SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
For Businesses with more than 25 seats
ESET Secure Enterprise
Whether your business is just starting or

Simple and Straightforward

established, there are a few things you expect

With ESET Business Solutions you can mix and match endpoint protection according to your actual needs, deploying it on a range of platforms
(Windows, Mac, and Linux) and devices: computers, smartphones, tablets, and servers.

from security software you use daily.
At ESET, we feel that running security software

Light on Your System

in the business environment should be easy

Our solutions are built for small footprint, which also makes them suitable for older hardware, saving IT-related costs on hardware upgrades.
In addition, program updates are small and can download from a cenral mirror server.

and simple. That’s why we have created ESET
Business Solutions, a perfect match for any size
business – utilizing over 25 years of experience

Easy to Manage
Easily deploy, configure and manage your security software from a single console. It no longer takes a bunch of IT professionals to run your
company’s IT security – but from our remote management console your company security can be tweaked to every last detail.

pioneering the antivirus industry.

endpoint
antivirus

mobile
security

file
security

endpoint
security

mail
security

gateway
security

eset endpoint protection standard
eset endpoint protection advanced
eset secure business
eset secure enterprise
ESET Endpoint Protection Standard
Keep your network clean and protect your endpoints (computers, smartphones, tablets, and fileserver) against emerging threats. ESET
Endpoint Protection Standard provides essential protection for the company network that is easily manageable from a single console.
ESET Endpoint Protection Advanced
In addition to ESET Endpoint Protection Standard, the Advanced version comes with the powerful Web Control, Firewall and Anti-Spam
filter to provide additional layers of protection for the company network and your mobile workforce.

Enquire about ESET Premium
Support for priority access to
IT security professionals 365/24/7

ESET Secure Business
Eliminating email-borne threats at the server level, ESET Secure Business gives your company’s data an extra level of security that
complements the protection of computers, mobile devices and fileservers.
ESET Secure Enterprise
Choose this option if you operate your own Internet gateway server to safeguard your HTTP and FTP communications. In addition, ESET
Secure Enterprise gives you all the products and tools for the maximum level of protection on your endpoints and servers across multiple
platforms.
ESET Secure Enterprise

Antivirus and Antispyware

Host-based Intrusion Prevention
System (HIPS)

Provides tamper protection and secures the system registry, processes, applications
and files from unauthorized modification. You can customize the behavior of the
system down to every last detail and detect even unknown threats based on suspicious
behavior.

Device Control

Lets you block unauthorized media and devices based on pre-set rules and parameters.
Set access permissions (read/write, read, block) for individual media, devices, users and
groups.

Auto-Scan of Removable Media

Automatically scans USBs, CDs, and DVDs for threats upon insertion to eliminate
autorun and other removable risks. Choose from these scanning options: start
automatically/notify (prompt user)/do not scan.

Cross-platform Protection

Exchange files and email attachments among Windows, Mac and Linux endpoints
with confidence that malware targeting any of these platforms will be automatically
detected and eliminated. Prevent Macs from turning into carriers of malware in the
company network.

Low System Demands

Leaves more system resources for programs you use daily. Our software also runs
smoothly on older hardware, saving your time and costs of having to upgrade your
endpoints.

Multiple Log Formats

Save logs in common formats - CSV, plain text, or Windows event log for immediate
analysis or harvesting. Take advantage of data being readable by 3rd party SIEM tools;
RSA enVision is supported directly via a plug-in.

Update Rollback

ESET Endpoint Antivirus

Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping
your network protected online and off.ESET’s cloud-powered reputation database
increases scanning speed and minimizes false positives.

Revert virus signature and module updates to a known good state in case of encountering
system incompatibilities. Opt to freeze updates temporarily or until manually changed.

ESET NOD32 Antivirus Business Edition for Mac OS X
ESET NOD32 Antivirus Business Edition for Linux Desktop
ESET Endpoint Security for Android
ESET Mobile Security Business Edition
ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris
ESET Endpoint Security
ESET Mail Security for Microsoft Exchange Server
ESET Mail Security for IBM Lotus Domino
ESET Mail Security for Linux/BSD/Solaris
ESET Security for Kerio
ESET Gateway Security for Linux/BSD/Solaris
ESET Security for Kerio
ESET Remote Administrator

See the following pages for benefits and features of the 			
products that are color-coded in grey.
Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.
ESET Secure Enterprise

Remote Lock

Locks lost or stolen devices by a remote SMS command. After locking, no unauthorized
person will be able to access data stored on the device.

Remote Wipe

Safely deletes all contacts, messages and data on removable memory cards. Advanced
cleaning procedures ensure that it is not be possible to restore wiped data (Android 2.2 and
higher).

GPS Localization

Remotely locates the phone using a remote SMS command and tracks the phone’s GPS
coordinates.

SIM Matching

Stay in control of your company smartphones remotely, even when an unauthorized
SIM card is inserted. The Admin Contacts phone numbers will receive a wealth of
information about the inserted SIM, including the phone number, IMSI and IMEI codes.

Admin Contacts

Set up one or more Admin Contacts for your company mobile fleet to receive all the
important information in the event of a loss or theft.

Call Blocking

Blocks calls from unknown or hidden numbers and also calls to unwanted numbers.
Define a list of allowed/blocked contacts and keep your phone bills under control.

Uninstall Protection

One password controls it all. Only authorized persons will be able to uninstall ESET
Endpoint Security for Android (version 2.2 and higher).

SMS/MMS Antispam

Filters out unwanted SMS/MMS messages. Allows you to define custom blacklists/
whitelists or simply block all unknown numbers.

Real-time Protection

Protects all applications, files and memory cards with the ESET NOD32 proactive
technology optimized for mobile platforms.

Security Audit

An on-demand security audit checks the status of all vital phone functions, including
battery level, Bluetooth status, home network, disk space and running processes.

On-access Scanning

Advanced scanning protects company smartphones and tablets from threats
attempting to access the system via Bluetooth or Wi-Fi.

ESET Security for Kerio

On-demand Scanning

On-demand Scanning provides reliable scanning and cleaning of integrated memory
and exchangeable media. Scanning of specific folders is also supported.

ESET Gateway Security for Linux/BSD/Solaris

Remote Administration

Enables you to check the security status of your smartphone fleet, run on-demand
scans, push security policies and set uninstall password. Get overview of the platforms,
OS versions and other information and stay up-to-date on your smartphones’ security.

Administrator Message

Allows administrator to push a message to the device with custom text via ESET
Remote Administrator. The message priority can be set to normal, warning or critical
warning.

ESET Endpoint Antivirus
ESET NOD32 Antivirus Business Edition for Mac OS X
ESET NOD32 Antivirus Business Edition for Linux Desktop
ESET Endpoint Security for Android
ESET Mobile Security Business Edition
ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris
ESET Endpoint Security
ESET Mail Security for Microsoft Exchange Server
ESET Mail Security for IBM Lotus Domino
ESET Mail Security for Linux/BSD/Solaris

ESET Security for Kerio
ESET Remote Administrator

See the previous and following page(s) for benefits 			
and features of the products that are color-coded in grey.
Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.
ESET Secure Enterprise

Antivirus and Antispyware

Eliminates all types of threats including viruses, rootkits, worms and spyware.
Provides real-time on-access scanning of the server-stored data.
ESET Self-defense prevents malware and unauthorized users from disabling the security
of the system.
Powered by the advanced ThreatSense® technology combining speed, accuracy and
minimal system impact.

Cross-platform Protection

Eliminates malware targeting all platforms, including Windows, Mac and Linux
operating systems.
Prevents malware from spreading from one platform to another.

ESET Endpoint Antivirus
Low System Demands

Delivers proven protection while leaving more system resources for the server’s vital
tasks.

Smooth Operation

ESET NOD32 Antivirus Business Edition for Mac OS X

Identification of user accounts used in infiltration attempts.

ESET NOD32 Antivirus Business Edition for Linux Desktop
ESET Endpoint Security for Android

Password protected uninstallation.

ESET Mobile Security Business Edition

Automatically excludes critical server files.

ESET File Security for Microsoft Windows Server

Automatically detects server roles to exclude critical server files like data stores and
paging files from on-access scanning to decrease overhead.

ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris
ESET Endpoint Security
ESET Mail Security for Microsoft Exchange Server
ESET Mail Security for IBM Lotus Domino
ESET Mail Security for Linux/BSD/Solaris
ESET Security for Kerio
ESET Gateway Security for Linux/BSD/Solaris
ESET Security for Kerio
ESET Remote Administrator

See the previous and following page(s) for benefits 			
and features of the products that are color-coded in grey.
Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.
ESET Secure Enterprise

Antivirus and Antispyware

Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your
network protected online and off. Optional cloud-powered scanning utilizes our reputation
database for increased scanning speed and minimal false positives.

