Why should Small business companies care?
Small and medium-sized businesses are now increasingly attractive targets for cybercriminals. They are more valuable targets for cybercriminals than consumers, and more vulnerable than large enterprises.
43% of victims in data breaches are SMBs.
Source: Verizon 2019 Data Breach Investigations report (DBIR)
71% of breaches are financially motivated
Source: Verizon 2019 Data Breach Investigations report (DBIR)
60% of victims paid the ransom demanded.
Source: Ponemon 2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB) survey
3 Pillars of IT Security
Endpoint protection
Keep your network clean and protect your endpoints (computers, smartphones, tablets and fileservers) against emerging threats.
ESET protection comes with the powerful Web Control, Firewall and Anti-Spam filter to provide additional layers of protection for a company network and your mobile workforce.
Pricing from
R5,129.00
for 10 devices
Encryption
Encryption prevents the data from being readable and misused, should that data fall in the wrong hands.
ESET Endpoint Encryption is a simple-to-use encryption for companies large and small, which supports full disk encryption (FDE), file/folder encryption, email encryption and USB encryption.
Two-factor authentication
81% of data breaches were caused by weak or stolen passwords. Two-factor Authentification helps to strengthen your password access.
ESET Secure Authentication Is a mobile-based two-factor authentication system which provides additional security for accessing a company network and sensitive data.
Better technology, more effective protection
ESET's multilayered technology allows you to detect and react to cyber threats fast and effectively. Check out our advanced technologies.
Ransomware shield
Monitors applications and processes that try to modify data, blocks suspicious activity, and alerts you
Light footprint
Third-party tests prove that ESET endpoint protection places the lightest load on your network
Reliable assistance
Quality service and fast response in all markets from high-trained professionals at your disposal
Trusted by business alike
protected by ESET since 2017
more than 9,000 endpoints
protected by ESET since 2016
more than 4,000 mailboxes
protected by ESET since 2016
more than 14,000 endpoints
ISP security partner since 2008
2 milion customer base
Request business trial
Please leave us your contact details so we can deliver a personalized offer tailored to your company's needs. No commitment.
+27 21 659 2000
We asked almost 500 of our partners worldwide and these are the main challenges they encounter:
Ransomware: How does it work?
There are multiple techniques used by ransomware cybercriminals including
Screen locker ransomware
blocks access to a device screen, other than to see the malware user interface.
PIN locker ransomware
changes the device's PIN code, rendering its content and functionality inaccessible.
Disk coding ransomware
encrypts the MBR (Master Boot Record) and/or critical file system structure, and thus prevents the user from accessing the operating system.
Crypto-ransowmare
encrypts user files stored on disk