0% found this document useful (0 votes)
118 views8 pages

ESET Business Solutions

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 8

for businesses with more than 25 seats

ESET Business Solutions 1/6

Whether your business is just starting out or is established, there are a few things that you should expect from the security software you use daily. At ESET, we feel
that running security software in the business environment should be easy and simple. Thats why we have created ESET Business Solutions, a perfect match for
your 25+ seat business utilizing over 25 years of pioneering experience in the anti-malware industry.

3 Great Reasons to Choose ESET Business Solutions


1. Simple and Straightforward

2. Light on Your System

3. Easy to Manage

With ESET Business Solutions you can mix and match endpoint
protection according to your actual needs, deploying it on a range
of platforms (Windows, Mac, Linux and Android) and devices:
computers, smartphones, tablets, and servers.

Our solutions are built for small footprint, which also makes them
suitable for older hardware, saving IT-related costs on hardware
upgrades. In addition, program updates are small and can download
from a cenral mirror server.

Easily deploy, configure and manage your security software from a


single console. Just one person, using ESET Remote Administrator,
our web-console, can oversee all your IT security. Whats more, ESET
License Administrator, also accessible via web-console, means you
can view and manage all your licenses cost-effectively in real-time,
from one location.

Find the Right Solution for You

endpoint
antivirus

eset endpoint protection standard


eset endpoint protection advanced
eset secure business
eset secure enterprise

mobile
security

virtualization
security

file
security

endpoint
security

mail
security

gateway
security

Explore the Full Range of Solutions to Secure Your IT Infrastructure

ESET Business Solutions 2/6

CMYK 10 / 0 / 0 / 40
RGB 163 / 173 / 178

Keep your network clean and protect your


endpoints (computers, smartphones, tablets,
and fileservers) against emerging threats.
ESET Endpoint Protection Standard provides
essential protection for your company network
that is easily manageable from a single console.

In addition to ESET Endpoint Protection


Standard, the Advanced version comes with the
powerful Web Control, Firewall and Antispam
filter to provide additional layers of protection
for your company network and your mobile
workforce.

Eliminating email-borne threats at the


server level, ESET Secure Business gives your
companys data an extra level of security that
complements the protection of computers,
mobile devices and fileservers.

White

a
Choose this option if you operate
your own
Internet gateway server to safeguard your HTTP
and FTP communications. In addition,
CMYKESET
100 / 50 / 0 / 60
Secure Enterprise gives you all theRGB
products
0 / 60 / 106
and tools for the maximum level of protection
CMYK
100 / 50 / 0 / 30
on your endpoints and servers across
multiple
RGB 0 / 80 / 140
platforms.

Components of ESET Business Solutions

ESET Business Solutions 3/6

Endpoint Antivirus

Antivirus and Antispyware

Eliminates all types of threats and spyware.

ESET Endpoint Antivirus for Windows

Anti-Phishing

Protects end users from fake websites attempts to acquire sensitive information.

ESET Endpoint Antivirus for OS X

Virtualization Support

Stores metadata from already scanned files in the virtual environment for boosted scan speed.

Exploit Blocker

Bolsters the security of applications such as web browsers, PDF readers and more.

Advanced Memory Scanner

Monitors the behavior of malicious processes and scans them once they decloak in the memory.

Host-Based Intrusion Prevention

Enables you to define rules for processes, applications and files.

Device Control

Blocks unauthorized CDs/DVDs and USBs from your system.

RIP & Replace

Other security software is detected and uninstalled during the installation of ESET solutions.

Low System Demands

Leaves more system resources for programs you use daily.

Mobile Security

Real-Time Protection

Shields all applications and files in real-time using ESET NOD32 proactive technology.

ESET Endpoint Security for Android

Anti-Phishing

Protects users against fake websites trying to acquire passwords, banking data and other
sensitive information.

Application Control

Offers administrators the option to monitor installed applications, block access or block
defined applications.

Anti-Theft

Protects mobile phones with Remote Lock, Remote Localization, Remote Wipe and more.

Device Security

Provides admins with options to execute basic security policies across your mobile device fleet.

SMS & Call Filter

Protects users from unwanted calls and SMS messages with a wide range of customization options.

iOS Mobile Device Management

Strengthen the security by setting Passcode, iCloud, Privacy and Device settings and restrictions
remotely, including Anti-Theft.

Remote Management

Provides admins with an overall network security overview via a single web-based console.

ESET Virtualization Security


for VMware vShield

Agentless protection of all VMs to provide high performance security that wont slow them down

ESET NOD32 Antivirus Business Edition for Linux Desktop

ESET Mobile Device Management for Apple iOS

Virtualization Security
ESET Virtualization Security for VMware vShield
ESET Shared Local Cache

Please note that functionality varies depending on operating system.

ESET Shared Local Cache

Uses vShield Endpoint technology to install a single ESET appliance on each host
Couples with an agent-based ESET solution to deliver multiple layers of protection
One Shared Local Cache per hypervisor significantly boosts the scanning speed of VMs

Components of ESET Business Solutions

ESET Business Solutions 4/6

File Security

Antivirus and Antispyware

Eliminates all types of threats including viruses, rootkits, worms and spyware.

ESET File Security for Microsoft Windows Server

Exploit Blocker

Bolsters the security of applications such as web browsers, PDF readers and more.

