ESET Business Solutions
ESET Business Solutions
ESET Business Solutions
Whether your business is just starting out or is established, there are a few things that you should expect from the security software you use daily. At ESET, we feel
that running security software in the business environment should be easy and simple. Thats why we have created ESET Business Solutions, a perfect match for
your 25+ seat business utilizing over 25 years of pioneering experience in the anti-malware industry.
3. Easy to Manage
With ESET Business Solutions you can mix and match endpoint
protection according to your actual needs, deploying it on a range
of platforms (Windows, Mac, Linux and Android) and devices:
computers, smartphones, tablets, and servers.
Our solutions are built for small footprint, which also makes them
suitable for older hardware, saving IT-related costs on hardware
upgrades. In addition, program updates are small and can download
from a cenral mirror server.
endpoint
antivirus
mobile
security
virtualization
security
file
security
endpoint
security
mail
security
gateway
security
CMYK 10 / 0 / 0 / 40
RGB 163 / 173 / 178
White
a
Choose this option if you operate
your own
Internet gateway server to safeguard your HTTP
and FTP communications. In addition,
CMYKESET
100 / 50 / 0 / 60
Secure Enterprise gives you all theRGB
products
0 / 60 / 106
and tools for the maximum level of protection
CMYK
100 / 50 / 0 / 30
on your endpoints and servers across
multiple
RGB 0 / 80 / 140
platforms.
Endpoint Antivirus
Anti-Phishing
Protects end users from fake websites attempts to acquire sensitive information.
Virtualization Support
Stores metadata from already scanned files in the virtual environment for boosted scan speed.
Exploit Blocker
Bolsters the security of applications such as web browsers, PDF readers and more.
Monitors the behavior of malicious processes and scans them once they decloak in the memory.
Device Control
Other security software is detected and uninstalled during the installation of ESET solutions.
Mobile Security
Real-Time Protection
Shields all applications and files in real-time using ESET NOD32 proactive technology.
Anti-Phishing
Protects users against fake websites trying to acquire passwords, banking data and other
sensitive information.
Application Control
Offers administrators the option to monitor installed applications, block access or block
defined applications.
Anti-Theft
Protects mobile phones with Remote Lock, Remote Localization, Remote Wipe and more.
Device Security
Provides admins with options to execute basic security policies across your mobile device fleet.
Protects users from unwanted calls and SMS messages with a wide range of customization options.
Strengthen the security by setting Passcode, iCloud, Privacy and Device settings and restrictions
remotely, including Anti-Theft.
Remote Management
Provides admins with an overall network security overview via a single web-based console.
Agentless protection of all VMs to provide high performance security that wont slow them down
Virtualization Security
ESET Virtualization Security for VMware vShield
ESET Shared Local Cache
Uses vShield Endpoint technology to install a single ESET appliance on each host
Couples with an agent-based ESET solution to deliver multiple layers of protection
One Shared Local Cache per hypervisor significantly boosts the scanning speed of VMs
File Security
Eliminates all types of threats including viruses, rootkits, worms and spyware.
Exploit Blocker
Bolsters the security of applications such as web browsers, PDF readers and more.
Monitors the behavior of malicious processes and scans them once they decloak in the memory.
Virtualization Support
Stores metadata of already scanned files in the virtual environment for boosted scan speed.
Interconnect several nodes of ESET File Security within a cluster and manage them as one.
Storage scan
Windows Management
Instrumentation (WMI) Provider
Monitors key functionalities of ESET File Security via the WMI framework, allowing for
integration into third-party management and SIEM software.
Component-Based Installation
Endpoint Security
Eliminates all types of threats including viruses, rootkits, worms and spyware.
Anti-Phishing
Protects users against fake websites trying to acquire passwords and other sensitive information.
Virtualization Support
Stores metadata of already scanned files in the virtual environment for boosted scan speed.
Exploit Blocker
Bolsters the security of application such as web browsers, PDF readers and more.
Monitors the behavior of malicious processes and scans them once they decloak in the memory.
Vulnerability Shield
Detection of vulnerabilities and exposures on widely used protocols such as SMB, RPC and RDP.
Botnet Protection
Protects against botnet malware preventing spam and network attacks launched from the endpoint.
Web Control
Limits website access by category, e.g. gaming, social networking, shopping and others.
Two-Way Firewall
Prevents unauthorized access to your company network and data exposure prevention.
Client Antispam
Effectively filters out spam and scans all incoming emails for malware.
Other security software is detected and uninstalled during the installation of ESET solutions.
Mail Security
Eliminates all types of threats, including viruses, rootkits, worms and spyware.
Filters out email-borne threats, including spyware at the gateway level.
Antispam
Spam log displays sender, recipient, spam score, classification reason and action taken.
Greylisting log displays greylisted sender, recipient, action taken and status.
Smooth Operation
Automatically excludes critical server files from scanning, including Microsoft Exchange folders.
Gateway Security
Eliminates all types of threats, including viruses, rootkits, worms and spyware.
Antispam
Cross-Platform Protection
Remote Administration
Allows you to remotely deploy, manage, and update all ESET security software in the company
network.
Spam log - Displays sender, recipient, spam score, classification reason and action taken.
Smooth Operation
Remote Administration
Manage servers, endpoints, smartphones and virtual machines from a single console.
ESET Remote Administrator Server Handles communication with agents, collecting and storing application data in the database.
Independent Agent
All tasks, policies and events are run by an independent agent directly on the endpoint, even
without connectivity to ESET Remote Administrator.
Web-Console
Allows network security to be managed from anywhere via web interface with drill-down
possibilities.
ESET Remote Administrator Proxy Collects and forwards aggregated data to the main server from remote locations without server
installation.
Discovers unprotected and unmanaged machines in the network which require attention.
Multi-Platform Support
ESET Remote Administrator runs on both Windows and Linux machines, or as a Virtual
Appliance.
Endpoints Deployment
All product installers are available from ESET servers and support caching on a web-proxy level
to eliminate duplicate downloads in your corporate network.
Role-Based Management
Utilized via the Transport Layer Security (TLS) 1.0 standard + own created and distributed
certificates for peer identification.
Via web-console, admin can track-back in time security incidents and system changes
for particular endpoint based on the ESET SysInspector snapshots.
Contact information:
Copyright 1992 2016 ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo
and/or other mentioned products of ESET, spol. s r. o., are registered trademarks of ESET, spol. s r. o. Windows is a trademark of the Microsoft group of companies. Other here
mentioned companies or products might be registered trademarks of their proprietors. Produced according to quality standards of ISO 9001:2000.