Join industry leader ESET in the south expo hall at booth #1167


Cybersecurity experts on your side

Join industry leader ESET in the south expo hall RSA Conference 2023 and explore our complete security solutions for enterprise: endpoint protection, EDR, threat hunting & intelligence. More opportunities below for Partners and Customers.

April 24–27, 2023
Moscone Center, San Francisco, CA
Visit us @booth 1167

@RSAC2023

days
hours
minutes


Cybersecurity experts on your side

Join industry leader ESET in the south expo hall RSA Conference 2023 and explore our complete security solutions for enterprise: endpoint protection, EDR, threat hunting & intelligence. More opportunities below for Partners and Customers.

April 24–27, 2023
Moscone Center, San Francisco, CA
Visit us @booth 1167

SPEAKING SESSIONS

Insights from ESET's cybersecurity experts

Moscone Center, San Francisco, CA

We (could have) cracked open your network for under $100

Monday, April 24, 2023 | 9:40 AM

Exploiting a vulnerability or spear phishing for credentials is hard work. Why bother when you can purchase them on the sprawling secondary hardware market? We tested the hypothesis that decommissioning processes may not always wipe a device clean, leaving critical data from the previous owner accessible and open to abuse. Join us to hear what we accessed and the potential damage it could cause.

Tony Anscombe, ESET Chief Security Evangelist
An industry veteran with over 20 years of experience in cybersecurity and data privacy.

Cameron Camp, ESET Security Researcher
A security researcher who focuses on malware analysis, botnets, cybercrime and emerging threats.


Is legislation and regulation a friend or foe of cyber defenders?

Monday, April 24, 2023 | 10:50 AM PT

There are many cybersecurity regulations being levied, including by the US SEC, FDIC, Executive Order on the Nation’s Cybersecurity, and various proposals by governments around the globe. The discussion will explore whether legislation and regulation is assisting or hampering cybersecurity teams.

Tony Anscombe, ESET Chief Security Evangelist
An industry veteran with over 20 years of experience in cybersecurity and data privacy.

Meet us during RSA

Partners

Join ESET for an exclusive partner breakfast. Register now to secure your spot.
April 25, Venue: Press Club

ESET Partner Breakfast

Tuesday, April 25 | 7:30 – 8:30 AM PT

Gain the energy and insights you need at the ESET Partner Breakfast before heading into the Moscone Center. Connect with your ESET team to learn how our solutions can help grow your business.

Customers

Join ESET for an exclusive lunch. Register now to secure your spot.
April 25, Venue: Press Club

Lunch & Threat Intelligence Talk

Tuesday, April 25 | 12:00 – 1:00 PM PT

Gain the inside view on the current threat landscape direct from the ESET research team. We will take the lid off our threat intelligence service and let you take an exclusive peep inside. Closing the gap between a cybersecurity teams knowledge and the bad actors is the a must for all businesses.

How ESET protects enterprise from cyberthreats

SUPPLY CHAIN ATTACKSADVANCED PERSISTENT THREATS (APT)FILE-LESS AND UEFI ATTACKSRANSOMWAREEXPLOITSCRITICAL INFRASTRUCTURE CYBER ATTACKS

How ESET protects enterprise from cyber threats

Supply chain attacks

Advances in technologies have also brought an increase in the number of large-scale cyber operations with destructive consequences.

Most recently, Petya showed that a supply chain attack using ransomware put together from multiple malware families can put tens of thousands of business computers out of commission for weeks. Thanks to ESET research, we came to know the mechanisms of that infection as well as the zero-day exploit that was at ground zero of the widespread infection. Our multi-layered technology can detect such intrusions and help companies be more secure.

ESET 'Single Pane of Glass' Solutions


ESET Endpoint Protection
includes a market verified stack of multiple protection layers, such as ESET Live Grid and network attack blocker, optimized against different attack vectors.


ESET Dynamic Threat Defense helps to stop supply chain attacks before they enter the environment, as it allows automatic submission and replication of mail attachments to ESET Cloud Sandboxes, where we simulate its behavior to determine the true intentions of the file included.


ESET Enterprise Inspector helps to identify which files have been affected by supply chain ransomware, so it allows retrospective “back to the root analysis” helping to determine the root cause of the attack.

Advanced Persistent Threats (APT)

Sednit, Turla, BlackEnergy, TeleBots, Lazarus.

These are only a few of the highly skilled and dangerous hacking groups ESET has been tracking during our 30+ years of thwarting malicious code. Thanks to this experience and intelligence, our experts build technologies that are able to identify and detect activity of these cybercriminals and protect clients from potential damage.

ESET 'Single Pane of Glass' Solutions


ESET Dynamic Threat Defense
allows analysis of never before seen files in a secure and always up-to-date Cloud Sandboxing environment. Here, all ESET technologies, including our advanced Augur Machine Learning engine, are employed to determine the behavior of the sample, thus preventing suspicious files from entering the network.


