ESET began life as a pioneer of antivirus protection, creating award-winning threat detection software.

Now, ESET’s goal is to make sure that everybody can enjoy the breathtaking opportunities that technology offers.

Today, our security solutions allow businesses and consumers in more than 200 countries and territories to make the most of the digital world.


ESET
Comes with 3 Bundles to fulfil all the customer needs.

ESET Full Disk Encryption

Add encryption, extend your organization’s security

By encrypting data on your endpoints, you meet some of the demands of data protection laws

Helps you comply with data protection regulations like GDPR and others

Monitor encryption on user machines remotely

Protect company data with a simple yet powerful solution

Robust full disk encryption native to ESET remote management consoles

ESET Full Disk Encryption provides powerful encryption managed natively by ESET remote management consoles, and increases your organization’s data security to meet compliance regulations.

  • Encrypt system disks, partitions or entire drives
  • Manage from ESET Cloud Administrator and ESET Security Management Center
  • Deploy, activate and encrypt devices in a single action
Cost-effective licensing

Flexible licensing
A separate license key gives you freedom to purchase encryption for only as many devices as you need.

Add additional devices at any time
You can increase the number of devices covered by your license at any time.

Add to your existing endpoint solution

Add-on feature
ESET Full Disk Encryption can be purchased only as an addition to a new or existing ESET business solution license. If you are an existing ESET business customer, please contact your local reseller.

Supported operating systems
Microsoft Windows 10, 8.1, 8,

ESET Dynamic Threat Defense

Provides another layer of security for ESET products like Mail Security and endpoint products by utilizing a cloud-based sandboxing technology to detect new, never before seen types of threats. Future-proof your company’s IT security with:

Behavior-based detection
Machine learning
Zero-day threats detection
Cloud sandbox

Multilayered protection
Within ESET Dynamic Threat Defense, ESET utilizes three different machine learning models once a file is submitted. After this process, the sample is run through a full sandbox which simulates user behavior to trick anti-evasive techniques.

Unparalleled speed
Every minute counts. That’s why ESET Dynamic Threat Defense is designed to analyze the majority of samples in under five minutes. If samples were previously analyzed, all devices at your organization will be protected in seconds.

Full visibility
Every sample analyzed by ESET Dynamic Threat Defense is listed in the “Submitted files” section of ESET Security Management Center, which also provides transparency for all data sent to ESET LiveGrid® cloud malware protection system

ESET Enterprise Inspector

An Endpoint Detection & Response tool designed to exploit ESET’s multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analysis and remediation of any security issue in the network enabling organizations to take immediate action to:

Detect advanced persistent threats

Stop file less attacks

Block zero-day threats

Protect against ransomware

Neutralize state-sponsored attacks

Open architecture & integrations

ESET Enterprise Inspector provides a unique behavior and reputation-based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning or easily created to match the needs of specific enterprise environments, including SIEM integrations.

Adjustable sensitivity

Utilize ESET’s Endpoint Detection and Response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name / path / hash / command line / signer to fine-tune the trigger conditions.

Synchronized response

ESET’s Endpoint Detection and Response tool is built on top of existing ESET endpoint security solutions, creating a consistent ecosystem that allows cross-linking of all relevant objects and synchronized remediation of incidents

ESET Endpoint Encryption Pro

Easy to use encryption application provides full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:

Zero data breaches
Compliance with requirements
Easily manage authentication
Seamless encryption

Manage devices anywhere
ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or firewall exceptions. Management is handled by utilizing HTTPS internet connectivity, making it extremely simple for businesses of any size to install and set up.

Zero impact on productivity
Implementing encryption is completely transparent for the users and requires no action on their part. There’s no extra overhead for IT departments and no need for user training.

Fast, seamless deployment
Server installation of ESET Endpoint Encryption usually takes less than 10 minutes, with complete setup in under one hour.

ESET Secure Authentication

A simple, effective way for businesses of all sizes to implement multi-factor authentication across commonly utilized systems. Enables your organization to:

Prevent data breaches

Meet compliance requirements
Easily manage authentication
Secure mobile devices

Push authentication
Single-touch authentication via mobile phone for maximum convenience. Works on iOS, Android and Windows 10 mobile devices.

Cloud support
In addition to on-premise applications, ESET Secure Authentication also supports web/cloud services such as Google Apps and Microsoft ADFS 3.0 (including Office 365).

Multiple ways to authenticate
ESET Secure Authentication supports mobile applications, push notifications, hard tokens and SMS for one-time password (OTP) delivery, as well as custom methods.

ESET Threat Intelligence Service

Get in-depth, up-to-date global knowledge about specific threats and attack sources, traditionally difficult to detect for security engineers, who access information only within their own networks. Enable your organization to:

Block targeted attacks

Protect against phishing

Stop botnet attacks

Detect advanced persistent threats

Real-time data feed

ESET Threat Intelligence data feeds utilize widely supported STIX/TAXII format, which makes it easy to integrate with existing SIEM tools. Integration helps to deliver the latest information on the threat landscape to predict and prevent threats before they strike.

Robust API

ESET Threat Intelligence features a full API that is available for automation of reports, YARA rules and other functionalities to allow for integration with other systems used within organizations.

YARA rules

These allow organizations to set up custom rules to obtain company-specific information that security engineers are interested in. Organizations receive valuable details such as the number of times specific threats have been seen worldwide, URLs containing malicious code, malware behavior on the system, where it was detected, and more.