SlideShare a Scribd company logo
1 of 7
Download to read offline
For Businesses with more than 25 seats

www.eset.com
ESET Endpoint Protection Advanced
Whether your business is just starting or

Simple and Straightforward

established, there are a few things you expect

With ESET Business Solutions you can mix and match endpoint protection according to your actual needs, deploying it on a range of platforms
(Windows, Mac, and Linux) and devices: computers, smartphones, tablets, and servers.

from security software you use daily.
At ESET, we feel that running security software

Light on Your System

in the business environment should be easy

Our solutions are built for small footprint, which also makes them suitable for older hardware, saving IT-related costs on hardware upgrades.
In addition, program updates are small and can download from a cenral mirror server.

and simple. That’s why we have created ESET
Business Solutions, a perfect match for any
size business – utilizing our 25 years experience

Easy to Manage
Easily deploy, configure and manage your security software from a single console. It no longer takes a bunch of IT professionals to run your
company’s IT security – but from our remote management console your company security can be tweaked to every last detail.

pioneering the antivirus industry.

endpoint
antivirus

mobile
security

file
security

endpoint
security

mail
security

gateway
security

eset endpoint protection standard
eset endpoint protection advanced
eset secure business
eset secure enterprise
ESET Endpoint Protection Standard
Keep your network clean and protect your endpoints (computers, smartphones, tablets, and fileserver) against emerging threats. ESET
Endpoint Protection Standard provides essential protection for the company network that is easily manageable from a single console.
ESET Endpoint Protection Advanced
In addition to ESET Endpoint Protection Standard, the Advanced version comes with the powerful Web Control, Firewall and Anti-Spam
filter to provide additional layers of protection for the company network and your mobile workforce.

Enquire about ESET Premium
Support for priority access to
IT security professionals 365/24/7

ESET Secure Business
Eliminating email-borne threats at the server level, ESET Secure Business gives your company’s data an extra level of security that
complements the protection of computers, mobile devices and fileservers.
ESET Secure Enterprise
Choose this option if you operate your own Internet gateway server to safeguard your HTTP and FTP communications. In addition, ESET
Secure Enterprise gives you all the products and tools for the maximum level of protection on your endpoints and servers across multiple
platforms.

pioneer of the antivirus industry for 25 years
ESET Endpoint Protection Advanced

Antivirus and Antispyware

Host-based Intrusion Prevention
System (HIPS)

Provides tamper protection and secures the system registry, processes, applications
and files from unauthorized modification. You can customize the behavior of the
system down to every last detail and detect even unknown threats based on suspicious
behavior.

Device Control

Lets you block unauthorized media and devices based on pre-set rules and parameters.
Set access permissions (read/write, read, block) for individual media, devices, users and
groups.

Auto-Scan of Removable Media

Automatically scans USBs, CDs, and DVDs for threats upon insertion to eliminate
autorun and other removable risks. Choose from these scanning options: start
automatically/notify (prompt user)/do not scan.

Cross-platform Protection

ESET Endpoint Antivirus

Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping
your network protected online and off.ESET’s cloud-powered reputation database
increases scanning speed and minimizes false positives.

Exchange files and email attachments among Windows, Mac and Linux endpoints
with confidence that malware targeting any of these platforms will be automatically
detected and eliminated. Prevent Macs from turning into carriers of malware in the
company network.

Low System Demands

Leaves more system resources for programs you use daily. Our software also runs
smoothly on older hardware, saving your time and costs of having to upgrade your
endpoints.

Multiple Log Formats

Save logs in common formats - CSV, plain text, or Windows event log for immediate
analysis or harvesting. Take advantage of data being readable by 3rd party SIEM tools;
RSA enVision is supported directly via a plug-in.

Update Rollback

Revert virus signature and module updates to a known good state in case of encountering
system incompatibilities. Opt to freeze updates temporarily or until manually changed.

