ESET endpoint security for windows

Leverages a multilayered approach that utilizes multiple technologies in dynamic equilibrium to constantly balance performance, detection and false positives enabling organizations to:

icon-cloud

Technical Sales Team

icon-cloud

Block targeted attacsks

icon-cloud

Prevent data breaches

icon-cloud

Stop file-less attacks

icon-cloud

Detect advanced persistent threats

icon-cloud

URL filtering

The ESET difference

Behavioral Detection – HIPS

ESET’s Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognize and stop suspicious system behavior.

Ransomware Shield

An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes t- hat resemble behavior of ransomware.

Network Attack Protection

ESET Network Attack Protection improves detection of known vulnerabilities on the network level. It constitutes another important layer of protection against spreading malware, network-conducted attacks, and exploitation of vulnerabilities, for which a patch has not yet been released or deployed.

Advanced Memory Scanner

A unique ESET technology which effectively addresses an important issue of modern malware – heavy use of obfuscation and/or encryption. Advanced Memory Scanner monitors the behavior of a malicious pro -cess and scans it once it decloaks in memory.

In-product Sandbox

ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware. Utilizing this technology, ESET solutions emulate different components of computer hardware and software to execute a suspicious sample in an isolated virtualized environment.

Exploit Blocker

ESET Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java, and more) and instead of just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.

Two-way firewall

Prevents unauthorized access to the company network. It provides anti-hacker protection, data exposure prevention, and enables defining trusted networks, making all other connections, such as to public Wi-Fi, restricted by default.

Botnet Protection

ESET Botnet Protection detects malicious communication used by botnets, and at the same time identifies the offending processes. Any detected malicious communication is blocked and reported to the user.