SlideShare uma empresa Scribd logo
1 de 70
Do More with ESET’s
new IT security products
for business
ESET – a pioneer of IT security
since 1987
HEADQUARTERS
Bratislava, SK
REGIONAL CENTERS AND OFFICES
San Diego (USA)
Buenos Aires (ARG)
Sao Paulo (BRA)
Sydney (AUS)
Jena (GER)
Prague (CZE)
Singapore
MALWARE RESEARCH AND TECHNOLOGY CENTERS
Bratislava (SVK)
Košice (SVK)
San Diego (USA)
Montreal (CAN)
Krakow (POL)
Buenos Aires (ARG)
Prague (CZE)
Jablonec nad Nisou (CZE)
Singapore
ESET’s worldwide presence
135EMPLOYEES
976EMPLOYEES
4FOUNDERS
2006
2014
1987
As the Internet has
grown, so has ESET
Global presence,
global protection
PROTECTED USERS WORLDWIDE
100,000,000
Numerous awards worldwide
ESET product is the leader in
lowest system-resource
consumption by testing
authority AV-Comparatives
ESET has received the most
"Advanced+" awards in proactive
tests from AV-Comparatives
The only vendor
with record-breaking
protection
ESET achieves 100%
protection in Dennis
Technology labs independent
test, topping the list of IT
security vendors
ESET holds Checkmark
certifications in detection of
infections
ESET tops the security software
consumer satisfaction in Japan
for the 3rd consecutive time
ESET is the first antivirus
company to have achieved
ICSA certification for Mac OS X
ESET Business products
get the approved award
from AV-Comparatives
Numerous awards worldwide
Antivirus Battle
Royale, ESET
receives 9/10 points
“We give the 2014 ESET
NOD32 Antivirus 10 out of
10 stars and a 2014 Best
Buy Award.”
ESET Mobile Security
wins Seal of Approval
from PTPA
ESET Wins PCMag Consumer
Recommended Award for
Security Suites and Stand Alone
Antivirus Software
Numerous awards worldwide
Leading enterprises entrust their
IT security to ESET
Leading enterprises entrust their
IT security to ESET
WHY ESET?
We are focused solely
on IT security – and
nothing else
Our only objective is to keep your
systems secure.
By securing your IT, we
let you Do More with
your business
Our solutions free up customers’ IT
resources.
Our software is easy to
use and won’t slow your
hardware
ESET solutions are famed for their
low system impact
Our technology is among
the best in the world
ESET products have now passed
every VB100 test for over 11 years,
also a record.
With rapid ROI, our
solutions pay for
themselves
Almost two-thirds of surveyed ESET
customers say they see a return on
their investment in less than 6
months.
We operate globally
With offices in Europe, the Americas
and Asia, we have a sales presence in
180 countries worldwide.
OUR COMPREHENSIVE
RANGE OF BUSINESS
PRODUCTS
NEW NEW
NEW
NEW NEW
NEW
NEW
Endpoint Protection
• Antivirus and Antispyware
• Virtualization Support
• Host-Based Intrusion Prevention System (HIPS)
• Exploit Blocker
• Advanced Memory Scanner
• Client Antispam
• Cross-Platform Protection
Data Access Protection
• Web Control
• Device Control
• Two-Way Firewall
• Anti-Phishing
• Vulnerability Shield
Scanning and Update Options
• Idle-State Scanner
• First Scan after Installation
• Update Rollback
• Postponed Updates
• Local Update Server
Usability
• RIP & Replace
• Customizable GUI Visibility
• ESET License Administrator
• Touchscreen Support
• Low System Demands
• Right-to-Left Language Support
• Remote Management
ESET Endpoint Security delivers comprehensive IT security for
your business via multiple layers of protection, including our
field-proven ESET NOD32® detection technology, data access
protection and fully adjustable scanning and update options.
Keep your system running at its best thanks to low system
demands, virtualization support and optional cloud-powered
scanning.
Maintain perfect data access protection by shielding your
network against unauthorized access, and limit employee
access to selected websites. Oversee it all effortlessly with our
latest ESET Remote Administrator tool.
Endpoint Protection
• Antivirus and Antispyware
• Virtualization Support
• Host-Based Intrusion Prevention System (HIPS)
• Exploit Blocker
• Advanced Memory Scanner
• Cross-Platform Protection
Data Access Protection
• Anti-Phishing
• Device Control
Scanning and Update Options
• Idle-State Scanner
• First Scan after Installation
• Update Rollback
• Postponed Updates
• Local Update Server
Usability
• RIP & Replace
• Customizable GUI Visibility
• ESET License Administrator
• Touchscreen Support
• Low System Demands
• Right-to-Left Language Support
• Remote Management
ESET Endpoint Antivirus, including our field-proven ESET
NOD32® detection technology, delivers superior detection
power for your business.
Its low system demands and virtualization capability keep
your system humming.
Keep the security of offline devices under control, and
customize scanning and update options as you see fit.
Control it all effortlessly with our all-new, user-friendly
remote administrator tool.
Endpoint Protection
• Antivirus and Antispyware
• Virtualization Support
• Web and Email Scanning