ESET NOD32 Antivirus Business Edition for Mac OS X
ESET NOD32 Antivirus Business Edition for Linux Desktop
ESET Endpoint Security for Android
ESET Mobile Security Business Edition
ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris
ESET Endpoint Security
ESET Remote Administrator

See the following page(s) for benefits and features
of the products that are color-coded in grey.

Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.

pioneer of the antivirus industry for 25 years
ESET Endpoint Protection Advanced

Remote Lock

Remote Wipe

Safely deletes all contacts, messages and data on removable memory cards. Advanced
cleaning procedures ensure that it is not be possible to restore wiped data (Android 2.2 and
higher).

GPS Localization

Remotely locates the phone using a remote SMS command and tracks the phone’s GPS
coordinates.

SIM Matching

Stay in control of your company smartphones remotely, even when an unauthorized
SIM card is inserted. The Admin Contacts phone numbers will receive a wealth of
information about the inserted SIM, including the phone number, IMSI and IMEI codes.

Admin Contacts

Set up one or more Admin Contacts for your company mobile fleet to receive all the
important information in the event of a loss or theft.

Call Blocking

Blocks calls from unknown or hidden numbers and also calls to unwanted numbers.
Define a list of allowed/blocked contacts and keep your phone bills under control.

Uninstall Protection

One password controls it all. Only authorized persons will be able to uninstall ESET
Endpoint Security for Android (version 2.2 and higher).

SMS/MMS Antispam

Filters out unwanted SMS/MMS messages. Allows you to define custom blacklists/
whitelists or simply block all unknown numbers.

Real-time Protection

Protects all applications, files and memory cards with the ESET NOD32 proactive
technology optimized for mobile platforms.

Security Audit

An on-demand security audit checks the status of all vital phone functions, including
battery level, Bluetooth status, home network, disk space and running processes.

On-access Scanning

Advanced scanning protects company smartphones and tablets from threats
attempting to access the system via Bluetooth or Wi-Fi.

On-demand Scanning

On-demand Scanning provides reliable scanning and cleaning of integrated memory
and exchangeable media. Scanning of specific folders is also supported.

Remote Administration

Enables you to check the security status of your smartphone fleet, run on-demand
scans, push security policies and set uninstall password. Get overview of the platforms,
OS versions and other information and stay up-to-date on your smartphones’ security.

Administrator Message

ESET Endpoint Antivirus

Locks lost or stolen devices by a remote SMS command. After locking, no unauthorized
person will be able to access data stored on the device.

Allows administrator to push a message to the device with custom text via ESET
Remote Administrator. The message priority can be set to normal, warning or critical
warning.

ESET NOD32 Antivirus Business Edition for Mac OS X
ESET NOD32 Antivirus Business Edition for Linux Desktop
ESET Endpoint Security for Android
ESET Mobile Security Business Edition
ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris

ESET Endpoint Security
ESET Remote Administrator

See the previous and following page(s) for benefits
and features of the products that are color-coded in grey.

Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.

pioneer of the antivirus industry for 25 years
ESET Endpoint Protection Advanced

Antivirus and Antispyware

Eliminates all types of threats including viruses, rootkits, worms and spyware.
Provides real-time on-access scanning of the server-stored data.
ESET Self-defense prevents malware and unauthorized users from disabling the security
of the system.
Powered by the advanced ThreatSense® technology combining speed, accuracy and
minimal system impact.

Cross-platform Protection

Eliminates malware targeting all platforms, including Windows, Mac and Linux
operating systems.
Prevents malware from spreading from one platform to another.

Low System Demands

Smooth Operation
ESET Endpoint Antivirus
ESET NOD32 Antivirus Business Edition for Mac OS X
ESET NOD32 Antivirus Business Edition for Linux Desktop

Delivers proven protection while leaving more system resources for the server’s vital
tasks.
Identification of user accounts used in infiltration attempts.
Password protected uninstallation.
Automatically excludes critical server files.
Automatically detects server roles to exclude critical server files like data stores and
paging files from on-access scanning to decrease overhead.

ESET Endpoint Security for Android
ESET Mobile Security Business Edition
ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris

ESET Endpoint Security
ESET Remote Administrator

See the previous and following page(s) for benefits
and features of the products that are color-coded in grey.

Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.

pioneer of the antivirus industry for 25 years
ESET Endpoint Protection Advanced

Antivirus and Antispyware

Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your
network protected online and off. Optional cloud-powered scanning utilizes our reputation
database for increased scanning speed and minimal false positives.

Host-based Intrusion Prevention
System (HIPS)

Provides tampering protection and protects the system registry, processes, applications and
files from unauthorized modification. You can customize the behavior of the system down to
every last detail and detect even unknown threats based on suspicious behavior.

Web Control

Allows to limit access to select website categories by a way of automatic in-the-cloud
classification. Create detailed rules for user groups to comply with your company policies
and block sites generating high traffic volume.

Trusted Network Detection

Lets you define trusted networks and protect all other connections with strict mode, making
company laptops invisible in public Wi-Fi networks in hotels, airports and at conferences.

Two-way Firewall

Prevents unauthorized access to company network and protects company data from
exposure. Remote administration provides a firewall rule merge wizard that makes
aggregating firewall rules in the network a snap.

Client Antispam

Protects your company communications from spam and email-borne threats. Set whiteand blacklists and self-learning separately for each client or group. The antispam natively
supports Microsoft Outlook and also filters POP3, IMAP, MAPI and HTTP protocols.

Device Control

Lets you block unauthorized media and devices based on pre-set rules and parameters. Set
access permissions (read/write, read, block) for individual media, devices, users and groups.

Component-based Installation

Install any or all of these security components: firewall, antispam, web control, device
control, Microsoft NAP support, and web access protection. Saves disk space by only
installing the modules you need. You can also remotely enable/disable installed modules.

Low System Demands

Ensure proven detection while leaving more system resources for programs you use daily.
Our software also runs smoothly on older hardware, saving your time and costs of having to
upgrade your endpoints.

Multiple Log Formats

Save logs in common formats - CSV, plain text, or Windows event log for immediate analysis
or harvesting. Take advantage of data being readable by 3rd party SIEM tools; RSA enVision is
supported directly via a plug-in.

ESET Endpoint Antivirus
ESET NOD32 Antivirus Business Edition for Mac OS X
ESET NOD32 Antivirus Business Edition for Linux Desktop
ESET Endpoint Security for Android
ESET Mobile Security Business Edition
ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris
ESET Endpoint Security
ESET Remote Administrator

See the previous and following page(s) for benefits
and features of the products that are color-coded in grey.

Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.

pioneer of the antivirus industry for 25 years
ESET Endpoint Protection Advanced

Remote Administration

Manage all servers, endpoints, and even smartphones and virtual machines from a
single console. Support for IPv6 infrastructure makes management of network security
even easier. The comprehensive console interface lets you view all security-related
events, including logs from antivirus, firewall, web control, device control and others.

Real-time Web Dashboard

Access web-based dashboard from anywhere for quick at-a-glance security status using live
streaming of data. Customize the information displayed on the dashboard to get the most
up-to-date information on the security status from the server and clients.

Role-based Management

Assign privileges to different remote administration users and delegate responsibilities
accordingly. The built-in password strength checker and audit functionality ensure that
administrator accounts are properly secured.

Dynamic Client Groups

Create dynamic and static client groups for easier policy enforcement and to address
any pressing issues. Select from these parameters for groups: operating system, client
name mask, IP mask, recent threat detected, and many more. Clients are moved
automatically to the corresponding group if parameters change.

Event Notifications

Specify log and report parameters or choose from more than 50 templates. Have
notification sent immediately or in batches based on custom threshold for securityrelated events.

Randomized Task Execution

Minimizes AV storms on virtual endpoints and reduces resource contention on
networked drives. Random task execution helps offset the effect of simultaneous
system scans on the network performance.

