ESET ENDPOINT PROTECTION

Our multilayered protection has been protecting your business from 390,000+ new viruses every day.

ESET Endpoint protection

Our multilayered protection has been protecting your business from 390,000+ new viruses every day.

Configure your license and continue your protection today!

Choose your management type:

Explore pricing

Price per device
 

5-10

$38.00

11-25

$32.30

26-49

$28.50

50-99

$26.60

100-249

$24.70

Explore pricing

Price per device
 

5-10

$41.30

11-25

$35.10

26-49

$31.00

50-99

$28.90

100-249

$26.90

Explore pricing

Price per device
 

5-10

$46.20

11-25

$39.30

26-49

$34.70

50-99

$32.30

100-249

$30.10

Explore pricing

Price per device
 

5-10

$49.50

11-25

$42.20

26-49

$37.20

50-99

$34.70

100-249

$32.30

"Runs better than ANY other AV I have EVER used, blocks the issues before the user can attempt to use the questionable files."

Read full review

"I enjoy the continuous protection, automatic updates, and comparably small size of this program in comparison to other options."

Read full review

"The things I enjoy most about their products is how light they run on my clients systems and how easily they are to manage and configure."

Read full review
ESET Endpoint Security recognized in Small-Business Antivirus based on user reviews
Based on customer reviews, through G2 Crowd surveys, that asked ESET business customers to rate their experiences using ESET Endpoint Security.

Endpoint protection features

Explore our multilayered approach to balancing performance, detection and false positives.

Ransomware shield

Ransomware shield

Monitors and evaluates all executed applications based on their behavior and reputation. Designed to detect and block processes that resemble the behavior of ransomware.

Advanced memory scanner

Advanced memory scanner

A unique ESET technology which effectively addresses an important issue of modern malware—heavy use of obfuscation and/or encryption. Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory.

Behavioral detection

Behavioral detection

ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognize and stop suspicious system behavior.

Two-way firewall

Two-way firewall

Prevents unauthorized access to the company network. Provides anti-hacker protection, data exposure prevention, and enables defining trusted networks—making all other connections, such as to public Wi-Fi, restricted by default.

Botnet protection

Botnet protection

Detects malicious communication used by botnets, and at the same time identifies the offending processes. Any detected malicious communication is blocked and reported to the user.

Exploit blocker

Exploit blocker

Monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java, and more). Rather than just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.

Network attack protection

Network attack protection

Improves detection of known vulnerabilities on the network level. It constitutes another important layer of protection against spreading malware, network-conducted attacks, and exploitation of vulnerabilities for which a patch has not yet been released or deployed.

In-product sandbox

In-product sandbox

ESET's in-product sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware. Utilizing this technology, ESET solutions emulate different components of computer hardware and software to execute a suspicious sample in an isolated virtualized environment.

Light footprint

Light footprint

Optimized for high performance, ESET maintains superior protection while keeping system resource demands and false positives at an industry low.

System requirements and license information

Supported operating systems

For computers

  • Microsoft Windows 10, 8.1, 8, 7, Vista, XP
  • macOS 10.9 and later
  • Debian and RedHat based distributions (Ubuntu, OpenSuse, Fedora, Mandriva, RedHat etc.)
  • kernel 2.6.x and later
  • GNU C Library 2.3 or newer
  • GTK+ 2.6 or newer
  • LSB 3.1 compatibility recommended

For smartphones and tablets

  • Android 5 (Lollipop) and later
  • iOS 8 and later

For file servers

  • Microsoft Windows Server 2016, 2012, 2008, 2003
  • Microsoft Windows Storage Server 2016, 2012, 2008
  • Microsoft Windows MultiPoint Server 2012, 2011, 2010
  • Microsoft Windows Small Business Server 2011, 2008, 2003
  • Ubuntu 18.04 LTS, 14.04 LTS, 12.04 LTS
  • Red Hat Enterprise Linux 7, 6
  • Centos 7
  • FreeBSD 9
  • Sles 12

For mail servers

  • Microsoft Windows Server 2016, 2012, 2008, 2003
  • Microsoft Small Business Server 2011, 2008, 2003
  • Microsoft Exchange Server 2016, 2013, 2010, 2007, 2003

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

Flexible license

Mix and match your licenses as needed
ESET Unilicense covers all the bases, allowing you to mix and match endpoint protection without wasting a single license.

Add additional devices at any time
You can purchases licenses for additional computers, laptops, mobile devices and servers any time.

Transfer a license to another computer
You can transfer a valid ESET license to a completely new computer from the original one. In addition, you can switch from one OS to another.

Switch to a different platform at any time
It's easy to switch your protection from one platform to another any time during the license term, without having to purchase additional licenses.

Products included with your license

ESET Endpoint Security for Windows/macOS/Android
ESET Endpoint Antivirus for Windows/macOS/Linux Desktop
ESET File Security for Windows Server/Linux/FreeBSD/Azure
ESET Mail Security for Microsoft Exchange Server
ESET Mobile Device Management for Apple iOS
ESET Virtual Security for VMware

Benefits of central management

Cloud-based Runs in an ESET-maintained cloud environment
Manage the security of your endpoints, while reducing costs and simplifying your network protection, all from the cloud.

  • Setup and deployment within minutes
  • No need for additional hardware or software
  • Single point of network security management
  • Secure access via web browser from anywhere
  • Recommended for small businesses up to 250 devices

On-premise Runs on your physical or virtualized environment
Real-time visibility for on-premise and off-premise endpoints as well as full reporting for ESET enterprise-grade solutions.

  • Complete network visibility
  • Full security management
  • Flexible reporting
  • Security management automation
  • Recommended for businesses with an in-house server

Frequently asked questions

How do I convert my ESET trial to full product?

To upgrade your trial version to the full version, you must first purchase a license. Once you have completed the purchase, you will receive an email with your new License Key. You will then insert the License Key into your product to activate your subscription.

Is it possible to remotely manage my devices even though I only used the trial on individual devices?

No need to uninstall/reinstall. Your newly purchased License Key will unlock your product.

Can I buy a bundle with a different remote management type than I originally activated during my trial?

As an ESET customer, you receive free phone, chat and email support for all of your ESET security products. In addition, ESET customers can enjoy free malware removal services—regularly priced at $99.99—absolutely free!

What if I don't need to remotely manage my devices?

Yes, auto-renewal is available when purchasing a full license. Make sure to select the ESET Auto-Renewal check box on the order summary screen.