ESET PROTECT Entry On-Premise
ESET Protect Entry On-Premise
187.431,273.30 Inc.VAT Select options

ESET Protect Entry On-Premise

187.431,273.30 Inc.VAT

  • On-Premises Console
  • Advanced Endpoint Protection
  • File Server Security

For more than 20 users & Support Services, please contact us

Clear
ESET-BUSINESS-SECURITY

ESET Protect Entry On-Premise

ESET Protect Entry Cloud is a scalable and customizable solution that keeps you one step ahead of any threat. Protect your company endpoints, business data and users with ESET's multilayered technology. ESET PROTECT platform offers customizable security solutions, easy to manage from an on-premise console.

ESET PROTECT ENTRY ON-PREMISE SUMMARY

On-Premise Console

✅ Full Security Management - from Prevention to Response
✅ Automated security management and threat remediation
✅ Flexible, comprehensive reporting
✅ Complete network visibility
✅ Includes ESET PROTECT cloud or on-premises

Advanced Endpoint Protection

✅ Comprehensive, cross-platform protection for computers and mobile devices
✅ Block targeted attacks
✅ Stop fileless attacks
✅ Secure Browser
✅ Includes ESET Endpoint Antivirus ESET Endpoint Security

File Server Security

✅ Multilayered protection for the file server system
✅ Safeguard the file storage
✅ Network Attack Protection improves server resilience
✅ Detect advanced persistent threats
✅ Includes ESET Server Security

ESET PROTECT ENTRY ON-PREMISE COMPONENTS

ON-PREMISE CONSOLE

ESET PROTECT provides over 170 built-in reports and allows you to create custom reports from over 1000 data points.

Starting with MFA-protected access, the console is equipped with an advanced Role-Based Access Control (RBAC) system.

Multiple users and permission groups can be created to allow access to a limited portion of the ESET PROTECT console. This allows full streamlining of responsibilities across large enterprise teams.

A ready-to-use solution, integrated with our cloud management console. It’s easy to get started for organizations of any size, as it requires no prerequisites such as certificates or additional components. Cloud MDM covers Android phones, with iOS being on the roadmap.

The support for cloud sandbox greatly improves detection of zero-day threats such as ransomware by quickly analyzing suspicious files in the powerful ESET cloud sandbox.

Organizations can set up multiple policies for the same computer or group and can nest policies for inherited permissions. In addition, organizations can configure policy settings as user-configurable, so you can lock down any number of settings from the end users.

Leave the updating of the console up to us. We’ll do it in the background, and you’ll always be on the latest version with the latest components.

Dynamic groups can sort computers based on current device status or defined inclusion criteria.

ESET PROTECT fully supports SIEM tools and can output all log information in the widely accepted JSON or LEEF format, allowing for integration with Security Operations Centers (SOC).

Full Disk Encryption is native to ESET PROTECT, managing encryption of data on both Windows and Mac (FileVault) endpoints, improving data security and helping organizations solving the problem of data regulation compliance.

Not only does ESET PROTECT report on all installed software applications across an organization, it also reports on installed hardware.

A comprehensive hardware detection algorithm is used to determine the identity of the machine based on its hardware. This allows automated re-imaging and cloning of non-persistent hardware environments. Therefore, ESET’s VDI support requires no manual interaction and is fully automated.

ADVANCED ENDPOINT PROTECTION

All ESET endpoints, including endpoints and mobiles, can be managed from our cloud-based unified management console ESET PROTECT.

ESET’s endpoint protection solutions use threat intelligence information based on their global presence to prioritize and effectively block the newest threats prior to their delivery anywhere else in the world. In addition, our solutions feature cloud-based updating to respond quickly in the case of a missed detection without having to wait for a regular update.

ESET Network Attack Protection improves detection of known vulnerabilities on the network level.

All ESET Endpoint products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks. For an in-depth inspection of the network, admins can turn on the special aggressive machine learning mode that works even without an internet connection. 

An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble ransomware behavior.

ESET is the first endpoint security provider to add a dedicated layer into its solution that protects the Unified Extensible Firmware Interface (UEFI). ESET UEFI Scanner checks and enforces the preboot environment's security and is designed to monitor the integrity of the firmware. If modification is detected, it notifies the user.

ESET Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java and more), and instead of just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.

ESET endpoint protection platforms have mitigations in place to detect malformed or hijacked applications to protect against fileless attacks. Dedicated scanners were also created to constantly check memory for anything suspicious.

Designed to protect an organization’s assets with a special layer of protection that focuses on the browser, as the main tool used to access critical data inside the intranet perimeter and in the cloud. Secure Browser provides enhanced memory protection for the browser process, coupled with keyboard protection, and lets admins add URLs to be protected by it.

ESET Botnet Protection detects malicious communication used by botnets, and at the same time, identifies the offending processes. Any detected malicious communication is blocked and reported to the user.

ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware.

ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognize and stop suspicious system behavior.

ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory. Fileless malware operates without needing persistent components in the file system that can be detected conventionally. Only memory scanning can successfully discover and stop such malicious attacks.

FILE SERVER SECURITY

All ESET products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks.

An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble the behavior of ransomware.

ESET Network Attack Protection improves detection of known vulnerabilities on the network level. It constitutes another important layer of protection against spreading malware, network-conducted attacks, and exploitation of vulnerabilities, for which a patch has not yet been released or deployed.

ESET Botnet Protection detects malicious communication used by botnets, and at the same time, identifies the offending processes. Any detected malicious communication is blocked and reported to the user.

ESET Dynamic Threat Defense provides another layer of security for ESET File Security solutions by utilizing cloud-based sandboxing technology to detect new, never before seen type of threats.

ESET Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java and more), and instead of just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.

ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognize and stop suspicious system behavior.

ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory. Fileless malware operates without needing persistent components in the file system that can be detected conventionally. Only memory scanning can successfully discover and stop such malicious attacks.

ESET provides installers for the most popular distributions of Unix-based systems, including the ‘Ready’ variations of RedHat and SuSE that comply with the File-System-Hierarchy standard. It requires no external libraries except for LIBC.

After registration is done on a single server, ESET has the ability to scan OneDrive to provide visibility and monitor the trusted source of company storage.

ESET products leverage the Antimalware Scan Interface (AMSI) to provide enhanced malware protection for users, data, applications, and workload. In addition, it utilizes the protected service interface that is a new security module built into Windows that only allows trusted, signed code to load and better protect against code injection attacks.

ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware.

ESET PROTECT ENTRY ON-PREMISE SOLUTION

OTHER ESET PROTECT ON-PREMISE SOLUTIONS

ESET Protect Solutions

Additional information

Brand

Protection

Remote Management
Virtualization Security
Endpoint Antivirus
Mobile Security
File Security
Endpoint Security

Security Solution

Advanced Endpoint Protection, Basic Endpoint Protection, On-Premise

Product

Protect Entry On-Premise

Operating System

Microsoft Windows
macOS
Linux

Smartphone / Tablets

Android
iOS

File Security

ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / FreeBSD

Endpoint Security

ESET Endpoint Security for Windows
ESET Endpoint Security for macOS

Virtualization Security

ESET Virtualization Security for VMware NSX
ESET Virtualization Security for VMware vShield
ESET Shared Local Cache

Years

1 Year, 2 Years, 3 Years

Reviews

There are no reviews yet.

Be the first to review “ESET Protect Entry On-Premise”