• Auto-Scan of Removable Media
• Cross-Platform Protection
Data Access Protection
• Web Control
• Two-Way Firewall
• Anti-Phishing
Scanning and Update Options
• Update Rollback
• Postponed Updates
• Local Update Server
Usability
• Low System Demands
• Remote Management
• ESET License Administrator
• Presentation Mode
• Component-Based Installation
• Remote Upgrade
• Multiple Log Formats
• Familiar Design
ESET Endpoint Security for OS X ensures multi-layered
protection for mixed environments.
It prevents unauthorized access to your company network
and provides anti-hacker protection.
Malware and spyware protection shields end users from
fake websites stealing sensitive information such as
usernames or passwords. The solution’s low system
footprint leaves more room for programs that end users
regularly use.
Endpoint Protection
• Antivirus and Antispyware
• Anti-Phishing
• Web and Email Scanning
• Auto-Scan of Removable Media
• Cross-Platform Protection
• Virtualization Support
Scanning and Update Options
• Idle-State Scanner
• Update Rollback
• Postponed Updates
• Local Update Server
Usability
• Low System Demands
• Remote Management
• ESET License Administrator
• Presentation Mode
• Remote Upgrade
• Mac OS X Server Support
• Multiple Log Formats
• Familiar Design
ESET Endpoint Antivirus for OS X delivers award-winning
cross-platform protection for multi-platform environments.
It protects against malware and spyware and shields end
users from fake websites phishing for sensitive information
such as usernames, passwords or credit card details.
Unauthorized devices can be blocked from the system
entirely. The solution’s highly intuitive interface allows for
quick navigation.
Endpoint Protection
• Real-time Protection
• On-Demand Scanning
• On-Charge Scan
• Anti-Phishing
• Uninstall Protection
• SMS & Call Filter
• Command Triggers
• Remote Lock
• Remote Localization
• Remote Wipe
• Remote Siren
• Remote Factory Reset
• Custom Message
• Lock Screen Information
• Trusted SIM
• Admin Contacts
Anti-Theft
Application Control
• Application Control Settings
• Application Audit
Device Security
• Device Security Settings
Usability and Management
• Import/Export Settings
• Notification Center
• Local Administration
• Improved Device Identification
• Set-up Wizards
• Remote management
• ESET License Administrator
ESET Endpoint Security for Android protects your company’s
mobile fleet with ESET NOD32® proactive technology.
It scans all applications, files and memory cards for malware.
The Anti-Theft system protects the physical devices, which can
be remotely locked or wiped if they are lost or stolen. Users
are spared unwanted calls and SMS messages, and
administrators can push security policies to all devices to
ensure compliance.
Endpoint Protection
• Antivirus and Antispyware
• Virtualization Support
• Exploit Blocker
• Advanced Memory Scanner
• Native clustering support
• Storage Scan
• Specialized cleaners
• Host-Based Intrusion Prevention System (HIPS)
Data Access Protection
• Anti-Phishing
• Device Control
Scanning and Update Options
• Idle-State Scanner
• Update Rollback
• Postponed Updates
• Local Update Server
Usability
• Windows Management Instrumentation (WMI) Provider
• Customizable GUI Visibility
• ESET License Administrator
• Component-Based Installation
• Remote Management
• ESET Log Collector
ESET File Security for Microsoft Windows® Server provides
superior protection for your company’s data passing through
the file server.
The solution utilizes the proven ESET NOD32® scanning engine
at its core and combines high detection speed, smooth
performance, and stability to ensure a continuously high level
of security.
Maintain more memory and CPU power for critical system
tasks thanks to the solution’s minimal resource usage. Stay on
top of server security with detailed and comprehensive
security logs, vital protection status information and system
notifications.
Mail Security
• Antivirus and Antispyware
• Antispam
• Remote Administration
• Logs & Statistics
• Smooth Operation
ESET Mail Security integrates powerful antivirus and antispam
protection that makes sure all harmful email-borne content is
filtered away at the server level.
With our solution, you get full protection of the server –
including the server’s own file system. You can apply policies
for specific content based on the real file type, and monitor
the security status or fine-tune the configuration via the ESET
Remote Administrator tool.
Gateway Security
• Antivirus and Antispyware
• Cross-Platform Protection
• Remote Administration
• Centralized Management
• Proxy Integration
• Automatic Bidirectional Protection
ESET Gateway Security protects HTTP and FTP gateways
against known and emerging viruses, worms, trojans, spyware,
spam, and other Internet threats.
For systems with heavy network traffic, ESET Gateway Security
features a small footprint and quick response that allow them