Host-based Intrusion Prevention
System (HIPS)

Provides tampering protection and protects the system registry, processes, applications and
files from unauthorized modification. You can customize the behavior of the system down to
every last detail and detect even unknown threats based on suspicious behavior.

Web Control

Allows to limit access to select website categories by a way of automatic in-the-cloud
classification. Create detailed rules for user groups to comply with your company policies
and block sites generating high traffic volume.

Trusted Network Detection

Lets you define trusted networks and protect all other connections with strict mode, making
company laptops invisible in public Wi-Fi networks in hotels, airports and at conferences.

Two-way Firewall

Prevents unauthorized access to company network and protects company data from
exposure. Remote administration provides a firewall rule merge wizard that makes
aggregating firewall rules in the network a snap.

Client Antispam

Protects your company communications from spam and email-borne threats. Set whiteand blacklists and self-learning separately for each client or group. The antispam natively
supports Microsoft Outlook and also filters POP3, IMAP, MAPI and HTTP protocols.

Device Control

Lets you block unauthorized media and devices based on pre-set rules and parameters. Set
access permissions (read/write, read, block) for individual media, devices, users and groups.

Component-based Installation

Install any or all of these security components: firewall, antispam, web control, device
control, Microsoft NAP support, and web access protection. Saves disk space by only
installing the modules you need. You can also remotely enable/disable installed modules.

Low System Demands

Ensure proven detection while leaving more system resources for programs you use daily.
Our software also runs smoothly on older hardware, saving your time and costs of having to
upgrade your endpoints.

Multiple Log Formats

Save logs in common formats - CSV, plain text, or Windows event log for immediate analysis
or harvesting. Take advantage of data being readable by 3rd party SIEM tools; RSA enVision is
supported directly via a plug-in.

ESET Endpoint Antivirus
ESET NOD32 Antivirus Business Edition for Mac OS X
ESET NOD32 Antivirus Business Edition for Linux Desktop
ESET Endpoint Security for Android
ESET Mobile Security Business Edition
ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris
ESET Endpoint Security
ESET Mail Security for Microsoft Exchange Server
ESET Mail Security for IBM Lotus Domino
ESET Mail Security for Linux/BSD/Solaris
ESET Security for Kerio
ESET Gateway Security for Linux/BSD/Solaris
ESET Security for Kerio
ESET Remote Administrator

See the previous and following page(s) for benefits 			
and features of the products that are color-coded in grey.
Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.
ESET Secure Enterprise

Antivirus and Antispyware

Eliminates all types of threats, including viruses, rootkits, worms and spyware.
Filters out email-borne threats, including spyware at the gateway level.
Provides all tools for fully-fledged server protection, including the resident shield and
on-demand scanner.
Powered by the advanced ThreatSense® technology combining speed, accuracy and minimal
system impact.

Antispam

Features improved antispam engine and an option to define antispam threshold scores with
greater precision.

ESET Endpoint Antivirus
ESET NOD32 Antivirus Business Edition for Mac OS X

Real file type detection lets the admin apply policies for specific type of content in e-mail
attachments.

ESET NOD32 Antivirus Business Edition for Linux Desktop
ESET Endpoint Security for Android

Logs & Statistics

Give you the option to monitor the server performance in real time.

ESET File Security for Microsoft Windows Server
ESET File Security for Linux / BSD / Solaris
ESET Endpoint Security
ESET Mail Security for Microsoft Exchange Server
ESET Mail Security for IBM Lotus Domino
ESET Mail Security for Linux/BSD/Solaris
ESET Security for Kerio
ESET Gateway Security for Linux/BSD/Solaris
ESET Security for Kerio
ESET Remote Administrator

See the previous and following page(s) for benefits 			
and features of the products that are color-coded in grey.
Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.

Spam log - Displays sender, recipient, spam score, classification reason and action taken.
Greylisting log - Displays greylisted sender, recipient, action taken and status until
connection denial period ends.

ESET Mobile Security Business Edition

ESET File Security for Microsoft Windows Server Core

Stops spam and phishing messages with high interception rates.

Smooth Operation

Automatically excludes critical server files from scanning including Microsoft Exchange
folders.
The built-in license manager automatically merges two or more licenses with the same
customer name.
ESET Secure Enterprise

Antivirus and Antispyware

Eliminates all types of threats, including viruses, rootkits, worms and spyware.
Provides real-time on-access scanning of HTTP, FTP, SMTP, IMAP and POP3 protocols.
Powered by the advanced ThreatSense® technology combining speed, accuracy and
minimal system impact.

