ESET® ENTERPRISE INSPECTOR

Uncover the unknown in your network with this EDR solution

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Enterprise Inspector

This endpoint detection and response tool leverages ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real-time endpoint data.  Provides quick analysis and remediation of any security issue in the network, enabling organizations to:

Checkmark icon

Detect advanced persistent threats

Checkmark icon

Stop fileless attacks

Checkmark icon

Block zero-day threats

Checkmark icon

Protect against ransomware

Checkmark icon

Neutralize state-sponsored attacks


Open architecture & integrations

ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning. New rules can be created to match the needs of specific enterprise environments, including SIEM integrations.

EEI dashboard screenshot

Adjustable sensitivity

Utilize ESET’s endpoint detection and response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.

Historic threat hunting

Easily adjust behavior rules with ESET Enterprise Inspector, then "re-scan" the entire events database. This allows you to then identify any new alerts triggered by the adjusted detection rules. No longer are you searching for a static IOC, but for dynamic behavior with multiple parameters.

EEI dashboard screenshot

Synchronizes response

ESET’s endpoint detection and response tool is built on existing ESET endpoint security solutions, creating a consistent ecosystem that allows cross-linking of all relevant objects and synchronized remediation of incidents.

Use cases

PROBLEM
Threat hunting & blocking

Your early warning system or Security Operation Center (SOC) delivers a new threat warning. What are your next steps?

SOLUTION

  • Leverage early warning system to retrieve data on upcoming or new threats.
  • Search all computers for existence of new threat.
  • Search all computers for indicators of compromise that threat existed prior to warning.
  • Block threat from being able to infiltrate network or execute within organization.

 

Protected by ESET since 2011.

Protected by ESET since 2008.

Canon logo

Protected by ESET since 2016.

T-com logo

ESET ISP security partner since 2008.

The ESET difference

Threat hunting

Apply filters to sort data based on file popularity, reputation, digital signature, behavior or contextual information. Setting up multiple filters enables automated threat hunting, including for APTs and targeted attacks, which can be customized to each company’s environment.

Investigation and remediation

Use a built-in set of rules or create your own rules to respond to detected incidents. Each triggered alarm features a proposed next step to be performed for remediation. This quick response functionality helps to ensure that any single incident will not fall through the cracks.

Incident detection (root cause analysis)

Quickly and easily view all security incidents in the alarms section. With a few clicks security teams can see a full root cause analysis that includes: what was affected, where and when the executable, script, or action was performed.

In cloud or on-premise

Taking advantage of ESET’S flexible and secure architecture, ESET Enterprise Inspector allows on-premise as well as cloud deployment for better scalability based on the company's size and needs.

Anomaly and behavior detection

Check actions that were carried out by an executable and utilize ESET’s LiveGrid® reputation system to quickly assess whether executed processes are safe or suspicious. Grouping of computers by user, department or other criteria allows security teams to quickly identify whether the user is entitled to perform a specific action or an action is out of the ordinary.

Company policy violation

Block malicious modules from being executed on any computer in your organization’s network. ESET Enterprise Inspector’s open architecture enables detection of policy violations regarding specific software like torrent applications, cloud storage, Tor browsing, etc.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Additional services complementing ESET Enterprise Inspector

ESET Deployment & Upgrade

ESET professionals install and configure ESET products in your environment and train your organization to ensure a successful deployment/upgrade.

ESET Threat Monitoring

ESET experts constantly monitor your network and endpoint security, alerting you in real time when something suspicious needs your attention.

ESET Threat Hunting

ESET experts help customers investigate data, events and alarms generated by ESET Enterprise Inspector including root cause analyses, forensic investigation and actionable mitigation advice. 

Looking for additional solutions?

Related enterprise-grade solutions

ESET Targeted Attack Protection solution icon

ESET Targeted Attack Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis
  • Endpoint Detection & Response

Related products and services

Stay on top of cybersecurity news

Brought to you by respected security researchers from ESET's 13 global R&D centers.

Corporate blog

woman on train drinking coffee using mobile phone

Security tips for travelers this Thanksgiving

With Thanksgiving and other holiday travels coming up, it’s a great time to review internet safety tips. For travelers, moving from one place to another without a secure and private connection makes...

Employing MITRE ATT&CK™ for improved endpoint protection via the ESET Enterprise Inspector

If the recent 2019 ESET Global Press Event was any indication, with its 57 international journalists and nine presentations, cybersecurity has become Tier 1 news. The event was flavored with a healthy...

Webinars

The MITRE ATT&CK framework: Everything you need to know in under 60 minutes

Wednesday, Nov. 13, 2019

The ATT&CK framework is an ever-expanding knowledge base of threat tactics and techniques—based on real-world observations— that the global cybersecurity community...

Sneak Peek: New ESET Security Management Center 7.1

Wednesday, Oct. 23, 2019

Meet ESET’s most ambitious management server ever—built to meet the latest customer demands using feedback from IT security pros worldwide.

We Live Security blog

Inside consumer perceptions of security and privacy in the connected home

The ESET survey polled 4,000 people to get a sense of their attitudes towards the privacy and security implications of smart home technology

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples