The War on Ransomware is Over

NeuShield Data Sentinel does more than just detecting and blocking ransomware attacks. We’re the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup. Data Sentinel uses Mirror Shielding™ to protect files ensuring that you can instantly recover your important data from any ransomware attack.

Mirror Shielding™

Patented technology that adds a barrier to protected files preventing them from being modified. Mirror Shielding™ makes an attacker believe they have access to a computer’s original data files, but they are in fact only seeing a mirror image of them.

One-Click Restore

Restores operating system files and settings back to a known good state allowing you to quickly regain access to your computer after a ransomware attack. One-Click Restore also removes both known and unknown malware.

Boot Protection

Protects the boot portion of a drive to prevent aggressive types of ransomware from taking over the boot process and preventing applications from writing to the boot record.

Data Engrams™

Leverages Mirror Shielding™ to create copies of modified data at different points in time. Data Engrams™ work like file revision history, allowing files to be restored to previous versions.

Disk Protection

Monitors all direct disk access preventing malicious programs from destroying data on the hard drive or SSD. Protects against destructive ransomware or wipers that attempt to wipe the disk.

Cloud Drive Protection

Protects local cloud drive folders allowing destroyed or corrupted data to be recovered quickly without an Internet connection. Supports popular solutions, such as: OneDrive, Google Drive, DropBox, and Box.com.

File Lockdown

Temporarily blocks write access to protected files preventing them from being modified during an active attack from Fully UnDetectable (FUD) ransomware.

Zero Performance Impact

Extremely small client engine using less than 10MBs of memory, making decisions about critical files with virtually no CPU or disk (IOPS) overhead.

ESET Endpoint Encryption Pro

Easy to use encryption application provides full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:

Zero data breaches
Compliance with requirements
Easily manage authentication
Seamless encryption

Manage devices anywhere
ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or firewall exceptions. Management is handled by utilizing HTTPS internet connectivity, making it extremely simple for businesses of any size to install and set up.

Zero impact on productivity
Implementing encryption is completely transparent for the users and requires no action on their part. There’s no extra overhead for IT departments and no need for user training.

Fast, seamless deployment
Server installation of ESET Endpoint Encryption usually takes less than 10 minutes, with complete setup in under one hour.

ESET Dynamic Threat Defense

Provides another layer of security for ESET products like Mail Security and endpoint products by utilizing a cloud-based sandboxing technology to detect new, never before seen types of threats. Future-proof your company’s IT security with:

Behavior-based detection
Machine learning
Zero-day threats detection
Cloud sandbox

Multilayered protection
Within ESET Dynamic Threat Defense, ESET utilizes three different machine learning models once a file is submitted. After this process, the sample is run through a full sandbox which simulates user behavior to trick anti-evasive techniques.

Unparalleled speed
Every minute counts. That’s why ESET Dynamic Threat Defense is designed to analyze the majority of samples in under five minutes. If samples were previously analyzed, all devices at your organization will be protected in seconds.

Full visibility
Every sample analyzed by ESET Dynamic Threat Defense is listed in the “Submitted files” section of ESET Security Management Center, which also provides transparency for all data sent to ESET LiveGrid® cloud malware protection system