ESET® DYNAMIC MAIL PROTECTION BUNDLED SOLUTIONS

Protect your users and their email, the most exploited threat vector

  • Security Management Center
  • Cloud Sandbox Analysis
  • Mail Security
ESET Dynamic Mail Protection solution icon

ESET Dynamic Mail Protection

Best-in-class enterprise-grade multi-platform mail security solution augmented by cloud-based sandboxing technology. Incorporates behavior-based detection. Easily managed via a single online console. Provides:

  • Protection against phishing
  • Spam filtering
  • Protection against ransomware
  • Zero-day threats detection
  • Remote management

Bundled solution for enterprise includes

Security Management Center

ESET Security Management Center is an easy-to-use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All features are managed from one single pane of glass.

ESET Mail Security award-winning solutions provide powerful server malware protection, spam filtering, anti-phishing and thorough email scanning against all email-borne threats. It is compatible with all major email platforms including Exchange, Office365, IBM Domino and Kerio.

Cloud-based Sandbox Analysis

ESET Dynamic Threat Defense is a cloud-based sandboxing solution. It evaluates behavior of all submitted samples with threat intelligence feeds, ESET’s multiple internal tools for static and dynamic analysis and reputation data to detect zero-day threats.

Use case: Prevent business continuity issues by reducing spam

PROBLEM

A single user will not be efficient due to having to sift through whether emails are legitimate or not. In addition, every spam email may be forwarded to the IT department to confirm legitimacy.

SOLUTION

  • ESET Mail Security analyzes email using proprietary technology to determine if an email is legitimate or spam.
  • Emails that are determined to be spam are quarantined, and users are delivered a message indicating that emails have been quarantined.
  • Administrators, in addition to the user who received the email, have the ability to release emails or delete them from being delivered.

Use case: Ransomware

PROBLEM

Ransomware tends to enter unsuspecting users’ mailboxes through email.

SOLUTION

  • ESET Mail Security evaluates the attachment to determine whether it is malicious, unknown or safe.
  • ESET Mail Security evaluates whether specific email rules were entered by an administrator to prevent certain attachment types or sizes from being sent to users.
  • If ESET Mail Security is unsure of the potential threat, it can forward the attachment to the additional solution – ESET Dynamic Threat Defense for analysis.
  • ESET Dynamic Threat Defense then analyzes the sample in a cloud sandbox, then submits the result back to Mail Security within minutes.
  • If the file was found to be malicious, ESET Mail Security automatically destroys the email that contained the malicious content.

Use case: Stop phishing in its tracks

PROBLEM

Users are constantly targeted via phishing campaigns that may contain other malicious components.

SOLUTION

  • Early warning system such as ESET Threat Intelligence notifies about a phishing campaign.
  • Rules can be implemented in ESET Mail Security to prevent emails from being received from known malicious countries and domains.
  • ESET Mail Security uses a sophisticated parser that searches message body and subject line to identify malicious links.
  • Any email containing malicious files or links is quarantined and prevented from being received by the users.
Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-com logo

ISP security partner since 2008
2 million customer base

Recommended cybersecurity services

ESET Threat Intelligence

Early warnings about threats and comprehensive data feeds from cloud-based cyberspace intelligence that ESET collects from over 110 million sensors worldwide.

The biggest thing that stands out is its strong technical advantage over other products in the marketplace. ESET offers us reliable security, meaning that I can work on any project at any time knowing our computers are protected 100%.

- Fiona Garland, Business Analyst Group IT; Mercury Engineering, Ireland; 1.300 seats

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Looking for more?

Add data access protection

ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

Business solution for superior and enhanced protection of an organization’s data and intellectual property. Includes:

  • Two-factor Authentication
  • Endpoint Encryption

Add complete mail security

ESET Dynamic Mail Protection solution icon

ESET Dynamic Mail Protection

Business solution incorporating antispam, anti-phishing and Cloud Sandbox Analysis for the complete protection of mailboxes and mail servers. Includes:

  • Security Management Center
  • Cloud Sandbox Analysis
  • Mail Security

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

The hidden threat of data theft: Keeping small businesses safe

Protecting your business against the loss of data is an often-overlooked step. A stolen laptop or a lost phone might affect fewer people than a high-level data breach, but, for a small- to...

Inside ESET’s Role in Partnering with Google: The App Defense Alliance

This morning, we announced that ESET has joined the App Defense Alliance. Why is this partnership with the Google Play Store significant, and what does it mean for you? A few brief points.

See more

We Live Security blog

Inside consumer perceptions of security and privacy in the connected home

The ESET survey polled 4,000 people to get a sense of their attitudes towards the privacy and security implications of smart home technology

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples