ESET® ENDPOINT SECURITY FOR ANDROID

Complete lightweight protection for your company's Android devices

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Endpoint Security for Android

Leverages a multilayered approach to provide complete protection and secure device management for your Android mobile devices. Enables:

Checkmark icon

Protection against ransomware

Checkmark icon

Data loss prevention

Checkmark icon

Application control

Checkmark icon

Remote management


Management server

ESET Security Management Center manages endpoint products from a single pane of glass and can be installed on Windows or Linux. As an alternative to on-premise installation, customers with up to 250 seats can manage their endpoints via ESET Cloud Administrator.

Machine learning

All ESET endpoint products currently use machine learning in conjunction with all of our other layers of defense and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks.

Multilayered defense

A single layer of defense isn't sufficient in today's constantly evolving threat landscape. All ESET endpoint products have the ability to detect malware pre-execution, during execution and post-execution. By focusing on the entire malware lifecycle, ESET provides the highest level of protection possible.

Use cases

PROBLEM

Not only is ransomware a desktop and server threat, but it is also a threat to Android devices.

Organizations need to make sure all of their data and devices are protected so they can't be held for ransom. 

SOLUTION

  • Deploy ESET Mobile Security to all Android mobile devices to ensure that they are protected from any type of malware.
  • Restrict Android devices from installing applications from unknown sources to limit risk.

Protected by ESET since 2011.

Protected by ESET since 2008.

Canon logo

Protected by ESET since 2016.

T-com logo

ESET ISP security partner since 2008.

The ESET difference

Mobile device management

The application automatically notifies both user and administrator if the current device settings are not in compliance with corporate security policies, and suggests the necessary changes.

Anti-phishing

Protects users from fake websites that attempt to acquire passwords, banking data and other sensitive information.

Anti-Theft

Easily remote lock, wipe or activate a siren when a device is believed to be lost or stolen. In addition, send custom messages directly to devices, or set up lock screen information to help ensure devices get returned to their proper owners.

Application control and audit

Offers administrators the option to monitor installed applications; block access to defined applications, permissions or categories; prompt users to uninstall particular applications; and track applications and their access to personal/company data sorted by categories.

AV Comparative Award 2019

ESET #1 in AV Comparatives Performance test in May 2019.

SE Labs Award - Endpoint protection AAA

ESET achieves highest score in SE Labs test in Q1 2019.

AV for Mac Comparatives 2019 Advanced

ESET Endpoint Security was named the best business antivirus for MacOS.

VB Award - spam+ verified

ESET ranked highest final score by VBSpam test in June 2019.

ESET ENDPOINT SECURITYFOR ANDROID

Get started

We'll design a personalized offer to fit your requirements.

Or, you can purchase this product online as part of ESET security bundles. Learn more

Try before you buy

Download a free trial license with absolutely no commitment. 

System Requirements

ESET Endpoint Protection Platform also covers the following OSes:

Windows logo
macOS logo
Linux logo
iOS logo
Microsoft Azure logo
VMware logo

Looking for additional solutions?

Related enterprise-grade solutions

ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

  • Security Management Center
  • Endpoint Protection Platform
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption

Related products and services

Stay on top of cybersecurity news

Brought to you by respected security researchers from ESET's 13 global R&D centers.

Corporate blog

Mitreblog

Advancing enterprise threat hunting with the MITRE ATT&CK™ knowledge base

As the wealth of cybercrime intelligence published by cybersecurity researchers increases every year, there is a parallel risk that this can become potentially unmanageable for IT administrators who...

we live security image

3 ways to browse the web anonymously

As concern about internet privacy grows, more and more people are actively seeking to browse the web anonymously. There are various ways to avoid being identified or tracked on the internet, although,...

Webinars

Internet of fakes: Protecting against a new era of threats and scams

Wednesday, January 29, 2020

Can you spot the differences between fake and real content? What about your employees?

Cybersecurity Trends 2020: What's Coming & How to Prepare

Wednesday, Dec. 18, 2019

Get a head start with expert insights from the ESET research team, based on their upcoming 2020 cyber trends report.

We Live Security blog

Dating apps share personal data with advertisers, study says

Some of the most popular dating services may be violating GDPR or other privacy laws

3 ways to browse the web anonymously

Are you looking to hide in plain sight? Here’s a rundown of three options for becoming invisible online

Are you an existing customer?

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

Business license white icon

Renew or manage license

Log in or retrieve your password to manage your existing licenses.

Need assistance?

All ESET products include free technical support in your language.