Antispam

Stops spam and phishing messages with high interception rates.
Allows you to define antispam threshold scores with a high level of precision.

ESET Endpoint Antivirus

Cross-platform Protection

ESET NOD32 Antivirus Business Edition for Mac OS X

Eliminates malware targeting all platforms, including Windows, Mac and Linux
operating systems.
Prevents malware from spreading from one platform to another.

ESET NOD32 Antivirus Business Edition for Linux Desktop
Remote Administration

Fully compatible with ESET Remote Administrator.

ESET Endpoint Security for Android

Offers a set of pre-defined actions upon scanning results.

ESET Mobile Security Business Edition

Allows you to remotely deploy, manage, and update and report on all instances of ESET
security software in the company network.

ESET File Security for Microsoft Windows Server

Logs & Statistics

ESET File Security for Microsoft Windows Server Core

Lets you keep abreast of security status with detailed and comprehensive logs and
statistics.

ESET File Security for Linux / BSD / Solaris

Spam log - Displays sender, recipient, spam score, classification reason and action
taken.

ESET Endpoint Security

Gives you the option to monitor the server performance in real time.

ESET Mail Security for Microsoft Exchange Server
ESET Mail Security for IBM Lotus Domino
ESET Mail Security for Linux/BSD/Solaris
ESET Security for Kerio
ESET Gateway Security for Linux/BSD/Solaris
ESET Security for Kerio
ESET Remote Administrator

See the previous and following page(s) for benefits 			
and features of the products that are color-coded in grey.
Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.

Smooth Operation

Offers customizable black/white -listing of websites.
Allows you to set rules by protocols.
Protects 3 in 1 – communication protocols, emails, and the server’s file system.
Automatically excludes critical server files from scanning .
ESET Secure Enterprise

Remote Administration

Manage all servers, endpoints, and even smartphones and virtual machines from a
single console. Support for IPv6 infrastructure makes management of network security
even easier. The comprehensive console interface lets you view all security-related
events, including logs from antivirus, firewall, web control, device control and others.

Real-time Web Dashboard

Access web-based dashboard from anywhere for quick at-a-glance security status using live
streaming of data. Customize the information displayed on the dashboard to get the most
up-to-date information on the security status from the server and clients.

Role-based Management

Assign privileges to different remote administration users and delegate responsibilities
accordingly. The built-in password strength checker and audit functionality ensure that
administrator accounts are properly secured.

Dynamic Client Groups

Create dynamic and static client groups for easier policy enforcement and to address
any pressing issues. Select from these parameters for groups: operating system, client
name mask, IP mask, recent threat detected, and many more. Clients are moved
automatically to the corresponding group if parameters change.

Event Notifications

Specify log and report parameters or choose from more than 50 templates. Have
notification sent immediately or in batches based on custom threshold for securityrelated events.

Randomized Task Execution

Minimizes AV storms on virtual endpoints and reduces resource contention on
networked drives. Random task execution helps offset the effect of simultaneous
system scans on the network performance.

Local Update Server

Have all clients update from a local mirror server and minimize Internet bandwidth
usage. For your mobile workforce define policies to update from ESET online servers
when outside of home network. The local update server supports secured (HTTPS)
communication channel.

The ESET Remote Administrator tool comes standard 			
with each version of ESET Business Solutions.

Update Rollback

Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.

Revert virus signature and module updates to a known good state in case of
encountering system incompatibilities. Opt to freeze updates temporarily or until
manually changed.

Postponed updates

Opt to download from 3 specialized update servers: pre-release (beta users), regular
release (regular users) and postponed release (approx. 12 hours after regular release).
Apply antivirus updates to non-critical systems first, followed by critical ones with the
option of clearing the update cache.

Microsoft NAP Support

Helps resolve compliance issues with company network access policy. You can set
compliance requirements such as age of virus database, antivirus product version,
protection status, availability of antivirus protection, as well as firewall status − and
force database updates.

Copyright © 1992 – 2013 ESET, spol. s r. o. ESET, ESET logo, ESET
android figure, NOD32, ESET Smart Security, SysInspector,
ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo and/or
other mentioned products of ESET, spol. s r. o., are registered
trademarks of ESET, spol. s r. o. Windows® is a trademark of
the Microsoft group of companies. Other here mentioned
companies or products might be registered trademarks of
their proprietors. Produced according to quality standards of
ISO 9001:2000.

