ESET Business Deck cyber security partner

Steventech1 119 views 138 slides Jun 24, 2024
Slide 1
Slide 1 of 138
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126
Slide 127
127
Slide 128
128
Slide 129
129
Slide 130
130
Slide 131
131
Slide 132
132
Slide 133
133
Slide 134
134
Slide 135
135
Slide 136
136
Slide 137
137
Slide 138
138

About This Presentation

antivirus


Slide Content

Contents ESET slide collection - About ESET, Why ESET, Technologies, Products, Solutions Assorted additional slides for your consideration/use Services Slides specific about ESET Services offering are hidden by default (Services slides, Solutions overview with ESET PROTECT MDR etc.) The reason is that these are available in selected markets only Latest version always on Global Hub , including changelog Version: 202 2 - 2-08

Your Cybersecurity Partner

Introducing ESET

About ESET

Number One EU Cybersecurity Company for Business 1Bn+ Internet users protected by our technology 400K+ Business customers 110M Users Trusted by Enterprise customers worldwide About ESET Number One EU Cybersecurity Company for Business 1Bn+ Internet users protected by our technology 400K+ Business customers 110M Users Trusted by Enterprise customers worldwide

About ESET Represented in 202 countries 13 Global R&D Centres Offices in 23 countries Represented in 202 countries 13 Global R&D Centres Offices in 23 countries

APT Protection Top Player About ESET Radicati Market QuadrantSM is copyrighted March 2021 by The Radicati Group, Inc. Reproduction in whole or in part is prohibited without expressed written permission of the Radicati Group. Vendors and products depicted in Radicati Market QuadrantsSM should not be considered an endorsement, but rather a measure of The Radicati Group’s opinion, based on product reviews, primary research studies, vendor interviews, historical data, and other metrics. The Radicati Group intends its Market Quadrants to be one of many information sources that readers use to form opinions and make decisions. Radicati Market QuadrantsSM are time sensitive, designed to depict the landscape of a particular market at a given point in time. The Radicati Group disclaims all warranties as to the accuracy or completeness of such information. The Radicati Group shall have no liability for errors, omissions, or inadequacies in the information contained herein or for interpretations thereof.

Leadership Matrix Champion About ESET The written content of this document represents our interpretation and analysis of information generally available to the public or released by responsible individuals in the subject companies, but is not guaranteed as to accuracy or completeness. It does not contain information provided to us in confidence by the industry. Market data contained in this document represents Canalys’ best estimates based on the information available to it at the time of publication.

Endpoint Prevention and Response v s TCO Strategic Leader About ESET

Regular independent awards for Top vendor Best product About ESET

ISO 27001 Certified ESET is built on security About ESET

Why ESET?

Number One EU Cybersecurity Company for Business 1Bn+ Internet users protected by our technology More than 400K Business customers 110M Users in 202 countries 13 Global R&D Centres Offices in 23 countries About ESET Founded by software engineers in 1987 Reputation built on quality, and reliability Still privately owned by the same founders in 2021 Corporately and financially independent for 34 years Managed according to principles not the stock market Founded by software engineers in 1987 Reputation built on quality, and reliability Still privately owned by the same founders in 2021 Corporately and financially independent for 34 years Managed according to principles not the stock market

ESET Security Reliability Market trends Financial performance Security first Long game TRUST OTHER VENDORS Share price and dividend yield Market trends Reliability Security Shareholder value first Short game $$$ About ESET Focusing on the cause of success , not the symptom

ESET Security Reliability Market trends Financial performance Security first Long game TRUST About ESET

ESET Security Reliability Market trends Financial performance Security first Long game TRUST About ESET

ESET Security Reliability Market trends Financial performance Security first Long game TRUST About ESET Over 2 million facebook followers Global No. 1 Security blog * Latest security trends Proprietary research Security education MITRE contributor * Source: blog.feedspot.com/cyber_security_blogs/

ESET Security Reliability Market trends Financial performance Security first Long game TRUST About ESET

