ESET® FILE SECURITY FOR MICROSOFT WINDOWS SERVER

Multilayered server protection without compromise

Starting at $190.00

for 5 devices

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

File Security for Microsoft Windows Server

Provides advanced protection for your company’s data passing through all general servers, network file storage including OneDrive, and multi-purpose servers. Ensures business continuity via:

Checkmark icon

Ransomware prevention

Checkmark icon

Zero-day threats detection

Checkmark icon

Data breaches prevention

Checkmark icon

Botnet protection


Multilayered defense

A single layer of defense isn't sufficient in today's constantly evolving threat landscape. All ESET endpoint products have the ability to detect malware pre-execution, during execution and post-execution. An additional layer can be implemented in the form of cloud sandbox analysis with ESET Dynamic Threat Defense. By focusing not just on a specific part of the malware lifecycle, this allows ESET to provide the highest level of protection possible.

Management server

ESET File Security solutions are managed from a single pane of glass that can be installed on Windows or Linux. In addition to installation, ESET has a virtual appliance that you can simply import for quick and easy setup.

Machine learning

All ESET products currently use machine learning in conjunction with all of our other layers of defense and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks.

Use cases

PROBLEM

Many businesses want extra protection from ransomware attacks. In addition, they need to ensure their network drives cannot be encrypted.

SOLUTION

  • Network Attack Protection has the ability to prevent ransomware from ever infecting a system by stopping exploits at the network level.
  • Our multilayered defense features an in-product sandbox that has the ability to detect malware that attempts to evade detection by using obfuscation.
  • Leverage ESET’s cloud malware protection system to automatically protect against new threats without the need to wait for the next detection update. Typical turnaround time of 20 minutes.
  • All products contain post-execution protection in the form of Ransomware Shield to ensure that businesses are protected from malicious file encryption.
  • If ESET File Security is unsure of a potential threat, it has the ability to upload the sample to ESET’s cloud sandbox, Dynamic Threat Defense, to make the highest quality decision on whether something is malicious.

Protected by ESET since 2011.

Protected by ESET since 2008.

Canon logo

Protected by ESET since 2016.

T-com logo

ESET ISP security partner since 2008.

The ESET difference

Behavioral Detection - HIPS

ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a predefined set of rules to recognize and stop suspicious system behavior.

Ransomware Shield

An additional layer protecting users from ransomware, which monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble the behavior of ransomware.

Network Attack Protection

ESET Network Attack Protection improves detection of known vulnerabilities on the network level. It constitutes another important layer of protection against spreading malware, network-conducted attacks, and exploitation of vulnerabilities for which a patch has not yet been released or deployed.

Botnet Protection

ESET Botnet Protection detects malicious communication used by botnets, and at the same time identifies the offending processes. Any detected malicious communication is blocked and reported to the user.

Office 365 OneDrive storage

After registration is done on a single server, ESET has the ability to scan OneDrive to provide visibility and monitor the trusted source of company storage.

Optional cloud sandbox analysis

ESET Dynamic Threat Defense provides another layer of security for ESET File Security solutions by utilizing a cloud-based sandboxing technology to detect new, never before seen types of threats.

AMSI/Protected service support

ESET products leverage the Antimalware Scan Interface (AMSI) to provide enhanced malware protection for users, data, applications and workload. In addition, it utilizes the protected service interface, a new security module built into Windows, that only allows trusted, signed code to load and better protects against code injection attacks.

Unparalleled performance

ESET products continue to excel in the performance arena, as shown by third-party tests proving how lightweight ESET endpoints are on systems. ESET File Security solutions are built on a 64-bit core and include DLL modules to ensure more RAM saving and faster computer startup times, and to allow native support of future Windows updates.

ESET FILE SECURITY FOR MICROSOFT WINDOWS SERVER

Purchase this product as a bundle component of ESET Endpoint Protection Advanced at the same price as the individual product.

On-premise management

Explore pricing

Price per device
 

100-249

$24.70

250-499

$22.80

500-999

$20.90

For additional discounts or higher quantities, use the partner locator and find a partner today.

Try before you buy

Download a free trial license with absolutely no commitment. 

Cloud-based management

Explore pricing

Price per device
 

100-249

$26.90

For additional discounts or higher quantities, use the partner locator and find a partner today.

Try before you buy

Download a free trial license with absolutely no commitment. 

Buy from a partner

Locate an ESET partner near you

For a complete list of partners in your area, please contact ESET Sales.

ESET FILE SECURITY FOR MICROSOFT WINDOWS SERVER

Get started

We'll design a personalized offer to fit your requirements.

Or, you can purchase this product online as part of ESET security bundles. Learn more

Try before you buy

Download a free trial license with absolutely no commitment. 

System Requirements

ESET File Security is also available for

Linux logo
Microsoft Azure logo

Looking for additional solutions?

Related enterprise-grade solutions

ESET Targeted Attack Protection solution icon

ESET Targeted Attack Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis
  • Endpoint Detection & Response
ESET Dynamic Endpoint Protection solution icon

ESET Dynamic Endpoint Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis

Related products and services

What IT pros are saying

"Runs better than ANY other AV I have EVER used, blocks the issues before the user can attempt to use the questionable files."

Read full review

"I enjoy the continuous protection, automatic updates, and comparably small size of this program in comparison to other options."

Read full review

"The things I enjoy most about their products is how light they run on my clients systems and how easily they are to manage and configure."

Read full review
ESET Endpoint Security recognized in Antivirus based on user reviews
Based on customer reviews, through G2 Crowd surveys, that asked ESET business customers to rate their experiences using ESET Endpoint Security.

Read honest reviews on Capterra from more than 300 ESET customers about their experiences using ESET and why they recommend our products.


"ESET is the best small footprint antivirus software out there."

Read full review

"Spend less time removing infections from endpoints by not getting them to begin with."

Read full review

"Strong antivirus defense along with ease of deployment to end users."

Read full review

Stay on top of cybersecurity news

Brought to you by respected security researchers from ESET's 13 global R&D centers.

Corporate blog

Tax Countdown: Top tips to protect against identity fraud

Top tips to prevent tax identity fraud include filing tax returns early and monitoring your bank accounts for suspicious transactions.

ESET Sr. Security Researcher Stephen Cobb Receives CompTIA Tech Champion Award

Technology executives, business owners and policymakers from around the country converged in Washington, D.C. for the CompTIA DC Fly-In Conference, which began February 5. The event focuses on the...

We Live Security blog

Embracing creativity to improve cyber-readiness

How approaching cybersecurity with creativity in mind can lead to better protection from digital threats

Bug in EA’s Origin client left gamers open to attacks

The gaming company has rolled out a fix for the remote code execution vulnerability, so make sure you run the platform's latest version

Are you an existing customer?

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

Business license white icon

Renew or manage license

Log in or retrieve your password to manage your existing licenses.

Need assistance?

All ESET products include free technical support in your language.