ESET File Security for Microsoft Windows Server Core

Advanced Memory Scanner

Monitors the behavior of malicious processes and scans them once they decloak in the memory.

Virtualization Support

Stores metadata of already scanned files in the virtual environment for boosted scan speed.

Native Clustering Support

Interconnect several nodes of ESET File Security within a cluster and manage them as one.

Storage scan

Easily set up on-demand scans of connected Network Attached Storage (NAS).

Windows Management
Instrumentation (WMI) Provider

Monitors key functionalities of ESET File Security via the WMI framework, allowing for
integration into third-party management and SIEM software.

Component-Based Installation

Choose which components to install for better optimization.

Low System Demands

Leaves more system resources for programs you use daily.

Endpoint Security

Antivirus and Antispyware

Eliminates all types of threats including viruses, rootkits, worms and spyware.

ESET Endpoint Security for Windows

Anti-Phishing

Protects users against fake websites trying to acquire passwords and other sensitive information.

ESET Endpoint Security for OS X

Virtualization Support

Stores metadata of already scanned files in the virtual environment for boosted scan speed.

Exploit Blocker

Bolsters the security of application such as web browsers, PDF readers and more.

Advanced Memory Scanner

Monitors the behavior of malicious processes and scans them once they decloak in the memory.

Vulnerability Shield

Detection of vulnerabilities and exposures on widely used protocols such as SMB, RPC and RDP.

Botnet Protection

Protects against botnet malware preventing spam and network attacks launched from the endpoint.

Web Control

Limits website access by category, e.g. gaming, social networking, shopping and others.

Two-Way Firewall

Prevents unauthorized access to your company network and data exposure prevention.

Client Antispam

Effectively filters out spam and scans all incoming emails for malware.

Host-based Intrusion Prevention


(HIPS)

Enables you to define rules for processes, applications and files.

RIP & Replace

Other security software is detected and uninstalled during the installation of ESET solutions.

Low System Demands

Leaves more system resources for programs you use daily.

ESET File Security for Linux/FreeBSD

Please note that functionality varies depending on operating


system.

Components of ESET Business Solutions

Mail Security

ESET Business Solutions 5/6

Antivirus and Antispyware

Eliminates all types of threats, including viruses, rootkits, worms and spyware.
Filters out email-borne threats, including spyware at the gateway level.

ESET Mail Security for Microsoft Exchange Server


ESET Mail Security for IBM Lotus Domino

Antispam

Stops spam and phishing messages with high interception rates.

ESET Mail Security for Linux/FreeBSD

Logs & Statistics

Spam log displays sender, recipient, spam score, classification reason and action taken.

ESET NOD32 Antivirus Business Edition for Kerio Connect

Greylisting log displays greylisted sender, recipient, action taken and status.
Smooth Operation

Automatically excludes critical server files from scanning, including Microsoft Exchange folders.

Gateway Security

Antivirus and Antispyware

Eliminates all types of threats, including viruses, rootkits, worms and spyware.

ESET Gateway Security for Linux/FreeBSD

Antispam

Stops spam and phishing messages with high interception rates.

ESET NOD32 Antivirus Business Edition for Kerio Control

Cross-Platform Protection

Eliminates malware targeting Windows, Mac and Linux operating systems.

Remote Administration

Allows you to remotely deploy, manage, and update all ESET security software in the company
network.

Logs & Statistics

Spam log - Displays sender, recipient, spam score, classification reason and action taken.

Smooth Operation

Protects 3 in 1 communication protocols, emails, and the servers file system.

Please note that functionality varies depending on operating


system.

Components of ESET Business Solutions

ESET Remote Administrator

ESET Business Solutions 6/6

Remote Administration

Manage servers, endpoints, smartphones and virtual machines from a single console.

ESET Remote Administrator Server Handles communication with agents, collecting and storing application data in the database.
Independent Agent

All tasks, policies and events are run by an independent agent directly on the endpoint, even
without connectivity to ESET Remote Administrator.

Web-Console

Allows network security to be managed from anywhere via web interface with drill-down
possibilities.

ESET Remote Administrator Proxy Collects and forwards aggregated data to the main server from remote locations without server
installation.

Please note that functionality varies depending on operating system.

Rogue Detection Sensor

Discovers unprotected and unmanaged machines in the network which require attention.

Multi-Platform Support

ESET Remote Administrator runs on both Windows and Linux machines, or as a Virtual
Appliance.

Endpoints Deployment

All product installers are available from ESET servers and support caching on a web-proxy level
to eliminate duplicate downloads in your corporate network.

Role-Based Management

Create multiple user accounts, each with customizable sets of privileges.

Secure Peer Communication

Utilized via the Transport Layer Security (TLS) 1.0 standard + own created and distributed
certificates for peer identification.

Integrated ESET SysInspector

Via web-console, admin can track-back in time security incidents and system changes
for particular endpoint based on the ESET SysInspector snapshots.

Contact information:

Copyright 1992 2016 ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo
and/or other mentioned products of ESET, spol. s r. o., are registered trademarks of ESET, spol. s r. o. Windows is a trademark of the Microsoft group of companies. Other here
mentioned companies or products might be registered trademarks of their proprietors. Produced according to quality standards of ISO 9001:2000.

You might also like