eset business products

49

Upload: hamed-masaebi

Post on 11-Jan-2017

90 views

Category:

Documents


0 download

TRANSCRIPT

HEADQUARTERS

Bratislava, SK

REGIONAL CENTERS AND OFFICES

Dubai - Middle East San Diego (USA)

Buenos Aires (ARG)

Sao Paulo (BRA)

Sydney (AUS)

Jena (GER)

Prague (CZE)

Singapore

MALWARE RESEARCH AND TECHNOLOGY CENTERS

Bratislava (SVK)

Košice (SVK)

San Diego (USA)

Montreal (CAN)

Krakow (POL)

Buenos Aires (ARG)

Prague (CZE)

Jablonec nad Nisou (CZE)

Singapore

ESET product is the leader in lowest system-resource

consumption by testing authority AV-Comparatives

ESET has received the most "Advanced+" awards in

proactive tests from AV-Comparatives

The only vendor with record-breaking

protection

ESET achieves 100% protection in Dennis

Technology labs independent test, topping

the list of IT security vendors

ESET holds Checkmarkcertifications in detection of

infections

ESET tops the security software consumer

satisfaction in Japan for the 3rd consecutive time

ESET is the first antivirus company to have achieved ICSA certification for Mac

OS X

ESET Business products get the approved award from AV-

Comparatives

Antivirus Battle Royale, ESET receives 9/10

points

“We give the 2014 ESET NOD32 Antivirus 10 out of 10 stars and a 2014

Best Buy Award.”

ESET Mobile Security wins Seal of Approval from

PTPA

ESET Wins PCMag ConsumerRecommended Award for

Security Suites and Stand AloneAntivirus Software

Our only objective is to keep

your systems secure.

Our solutions free up customers’

IT resources. ESET solutions are famed for

their low system impact

ESET products have now passed

every VB100 test for over 11

years, also a record.

Almost two-thirds of surveyed

ESET customers say they see a

return on their investment in

less than 6 months.

With offices in Europe, the

Americas and Asia, we have a

sales presence in 180 countries

worldwide.

at the core is our award-winning ESET NOD32®

malware detection technology

our technology works fast, and has the lowest possible impact on your

systems

designed by IT professionals for

ultimate ease of use

NEW NEW

NEW

NEW NEW

NEW

Complete protection for company endpoints

Antivirus & Antispyware HIPS Device Control Two-way Firewall Web Control Client Antispam Botnet protection

Powerful antivirus and antispyware protection

Antivirus & Antispyware HIPS Device Control

Protect your company’s smartphones and tablets

Application Control Anti-Theft SMS & Call Filtering Security Audit Enhanced Anti-Phishing

Server OS Security

Antivirus & Antispyware Designed for Servers Auto-detection of Server Roles Exceptions setup based on roles

Protecting company mailboxes

Advanced Antispam protection Mailbox Anti-Malware Antivirus & Antispyware

Gateway Security

Antivirus & Antispyware Proxy integration Web-based interface

SharePoint Security

Now with support of Microsoft SharePoint Server 2013

Scan any content stored within the SharePoint database structure

Rule-based filtering

Server Installation

You can now install the ERA Server on Linux and as a Virtual Appliance.

Web Console

The Web Console is the primary interface used to administer clients

ESET License Administrator

Allows administrators to manage credentials for their software, convert older

Username and Password

ERA Agent

The ERA Agent must be installed on all client computers that communicate with

the ERA Server.

•On-place security management – configured to store several security scenarios,

reaction time to threat is significantly lowered.

•Off-line security management – the Agent can respond to an event if it is not

connected to the ERA Server.

Rogue Detection Sensor

Rogue Detection Sensor (RD Sensor)—Detects unprotected client computers on

your network.

&

From ESET uninstalls all redundant

anti-malware solutions from your

system as it installs the latest ESET

solution, resulting in seamless, easy

migration.

ERA Proxy Server

The ERA Proxy Server can be used on larger networks to help distribute load from

client computers to the ERA Server.

• Passive distribution of configuration data (groups, policies, tasks, etc.)

• The forwarding is done with no involvement from the ERA Server.

• This allows for the optimization of database queries and reduce the load.

• Flexibility and scalability.

A botnet is a network of infected computers, where the network is used by the malware to spread.

Protects against infiltration by botnet malware

Prevents spam and network attacks from being launched from the endpoint

Protects you from attempts to acquire password and other sensitive information

By restricting access to malicious websites that impersonate legitimate ones.

New detection technology

Protects against attacks on web browsers,

PDF readers and other applications,

including Java-based software.

Strengthens protection against targeted

attacks and previously unknown exploits –

i.e. zero-day attacks

Monitors the behavior of malicious processes

Scans them once they decloak in the memory

Provides effective prevention of infection by heavily obfuscated malware.

Improves detection of Common Vulnerabilities and Exposures (CVEs) on widely used protocols such as SMB, RPC and RDP

Protects against vulnerabilities for which a patch has not yet been released or deployed

Device Control

Supported external devices:

• Disk storage (HDD, USB removable disk)

• CD/DVD

• USB printer

• FireWire Storage

• Bluetooth Device

• Smart card reader

• Imaging Device

• Modem

• LPT/COM port

• Portable Device

Web Control

Access rights

• Allow

• Allow and warn

• Block

Client Antispam

HIPS -

Host Intrusion

Prevention System

Endpoint Firewall