Mais conteúdo relacionado

Mais procurados

Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityseAppin Ara
 
StandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackStandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackHelpSystems
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportAjit Gaddam
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Brent Muir
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYRisman Hatibi
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009OS-Cubed, Inc.
 
Operating System Security
Operating System SecurityOperating System Security
Operating System SecurityRamesh Upadhaya
 
Operating system security
Operating system securityOperating system security
Operating system securityRachel Jeewa
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ictmakanaya
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2smktsj2
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systemsSejahtera Affif
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)José Ferreiro
 

Mais procurados (20)

Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
StandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackStandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech Pack
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Ch11
Ch11Ch11
Ch11
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
 
Microsoft intune
Microsoft intuneMicrosoft intune
Microsoft intune
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 

Semelhante a ESET Business Solutions Endpoint Protection

IT security for busines
IT security for businesIT security for busines
IT security for businesAdi Saputra
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US☁ ☁ Gautam T ☁☁
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint ProtectionDan Buckley
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint ProtectionDan Buckley
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Dan Buckley
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security SolutionsThe TNS Group
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9Javier Arrospide
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptxNBBNOC
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devicesHCL Technologies
 

Semelhante a ESET Business Solutions Endpoint Protection (20)

IT security for busines
IT security for businesIT security for busines
IT security for busines
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
 
Onepager w10 security
Onepager w10 securityOnepager w10 security
Onepager w10 security
 
ESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--editionESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--edition
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Cyber tooth
Cyber toothCyber tooth
Cyber tooth
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 

Último

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 

Último (20)