ESET Security Reliability Market trends Financial performance Security first Long game TRUST About ESET

Trust

Technology accelerates human progress Stone tools Fire Spears Language Clothing Everything else Cave painting

Technology accelerates human progress Agriculture Alcohol Bronze Iron Money Everything else Cave painting

Technology accelerates human progress Agriculture Alcohol Bronze Iron Money Everything else Cave painting

Creating new dimensions for criminal activity Technology accelerates human progress 1971 Creeper ELK Cloner 1982 1986 Brain Vienna 1987 1988 Morris AIDS 1989 1990 Chameleon Concept 1995 1996 Boza CIH 1998 1999 Melissa ILOVEYOU 2000 2001 Anna Kournikova Beast 2002 Zeuss 2007 2008 Conficker Stuxnet 2010 2011 Duqu Cryptolocker 2013 2016 Mirai 2018 Thanatos Wannacry Petya NotPetya 2017 Emotet 2020 2021 Pegasus

The number of transistors in a dense integrated circuit doubles about every two years Creating new dimensions for criminal activity Technology accelerates human progress 1971 Creeper ELK Cloner 1982 1986 Brain Vienna 1987 1988 Morris AIDS 1989 1990 Chameleon Concept 1995 1996 Boza CIH 1998 1999 Melissa ILOVEYOU 2000 2001 Anna Kournikova Beast 2002 Zeuss 2007 2008 Conficker Stuxnet 2010 2011 Duqu Cryptolocker 2013 2016 Mirai 2018 Thanatos Wannacry Petya NotPetya 2017 Emotet 2020 2021 Pegasus Moore’s Law Taking the complexity of cyber-threats with it making cyber-security something we must trust to the experts

Trust

ESET TECHNOLOGY

OUR PRINCIPLES High detection Low performance impact Ease of use Reliability

RESPOND PREDICT DETECT PREVENT

RESPOND PREDICT DETECT PREVENT ESET

PREVENT DETECT RESPOND

ESET PROTECT ESET LiveGuard Advanced ESET Inspect Xopero - Backup and Recovery GreyCortex Network Traffic Analysis RESPOND ESET Threat Intelligence Data Feed s - APT Reports Premium - PREDICT ESET PROTECT ESET Endpoint Security ESET LiveGuard Advanced Safetica - Data Loss Prevention GreyCortex Network Traffic Analysis DETECT ESET PROTECT ESET Endpoint Security ESET Virtualization Security ESET Secure Authentication ESET Endpoint Encryption Safetica - Data Loss Prevention PREVENT

MULTI-LAYERED SECURITY ESSENTIAL PROTECTION EXTENDED PROTECTION DETECTION AND RESPONSE THREAT INTELLIGENCE

Core Components ESET PROTECT Platform ● ● ● ● ● Modern Endpoint Protection ● ● ● ● ● File Server Protection ● ● ● ● ● Advanced Threat Defense ● ● ● ● Full Disk Encryption ● ● ● ● Mail Security ● ◐ ◐ Cloud App Protection ● ◐ ◐ Detection & Response ● ● Optional Solutions Sharepoint Security ◐ ◐ ◐ ◐ ◐ Endpoint Encryption ◐ ◐ ◐ ◐ ◐ Authentication ◐ ◐ ◐ ◐ ◐ Services Complementary Technical Support ● ● ● ● ● Premium Support Advanced ◐ ◐ ◐ ◐ ● Deployment & Upgrade ◐ ◐ ◐ ◐ ● Security Services ◐ ◐ ◐ ◐ ● Managed Detection & Response ◐ ● Choose the best ESET protection tier for you

MULTI-LAYERED SECURITY DETECTION AND RESPONSE THREAT INTELLIGENCE ESSENTIAL PROTECTION EXTENDED PROTECTION

Did somebody say Next-Gen ?

1987 30 years ago… NOD was born 1992 ESET founded 2002 Advanced Heuristics 1995 1 st experiments with Machine Learning Heuristic Detection & Behavioral Detection 1998 1 st VB100 Award 1997 Machine Learning algorithms applied in products

2007 Automated detection based on DNA 2008 Centroids project 2005 ThreatSense.net DNA Detections 2011 Automated file reputation system based on DNA Machine Learning based detection 2012 Network Attack Protection Exploit Blocker 2006 Mass Processing Algorithm

2014 Botnet Protection Shared Local Cache 2015 Network Detections 201 8 ESET Enterprise Inspector - EDR 2013 CMPS/DNA Hash Advanced Memory Scanner  Cloud Sandbox 201 7 UEFI scanner Anti-Ransomware Protection 2012 Machine Learning evolution

2019 Deep Behavioral Inspection Isolated Scanner Advanced Machine Learning on the endpoint Global coverage with Security Services for Enterprise 2018 Brute-Force Attack Protection 2020

Machine Learning in ESET Expert system for mass processing Algorithm placing samples on the map 1998 Neural Networks in product 2006 2012 2005 DNA Detections (Online ML)

ESET PRODUCTS

Unified management console for ESET security solutions

MULTI-LAYERED SECURITY

ESET’s security plaform Management console for all OSes Cloud or on-premises deployment Manages all ESET Endpoint Security Products Real-time visibility for: On-premise endpoints Off-premise endpoints Extensive reporting capabilities

Threat prevention, detection and response Fully customizable notification system Single-click incident remediation Dynamic and custom reporting

Hardware and software inventory Software remediation SIEM and SOC support Multi-tenancy support MSP Ready

Automation framework Automated VDI Support Advanced RBAC Fully Scalable

Can be hosted in-house Install for Windows Linux By Virtual Appliance

Multilayered protection across all platforms

MULTI-LAYERED SECURITY

Endpoint protection platform is a security solution deployed on company devices to prevent cyber attacks, detect malicious activity, and provide instant remediation capabilities. ESET Server Security provides advanced protection for all general servers and network file storage, to maintain stable and conflict-free operation and ensure business continuity.

ESET Endpoint Security for Windows/macOS/Android ESET Endpoint Antivirus for Windows/macOS/Linux ESET Endpoint Security for Android ESET MDM for iOS and iPadOS ESET Server Security for Windows Server/Linux/Azure

A single point of protection or a single method of defense is simply not enough. ESET uses multi-layered technologies that go far beyond the capabilities of basic antivirus. ESET’s scanning engine is at the core of our products and, while the underlying technology has been inherited from “old-style antivirus,” it has been greatly extended and enhanced and is constantly being developed to cover modern threats.

LiveGrid ® Protection Botnet Protection Ransomware Shield Advanced Memory Scanner Exploit Blocker Script Scanner & AMSI Deep Behavioral Inspection Reputation and Cache UEFI Scanner Device Control Brute-Force Attack Protection In-Product Sandbox DNA Detections Network Attack Protection POST EXECUTION EXECUTION PRE-EXECUTION Advanced Machine Learning Secure Browser Fence CCTV Smoke Detector Motion Sensor Guard Dog Security System Fire Alarm Key Fire Sprinkler Vault

LiveGrid ® Protection Botnet Protection Ransomware Shield Advanced Memory Scanner Exploit Blocker Script Scanner & AMSI Deep Behavioral Inspection Reputation and Cache UEFI Scanner Device Control Brute-Force Attack Protection In-Product Sandbox DNA Detections Network Attack Protection POST EXECUTION EXECUTION PRE-EXECUTION Advanced Machine Learning Secure Browser

ESET LiveGrid® Protection Advanced early warning system comprised of several cloud-based technologies. Helps detect emerging threats based on reputation and improves scanning performance by means of whitelisting. New threat information is streamed in real-time to the ESET cloud, which enables the ESET Malware Research Lab to provide timely response and consistent protection at all times.

Antimalware Antiphishing and antispam Network Attack Protection Device control Machine-learning based protection Exploit Blocker Secure Browser Brute force attack protection Android & iOS MDM

Antimalware Multilayered host protection OneDrive and Hyper-V scan Automatic exclusions Integration with ESET PROTECT console

Cross platform support

Complete protection for mail servers, the #1 threat vector

MULTI-LAYERED SECURITY

In-house developed anti-spam, anti-phishing and host server protection. Combining machine learning, big data and human expertise.

Antimalware Antispam Antiphishing Host server protection Machine-learning based protection Robust quarantine management Custer support Hybrid Office 365 scanning

Proactive defense against zero-day and never-before-seen threat types

MULTI-LAYERED SECURITY

Detects zero-day, never-before seen threats Cloud-based sandboxing technology Behavior-based detection

Detects zero-day, never-before seen threats Cloud-based sandboxing technology Behavior-based detection

All samples detailed in ESET Protect console 99% of samples tested in under 5 minutes Works directly with ESET Mail Security Highly configurable endpoint policy All samples detailed in ESET Protect console 99% of samples tested in under 5 minutes Works directly with ESET Mail Security Highly configurable endpoint policy

Protection for Microsoft 365 applications

MULTI-LAYERED SECURITY

Cloud-hosted or not , email remains a key attack vector for spam, malware distribution and phishing Online collaboration tools need to be secured to ensure business continuity

ESET’s track record of 30+ years of innovation in IT security ESET’s Technology advantage: Award-winning antispam, anti-malware and anti-phishing technologies, used in our mature on-premise mail server products, now available for protecting of Microsoft 365

Anti-malware protection for Exchange Online, OneDrive, SharePoint Online and Teams Antispam protection for Exchange Online Anti-phishing protection for Exchange Online ESET LiveGuard Advanced – detection of never-before seen threats Deployment and immediate protection in as little as five minutes

Features Dashboard with detection statistics and filtering Anti-malware protection for Exchange Online Antispam protection for Exchange Online ESET LiveGuard Advanced included Deployment in just 5 minutes Anti-phishing protection for: OneDrive, SharePoint Online and Teams Exchange Online Multitenancy with access management Manage Teams and Sites Comprehensive Logging Policies and automation Quarantine manager Scalability

Multi-factor authentication that's easy to implement and use

MULTI-LAYERED SECURITY

External contractors accessing network from outside Compliance law requiring personal data protection Increasing number of cloud services Poor employee password hygiene Remote workforce related risk Targeted data breaches Helps solve the access and authentication risks: 61% of of breaches involved credential data* *Source: Verizon 2021 Data Breach Investigation Report Helps solve the access and authentication risks:

Works with hardware keys and smartphones No dedicated hardware required Full API and SDK provided Remote management Push authentication 10-minute setup Key Features Works with hardware keys and smartphones No dedicated hardware required Full API and SDK provided Remote management Push authentication 10-minute setup

Data protection for businesses of all sizes

MULTI-LAYERED SECURITY

Robust full disk encryption native to ESET PROTECT Helps you comply with data protection regulations like GDPR and others Monitor encryption on user machines remotely Protects company data with a simple yet powerful solution

Pre-Boot security Full Disk Encryption Manageable via ESET Protect. Remote setup of password policies. Remotely block, invalidate or wipe passwords on managed endpoints All products managed from one console Identity and data protection Cross-platform coverage Single-click deployment Fully validated Features Pre-Boot security Full Disk Encryption Manageable via ESET Protect. Remote setup of password policies. Remotely block, invalidate or wipe passwords on managed endpoints All products managed from one console Identity and data protection Cross-platform coverage Single-click deployment Fully validated

Highly customizable endpoint detection & response

MULTI-LAYERED SECURITY

Detect suspicious activity Identify malicious anomaly Prevent malicious activity Discover what happened Discover how it happened Prevent it happening Discover what happened Discover how it happened Why EDR?

Collects real time events Provides extensive filtering and sorting Uses ESET reputation system Custom notification rules Blocking and remediation Designed for threat hunting Key features Collects real time events Provides extensive filtering and sorting Uses ESET reputation system Custom notification rules Blocking and remediation Designed for threat hunting

Solution for targeted attacks & APTs Detection Visibility Response Find malicious anomaly What is affected? When it happened? How it happened? Block it Remove it

MULTI-LAYERED SECURITY

ESET SERVICES PORTFOLIO PROFESSIONAL SERVICES PREMIUM SUPPORT ESSENTIAL PREMIUM SUPPORT ADVANCED DEPLOYMENT & UPGRADE HEALTHCHECK SECURITY SERVICES DETECTION AND RESPONSE ESSENTIAL DETECTION AND RESPONSE ADVANCED DETECTION AND RESPONSE ULTIMATE

STANDARD SUPPORT PREMIUM SUPPORT ESSENTIAL PREMIUM SUPPORT ADVANCED DEPLOYMENT & UPGRADE HEALTHCHECK Critical Severity (A) Response Time Best effort 2 hours 2 hours – – Serious Severity (B) Response Time Best effort 4 hours 4 hours – – Common Severity (C) Response Time Best effort 1 workday 1 workday – – Support availability 7:00-18:00, business days only 365/24/7 365/24/7 – – Customer Contacts Limited Unlimited Unlimited – – Priority call queuing – ✓ ✓ – – Number of tickets eligible for premium treatment – Limited Unlimited – – Dedicated account manager – – ✓ – – Priority access to development teams – – ✓ – – Proactive Informative Services – – ✓ – – Deployment/Upgrade – – 1 ✓ – Healthcheck – – 1 – ✓ PROFESSIONAL SERVICES OVERVIEW

ACTIVITY CATEGORY ACTIVITY STANDARD SECURITY SUPPORT DETECTION AND RESPONSE ESSENTIAL DETECTION AND RESPONSE ADVANCED DETECTION AND RESPONSE ULTIMATE Response Times Best effort Guaranteed by SLA Guaranteed by SLA Guaranteed by SLA Endpoint Security Support Malware: missing detection ✓ ✓ ✓ ✓ Malware: cleaning problem ✓ ✓ ✓ ✓ Malware: ransomware infection ✓ ✓ ✓ ✓ False positive ✓ ✓ ✓ ✓ General: Suspicious behavior investigation ✓ ✓ ✓ ✓ Incident Investigation & response Basic file analysis – ✓ ✓ ✓ Detailed file analysis – ✓ ✓ ✓ Digital forensic – ✓ ✓ ✓ Digital forensic incident response assistance – ✓ ✓ ✓ EDR Security Support Support – rules – – ✓ ✓ Support – exclusions – – ✓ ✓ General: EI security related question – – ✓ ✓ EI: Initial Optimization – – ✓ ✓ EI: Threat Hunting (on-demand) – – ✓ ✓ EDR Security Service EI: Threat Monitoring – – – ✓ EI: Threat Hunting (proactive) – – – ✓ Supporting Professional Services Deployment & Upgrade – – – ✓ SECURITY SERVICES OVERVIEW

MULTI-LAYERED SECURITY

ESET Support Services A pillar of the satisfaction of customers with ESET FREE for all customers Available in local languages Praised by customers, one of the parts of ESET experience that stands out Local p resence and support

The latest intelligence from the top industry experts

MULTI-LAYERED SECURITY

Threat Intelligence is information about threats that Is frequently updated (very frequently) Contains detailed information Is available in standardized formats … so that organizations can use it to stay on top of security for themselves or for their clients, and integrate it into: SIEMs – Security Information and Event Management SOARs – Security Orchestration, Automation and Response TIPs – Threat Intelligence Platforms

ESET Threat Intelligence Provides real-time global knowledge gathered by ESET experts on targeted attacks, advanced persistent threats, zero-days and botnet activities. Shared in the form of data feeds: JSON and STIX v 2 . formats Via TAXII server, updated several times within one hour I ndicators of C ompromise (IoCs) Out-of-the-box integrations with Threat Intelligence Platforms Botnet feed Domain feed URL feed Malicious files feed IP feed APT feed

Domain feed URL feed Malicious file feed Botnet feed

Seamless network security for connected devices in mobile and fixed networks

Product for Telcos and ISPs Product will protect customers connected to Telco/ISP network (fixed or mobile) It filters malicious domains when users browse the web Parental Control can block restricted content by category (adult, violence, drugs, etc.) Remote management via portal (home admin) Imagine internet security with 1 click and without any technical knowledge by customers

ESET NetProtect   products ESET NetProtect for Mobile Advanced per 1 device | 1 SIM card ESET NetProtect for Home Advanced per router | no device limitations ESET NetProtect for Mobile per 1 device | 1 SIM card ESSENTIAL ADVANCED

ESET NetProtect in detail Mobile network (5G, 4G, 3G, 2G) Fixed network ( Fiber , FWA, xDSL , cable ) Features/Products ESET NetProtect for Mobile (DNS filter-AV) ESET NetProtect for Mobile Advanced DNS filter-AV + Web content filter/On-Net parental ESET NetProtect for Home Advanced DNS filter-AV  + Web content filter/On-Net parental DNS filter | Anti - Malware ✓ ✓ ✓ DNS filter | Potentially Unwanted Content ✓ ✓ ✓ DNS filter | Anti - Phishing ✓ ✓ ✓ Customer Management P ortal ✓ ✓ ✓ W hitelist / B lacklist ✓ ✓ ✓ Security R eport ✓ ✓ ✓ W eb  C ontent  F ilter , categorization with age groups filters ✓ ✓

ESET NetProtect FEATURES On-net protection Protects customer devices connected to Telco/ISP networks (fixed or mobile) against malicious web domains / domain categories such as malware, phishing and PUAs. Children can be protected by Parental Control filters. There is no need for any device software installation. User management control Portals where authorized users (home admins) or Telco admins can manage  NetProtect rules and see logs and usage statistics for connected devices; also includes provisioning & licensing. Off-net protection

ESET NetProtect FEATURES DNS filter | Anti - Malware (Antivirus filters) Provides proactive protection against domains containing files categorized as malicious software and thereby protects users from data leakage and damage to personal devices and prevents malware from spreading. DNS filter | Potentially Unwanted Content Protects users against suspicious domains, or websites hosting unwanted content, by blocking them.

ESET NetProtect FEATURES DNS filter | Anti - Phishing Protects users’ privacy and assets against attempts by fraudulent websites to acquire sensitive information such as usernames, passwords or banking details, or feed fake news from seemingly reputable sources. Protects users from homoglyph attacks (which replace characters in links with ones that look similar but are actually different). Customer Management P ortal Allows users to manage the NetProtect settings of their connected devices and manage their whitelists and blacklists and provides security reports. Based on ISP/Telco options, email management with notifications can be added.

ESET NetProtect FEATURES W hitelist / B lacklist Allows users to manually whitelist blocked domains when sure they are legitimate, and to blacklist inappropriate domains from the management console. Security R eport Security reports give users an insight into how ESET protects their device(s). The summary includes information about detected threats, blocked webpages and more. Web  C ontent filter (On-Net content filtering) Gives users the option to choose from 35 predefined content categories (e.g. adult, violence, aggressive, social media, etc.). Based on the end-user (e.g. corporate, child) you can switch-on/select the level of protection. ADVANCED

MULTI-LAYERED SECURITY ESSENTIAL PROTECTION EXTENDED PROTECTION DETECTION AND RESPONSE THREAT INTELLIGENCE

MULTI-LAYERED SECURITY DETECTION AND RESPONSE THREAT INTELLIGENCE ESSENTIAL PROTECTION EXTENDED PROTECTION

Core Components ESET PROTECT Platform ● ● ● ● ● Modern Endpoint Protection ● ● ● ● ● File Server Protection ● ● ● ● ● Advanced Threat Defense ● ● ● ● Full Disk Encryption ● ● ● ● Mail Security ● ◐ ◐ Cloud App Protection ● ◐ ◐ Detection & Response ● ● Optional Solutions Sharepoint Security ◐ ◐ ◐ ◐ ◐ Endpoint Encryption ◐ ◐ ◐ ◐ ◐ Authentication ◐ ◐ ◐ ◐ ◐ Services Complementary Technical Support ● ● ● ● ● Premium Support Advanced ◐ ◐ ◐ ◐ ● Deployment & Upgrade ◐ ◐ ◐ ◐ ● Security Services ◐ ◐ ◐ ◐ ● Managed Detection & Response ◐ ● Choose the best ESET protection tier for you

Core Components ESET PROTECT Platform ● ● ● ● Modern Endpoint Protection ● ● ● ● File Server Protection ● ● ● ● Advanced Threat Defense ● ● ● Full Disk Encryption ● ● ● Mail Security ● ◐ Cloud App Protection ● ◐ Detection & Response ● Optional Solutions Sharepoint Security ◐ ◐ ◐ ◐ Endpoint Encryption ◐ ◐ ◐ ◐ Authentication ◐ ◐ ◐ ◐ Services Complementary Technical Support ● ● ● ● Premium Support Advanced ◐ ◐ ◐ ◐ Deployment & Upgrade ◐ ◐ ◐ ◐ Security Services ◐ ◐ ◐ ◐ Managed Detection & Response ◐ Choose the best ESET protection tier for you

DETECTION AND RESPONSE THREAT INTELLIGENCE Endpoint Antivirus ESET PROTECT ENTRY ESSENTIAL PROTECTION EXTENDED PROTECTION

Core Components ESET PROTECT Platform ● Modern Endpoint Protection ● File Server Protection ● Advanced Threat Defense Full Disk Encryption Mail Security Cloud App Protection Detection & Response Optional Solutions Sharepoint Security ◐ Endpoint Encryption ◐ Authentication ◐ Services Complementary Technical Support ● Premium Support Advanced ◐ Deployment & Upgrade ◐ Security Services ◐ Managed Detection & Response ESET PROTECT ENTRY Easily accessible ESET PROTECT Cloud console improves the TCO of security management. Single-pane-of-glass remote management for visibility to threats, users and quarantined items. Company endpoints and mobiles protected via advanced multilayered technology, including server security, now with secure intranet and banking protection. Best-in-class endpoint security, utilizing ESET´s verified layered approach (combining the best of all worlds: cloud-based reputation, machine learning, and deep behavioral inspection). Award-winning endpoint protection combines the latest ML techniques with decades of human expertise.

DETECTION AND RESPONSE THREAT INTELLIGENCE ESET PROTECT ADVANCED ESSENTIAL PROTECTION EXTENDED PROTECTION

Core Components ESET PROTECT Platform ● Modern Endpoint Protection ● File Server Protection ● Advanced Threat Defense ● Full Disk Encryption ● Mail Security Cloud App Protection Detection & Response Optional Solutions Sharepoint Security ◐ Endpoint Encryption ◐ Authentication ◐ Services Complementary Technical Support ● Premium Support Advanced ◐ Deployment & Upgrade ◐ Security Services ◐ Managed Detection & Response ESET PROTECT ADVANCED Improved protection against ransomware and zero-day threats via cloud-based sandboxing technology. Helps comply with data regulations thanks to full disk encryption capabilities on Windows and macOS. Easily accessible ESET PROTECT console improves the TCO of security management. Single-pane-of-glass remote management to ensure visibility of threats, users and quarantined items. Company endpoints and mobiles are protected via advanced multilayered technology, including server security, now with secure banking protection.