ESET Enterprise Inspector is programmed by ESET experts to identify suspicious behavior and allows security experts to tailor the detection to their specific needs. This unique approach makes ESET products stand out from the competition.

File-less and UEFI attacks

Many malware families are trying to avoid security solutions by never dropping a file on the targeted machine. Bad actors are increasingly turning to UEFI as a way to ‘rootkit’ systems and maintain persistence despite OS reinstallation.

ESET is ready for such threats as its Advanced Memory Scanner is designed to stop attackers precisely at the moment when they reveal their true malicious intentions – in the memory. By also scanning UEFI, ESET helps you secure this emerging attack vector.

ESET 'Single Pane of Glass' Solutions


ESET Endpoint Protection
includes a market verified stack of multiple protection layers, optimized against different attack vectors. Advanced Memory Scanner, UEFI scanner are the tools protecting you against file-less attacks.


ESET Enterprise Inspector gives visibility into all scripts executed in the network, helping you to identify when file-less attacks were conducted to further strengthen your security policies.

Ransomware

As WannaCry was invading hundreds of thousands of businesses around the world, ESET clients had no reason to worry.

Their endpoints were protected thanks to ESET’s network attack protection module, which successfully blocked the EternalBlue exploit used to spread the malicious code.

ESET 'Single Pane of Glass' Solutions


ESET Endpoint Protection
includes a market verified stack of multiple protection layers, optimized against different attack vectors. Although most ransomware infections are stopped by the use of ESET Live Grid and our DNA detections, we have other layers that assist. Network Attack Protection was the technology that stopped WannaCry infection in its tracks. Newly added Ransomware Shield helps to identify a ransomware-like behavior, and stops it effectively.


ESET Enterprise Inspector helps to identify which files have been affected by ransomware, so it allows retrospective “back to the root analysis” helping to determine the root cause of the attack.


ESET Dynamic Threat Defense helps to stop Ransomware Attacks before they enter the environment, as it allows automatic submission and replication of mail attachments to ESET Cloud Sandboxes, where we simulate its behavior, to determine the true intentions of the file included.

Exploits

Nowadays, highly experienced attackers look for security vulnerabilities and craft specialized tools that help them push malware through such loopholes./p>

In 2017 a ESET research team detected an attack attempt by the Sednit group that tried to use two zero-day exploits to infect a French election candidate’s campaign with a reconnaissance tool. Exploit Blocker technology mitigates similar risks by monitoring typically exploited applications for anomalies and blocking exploitation techniqu

ESET 'Single Pane of Glass' Solutions


ESET Endpoint Protection
includes a market verified stack of multiple protection layers, optimized against different attack vectors. Exploit blocker, included in all ESET Windows Endpoint & Server security products, helps to detect exploitation techniques, and protect against using them. It´s a generic approach, effective also against not publicly disclosed exploits.


ESET Enterprise Inspector gives visibility into what happens in the network, helping to identify attacks against exploits, or commonly vulnerable applications. Our rule-based mechanism allows you to monitor critical assets (applications) in your network to clearly identify any suspicious activity.

Critical Infrastructure Cyber Attacks

Black-hat hackers can go to great lengths to infiltrate a specific target.

The Industroyer malware, with its destructive, targeted and highly advanced design was one recent examples of such behavior, going after crucial industrial control systems (ICS) that were inadequately protected. ESET technologies are able to detect and block similar threats before they can inflict harm.

ESET 'Single Pane of Glass' Solutions


ESET Endpoint Protection
includes a market verified stack of multiple protection layers, which together effectively protect against all attack vectors.


ESET Enterprise Inspector constantly monitors what is happening in the network and allows security teams to define their own “safety net” criteria, to identify attacks, or suspicious behavior. When an alarm is triggered, it gives the team power to stop it. The team can define various criticality levels, and also trigger automatic generation of alert notification, to set your company at “high alert” in case of a pending attack.

Related resources

PREMIUM CONTENT

REPORT


ESET T2 2022 Threat Report

A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts.


Award-winning news, views, and insights

Get the latest news, research, cyberthreats and malware discoveries, with insights from ESET experts.

WEBINAR


Cyber Insurance — How to Meet Security Requirements

Solutions include endpoint detection and response (EDR), endpoint protection, email security, multi-factor authentication and cybersecurity awareness training.


ESET Security Solutions

Combining the skills of our world-class IT security research teams, and the cutting-edge technology of ESET IT security products...


ESET Services

Designed to help you exploit the full potential of your ESET products, ensure protection against any potential security issues...


ESET Partner Program

The ESET Channel Team is dedicated to supporting partners at all levels to help your business grow.