to thrive and perform at their best.
Components
• ESET Remote Administrator Server
• Independent Agent
• Web-Console
• ESET Remote Administrator Proxy
• Rogue Detection Sensor
• Multi-Platform Support
Usability
• ESET License Administrator
• Endpoints Deployment
• Role-Based Management
• Secure Peer Communication
In-Depth Customization
• Dynamic and Static Groups – client-centric approach
• Policies – define for each product; executed on the agent
• Tasks – created in wizard-style steps and sorted by product
• Triggers – define if and when a specific task is executed
• Reports – use pre-defined templates, or customize
• Notifications – enabling you to react immediately
ESET Remote Administrator empowers your IT staff, allowing them to
oversee te entire network, including workstations, servers and
smartphones – from a single point.
Developed based on in-depth consultation with IT professionals, it
allows you to manage IT security via a web-console from anywhere
that has an Internet connection. In addition, it can be installed on
Windows as well as Linux servers, and also comes as a Virtual
Appliance.
The built-in task management system helps minimize downtime by
responding quickly to incidents. Using dynamic threat protection and
integrated tools, ESET Remote Administrator comes with new agent-
based architecture to streamline network security and minimize
administration overhead.
Secure Authentication
• Ultra strong, super simple validation and ID protection
• Two-factor one-time Password (OTP) authentication
• Designed to use only your existing IT infrastructure
• Software-only solution – no need to carry additional
device or token
• Protects your data against intruders, dictionary attacks,
password guessing and more
• Out-of-the-box solution with easy installation and setup
How It Works
ESET Secure Authentication secures remote access to company
network and data – in a hassle-free way. A powerful mobile-
based solution, it relies on two-factor, one time password (2FA
OTP). The OTPs it uses are randomly generated, so they can’t
be predicted or reused.
DESlock+ Data Encryption
• Full Disk Encryption
• Removable Media Encryption
• File & Folder Encryption
• Email Encryption
• Remote Central Management
• Encryption Key Management
• Enterprise Server Proxy
DESlock+ Data Encryption – how it works
DESlock+ is a simple-to-
use encryption
application for companies
large and small. Take
advantage of the
optimized setup that
speeds up the time to
adoption for admins. The
client side requires
minimal user interaction,
increasing user
compliance and the
security of your company
data.
File, folder and email
encryption allow fully
secure collaboration
across complex
workgroups and team
boundaries, with security
policy enforced at all
endpoints by the DESlock+
Enterprise Server. Meet
your data security
compliance obligations
with a single MSI package.
The DESlock+ Enterprise
server can manage users
and workstations
together or
independently. Retain full
control, wherever your
users are.
ESET Technology Alliance
ESET Technology Alliance aims to better protect businesses
with a range of complementary IT security solutions. We
provide customers with a better option when staying protected
in the ever-changing security environment by combining our
proven and trusted technology with other best-of-breed
products. All members of the ESET Technology Alliance are
carefully selected companies specializing on a specific IT
security area.
ESET
ADDING
VALUE
PREMIUM SUPPORT
Provides 24/7 access to senior ESET customer care specialists with
years of experience in IT security for assistance while installing
major upgrades, conducting migrations or any other task.
RIP & REPLACE
from ESET uninstalls all redundant anti-malware solutions
from your system as it installs the latest ESET solution,
resulting in seamless, easy migration.
CUTTING-EDGE
TECHNOLOGY
New detection technology
Strengthens protection against
targeted attacks and previously
unknown exploits – i.e. zero-day
attacks
Exploit Blocker
Monitors the behavior of malicious
processes
Scans them once they decloak in the
memory
Provides effective prevention of
infection by heavily obfuscated
malware.
Advanced
Memory Scanner
Protects against infiltration by botnet
malware
Prevents spam and network attacks
from being launched from the
endpoint
Botnet Protection
Improves detection of Common
Vulnerabilities and Exposures (CVEs)
on widely used protocols such as
SMB, RPC and RDP
Protects against vulnerabilities for
which a patch has not yet been
released or deployed
Vulnerability
Shield
Core strengths in
every product
PROACTIVE
DETECTION
at the core is our award-winning
ESET NOD32® malware detection
technology
SPEED
our technology works
fast, and has the lowest
possible impact on your
systems
USABILITY
designed by IT
professionals for ultimate
ease of use
ESET: #DoMore With Our Comprehensive Range of Business Products