DETECTION AND RESPONSE THREAT INTELLIGENCE ESET PROTECT COMPLETE ESSENTIAL PROTECTION EXTENDED PROTECTION

Core Components ESET PROTECT Platform ● Modern Endpoint Protection ● File Server Protection ● Advanced Threat Defense ● Full Disk Encryption ● Mail Security ● Cloud App Protection ● Detection & Response Optional Solutions Sharepoint Security ◐ Endpoint Encryption ◐ Authentication ◐ Services Complementary Technical Support ● Premium Support Advanced ◐ Deployment & Upgrade ◐ Security Services ◐ Managed Detection & Response ESET PROTECT COMPLETE Improved protection against ransomware and zero-day threats via cloud-based sandboxing technology. Helps comply with data regulations thanks to full disk encryption capabilities on Windows and macOS. Protection against disruption caused by email-based attacks and malware in Microsoft 365 cloud applications. Easily accessible ESET PROTECT console improves the TCO of security management. Company endpoints and mobiles are protected via advanced multilayered technology, including server security, now with secure banking protection.

DETECTION AND RESPONSE THREAT INTELLIGENCE ESET PROTECT ENTERPRISE ESSENTIAL PROTECTION EXTENDED PROTECTION

Core Components ESET PROTECT Platform ● Modern Endpoint Protection ● File Server Protection ● Advanced Threat Defense ● Full Disk Encryption ● Mail Security ◐ Cloud App Protection ◐ Detection & Response ● Optional Solutions Sharepoint Security ◐ Endpoint Encryption ◐ Authentication ◐ Services Complementary Technical Support ● Premium Support Advanced ◐ Deployment & Upgrade ◐ Security Services ◐ Managed Detection & Response ◐ ESET PROTECT ENTERPRISE Unique behavior and reputation-based detection and response that is fully transparent to security teams and gives real-time feedback gathered from over 100 million endpoints in our LiveGrid. Improved protection against ransomware and zero-day threats via cloud-based sandboxing technology. Helps comply with data regulations thanks to full disk encryption capabilities on Windows and macOS. Company endpoints and mobiles are protected via advanced multilayered technology, including server security, now with secure banking protection.

DETECTION AND RESPONSE THREAT INTELLIGENCE ESET PROTECT MDR ESSENTIAL PROTECTION EXTENDED PROTECTION

Core Components ESET PROTECT Platform ● Modern Endpoint Protection ● File Server Protection ● Advanced Threat Defense ● Full Disk Encryption ● Mail Security ◐ Cloud App Protection ◐ Detection & Response ● Optional Solutions Sharepoint Security ◐ Endpoint Encryption ◐ Authentication ◐ Services Complementary Technical Support ● Premium Support Advanced ● Deployment & Upgrade ● Security Services ● Managed Detection & Response ● ESET PROTECT MDR Accelerate detection, containment and remediation of cybersecurity incidents with ESET expertise via the included Managed Detection and Response (MDR) service. Get prompt assistance from ESET at any hour of the day or night, including weekends and public holidays Unique behavior and reputation-based detection and response that is fully transparent to security teams and gives real-time feedback gathered from over 100 million endpoints in our LiveGrid. Improved protection against ransomware and zero-day threats via cloud-based sandboxing technology.

Backup slides Variety of slides in different styles for your use .

Number One Cybersecurity Company i n EU

1 st Slovak Company to receive ECSO Cybersecurity Made in EU certification

years of complete independence & innovation One of very few private global IT security companies

€578M Annual Revenues

100M Direct Users 1BN+ INTERNET USERS protected by our technology

Leading enterprises entrust their IT security to ESET

195+ Countries & Territories 13 Global R&D Centers

23 offices 1930 employees 13 Research Centers 195+ countries

COURAGE INTEGRITY RELIABILITY PASSION

The beginning

1990’s Era of Computer Viruses

2000’s Era of Computer Worms

Nowadays Era of Advanced Cyberattacks

* Source: blog.feedspot.com/cyber_security_blogs/

The world is changing and so is ESET Compliance Targeted Attacks UEFI File-less attacks Attack Prediction & Response IoT Cyberwarfare Machine Learning Managed Threat Hunting Ransomware

Cybersecurity Education