Small update size

ESET Micro Updates are very small update files of 250 to 500 kilobytes per week. If for any reason you miss two consecutive updates, thus making a standard weekly update impossible, you can still download a differential update after 4 weeks (comprising around 1 to 2 megabytes). After that, you may resume downloading regular weekly updates as usual.

Distribution and update process

Once a week, ESET generates a special differential update, which contains all the essential changes from the previous week. The latest format is compatible with all Version 3 and later ESET products. The update process is then straightforward – simply unpack the contents of the archive to a mirror directory and update all client computers from that mirror.

Minimal system footprint

ESET software is well known for its small system footprint. This has two advantages: It allows you to use the full power of your hardware, even during scanning and updates; and it makes ESET software fully compatible with older machines.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Looking for the complete security of your network?

Related bundled solutions

ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

  • On-premise management
  • Endpoint security
  • File server security
ESET Endpoint Protection Standard solution icon

ESET Endpoint Protection Standard

  • On-premise management
  • Endpoint antivirus
  • File server security

Related SMB solutions

  • ESET Security Management Center
    Real-time network security visibility, reporting and management on a single screen.​​​​​​​
  • ESET Endpoint Security
    Award-winning multilayered technology combining machine learning, big data and human expertise.
  • ESET File Security
    Provides advanced protection to all general servers, network file storage, and multi-purpose servers.

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Why educators love ESET

ESET provides security and data protection to many schools and educational institutes, here’s what a few of those happy customers had to say about the level of service offered.

How secret are secret questions?

The secret questions and answers you use to recover an account should be secret right? That might be harder to do than you think.

See more Blog / UK News categories

We Live Security blog

Inside consumer perceptions of security and privacy in the connected home

The ESET survey polled 4,000 people to get a sense of their attitudes towards the privacy and security implications of smart home technology

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples