Contents ESET slide collection - About ESET, Why ESET, Technologies, Products, Solutions Assorted additional slides for your consideration/use Services Slides specific about ESET Services offering are hidden by default (Services slides, Solutions overview with ESET PROTECT MDR etc.) The reason is that these are available in selected markets only Latest version always on Global Hub , including changelog Version: 202 2 - 2-08
Your Cybersecurity Partner
Introducing ESET
About ESET
Number One EU Cybersecurity Company for Business 1Bn+ Internet users protected by our technology 400K+ Business customers 110M Users Trusted by Enterprise customers worldwide About ESET Number One EU Cybersecurity Company for Business 1Bn+ Internet users protected by our technology 400K+ Business customers 110M Users Trusted by Enterprise customers worldwide
About ESET Represented in 202 countries 13 Global R&D Centres Offices in 23 countries Represented in 202 countries 13 Global R&D Centres Offices in 23 countries
APT Protection Top Player About ESET Radicati Market QuadrantSM is copyrighted March 2021 by The Radicati Group, Inc. Reproduction in whole or in part is prohibited without expressed written permission of the Radicati Group. Vendors and products depicted in Radicati Market QuadrantsSM should not be considered an endorsement, but rather a measure of The Radicati Group’s opinion, based on product reviews, primary research studies, vendor interviews, historical data, and other metrics. The Radicati Group intends its Market Quadrants to be one of many information sources that readers use to form opinions and make decisions. Radicati Market QuadrantsSM are time sensitive, designed to depict the landscape of a particular market at a given point in time. The Radicati Group disclaims all warranties as to the accuracy or completeness of such information. The Radicati Group shall have no liability for errors, omissions, or inadequacies in the information contained herein or for interpretations thereof.
Leadership Matrix Champion About ESET The written content of this document represents our interpretation and analysis of information generally available to the public or released by responsible individuals in the subject companies, but is not guaranteed as to accuracy or completeness. It does not contain information provided to us in confidence by the industry. Market data contained in this document represents Canalys’ best estimates based on the information available to it at the time of publication.
Endpoint Prevention and Response v s TCO Strategic Leader About ESET
Regular independent awards for Top vendor Best product About ESET
ISO 27001 Certified ESET is built on security About ESET
Why ESET?
Number One EU Cybersecurity Company for Business 1Bn+ Internet users protected by our technology More than 400K Business customers 110M Users in 202 countries 13 Global R&D Centres Offices in 23 countries About ESET Founded by software engineers in 1987 Reputation built on quality, and reliability Still privately owned by the same founders in 2021 Corporately and financially independent for 34 years Managed according to principles not the stock market Founded by software engineers in 1987 Reputation built on quality, and reliability Still privately owned by the same founders in 2021 Corporately and financially independent for 34 years Managed according to principles not the stock market
ESET Security Reliability Market trends Financial performance Security first Long game TRUST OTHER VENDORS Share price and dividend yield Market trends Reliability Security Shareholder value first Short game $$$ About ESET Focusing on the cause of success , not the symptom
ESET Security Reliability Market trends Financial performance Security first Long game TRUST About ESET
ESET Security Reliability Market trends Financial performance Security first Long game TRUST About ESET
ESET Security Reliability Market trends Financial performance Security first Long game TRUST About ESET Over 2 million facebook followers Global No. 1 Security blog * Latest security trends Proprietary research Security education MITRE contributor * Source: blog.feedspot.com/cyber_security_blogs/
ESET Security Reliability Market trends Financial performance Security first Long game TRUST About ESET
ESET Security Reliability Market trends Financial performance Security first Long game TRUST About ESET
Trust
Technology accelerates human progress Stone tools Fire Spears Language Clothing Everything else Cave painting
Technology accelerates human progress Agriculture Alcohol Bronze Iron Money Everything else Cave painting
Technology accelerates human progress Agriculture Alcohol Bronze Iron Money Everything else Cave painting
The number of transistors in a dense integrated circuit doubles about every two years Creating new dimensions for criminal activity Technology accelerates human progress 1971 Creeper ELK Cloner 1982 1986 Brain Vienna 1987 1988 Morris AIDS 1989 1990 Chameleon Concept 1995 1996 Boza CIH 1998 1999 Melissa ILOVEYOU 2000 2001 Anna Kournikova Beast 2002 Zeuss 2007 2008 Conficker Stuxnet 2010 2011 Duqu Cryptolocker 2013 2016 Mirai 2018 Thanatos Wannacry Petya NotPetya 2017 Emotet 2020 2021 Pegasus Moore’s Law Taking the complexity of cyber-threats with it making cyber-security something we must trust to the experts
Trust
ESET TECHNOLOGY
OUR PRINCIPLES High detection Low performance impact Ease of use Reliability
RESPOND PREDICT DETECT PREVENT
RESPOND PREDICT DETECT PREVENT ESET
PREVENT DETECT RESPOND
ESET PROTECT ESET LiveGuard Advanced ESET Inspect Xopero - Backup and Recovery GreyCortex Network Traffic Analysis RESPOND ESET Threat Intelligence Data Feed s - APT Reports Premium - PREDICT ESET PROTECT ESET Endpoint Security ESET LiveGuard Advanced Safetica - Data Loss Prevention GreyCortex Network Traffic Analysis DETECT ESET PROTECT ESET Endpoint Security ESET Virtualization Security ESET Secure Authentication ESET Endpoint Encryption Safetica - Data Loss Prevention PREVENT
1987 30 years ago… NOD was born 1992 ESET founded 2002 Advanced Heuristics 1995 1 st experiments with Machine Learning Heuristic Detection & Behavioral Detection 1998 1 st VB100 Award 1997 Machine Learning algorithms applied in products
2007 Automated detection based on DNA 2008 Centroids project 2005 ThreatSense.net DNA Detections 2011 Automated file reputation system based on DNA Machine Learning based detection 2012 Network Attack Protection Exploit Blocker 2006 Mass Processing Algorithm
2019 Deep Behavioral Inspection Isolated Scanner Advanced Machine Learning on the endpoint Global coverage with Security Services for Enterprise 2018 Brute-Force Attack Protection 2020
Machine Learning in ESET Expert system for mass processing Algorithm placing samples on the map 1998 Neural Networks in product 2006 2012 2005 DNA Detections (Online ML)
ESET PRODUCTS
Unified management console for ESET security solutions
MULTI-LAYERED SECURITY
ESET’s security plaform Management console for all OSes Cloud or on-premises deployment Manages all ESET Endpoint Security Products Real-time visibility for: On-premise endpoints Off-premise endpoints Extensive reporting capabilities
Threat prevention, detection and response Fully customizable notification system Single-click incident remediation Dynamic and custom reporting
Hardware and software inventory Software remediation SIEM and SOC support Multi-tenancy support MSP Ready
Automation framework Automated VDI Support Advanced RBAC Fully Scalable
Can be hosted in-house Install for Windows Linux By Virtual Appliance
Multilayered protection across all platforms
MULTI-LAYERED SECURITY
Endpoint protection platform is a security solution deployed on company devices to prevent cyber attacks, detect malicious activity, and provide instant remediation capabilities. ESET Server Security provides advanced protection for all general servers and network file storage, to maintain stable and conflict-free operation and ensure business continuity.
ESET Endpoint Security for Windows/macOS/Android ESET Endpoint Antivirus for Windows/macOS/Linux ESET Endpoint Security for Android ESET MDM for iOS and iPadOS ESET Server Security for Windows Server/Linux/Azure
A single point of protection or a single method of defense is simply not enough. ESET uses multi-layered technologies that go far beyond the capabilities of basic antivirus. ESET’s scanning engine is at the core of our products and, while the underlying technology has been inherited from “old-style antivirus,” it has been greatly extended and enhanced and is constantly being developed to cover modern threats.
LiveGrid ® Protection Botnet Protection Ransomware Shield Advanced Memory Scanner Exploit Blocker Script Scanner & AMSI Deep Behavioral Inspection Reputation and Cache UEFI Scanner Device Control Brute-Force Attack Protection In-Product Sandbox DNA Detections Network Attack Protection POST EXECUTION EXECUTION PRE-EXECUTION Advanced Machine Learning Secure Browser Fence CCTV Smoke Detector Motion Sensor Guard Dog Security System Fire Alarm Key Fire Sprinkler Vault
LiveGrid ® Protection Botnet Protection Ransomware Shield Advanced Memory Scanner Exploit Blocker Script Scanner & AMSI Deep Behavioral Inspection Reputation and Cache UEFI Scanner Device Control Brute-Force Attack Protection In-Product Sandbox DNA Detections Network Attack Protection POST EXECUTION EXECUTION PRE-EXECUTION Advanced Machine Learning Secure Browser
ESET LiveGrid® Protection Advanced early warning system comprised of several cloud-based technologies. Helps detect emerging threats based on reputation and improves scanning performance by means of whitelisting. New threat information is streamed in real-time to the ESET cloud, which enables the ESET Malware Research Lab to provide timely response and consistent protection at all times.
Antimalware Antiphishing and antispam Network Attack Protection Device control Machine-learning based protection Exploit Blocker Secure Browser Brute force attack protection Android & iOS MDM
Antimalware Multilayered host protection OneDrive and Hyper-V scan Automatic exclusions Integration with ESET PROTECT console
Cross platform support
Complete protection for mail servers, the #1 threat vector
MULTI-LAYERED SECURITY
In-house developed anti-spam, anti-phishing and host server protection. Combining machine learning, big data and human expertise.
Antimalware Antispam Antiphishing Host server protection Machine-learning based protection Robust quarantine management Custer support Hybrid Office 365 scanning
Proactive defense against zero-day and never-before-seen threat types
MULTI-LAYERED SECURITY
Detects zero-day, never-before seen threats Cloud-based sandboxing technology Behavior-based detection
Detects zero-day, never-before seen threats Cloud-based sandboxing technology Behavior-based detection
All samples detailed in ESET Protect console 99% of samples tested in under 5 minutes Works directly with ESET Mail Security Highly configurable endpoint policy All samples detailed in ESET Protect console 99% of samples tested in under 5 minutes Works directly with ESET Mail Security Highly configurable endpoint policy
Protection for Microsoft 365 applications
MULTI-LAYERED SECURITY
Cloud-hosted or not , email remains a key attack vector for spam, malware distribution and phishing Online collaboration tools need to be secured to ensure business continuity
ESET’s track record of 30+ years of innovation in IT security ESET’s Technology advantage: Award-winning antispam, anti-malware and anti-phishing technologies, used in our mature on-premise mail server products, now available for protecting of Microsoft 365
Anti-malware protection for Exchange Online, OneDrive, SharePoint Online and Teams Antispam protection for Exchange Online Anti-phishing protection for Exchange Online ESET LiveGuard Advanced – detection of never-before seen threats Deployment and immediate protection in as little as five minutes
Features Dashboard with detection statistics and filtering Anti-malware protection for Exchange Online Antispam protection for Exchange Online ESET LiveGuard Advanced included Deployment in just 5 minutes Anti-phishing protection for: OneDrive, SharePoint Online and Teams Exchange Online Multitenancy with access management Manage Teams and Sites Comprehensive Logging Policies and automation Quarantine manager Scalability
Multi-factor authentication that's easy to implement and use
MULTI-LAYERED SECURITY
External contractors accessing network from outside Compliance law requiring personal data protection Increasing number of cloud services Poor employee password hygiene Remote workforce related risk Targeted data breaches Helps solve the access and authentication risks: 61% of of breaches involved credential data* *Source: Verizon 2021 Data Breach Investigation Report Helps solve the access and authentication risks:
Works with hardware keys and smartphones No dedicated hardware required Full API and SDK provided Remote management Push authentication 10-minute setup Key Features Works with hardware keys and smartphones No dedicated hardware required Full API and SDK provided Remote management Push authentication 10-minute setup
Data protection for businesses of all sizes
MULTI-LAYERED SECURITY
Robust full disk encryption native to ESET PROTECT Helps you comply with data protection regulations like GDPR and others Monitor encryption on user machines remotely Protects company data with a simple yet powerful solution
Pre-Boot security Full Disk Encryption Manageable via ESET Protect. Remote setup of password policies. Remotely block, invalidate or wipe passwords on managed endpoints All products managed from one console Identity and data protection Cross-platform coverage Single-click deployment Fully validated Features Pre-Boot security Full Disk Encryption Manageable via ESET Protect. Remote setup of password policies. Remotely block, invalidate or wipe passwords on managed endpoints All products managed from one console Identity and data protection Cross-platform coverage Single-click deployment Fully validated
Highly customizable endpoint detection & response
MULTI-LAYERED SECURITY
Detect suspicious activity Identify malicious anomaly Prevent malicious activity Discover what happened Discover how it happened Prevent it happening Discover what happened Discover how it happened Why EDR?
Collects real time events Provides extensive filtering and sorting Uses ESET reputation system Custom notification rules Blocking and remediation Designed for threat hunting Key features Collects real time events Provides extensive filtering and sorting Uses ESET reputation system Custom notification rules Blocking and remediation Designed for threat hunting
Solution for targeted attacks & APTs Detection Visibility Response Find malicious anomaly What is affected? When it happened? How it happened? Block it Remove it
MULTI-LAYERED SECURITY
ESET SERVICES PORTFOLIO PROFESSIONAL SERVICES PREMIUM SUPPORT ESSENTIAL PREMIUM SUPPORT ADVANCED DEPLOYMENT & UPGRADE HEALTHCHECK SECURITY SERVICES DETECTION AND RESPONSE ESSENTIAL DETECTION AND RESPONSE ADVANCED DETECTION AND RESPONSE ULTIMATE
STANDARD SUPPORT PREMIUM SUPPORT ESSENTIAL PREMIUM SUPPORT ADVANCED DEPLOYMENT & UPGRADE HEALTHCHECK Critical Severity (A) Response Time Best effort 2 hours 2 hours – – Serious Severity (B) Response Time Best effort 4 hours 4 hours – – Common Severity (C) Response Time Best effort 1 workday 1 workday – – Support availability 7:00-18:00, business days only 365/24/7 365/24/7 – – Customer Contacts Limited Unlimited Unlimited – – Priority call queuing – ✓ ✓ – – Number of tickets eligible for premium treatment – Limited Unlimited – – Dedicated account manager – – ✓ – – Priority access to development teams – – ✓ – – Proactive Informative Services – – ✓ – – Deployment/Upgrade – – 1 ✓ – Healthcheck – – 1 – ✓ PROFESSIONAL SERVICES OVERVIEW
ACTIVITY CATEGORY ACTIVITY STANDARD SECURITY SUPPORT DETECTION AND RESPONSE ESSENTIAL DETECTION AND RESPONSE ADVANCED DETECTION AND RESPONSE ULTIMATE Response Times Best effort Guaranteed by SLA Guaranteed by SLA Guaranteed by SLA Endpoint Security Support Malware: missing detection ✓ ✓ ✓ ✓ Malware: cleaning problem ✓ ✓ ✓ ✓ Malware: ransomware infection ✓ ✓ ✓ ✓ False positive ✓ ✓ ✓ ✓ General: Suspicious behavior investigation ✓ ✓ ✓ ✓ Incident Investigation & response Basic file analysis – ✓ ✓ ✓ Detailed file analysis – ✓ ✓ ✓ Digital forensic – ✓ ✓ ✓ Digital forensic incident response assistance – ✓ ✓ ✓ EDR Security Support Support – rules – – ✓ ✓ Support – exclusions – – ✓ ✓ General: EI security related question – – ✓ ✓ EI: Initial Optimization – – ✓ ✓ EI: Threat Hunting (on-demand) – – ✓ ✓ EDR Security Service EI: Threat Monitoring – – – ✓ EI: Threat Hunting (proactive) – – – ✓ Supporting Professional Services Deployment & Upgrade – – – ✓ SECURITY SERVICES OVERVIEW
MULTI-LAYERED SECURITY
ESET Support Services A pillar of the satisfaction of customers with ESET FREE for all customers Available in local languages Praised by customers, one of the parts of ESET experience that stands out Local p resence and support
The latest intelligence from the top industry experts
MULTI-LAYERED SECURITY
Threat Intelligence is information about threats that Is frequently updated (very frequently) Contains detailed information Is available in standardized formats … so that organizations can use it to stay on top of security for themselves or for their clients, and integrate it into: SIEMs – Security Information and Event Management SOARs – Security Orchestration, Automation and Response TIPs – Threat Intelligence Platforms
ESET Threat Intelligence Provides real-time global knowledge gathered by ESET experts on targeted attacks, advanced persistent threats, zero-days and botnet activities. Shared in the form of data feeds: JSON and STIX v 2 . formats Via TAXII server, updated several times within one hour I ndicators of C ompromise (IoCs) Out-of-the-box integrations with Threat Intelligence Platforms Botnet feed Domain feed URL feed Malicious files feed IP feed APT feed
Seamless network security for connected devices in mobile and fixed networks
Product for Telcos and ISPs Product will protect customers connected to Telco/ISP network (fixed or mobile) It filters malicious domains when users browse the web Parental Control can block restricted content by category (adult, violence, drugs, etc.) Remote management via portal (home admin) Imagine internet security with 1 click and without any technical knowledge by customers
ESET NetProtect products ESET NetProtect for Mobile Advanced per 1 device | 1 SIM card ESET NetProtect for Home Advanced per router | no device limitations ESET NetProtect for Mobile per 1 device | 1 SIM card ESSENTIAL ADVANCED
ESET NetProtect in detail Mobile network (5G, 4G, 3G, 2G) Fixed network ( Fiber , FWA, xDSL , cable ) Features/Products ESET NetProtect for Mobile (DNS filter-AV) ESET NetProtect for Mobile Advanced DNS filter-AV + Web content filter/On-Net parental ESET NetProtect for Home Advanced DNS filter-AV + Web content filter/On-Net parental DNS filter | Anti - Malware ✓ ✓ ✓ DNS filter | Potentially Unwanted Content ✓ ✓ ✓ DNS filter | Anti - Phishing ✓ ✓ ✓ Customer Management P ortal ✓ ✓ ✓ W hitelist / B lacklist ✓ ✓ ✓ Security R eport ✓ ✓ ✓ W eb C ontent F ilter , categorization with age groups filters ✓ ✓
ESET NetProtect FEATURES On-net protection Protects customer devices connected to Telco/ISP networks (fixed or mobile) against malicious web domains / domain categories such as malware, phishing and PUAs. Children can be protected by Parental Control filters. There is no need for any device software installation. User management control Portals where authorized users (home admins) or Telco admins can manage NetProtect rules and see logs and usage statistics for connected devices; also includes provisioning & licensing. Off-net protection
ESET NetProtect FEATURES DNS filter | Anti - Malware (Antivirus filters) Provides proactive protection against domains containing files categorized as malicious software and thereby protects users from data leakage and damage to personal devices and prevents malware from spreading. DNS filter | Potentially Unwanted Content Protects users against suspicious domains, or websites hosting unwanted content, by blocking them.
ESET NetProtect FEATURES DNS filter | Anti - Phishing Protects users’ privacy and assets against attempts by fraudulent websites to acquire sensitive information such as usernames, passwords or banking details, or feed fake news from seemingly reputable sources. Protects users from homoglyph attacks (which replace characters in links with ones that look similar but are actually different). Customer Management P ortal Allows users to manage the NetProtect settings of their connected devices and manage their whitelists and blacklists and provides security reports. Based on ISP/Telco options, email management with notifications can be added.