Mais conteúdo relacionado

Mais procurados

The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
Kaspersky
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
Kirill Kertsenbaum
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Ariel Martin Beliera
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
GS CHO
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Kirill Kertsenbaum
 

Mais procurados (20)

The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEETESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
 
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEETESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
McAfee MOVE & Endpoint Security
McAfee MOVE & Endpoint SecurityMcAfee MOVE & Endpoint Security
McAfee MOVE & Endpoint Security
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security Solutions
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 

Destaque

Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3
princescorpio
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
Bitdefender Enterprise
 

Destaque (12)

Learn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsLearn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platforms
 
ESET NOD32
ESET NOD32ESET NOD32
ESET NOD32
 
CSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho PresentationCSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
 
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
Avira endpoint security (former avira net work bundle) 繁體中文安裝及佈署手冊 祺荃企業有限公司
 
Dividend Yield Breakthroughs
Dividend Yield BreakthroughsDividend Yield Breakthroughs
Dividend Yield Breakthroughs
 
Building & Leveraging White Database for Antivirus Testing
Building & Leveraging White Database for Antivirus TestingBuilding & Leveraging White Database for Antivirus Testing
Building & Leveraging White Database for Antivirus Testing
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3
 
Agnitum Technology Licensing
Agnitum Technology LicensingAgnitum Technology Licensing
Agnitum Technology Licensing
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
 
Kaspersky presentation
Kaspersky presentationKaspersky presentation
Kaspersky presentation
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 

Semelhante a ESET: #DoMore With Our Comprehensive Range of Business Products

Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRYDESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
iQHub
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
technext1
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
Presentologics
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
CTI Group
 

Semelhante a ESET: #DoMore With Our Comprehensive Range of Business Products (20)

K7 Total Security Datasheet
K7 Total Security DatasheetK7 Total Security Datasheet
K7 Total Security Datasheet
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
ETS Services Outline
ETS Services OutlineETS Services Outline
ETS Services Outline
 
ESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEETESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEET
 
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRYDESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 
Apriorit presentation 2018 Embedded + Cybersecurity
Apriorit presentation 2018 Embedded + CybersecurityApriorit presentation 2018 Embedded + Cybersecurity
Apriorit presentation 2018 Embedded + Cybersecurity
 
366864108 azure-security
366864108 azure-security366864108 azure-security
366864108 azure-security
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 

Mais de ESET

ESET Technology From
ESET Technology FromESET Technology From
ESET Technology From
ESET
 

Mais de ESET (18)

ESET Cybersecurity students
ESET Cybersecurity studentsESET Cybersecurity students
ESET Cybersecurity students
 
ESET Cybersecurity training
ESET Cybersecurity trainingESET Cybersecurity training
ESET Cybersecurity training
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
 
Visiting the Bear Den
Visiting the Bear DenVisiting the Bear Den
Visiting the Bear Den
 
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection Regulation
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus Bulletin
 
Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015
 
Shopping Online
Shopping OnlineShopping Online
Shopping Online
 
Banking Online
Banking OnlineBanking Online
Banking Online
 
Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct?
 
Unpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresUnpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasures
 
#DoMore with ESET
#DoMore with ESET#DoMore with ESET
#DoMore with ESET
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
Trends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyTrends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet Privacy
 
ESET Technology From
ESET Technology FromESET Technology From
ESET Technology From
 
Why do THEY want your digital devices?
Why do THEY want your digital devices?Why do THEY want your digital devices?
Why do THEY want your digital devices?
 

ESET: #DoMore With Our Comprehensive Range of Business Products

  • 1. Do More with ESET’s new IT security products for business
  • 2. ESET – a pioneer of IT security since 1987
  • 3. HEADQUARTERS Bratislava, SK REGIONAL CENTERS AND OFFICES San Diego (USA) Buenos Aires (ARG) Sao Paulo (BRA) Sydney (AUS) Jena (GER) Prague (CZE) Singapore MALWARE RESEARCH AND TECHNOLOGY CENTERS Bratislava (SVK) Košice (SVK) San Diego (USA) Montreal (CAN) Krakow (POL) Buenos Aires (ARG) Prague (CZE) Jablonec nad Nisou (CZE) Singapore ESET’s worldwide presence
  • 5. Global presence, global protection PROTECTED USERS WORLDWIDE 100,000,000
  • 6. Numerous awards worldwide ESET product is the leader in lowest system-resource consumption by testing authority AV-Comparatives ESET has received the most "Advanced+" awards in proactive tests from AV-Comparatives The only vendor with record-breaking protection ESET achieves 100% protection in Dennis Technology labs independent test, topping the list of IT security vendors
  • 7. ESET holds Checkmark certifications in detection of infections ESET tops the security software consumer satisfaction in Japan for the 3rd consecutive time ESET is the first antivirus company to have achieved ICSA certification for Mac OS X ESET Business products get the approved award from AV-Comparatives Numerous awards worldwide
  • 8. Antivirus Battle Royale, ESET receives 9/10 points “We give the 2014 ESET NOD32 Antivirus 10 out of 10 stars and a 2014 Best Buy Award.” ESET Mobile Security wins Seal of Approval from PTPA ESET Wins PCMag Consumer Recommended Award for Security Suites and Stand Alone Antivirus Software Numerous awards worldwide
  • 9. Leading enterprises entrust their IT security to ESET
  • 10. Leading enterprises entrust their IT security to ESET
  • 12. We are focused solely on IT security – and nothing else Our only objective is to keep your systems secure. By securing your IT, we let you Do More with your business Our solutions free up customers’ IT resources. Our software is easy to use and won’t slow your hardware ESET solutions are famed for their low system impact
  • 13. Our technology is among the best in the world ESET products have now passed every VB100 test for over 11 years, also a record. With rapid ROI, our solutions pay for themselves Almost two-thirds of surveyed ESET customers say they see a return on their investment in less than 6 months. We operate globally With offices in Europe, the Americas and Asia, we have a sales presence in 180 countries worldwide.
  • 14. OUR COMPREHENSIVE RANGE OF BUSINESS PRODUCTS
  • 16. Endpoint Protection • Antivirus and Antispyware • Virtualization Support • Host-Based Intrusion Prevention System (HIPS) • Exploit Blocker • Advanced Memory Scanner • Client Antispam • Cross-Platform Protection
  • 17. Data Access Protection • Web Control • Device Control • Two-Way Firewall • Anti-Phishing • Vulnerability Shield
  • 18. Scanning and Update Options • Idle-State Scanner • First Scan after Installation • Update Rollback • Postponed Updates • Local Update Server
  • 19. Usability • RIP & Replace • Customizable GUI Visibility • ESET License Administrator • Touchscreen Support • Low System Demands • Right-to-Left Language Support • Remote Management
  • 20. ESET Endpoint Security delivers comprehensive IT security for your business via multiple layers of protection, including our field-proven ESET NOD32® detection technology, data access protection and fully adjustable scanning and update options. Keep your system running at its best thanks to low system demands, virtualization support and optional cloud-powered scanning. Maintain perfect data access protection by shielding your network against unauthorized access, and limit employee access to selected websites. Oversee it all effortlessly with our latest ESET Remote Administrator tool.
  • 21. Endpoint Protection • Antivirus and Antispyware • Virtualization Support • Host-Based Intrusion Prevention System (HIPS) • Exploit Blocker • Advanced Memory Scanner • Cross-Platform Protection
  • 22. Data Access Protection • Anti-Phishing • Device Control
  • 23. Scanning and Update Options • Idle-State Scanner • First Scan after Installation • Update Rollback • Postponed Updates • Local Update Server
  • 24. Usability • RIP & Replace • Customizable GUI Visibility • ESET License Administrator • Touchscreen Support • Low System Demands • Right-to-Left Language Support • Remote Management
  • 25. ESET Endpoint Antivirus, including our field-proven ESET NOD32® detection technology, delivers superior detection power for your business. Its low system demands and virtualization capability keep your system humming. Keep the security of offline devices under control, and customize scanning and update options as you see fit. Control it all effortlessly with our all-new, user-friendly remote administrator tool.
  • 26. Endpoint Protection • Antivirus and Antispyware • Virtualization Support • Web and Email Scanning • Auto-Scan of Removable Media • Cross-Platform Protection
  • 27. Data Access Protection • Web Control • Two-Way Firewall • Anti-Phishing
  • 28. Scanning and Update Options • Update Rollback • Postponed Updates • Local Update Server
  • 29. Usability • Low System Demands • Remote Management • ESET License Administrator • Presentation Mode • Component-Based Installation • Remote Upgrade • Multiple Log Formats • Familiar Design
  • 30. ESET Endpoint Security for OS X ensures multi-layered protection for mixed environments. It prevents unauthorized access to your company network and provides anti-hacker protection. Malware and spyware protection shields end users from fake websites stealing sensitive information such as usernames or passwords. The solution’s low system footprint leaves more room for programs that end users regularly use.
  • 31. Endpoint Protection • Antivirus and Antispyware • Anti-Phishing • Web and Email Scanning • Auto-Scan of Removable Media • Cross-Platform Protection • Virtualization Support
  • 32. Scanning and Update Options • Idle-State Scanner • Update Rollback • Postponed Updates • Local Update Server
  • 33. Usability • Low System Demands • Remote Management • ESET License Administrator • Presentation Mode • Remote Upgrade • Mac OS X Server Support • Multiple Log Formats • Familiar Design
  • 34. ESET Endpoint Antivirus for OS X delivers award-winning cross-platform protection for multi-platform environments. It protects against malware and spyware and shields end users from fake websites phishing for sensitive information such as usernames, passwords or credit card details. Unauthorized devices can be blocked from the system entirely. The solution’s highly intuitive interface allows for quick navigation.
  • 35. Endpoint Protection • Real-time Protection • On-Demand Scanning • On-Charge Scan • Anti-Phishing • Uninstall Protection • SMS & Call Filter
  • 36. • Command Triggers • Remote Lock • Remote Localization • Remote Wipe • Remote Siren • Remote Factory Reset • Custom Message • Lock Screen Information • Trusted SIM • Admin Contacts Anti-Theft
  • 37. Application Control • Application Control Settings • Application Audit Device Security • Device Security Settings
  • 38. Usability and Management • Import/Export Settings • Notification Center • Local Administration • Improved Device Identification • Set-up Wizards • Remote management • ESET License Administrator
  • 39. ESET Endpoint Security for Android protects your company’s mobile fleet with ESET NOD32® proactive technology. It scans all applications, files and memory cards for malware. The Anti-Theft system protects the physical devices, which can be remotely locked or wiped if they are lost or stolen. Users are spared unwanted calls and SMS messages, and administrators can push security policies to all devices to ensure compliance.
  • 40. Endpoint Protection • Antivirus and Antispyware • Virtualization Support • Exploit Blocker • Advanced Memory Scanner • Native clustering support • Storage Scan • Specialized cleaners • Host-Based Intrusion Prevention System (HIPS)
  • 41. Data Access Protection • Anti-Phishing • Device Control
  • 42. Scanning and Update Options • Idle-State Scanner • Update Rollback • Postponed Updates • Local Update Server
  • 43. Usability • Windows Management Instrumentation (WMI) Provider • Customizable GUI Visibility • ESET License Administrator • Component-Based Installation • Remote Management • ESET Log Collector
  • 44. ESET File Security for Microsoft Windows® Server provides superior protection for your company’s data passing through the file server. The solution utilizes the proven ESET NOD32® scanning engine at its core and combines high detection speed, smooth performance, and stability to ensure a continuously high level of security. Maintain more memory and CPU power for critical system tasks thanks to the solution’s minimal resource usage. Stay on top of server security with detailed and comprehensive security logs, vital protection status information and system notifications.
  • 45. Mail Security • Antivirus and Antispyware • Antispam • Remote Administration • Logs & Statistics • Smooth Operation
  • 46. ESET Mail Security integrates powerful antivirus and antispam protection that makes sure all harmful email-borne content is filtered away at the server level. With our solution, you get full protection of the server – including the server’s own file system. You can apply policies for specific content based on the real file type, and monitor the security status or fine-tune the configuration via the ESET Remote Administrator tool.
  • 47. Gateway Security • Antivirus and Antispyware • Cross-Platform Protection • Remote Administration • Centralized Management • Proxy Integration • Automatic Bidirectional Protection
  • 48. ESET Gateway Security protects HTTP and FTP gateways against known and emerging viruses, worms, trojans, spyware, spam, and other Internet threats. For systems with heavy network traffic, ESET Gateway Security features a small footprint and quick response that allow them to thrive and perform at their best.
  • 49. Components • ESET Remote Administrator Server • Independent Agent • Web-Console • ESET Remote Administrator Proxy • Rogue Detection Sensor • Multi-Platform Support
  • 50. Usability • ESET License Administrator • Endpoints Deployment • Role-Based Management • Secure Peer Communication