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 

ESET Business Solutions Endpoint Protection

  • 1. For Businesses with more than 25 seats
  • 2. ESET Secure Enterprise Whether your business is just starting or Simple and Straightforward established, there are a few things you expect With ESET Business Solutions you can mix and match endpoint protection according to your actual needs, deploying it on a range of platforms (Windows, Mac, and Linux) and devices: computers, smartphones, tablets, and servers. from security software you use daily. At ESET, we feel that running security software Light on Your System in the business environment should be easy Our solutions are built for small footprint, which also makes them suitable for older hardware, saving IT-related costs on hardware upgrades. In addition, program updates are small and can download from a cenral mirror server. and simple. That’s why we have created ESET Business Solutions, a perfect match for any size business – utilizing over 25 years of experience Easy to Manage Easily deploy, configure and manage your security software from a single console. It no longer takes a bunch of IT professionals to run your company’s IT security – but from our remote management console your company security can be tweaked to every last detail. pioneering the antivirus industry. endpoint antivirus mobile security file security endpoint security mail security gateway security eset endpoint protection standard eset endpoint protection advanced eset secure business eset secure enterprise ESET Endpoint Protection Standard Keep your network clean and protect your endpoints (computers, smartphones, tablets, and fileserver) against emerging threats. ESET Endpoint Protection Standard provides essential protection for the company network that is easily manageable from a single console. ESET Endpoint Protection Advanced In addition to ESET Endpoint Protection Standard, the Advanced version comes with the powerful Web Control, Firewall and Anti-Spam filter to provide additional layers of protection for the company network and your mobile workforce. Enquire about ESET Premium Support for priority access to IT security professionals 365/24/7 ESET Secure Business Eliminating email-borne threats at the server level, ESET Secure Business gives your company’s data an extra level of security that complements the protection of computers, mobile devices and fileservers. ESET Secure Enterprise Choose this option if you operate your own Internet gateway server to safeguard your HTTP and FTP communications. In addition, ESET Secure Enterprise gives you all the products and tools for the maximum level of protection on your endpoints and servers across multiple platforms.
  • 3. ESET Secure Enterprise Antivirus and Antispyware Host-based Intrusion Prevention System (HIPS) Provides tamper protection and secures the system registry, processes, applications and files from unauthorized modification. You can customize the behavior of the system down to every last detail and detect even unknown threats based on suspicious behavior. Device Control Lets you block unauthorized media and devices based on pre-set rules and parameters. Set access permissions (read/write, read, block) for individual media, devices, users and groups. Auto-Scan of Removable Media Automatically scans USBs, CDs, and DVDs for threats upon insertion to eliminate autorun and other removable risks. Choose from these scanning options: start automatically/notify (prompt user)/do not scan. Cross-platform Protection Exchange files and email attachments among Windows, Mac and Linux endpoints with confidence that malware targeting any of these platforms will be automatically detected and eliminated. Prevent Macs from turning into carriers of malware in the company network. Low System Demands Leaves more system resources for programs you use daily. Our software also runs smoothly on older hardware, saving your time and costs of having to upgrade your endpoints. Multiple Log Formats Save logs in common formats - CSV, plain text, or Windows event log for immediate analysis or harvesting. Take advantage of data being readable by 3rd party SIEM tools; RSA enVision is supported directly via a plug-in. Update Rollback ESET Endpoint Antivirus Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your network protected online and off.ESET’s cloud-powered reputation database increases scanning speed and minimizes false positives. Revert virus signature and module updates to a known good state in case of encountering system incompatibilities. Opt to freeze updates temporarily or until manually changed. ESET NOD32 Antivirus Business Edition for Mac OS X ESET NOD32 Antivirus Business Edition for Linux Desktop ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Endpoint Security ESET Mail Security for Microsoft Exchange Server ESET Mail Security for IBM Lotus Domino ESET Mail Security for Linux/BSD/Solaris ESET Security for Kerio ESET Gateway Security for Linux/BSD/Solaris ESET Security for Kerio ESET Remote Administrator See the following pages for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features.
  • 4. ESET Secure Enterprise Remote Lock Locks lost or stolen devices by a remote SMS command. After locking, no unauthorized person will be able to access data stored on the device. Remote Wipe Safely deletes all contacts, messages and data on removable memory cards. Advanced cleaning procedures ensure that it is not be possible to restore wiped data (Android 2.2 and higher). GPS Localization Remotely locates the phone using a remote SMS command and tracks the phone’s GPS coordinates. SIM Matching Stay in control of your company smartphones remotely, even when an unauthorized SIM card is inserted. The Admin Contacts phone numbers will receive a wealth of information about the inserted SIM, including the phone number, IMSI and IMEI codes. Admin Contacts Set up one or more Admin Contacts for your company mobile fleet to receive all the important information in the event of a loss or theft. Call Blocking Blocks calls from unknown or hidden numbers and also calls to unwanted numbers. Define a list of allowed/blocked contacts and keep your phone bills under control. Uninstall Protection One password controls it all. Only authorized persons will be able to uninstall ESET Endpoint Security for Android (version 2.2 and higher). SMS/MMS Antispam Filters out unwanted SMS/MMS messages. Allows you to define custom blacklists/ whitelists or simply block all unknown numbers. Real-time Protection Protects all applications, files and memory cards with the ESET NOD32 proactive technology optimized for mobile platforms. Security Audit An on-demand security audit checks the status of all vital