ESET NetProtect FEATURES W hitelist / B lacklist Allows users to manually whitelist blocked domains when sure they are legitimate, and to blacklist inappropriate domains from the management console. Security R eport Security reports give users an insight into how ESET protects their device(s). The summary includes information about detected threats, blocked webpages and more. Web C ontent filter (On-Net content filtering) Gives users the option to choose from 35 predefined content categories (e.g. adult, violence, aggressive, social media, etc.). Based on the end-user (e.g. corporate, child) you can switch-on/select the level of protection. ADVANCED
Core Components ESET PROTECT Platform ● ● ● ● ● Modern Endpoint Protection ● ● ● ● ● File Server Protection ● ● ● ● ● Advanced Threat Defense ● ● ● ● Full Disk Encryption ● ● ● ● Mail Security ● ◐ ◐ Cloud App Protection ● ◐ ◐ Detection & Response ● ● Optional Solutions Sharepoint Security ◐ ◐ ◐ ◐ ◐ Endpoint Encryption ◐ ◐ ◐ ◐ ◐ Authentication ◐ ◐ ◐ ◐ ◐ Services Complementary Technical Support ● ● ● ● ● Premium Support Advanced ◐ ◐ ◐ ◐ ● Deployment & Upgrade ◐ ◐ ◐ ◐ ● Security Services ◐ ◐ ◐ ◐ ● Managed Detection & Response ◐ ● Choose the best ESET protection tier for you
Core Components ESET PROTECT Platform ● ● ● ● Modern Endpoint Protection ● ● ● ● File Server Protection ● ● ● ● Advanced Threat Defense ● ● ● Full Disk Encryption ● ● ● Mail Security ● ◐ Cloud App Protection ● ◐ Detection & Response ● Optional Solutions Sharepoint Security ◐ ◐ ◐ ◐ Endpoint Encryption ◐ ◐ ◐ ◐ Authentication ◐ ◐ ◐ ◐ Services Complementary Technical Support ● ● ● ● Premium Support Advanced ◐ ◐ ◐ ◐ Deployment & Upgrade ◐ ◐ ◐ ◐ Security Services ◐ ◐ ◐ ◐ Managed Detection & Response ◐ Choose the best ESET protection tier for you
DETECTION AND RESPONSE THREAT INTELLIGENCE Endpoint Antivirus ESET PROTECT ENTRY ESSENTIAL PROTECTION EXTENDED PROTECTION
Core Components ESET PROTECT Platform ● Modern Endpoint Protection ● File Server Protection ● Advanced Threat Defense Full Disk Encryption Mail Security Cloud App Protection Detection & Response Optional Solutions Sharepoint Security ◐ Endpoint Encryption ◐ Authentication ◐ Services Complementary Technical Support ● Premium Support Advanced ◐ Deployment & Upgrade ◐ Security Services ◐ Managed Detection & Response ESET PROTECT ENTRY Easily accessible ESET PROTECT Cloud console improves the TCO of security management. Single-pane-of-glass remote management for visibility to threats, users and quarantined items. Company endpoints and mobiles protected via advanced multilayered technology, including server security, now with secure intranet and banking protection. Best-in-class endpoint security, utilizing ESET´s verified layered approach (combining the best of all worlds: cloud-based reputation, machine learning, and deep behavioral inspection). Award-winning endpoint protection combines the latest ML techniques with decades of human expertise.
DETECTION AND RESPONSE THREAT INTELLIGENCE ESET PROTECT ADVANCED ESSENTIAL PROTECTION EXTENDED PROTECTION
Core Components ESET PROTECT Platform ● Modern Endpoint Protection ● File Server Protection ● Advanced Threat Defense ● Full Disk Encryption ● Mail Security Cloud App Protection Detection & Response Optional Solutions Sharepoint Security ◐ Endpoint Encryption ◐ Authentication ◐ Services Complementary Technical Support ● Premium Support Advanced ◐ Deployment & Upgrade ◐ Security Services ◐ Managed Detection & Response ESET PROTECT ADVANCED Improved protection against ransomware and zero-day threats via cloud-based sandboxing technology. Helps comply with data regulations thanks to full disk encryption capabilities on Windows and macOS. Easily accessible ESET PROTECT console improves the TCO of security management. Single-pane-of-glass remote management to ensure visibility of threats, users and quarantined items. Company endpoints and mobiles are protected via advanced multilayered technology, including server security, now with secure banking protection.
DETECTION AND RESPONSE THREAT INTELLIGENCE ESET PROTECT COMPLETE ESSENTIAL PROTECTION EXTENDED PROTECTION
Core Components ESET PROTECT Platform ● Modern Endpoint Protection ● File Server Protection ● Advanced Threat Defense ● Full Disk Encryption ● Mail Security ● Cloud App Protection ● Detection & Response Optional Solutions Sharepoint Security ◐ Endpoint Encryption ◐ Authentication ◐ Services Complementary Technical Support ● Premium Support Advanced ◐ Deployment & Upgrade ◐ Security Services ◐ Managed Detection & Response ESET PROTECT COMPLETE Improved protection against ransomware and zero-day threats via cloud-based sandboxing technology. Helps comply with data regulations thanks to full disk encryption capabilities on Windows and macOS. Protection against disruption caused by email-based attacks and malware in Microsoft 365 cloud applications. Easily accessible ESET PROTECT console improves the TCO of security management. Company endpoints and mobiles are protected via advanced multilayered technology, including server security, now with secure banking protection.
DETECTION AND RESPONSE THREAT INTELLIGENCE ESET PROTECT ENTERPRISE ESSENTIAL PROTECTION EXTENDED PROTECTION
Core Components ESET PROTECT Platform ● Modern Endpoint Protection ● File Server Protection ● Advanced Threat Defense ● Full Disk Encryption ● Mail Security ◐ Cloud App Protection ◐ Detection & Response ● Optional Solutions Sharepoint Security ◐ Endpoint Encryption ◐ Authentication ◐ Services Complementary Technical Support ● Premium Support Advanced ◐ Deployment & Upgrade ◐ Security Services ◐ Managed Detection & Response ◐ ESET PROTECT ENTERPRISE Unique behavior and reputation-based detection and response that is fully transparent to security teams and gives real-time feedback gathered from over 100 million endpoints in our LiveGrid. Improved protection against ransomware and zero-day threats via cloud-based sandboxing technology. Helps comply with data regulations thanks to full disk encryption capabilities on Windows and macOS. Company endpoints and mobiles are protected via advanced multilayered technology, including server security, now with secure banking protection.
DETECTION AND RESPONSE THREAT INTELLIGENCE ESET PROTECT MDR ESSENTIAL PROTECTION EXTENDED PROTECTION
Core Components ESET PROTECT Platform ● Modern Endpoint Protection ● File Server Protection ● Advanced Threat Defense ● Full Disk Encryption ● Mail Security ◐ Cloud App Protection ◐ Detection & Response ● Optional Solutions Sharepoint Security ◐ Endpoint Encryption ◐ Authentication ◐ Services Complementary Technical Support ● Premium Support Advanced ● Deployment & Upgrade ● Security Services ● Managed Detection & Response ● ESET PROTECT MDR Accelerate detection, containment and remediation of cybersecurity incidents with ESET expertise via the included Managed Detection and Response (MDR) service. Get prompt assistance from ESET at any hour of the day or night, including weekends and public holidays Unique behavior and reputation-based detection and response that is fully transparent to security teams and gives real-time feedback gathered from over 100 million endpoints in our LiveGrid. Improved protection against ransomware and zero-day threats via cloud-based sandboxing technology.
Backup slides Variety of slides in different styles for your use .
Number One Cybersecurity Company i n EU
1 st Slovak Company to receive ECSO Cybersecurity Made in EU certification
years of complete independence & innovation One of very few private global IT security companies
€578M Annual Revenues
100M Direct Users 1BN+ INTERNET USERS protected by our technology
Leading enterprises entrust their IT security to ESET
195+ Countries & Territories 13 Global R&D Centers
23 offices 1930 employees 13 Research Centers 195+ countries
COURAGE INTEGRITY RELIABILITY PASSION
The beginning
1990’s Era of Computer Viruses
2000’s Era of Computer Worms
Nowadays Era of Advanced Cyberattacks
* Source: blog.feedspot.com/cyber_security_blogs/
The world is changing and so is ESET Compliance Targeted Attacks UEFI File-less attacks Attack Prediction & Response IoT Cyberwarfare Machine Learning Managed Threat Hunting Ransomware