  • 51. In-Depth Customization • Dynamic and Static Groups – client-centric approach • Policies – define for each product; executed on the agent • Tasks – created in wizard-style steps and sorted by product • Triggers – define if and when a specific task is executed • Reports – use pre-defined templates, or customize • Notifications – enabling you to react immediately
  • 52. ESET Remote Administrator empowers your IT staff, allowing them to oversee te entire network, including workstations, servers and smartphones – from a single point. Developed based on in-depth consultation with IT professionals, it allows you to manage IT security via a web-console from anywhere that has an Internet connection. In addition, it can be installed on Windows as well as Linux servers, and also comes as a Virtual Appliance. The built-in task management system helps minimize downtime by responding quickly to incidents. Using dynamic threat protection and integrated tools, ESET Remote Administrator comes with new agent- based architecture to streamline network security and minimize administration overhead.
  • 53. Secure Authentication • Ultra strong, super simple validation and ID protection • Two-factor one-time Password (OTP) authentication • Designed to use only your existing IT infrastructure • Software-only solution – no need to carry additional device or token • Protects your data against intruders, dictionary attacks, password guessing and more • Out-of-the-box solution with easy installation and setup
  • 55. ESET Secure Authentication secures remote access to company network and data – in a hassle-free way. A powerful mobile- based solution, it relies on two-factor, one time password (2FA OTP). The OTPs it uses are randomly generated, so they can’t be predicted or reused.
  • 56. DESlock+ Data Encryption • Full Disk Encryption • Removable Media Encryption • File & Folder Encryption • Email Encryption • Remote Central Management • Encryption Key Management • Enterprise Server Proxy
  • 57. DESlock+ Data Encryption – how it works
  • 58. DESlock+ is a simple-to- use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side requires minimal user interaction, increasing user compliance and the security of your company data. File, folder and email encryption allow fully secure collaboration across complex workgroups and team boundaries, with security policy enforced at all endpoints by the DESlock+ Enterprise Server. Meet your data security compliance obligations with a single MSI package. The DESlock+ Enterprise server can manage users and workstations together or independently. Retain full control, wherever your users are.
  • 59. ESET Technology Alliance ESET Technology Alliance aims to better protect businesses with a range of complementary IT security solutions. We provide customers with a better option when staying protected in the ever-changing security environment by combining our proven and trusted technology with other best-of-breed products. All members of the ESET Technology Alliance are carefully selected companies specializing on a specific IT security area.
  • 61. PREMIUM SUPPORT Provides 24/7 access to senior ESET customer care specialists with years of experience in IT security for assistance while installing major upgrades, conducting migrations or any other task.
  • 62. RIP & REPLACE from ESET uninstalls all redundant anti-malware solutions from your system as it installs the latest ESET solution, resulting in seamless, easy migration.
  • 64. New detection technology Strengthens protection against targeted attacks and previously unknown exploits – i.e. zero-day attacks Exploit Blocker
  • 65. Monitors the behavior of malicious processes Scans them once they decloak in the memory Provides effective prevention of infection by heavily obfuscated malware. Advanced Memory Scanner
  • 66. Protects against infiltration by botnet malware Prevents spam and network attacks from being launched from the endpoint Botnet Protection
  • 67. Improves detection of Common Vulnerabilities and Exposures (CVEs) on widely used protocols such as SMB, RPC and RDP Protects against vulnerabilities for which a patch has not yet been released or deployed Vulnerability Shield
  • 69. PROACTIVE DETECTION at the core is our award-winning ESET NOD32® malware detection technology SPEED our technology works fast, and has the lowest possible impact on your systems USABILITY designed by IT professionals for ultimate ease of use

Notas do Editor

  1. Predelovy slide
  2. Predelovy slide
  3. Predelovy slide
  4. Predelovy slide
  5. Predelovy slide
  6. Predelovy slide
  7. Predelovy slide
  8. Predelovy slide
  9. Predelovy slide
  10. Predelovy slide
  11. Predelovy slide
  12. Predelovy slide
  13. Predelovy slide
  14. Predelovy slide
  15. Predelovy slide
  16. Predelovy slide
  17. Predelovy slide
  18. Predelovy slide
  19. Predelovy slide
  20. Predelovy slide
  21. Predelovy slide
  22. Predelovy slide
  23. Predelovy slide
  24. Predelovy slide
  25. Predelovy slide
  26. Predelovy slide
  27. Predelovy slide
  28. Predelovy slide
  29. Predelovy slide
  30. Predelovy slide
  31. Predelovy slide
  32. Predelovy slide
  33. Predelovy slide
  34. Predelovy slide
  35. Predelovy slide
  36. Predelovy slide
  37. Predelovy slide
  38. Predelovy slide
  39. Predelovy slide
  40. Predelovy slide
  41. Predelovy slide
  42. Predelovy slide
  43. Predelovy slide
  44. Predelovy slide