phone functions, including battery level, Bluetooth status, home network, disk space and running processes. On-access Scanning Advanced scanning protects company smartphones and tablets from threats attempting to access the system via Bluetooth or Wi-Fi. ESET Security for Kerio On-demand Scanning On-demand Scanning provides reliable scanning and cleaning of integrated memory and exchangeable media. Scanning of specific folders is also supported. ESET Gateway Security for Linux/BSD/Solaris Remote Administration Enables you to check the security status of your smartphone fleet, run on-demand scans, push security policies and set uninstall password. Get overview of the platforms, OS versions and other information and stay up-to-date on your smartphones’ security. Administrator Message Allows administrator to push a message to the device with custom text via ESET Remote Administrator. The message priority can be set to normal, warning or critical warning. ESET Endpoint Antivirus ESET NOD32 Antivirus Business Edition for Mac OS X ESET NOD32 Antivirus Business Edition for Linux Desktop ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Endpoint Security ESET Mail Security for Microsoft Exchange Server ESET Mail Security for IBM Lotus Domino ESET Mail Security for Linux/BSD/Solaris ESET Security for Kerio ESET Remote Administrator See the previous and following page(s) for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features.
  • 5. ESET Secure Enterprise Antivirus and Antispyware Eliminates all types of threats including viruses, rootkits, worms and spyware. Provides real-time on-access scanning of the server-stored data. ESET Self-defense prevents malware and unauthorized users from disabling the security of the system. Powered by the advanced ThreatSense® technology combining speed, accuracy and minimal system impact. Cross-platform Protection Eliminates malware targeting all platforms, including Windows, Mac and Linux operating systems. Prevents malware from spreading from one platform to another. ESET Endpoint Antivirus Low System Demands Delivers proven protection while leaving more system resources for the server’s vital tasks. Smooth Operation ESET NOD32 Antivirus Business Edition for Mac OS X Identification of user accounts used in infiltration attempts. ESET NOD32 Antivirus Business Edition for Linux Desktop ESET Endpoint Security for Android Password protected uninstallation. ESET Mobile Security Business Edition Automatically excludes critical server files. ESET File Security for Microsoft Windows Server Automatically detects server roles to exclude critical server files like data stores and paging files from on-access scanning to decrease overhead. ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Endpoint Security ESET Mail Security for Microsoft Exchange Server ESET Mail Security for IBM Lotus Domino ESET Mail Security for Linux/BSD/Solaris ESET Security for Kerio ESET Gateway Security for Linux/BSD/Solaris ESET Security for Kerio ESET Remote Administrator See the previous and following page(s) for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features.
  • 6. ESET Secure Enterprise Antivirus and Antispyware Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your network protected online and off. Optional cloud-powered scanning utilizes our reputation database for increased scanning speed and minimal false positives. Host-based Intrusion Prevention System (HIPS) Provides tampering protection and protects the system registry, processes, applications and files from unauthorized modification. You can customize the behavior of the system down to every last detail and detect even unknown threats based on suspicious behavior. Web Control Allows to limit access to select website categories by a way of automatic in-the-cloud classification. Create detailed rules for user groups to comply with your company policies and block sites generating high traffic volume. Trusted Network Detection Lets you define trusted networks and protect all other connections with strict mode, making company laptops invisible in public Wi-Fi networks in hotels, airports and at conferences. Two-way Firewall Prevents unauthorized access to company network and protects company data from exposure. Remote administration provides a firewall rule merge wizard that makes aggregating firewall rules in the network a snap. Client Antispam Protects your company communications from spam and email-borne threats. Set whiteand blacklists and self-learning separately for each client or group. The antispam natively supports Microsoft Outlook and also filters POP3, IMAP, MAPI and HTTP protocols. Device Control Lets you block unauthorized media and devices based on pre-set rules and parameters. Set access permissions (read/write, read, block) for individual media, devices, users and groups. Component-based Installation Install any or all of these security components: firewall, antispam, web control, device control, Microsoft NAP support, and web access protection. Saves disk space by only installing the modules you need. You can also remotely enable/disable installed modules. Low System Demands Ensure proven detection while leaving more system resources for programs you use daily. Our software also runs smoothly on older hardware, saving your time and costs of having to upgrade your endpoints. Multiple Log Formats Save logs in common formats - CSV, plain text, or Windows event log for immediate analysis or harvesting. Take advantage of data being readable by 3rd party SIEM tools; RSA enVision is supported directly via a plug-in. ESET Endpoint Antivirus ESET NOD32 Antivirus Business Edition for Mac OS X ESET NOD32 Antivirus Business Edition for Linux Desktop ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Endpoint Security ESET Mail Security for Microsoft Exchange Server ESET Mail Security for IBM Lotus Domino ESET Mail Security for Linux/BSD/Solaris ESET Security for Kerio ESET Gateway Security for Linux/BSD/Solaris ESET Security for Kerio ESET Remote Administrator See the previous and following page(s) for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features.