Local Update Server

Have all clients update from a local mirror server and minimize Internet bandwidth
usage. For your mobile workforce define policies to update from ESET online servers
when outside of home network. The local update server supports secured (HTTPS)
communication channel.

Update Rollback

Revert virus signature and module updates to a known good state in case of
encountering system incompatibilities. Opt to freeze updates temporarily or until
manually changed.

Postponed updates

Opt to download from 3 specialized update servers: pre-release (beta users), regular
release (regular users) and postponed release (approx. 12 hours after regular release).
Apply antivirus updates to non-critical systems first, followed by critical ones with the
option of clearing the update cache.

Microsoft NAP Support

Helps resolve compliance issues with company network access policy. You can set
compliance requirements such as age of virus database, antivirus product version,
protection status, availability of antivirus protection, as well as firewall status − and
force database updates.

The ESET Remote Administrator tool comes standard
with each version of ESET Business Solutions.
Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.

Copyright © 1992–2012 ESET, spol. s r. o. ESET, logo ESET,
NOD32, ThreatSense, ThreatSense.Net and/or other
mentioned products of ESET, spol. s r. o., are registered
trademarks of ESET, spol. s r. o. Other here mentioned
companies or products might be registered trademarks of its
proprietors. Produced according to quality standards of ISO
9001:2000.

pioneer of the antivirus industry for 25 years

More Related Content

What's hot

Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityseAppin Ara
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
StandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackStandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackHelpSystems
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYRisman Hatibi
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Brent Muir
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportAjit Gaddam
 
Using Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksUsing Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksIBM Security
 
IS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresAlexander Benoit
 
Security Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating SystemsSecurity Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating SystemsCisco Canada
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0Javier Gonzalez
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)José Ferreiro
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityIntel IT Center
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security EnhancementsPresentologics
 

What's hot (20)

Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
StandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackStandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech Pack
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
Using Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksUsing Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style Attacks
 
IS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions Company Presentation
IS Decisions Company Presentation
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
Security Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating SystemsSecurity Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating Systems
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Ch11
Ch11Ch11
Ch11
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Security
SecuritySecurity
Security
 
Microsoft intune
Microsoft intuneMicrosoft intune
Microsoft intune
 

Similar to ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET

How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
IT security for busines
IT security for businesIT security for busines
IT security for businesAdi Saputra
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9Javier Arrospide
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint ProtectionDan Buckley
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint ProtectionDan Buckley
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Dan Buckley
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US☁ ☁ Gautam T ☁☁
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet TemplateTDSmaker
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General PresentationKsenia Kondratieva
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Svarbiausios ESET technologijos
Svarbiausios ESET technologijosSvarbiausios ESET technologijos
Svarbiausios ESET technologijosBaltimax
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptxNBBNOC
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devicesHCL Technologies
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPJavier Arrospide
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 

Similar to ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET (20)

How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
IT security for busines
IT security for businesIT security for busines
IT security for busines
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet Template
 
Onepager w10 security
Onepager w10 securityOnepager w10 security
Onepager w10 security
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Svarbiausios ESET technologijos
Svarbiausios ESET technologijosSvarbiausios ESET technologijos
Svarbiausios ESET technologijos
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET

  • 1. For Businesses with more than 25 seats www.eset.com
  • 2. ESET Endpoint Protection Advanced Whether your business is just starting or Simple and Straightforward established, there are a few things you expect With ESET Business Solutions you can mix and match endpoint protection according to your actual needs, deploying it on a range of platforms (Windows, Mac, and Linux) and devices: computers, smartphones, tablets, and servers. from security software you use daily. At ESET, we feel that running security software Light on Your System in the business environment should be easy Our solutions are built for small footprint, which also makes them suitable for older hardware, saving IT-related costs on hardware upgrades. In addition, program updates are small and can download from a cenral mirror server. and simple. That’s why we have created ESET Business Solutions, a perfect match for any size business – utilizing our 25 years experience Easy to Manage Easily deploy, configure and manage your security software from a single console. It no longer takes a bunch of IT professionals to run your company’s IT security – but from our remote management console your company security can be tweaked to every last detail. pioneering the antivirus industry. endpoint antivirus mobile security file security endpoint security mail security gateway security eset endpoint protection standard eset endpoint protection advanced eset secure business eset secure enterprise ESET Endpoint Protection Standard Keep your network clean and protect your endpoints (computers, smartphones, tablets, and fileserver) against emerging threats. ESET Endpoint Protection Standard provides essential protection for the company network that is easily manageable from a single console. ESET Endpoint Protection Advanced In addition to ESET Endpoint Protection Standard, the Advanced version comes with the powerful Web Control, Firewall and Anti-Spam filter to provide additional layers of protection for the company network and your mobile workforce. Enquire about ESET Premium Support for priority access to IT security professionals 365/24/7 ESET Secure Business Eliminating email-borne threats at the server level, ESET Secure Business gives your company’s data an extra level of security that complements the protection of computers, mobile devices and fileservers. ESET Secure Enterprise Choose this option if you operate your own Internet gateway server to safeguard your HTTP and FTP communications. In addition, ESET Secure Enterprise gives you all the products and tools for the maximum level of protection on your endpoints and servers across multiple platforms. pioneer of the antivirus industry for 25 years
  • 3. ESET Endpoint Protection Advanced Antivirus and Antispyware Host-based Intrusion Prevention System (HIPS) Provides tamper protection and secures the system registry, processes, applications and files from unauthorized modification. You can customize the behavior of the system down to every last detail and detect even unknown threats based on suspicious behavior. Device Control Lets you block unauthorized media and devices based on pre-set rules and parameters. Set access permissions (read/write, read, block) for individual media, devices, users and groups. Auto-Scan of Removable Media Automatically scans USBs, CDs, and DVDs for threats upon insertion to eliminate autorun and other removable risks. Choose from these scanning options: start automatically/notify (prompt user)/do not scan. Cross-platform Protection ESET Endpoint Antivirus Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your network protected online and off.ESET’s cloud-powered reputation database increases scanning speed and minimizes false positives. Exchange files and email attachments among Windows, Mac and Linux endpoints with confidence that malware targeting any of these platforms will be automatically detected and eliminated. Prevent Macs from turning into carriers of malware in the company network. Low System Demands Leaves more system resources for programs you use daily. Our software also runs smoothly on older hardware, saving your time and costs of having to upgrade your endpoints. Multiple Log Formats Save logs in common formats - CSV, plain text, or Windows event log for immediate analysis or harvesting. Take advantage of data being readable by 3rd party SIEM tools; RSA enVision is supported directly via a plug-in. Update Rollback Revert virus signature and module updates to a known good state in case of encountering system incompatibilities. Opt to freeze updates temporarily or until manually changed. ESET NOD32 Antivirus Business Edition for Mac OS X ESET NOD32 Antivirus Business Edition for Linux Desktop ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Endpoint Security ESET Remote Administrator See the following page(s) for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features. pioneer of the antivirus industry for 25 years
