ESET® MICRO UPDATES SERVICE

Up-to-date security for operations with limited internet access

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Micro Updates

Our solutions are suitable for industries with limited internet access or with strict update policies. It is important to keep security updates, and detection engine up-to-date, while balancing the cost and availability of an internet connection.


Why a Micro Updates Service?

Checkmark icon

Industries with very limited internet access

shipping or transportation
public infrastructure
banking (POS terminals) etc.

Checkmark icon

Production plants running older hardware or operating systems

manufacturing
automotive
aviation

Checkmark icon

Organizations applying very strict update policies

military
pharmaceuticals

Honda logo

protected by ESET since 2011
license prolonged 3x, enlarged 2x

Allianz Suisse logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-com logo

ISP security partner since 2008
2 milion customer base

Benefit from the following features

Small update size

ESET Micro Updates are very small update files of 250 to 500 kilobytes per week. If for any reason you miss two consecutive updates, thus making a standard weekly update impossible, you can still download a differential update after 4 weeks (comprising around 1 to 2 megabytes). After that, you may resume downloading regular weekly updates as usual.

Distribution and update process

Once a week, ESET generates a special differential update, which contains all the essential changes from the previous week. The latest format is compatible with all Version 3 and later ESET products. The update process is then straightforward – simply unpack the contents of the archive to a mirror directory and update all client computers from that mirror.

Minimal system footprint

ESET software is well known for its small system footprint. This has two advantages: It allows you to use the full power of your hardware, even during scanning and updates; and it makes ESET software fully compatible with older machines.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Looking for the complete security of your network?

Related bundled solutions

ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

  • On-premise management
  • Endpoint security
  • File server security
ESET Endpoint Protection Standard solution icon

ESET Endpoint Protection Standard

  • On-premise management
  • Endpoint antivirus
  • File server security

Related SMB solutions

  • ESET Security Management Center
    Real-time network security visibility, reporting and management on a single screen.​​​​​​​
  • ESET Endpoint Security
    Award-winning multilayered technology combining machine learning, big data and human expertise.
  • ESET File Security
    Provides advanced protection to all general servers, network file storage, and multi-purpose servers.

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

ESET security suite selected as 'PCMag Readers' Choice Award winner

2019 welcomed us with the great news that our consumer product offering was recognised by the Readers of PC Mag as “everything you need in a security suite.”

ESET Veteran Stephen Cobb Receives Prestigious CompTIA Award

Stephen Cobb, Senior Security Researcher at ESET and one of the world’s leading voices in cybersecurity, will receive a prestigious Computing Technology Industry Association (CompTIA) Award.

See more

We Live Security blog

How costly are sweetheart swindles?

And that’s on top of the heartache experienced by the tens of thousands of people who fall for romance scams each year

Siegeware: When criminals take over your smart building

Siegeware is what you get when cybercriminals mix the concept of ransomware with building automation systems: abuse of equipment control software to threaten access to physical facilities