ESET Endpoint & Server Security
Every Workstation and Endpoint needs protection, with ESET Endpoint Anti-Virus and ESET Remote Administrator, you can easily implement and maintain a powerful anti-malware solution.
Anti-Virus and Anti-Spyware combats all threats, including viruses, rootkits, worms and spyware. Optional cloud-powered scanning allows whitelisting of safe files based on a file reputation database in the cloud, ensuring better detection and faster scanning. Protect your company against threats both known and emerging with advanced heuristics and comprehensive scanning options, including idle-state scanning which initiates a scan once the computer is not in use.
ESET’s signature low system footprint ensures that your hardware runs faster for longer. A small update package keeps you protected against the latest threats without consuming all of your bandwidth. Prevent threats being brought into the company physically with Device Control, allowing you to block unauthorised CDs/DVDs and USBs.
The Anti-Phishing module protects against fake websites which attempt to harvest sensitive information from end-users, such as passwords, usernames and banking or credit card information. ESET’s Host-Based Intrusion Prevention System (HIPS) protects against malware tampering with the registry of your endpoints and detects threats based on system behaviour.
Edit GUI visibility for the end-user, reducing the system resources required even further if hidden completely. ESET security solutions protect against Mac based malware even on a Windows platform and vice-versa, ensuring that your network is secure regardless of the systems attached to it. Detect and uninstall other security software as ESET installs with RIP & Replace: transferring to ESET has never been easier.
Anti-Virus and Anti-Spyware – Eliminate all known threats, including viruses, rootkits, worms and spyware.
Host-Based Intrusion Prevention System (HIPS) – Give your IT staff extensive control over your entire network.
Exploit Blocker – Strengthen the security of common applications such as web browsers, PDF readers, email clients and Microsoft Office Components.
Cross-Platform Protection – Prevent malware from moving from one operating system to another.
Anti-Phishing – Defends end-users against fake websites looking to harvest sensitive information, such as passwords, usernames or bank/credit card details.
Device Control – Allows you to block unauthorised devices (CDs/DVD and USBs) from being connected to your computer systems.
Idle-State Scanning – Performs a scan on your systems whilst they are not being used, avoiding interruption during the working day.
RIP & Replace – Removes other security software during installation, making transferring from an under-performing Anti-Virus even easier
Low System Demands – Fully protect your system or network with minimal resource consumption.