ESET
DYNAMIC
THREAT DEFENSE

Strengthen your security with cloud-based sandboxing technology.

Endpoint security provides a solid layer of protection against attacks and data breaches. But as zero-day exploits and other advanced threats proliferate, the only safe way to identify malicious samples is to run them in a cloud sandbox. 

EDTD runs files in a safe, cloud-based operating system to uncover their true purpose. It blocks any malware, including zero-days and ransomware, and protects your entire network in under 5 minutes. 

 

What is a cloud
security sandbox?

Cloud security sandboxes are isolated test environments in which suspicious programs can be executed, and their behavior observed and analyzed—all in an automated manner.  Malicious content is then blocked before reaching your production environment. 

ESET Dynamic Threat Defense combines cloud sandbox technology with machine learning to help keep ransomware, zero-day attacks and other complex threats from entering your network, spreading through your workforce and impacting your IT infrastructure.

Save up to 50% with the new ESET Remote Workforce Offer

Protect against advanced threats & targeted attacks

EDTD’s fast, cloud-based processing power keeps your business fully armed against advanced malware designed to evade endpoint security, including:

Zero-day threats

Zero-day exploits are particularly dangerous because they’re launched on the same day a vulnerability in your system is discovered—before antivirus signatures are available to detect them.  As the vulnerability is known only to the attacker, no patch exists to mitigate it and endpoint or mail security won't be able to recognize such a file or attachment as malicious when it comes in.

ESET Dynamic Threat Defense can detect a new malware sample, even one that appears harmless, and run it immediately in the safe sandbox environment. Via machine learning and behavioral analysis, EDTD can identify the file's true purpose before it can reach your users or spread throughout your network. Based on its behavior, the file will either be released or deleted.

Ransomware

Ransomware—malicious software used for extortion—continues to be a major threat to organizations of all sizes. Highly profitable and easy to spread via email, ransomware can be used to encrypt files and documents or lock screens on devices, networks and servers. With the rise in the remote workforce model, ransomware attacks have increased dramatically, targeting Remote Desktop Protocol vulnerabilities as well as distracted or untrained employees.

Since ransomware is often spread via zero-day exploits in emails, there won't be a virus signature, much less a patch to block it.  However, EDTD will provide protection if a worker opens that email by immediately identifying and analyzing the contents. Before releasing the email to the user, EDTD will execute the file in a safe environment to determine its true purpose. Any malicious content will be deleted and your entire network will be protected in under five minutes.

 

Advanced persistent threats

An advanced persistent threat (APT) is a network attack in which an unauthorized person or organization gains access to a network and stays there, undetected, for a long period of time—often, for months or even years. These sophisticated attacks are performed by skilled, often state-backed groups with significant financial, technical and human resources. They can develop malware that's designed to evade conventional endpoint and mail security, then remain hidden while they access sensitive data, plant destructive code or create backdoor programs that allow them to access the target network or computer at will. 

EDTD is able to analyze a broad range of file samples, including documents, scripts and installers, which these attackers may use to attempt access. By using behavioral analysis, EDTD can determine the true nature of a sample that initially appears to be clean and block it before it executes. It will also prevent additional attempts to spread that particular malware by other means, such as a USB stick.    

 

 

 

How it works

Fast, powerful protection

ESET Dynamic Threat Defense utilizes 3 different machine learning models to analyze suspect files, before running each sample in a cloud-based sandbox to simulate its behavior and trigger detection-evasion techniques. If anything malicious is detected, the technology moves to protect all of your ESET-secured IT infrastructure.

Complete the form and an ESET representative will contact you.

Three new offers

CLOUD-BASED MANAGEMENT

  • Remote Management
  • Endpoint Security
  • Mobile Security*
  • Virtualization Security*
  • Server Security
  • Cloud Snadbox Analysis
  • Full Disk Encryption add-on

CLOUD-BASED MANAGEMENT

  • Remote Management
  • Endpoint Security
  • Mobile Security*
  • Virtualization Security*
  • Server Security
  • Cloud Sandbox Analysis
  • Full Disk Encryption

On-premise management

  • Remote Management
  • Endpoint Security
  • Mobile Security
  • Virtualization Security
  • Server Security
  • Cloud Sandbox Analysis
  • Full Disk Encryption add-on

*Mobile security and Virtualization Security are not manageable via ESET Cloud Administrator at the moment.