eset business products
TRANSCRIPT
HEADQUARTERS
Bratislava, SK
REGIONAL CENTERS AND OFFICES
Dubai - Middle East San Diego (USA)
Buenos Aires (ARG)
Sao Paulo (BRA)
Sydney (AUS)
Jena (GER)
Prague (CZE)
Singapore
MALWARE RESEARCH AND TECHNOLOGY CENTERS
Bratislava (SVK)
Košice (SVK)
San Diego (USA)
Montreal (CAN)
Krakow (POL)
Buenos Aires (ARG)
Prague (CZE)
Jablonec nad Nisou (CZE)
Singapore
ESET product is the leader in lowest system-resource
consumption by testing authority AV-Comparatives
ESET has received the most "Advanced+" awards in
proactive tests from AV-Comparatives
The only vendor with record-breaking
protection
ESET achieves 100% protection in Dennis
Technology labs independent test, topping
the list of IT security vendors
ESET holds Checkmarkcertifications in detection of
infections
ESET tops the security software consumer
satisfaction in Japan for the 3rd consecutive time
ESET is the first antivirus company to have achieved ICSA certification for Mac
OS X
ESET Business products get the approved award from AV-
Comparatives
Antivirus Battle Royale, ESET receives 9/10
points
“We give the 2014 ESET NOD32 Antivirus 10 out of 10 stars and a 2014
Best Buy Award.”
ESET Mobile Security wins Seal of Approval from
PTPA
ESET Wins PCMag ConsumerRecommended Award for
Security Suites and Stand AloneAntivirus Software
Our only objective is to keep
your systems secure.
Our solutions free up customers’
IT resources. ESET solutions are famed for
their low system impact
ESET products have now passed
every VB100 test for over 11
years, also a record.
Almost two-thirds of surveyed
ESET customers say they see a
return on their investment in
less than 6 months.
With offices in Europe, the
Americas and Asia, we have a
sales presence in 180 countries
worldwide.
at the core is our award-winning ESET NOD32®
malware detection technology
our technology works fast, and has the lowest possible impact on your
systems
designed by IT professionals for
ultimate ease of use
Complete protection for company endpoints
Antivirus & Antispyware HIPS Device Control Two-way Firewall Web Control Client Antispam Botnet protection
Powerful antivirus and antispyware protection
Antivirus & Antispyware HIPS Device Control
Protect your company’s smartphones and tablets
Application Control Anti-Theft SMS & Call Filtering Security Audit Enhanced Anti-Phishing
Server OS Security
Antivirus & Antispyware Designed for Servers Auto-detection of Server Roles Exceptions setup based on roles
Protecting company mailboxes
Advanced Antispam protection Mailbox Anti-Malware Antivirus & Antispyware
Gateway Security
Antivirus & Antispyware Proxy integration Web-based interface
SharePoint Security
Now with support of Microsoft SharePoint Server 2013
Scan any content stored within the SharePoint database structure
Rule-based filtering
ESET License Administrator
Allows administrators to manage credentials for their software, convert older
Username and Password
ERA Agent
The ERA Agent must be installed on all client computers that communicate with
the ERA Server.
•On-place security management – configured to store several security scenarios,
reaction time to threat is significantly lowered.
•Off-line security management – the Agent can respond to an event if it is not
connected to the ERA Server.
Rogue Detection Sensor
Rogue Detection Sensor (RD Sensor)—Detects unprotected client computers on
your network.
&
From ESET uninstalls all redundant
anti-malware solutions from your
system as it installs the latest ESET
solution, resulting in seamless, easy
migration.
ERA Proxy Server
The ERA Proxy Server can be used on larger networks to help distribute load from
client computers to the ERA Server.
• Passive distribution of configuration data (groups, policies, tasks, etc.)
• The forwarding is done with no involvement from the ERA Server.
• This allows for the optimization of database queries and reduce the load.
• Flexibility and scalability.
A botnet is a network of infected computers, where the network is used by the malware to spread.
Protects against infiltration by botnet malware
Prevents spam and network attacks from being launched from the endpoint
Protects you from attempts to acquire password and other sensitive information
By restricting access to malicious websites that impersonate legitimate ones.
New detection technology
Protects against attacks on web browsers,
PDF readers and other applications,
including Java-based software.
Strengthens protection against targeted
attacks and previously unknown exploits –
i.e. zero-day attacks
Monitors the behavior of malicious processes
Scans them once they decloak in the memory
Provides effective prevention of infection by heavily obfuscated malware.
Improves detection of Common Vulnerabilities and Exposures (CVEs) on widely used protocols such as SMB, RPC and RDP
Protects against vulnerabilities for which a patch has not yet been released or deployed
Device Control
Supported external devices:
• Disk storage (HDD, USB removable disk)
• CD/DVD
• USB printer
• FireWire Storage
• Bluetooth Device
• Smart card reader
• Imaging Device
• Modem
• LPT/COM port
• Portable Device