  • 7. ESET Secure Enterprise Antivirus and Antispyware Eliminates all types of threats, including viruses, rootkits, worms and spyware. Filters out email-borne threats, including spyware at the gateway level. Provides all tools for fully-fledged server protection, including the resident shield and on-demand scanner. Powered by the advanced ThreatSense® technology combining speed, accuracy and minimal system impact. Antispam Features improved antispam engine and an option to define antispam threshold scores with greater precision. ESET Endpoint Antivirus ESET NOD32 Antivirus Business Edition for Mac OS X Real file type detection lets the admin apply policies for specific type of content in e-mail attachments. ESET NOD32 Antivirus Business Edition for Linux Desktop ESET Endpoint Security for Android Logs & Statistics Give you the option to monitor the server performance in real time. ESET File Security for Microsoft Windows Server ESET File Security for Linux / BSD / Solaris ESET Endpoint Security ESET Mail Security for Microsoft Exchange Server ESET Mail Security for IBM Lotus Domino ESET Mail Security for Linux/BSD/Solaris ESET Security for Kerio ESET Gateway Security for Linux/BSD/Solaris ESET Security for Kerio ESET Remote Administrator See the previous and following page(s) for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features. Spam log - Displays sender, recipient, spam score, classification reason and action taken. Greylisting log - Displays greylisted sender, recipient, action taken and status until connection denial period ends. ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server Core Stops spam and phishing messages with high interception rates. Smooth Operation Automatically excludes critical server files from scanning including Microsoft Exchange folders. The built-in license manager automatically merges two or more licenses with the same customer name.
  • 8. ESET Secure Enterprise Antivirus and Antispyware Eliminates all types of threats, including viruses, rootkits, worms and spyware. Provides real-time on-access scanning of HTTP, FTP, SMTP, IMAP and POP3 protocols. Powered by the advanced ThreatSense® technology combining speed, accuracy and minimal system impact. Antispam Stops spam and phishing messages with high interception rates. Allows you to define antispam threshold scores with a high level of precision. ESET Endpoint Antivirus Cross-platform Protection ESET NOD32 Antivirus Business Edition for Mac OS X Eliminates malware targeting all platforms, including Windows, Mac and Linux operating systems. Prevents malware from spreading from one platform to another. ESET NOD32 Antivirus Business Edition for Linux Desktop Remote Administration Fully compatible with ESET Remote Administrator. ESET Endpoint Security for Android Offers a set of pre-defined actions upon scanning results. ESET Mobile Security Business Edition Allows you to remotely deploy, manage, and update and report on all instances of ESET security software in the company network. ESET File Security for Microsoft Windows Server Logs & Statistics ESET File Security for Microsoft Windows Server Core Lets you keep abreast of security status with detailed and comprehensive logs and statistics. ESET File Security for Linux / BSD / Solaris Spam log - Displays sender, recipient, spam score, classification reason and action taken. ESET Endpoint Security Gives you the option to monitor the server performance in real time. ESET Mail Security for Microsoft Exchange Server ESET Mail Security for IBM Lotus Domino ESET Mail Security for Linux/BSD/Solaris ESET Security for Kerio ESET Gateway Security for Linux/BSD/Solaris ESET Security for Kerio ESET Remote Administrator See the previous and following page(s) for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features. Smooth Operation Offers customizable black/white -listing of websites. Allows you to set rules by protocols. Protects 3 in 1 – communication protocols, emails, and the server’s file system. Automatically excludes critical server files from scanning .
  • 9. ESET Secure Enterprise Remote Administration Manage all servers, endpoints, and even smartphones and virtual machines from a single console. Support for IPv6 infrastructure makes management of network security even easier. The comprehensive console interface lets you view all security-related events, including logs from antivirus, firewall, web control, device control and others. Real-time Web Dashboard Access web-based dashboard from anywhere for quick at-a-glance security status using live streaming of data. Customize the information displayed on the dashboard to get the most up-to-date information on the security status from the server and clients. Role-based Management Assign privileges to different remote administration users and delegate responsibilities accordingly. The built-in password strength checker and audit functionality ensure that administrator accounts are properly secured. Dynamic Client Groups Create dynamic and static client groups for easier policy enforcement and to address any pressing issues. Select from these parameters for groups: operating system, client name mask, IP mask, recent threat detected, and many more. Clients are moved automatically to the corresponding group if parameters change. Event Notifications Specify log and report parameters or choose from more than 50 templates. Have notification sent immediately or in batches based on custom threshold for securityrelated events. Randomized Task Execution Minimizes AV storms on virtual endpoints and reduces resource contention on networked drives. Random task execution helps offset the effect of simultaneous system scans on the network performance. Local Update Server Have all clients update from a local mirror server and minimize Internet bandwidth usage. For your mobile workforce define policies to update from ESET online servers when outside of home network. The local update server supports secured (HTTPS) communication channel. The ESET Remote Administrator tool comes standard with each version of ESET Business Solutions. Update Rollback Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features. Revert virus signature and module updates to a known good state in case of encountering system incompatibilities. Opt to freeze updates temporarily or until manually changed. Postponed updates Opt to download from 3 specialized update servers: pre-release (beta users), regular release (regular users) and postponed release (approx. 12 hours after regular release). Apply antivirus updates to non-critical systems first, followed by critical ones with the option of clearing the update cache. Microsoft NAP Support Helps resolve compliance issues with company network access policy. You can set compliance requirements such as age of virus database, antivirus product version, protection status, availability of antivirus protection, as well as firewall status − and force database updates. Copyright © 1992 – 2013 ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo and/or other mentioned products of ESET, spol. s r. o., are registered trademarks of ESET, spol. s r. o. Windows® is a trademark of the Microsoft group of companies. Other here mentioned companies or products might be registered trademarks of their proprietors. Produced according to quality standards of ISO 9001:2000.