Ensures real-time visibility for all endpoints as well as full reporting and security management for all OSes

  • Cloud-based console with the possibility of an on-premises deployment
  • Provides real-time visibility of all endpoints: desktops, servers, virtual machines and even managed mobile devices
  • Enables full reporting for ESET security solutions
  • Controls endpoint prevention, detection & response layers across all platforms
  • Connect anytime, anywhere from your favorite web browser

Explore features

Completely multitenant

Multiple users and permission groups can be created to allow access to a limited portion of the ESET PROTECT console. This allows full streamlining of responsibilities across large enterprise teams.

Automation framework

Dynamic groups can sort computers based on current device status or defined inclusion criteria.

Dynamic and custom reporting

ESET PROTECT provides over 170 built-in reports and allows you to create custom reports from over 1000 data points.

Fully automated VDI support

A comprehensive hardware detection algorithm is used to determine the identity of the machine based on its hardware. This allows automated re-imaging and cloning of non-persistent hardware environments. Therefore, ESET’s VDI support requires no manual interaction and is fully automated.

Advanced RBAC

Starting with MFA-protected access, the console is equipped with an advanced Role-Based Access Control (RBAC) system.

Support for XDR

To further improve situational awareness and provide visibility across your network, ESET PROTECT works together with ESET Inspect, the XDR-enabling component of the ESET PROTECT platform.

Cloud MDM

A ready-to-use solution, integrated with our cloud management console. It’s easy for organizations of any size to get started, as there are no prerequisites such as certificates or additional components. Cloud MDM covers Android and Apple devices.

Advanced threat defense

Support for advanced threat defense greatly improves detection of zero-day threats such as ransomware by quickly analyzing suspicious files in ESET's powerful cloud sandbox.

Always the latest features

Leave the updating of the console up to us. We’ll do it in the background, and you’ll always be on the latest version with the latest components.

Granular policy control

Organizations can set up multiple policies for the same computer or group and can nest policies for inherited permissions. In addition, organizations can configure policy settings as user-configurable, so you can lock down any number of settings from the end users.

SIEM and SOC support

ESET PROTECT fully supports SIEM tools and can output all log information in the widely accepted JSON or LEEF format, allowing for integration with Security Operations Centers (SOC).

Full disk encryption (FDE)

Full Disk Encryption is native to ESET PROTECT, managing encryption of data on both Windows and Mac (FileVault) endpoints, improving data security and helping organizations solving the problem of data regulation compliance.

Hardware/software inventory

Not only does ESET PROTECT report on all installed software applications across an organization, it also reports on installed hardware.

System requirements

Cloud deployment

  • Internet connection

Supported browsers

  • Mozilla Firefox
  • Microsoft Edge
  • Google Chrome
  • Safari
  • Opera

See detail specifications

On-premises deployment

Supported operating systems

  • Windows Server 2012, 2012 R2, 2016, 2019, 2022
  • Windows Storage Server 2012 R2, 2016
  • Microsoft SBS 2011
  • Ubuntu, RHEL Server, CentOS, SLED, SLES, OpenSUSE, Debian

See detail specifications