  • 4. ESET Endpoint Protection Advanced Remote Lock Remote Wipe Safely deletes all contacts, messages and data on removable memory cards. Advanced cleaning procedures ensure that it is not be possible to restore wiped data (Android 2.2 and higher). GPS Localization Remotely locates the phone using a remote SMS command and tracks the phone’s GPS coordinates. SIM Matching Stay in control of your company smartphones remotely, even when an unauthorized SIM card is inserted. The Admin Contacts phone numbers will receive a wealth of information about the inserted SIM, including the phone number, IMSI and IMEI codes. Admin Contacts Set up one or more Admin Contacts for your company mobile fleet to receive all the important information in the event of a loss or theft. Call Blocking Blocks calls from unknown or hidden numbers and also calls to unwanted numbers. Define a list of allowed/blocked contacts and keep your phone bills under control. Uninstall Protection One password controls it all. Only authorized persons will be able to uninstall ESET Endpoint Security for Android (version 2.2 and higher). SMS/MMS Antispam Filters out unwanted SMS/MMS messages. Allows you to define custom blacklists/ whitelists or simply block all unknown numbers. Real-time Protection Protects all applications, files and memory cards with the ESET NOD32 proactive technology optimized for mobile platforms. Security Audit An on-demand security audit checks the status of all vital phone functions, including battery level, Bluetooth status, home network, disk space and running processes. On-access Scanning Advanced scanning protects company smartphones and tablets from threats attempting to access the system via Bluetooth or Wi-Fi. On-demand Scanning On-demand Scanning provides reliable scanning and cleaning of integrated memory and exchangeable media. Scanning of specific folders is also supported. Remote Administration Enables you to check the security status of your smartphone fleet, run on-demand scans, push security policies and set uninstall password. Get overview of the platforms, OS versions and other information and stay up-to-date on your smartphones’ security. Administrator Message ESET Endpoint Antivirus Locks lost or stolen devices by a remote SMS command. After locking, no unauthorized person will be able to access data stored on the device. Allows administrator to push a message to the device with custom text via ESET Remote Administrator. The message priority can be set to normal, warning or critical warning. ESET NOD32 Antivirus Business Edition for Mac OS X ESET NOD32 Antivirus Business Edition for Linux Desktop ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Endpoint Security ESET Remote Administrator See the previous and following page(s) for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features. pioneer of the antivirus industry for 25 years
  • 5. ESET Endpoint Protection Advanced Antivirus and Antispyware Eliminates all types of threats including viruses, rootkits, worms and spyware. Provides real-time on-access scanning of the server-stored data. ESET Self-defense prevents malware and unauthorized users from disabling the security of the system. Powered by the advanced ThreatSense® technology combining speed, accuracy and minimal system impact. Cross-platform Protection Eliminates malware targeting all platforms, including Windows, Mac and Linux operating systems. Prevents malware from spreading from one platform to another. Low System Demands Smooth Operation ESET Endpoint Antivirus ESET NOD32 Antivirus Business Edition for Mac OS X ESET NOD32 Antivirus Business Edition for Linux Desktop Delivers proven protection while leaving more system resources for the server’s vital tasks. Identification of user accounts used in infiltration attempts. Password protected uninstallation. Automatically excludes critical server files. Automatically detects server roles to exclude critical server files like data stores and paging files from on-access scanning to decrease overhead. ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Endpoint Security ESET Remote Administrator See the previous and following page(s) for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features. pioneer of the antivirus industry for 25 years
  • 6. ESET Endpoint Protection Advanced Antivirus and Antispyware Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your network protected online and off. Optional cloud-powered scanning utilizes our reputation database for increased scanning speed and minimal false positives. Host-based Intrusion Prevention System (HIPS) Provides tampering protection and protects the system registry, processes, applications and files from unauthorized modification. You can customize the behavior of the system down to every last detail and detect even unknown threats based on suspicious behavior. Web Control Allows to limit access to select website categories by a way of automatic in-the-cloud classification. Create detailed rules for user groups to comply with your company policies and block sites generating high traffic volume. Trusted Network Detection Lets you define trusted networks and protect all other connections with strict mode, making company laptops invisible in public Wi-Fi networks in hotels, airports and at conferences. Two-way Firewall Prevents unauthorized access to company network and protects company data from exposure. Remote administration provides a firewall rule merge wizard that makes aggregating firewall rules in the network a snap. Client Antispam Protects your company communications from spam and email-borne threats. Set whiteand blacklists and self-learning separately for each client or group. The antispam natively supports Microsoft Outlook and also filters POP3, IMAP, MAPI and HTTP protocols. Device Control Lets you block unauthorized media and devices based on pre-set rules and parameters. Set access permissions (read/write, read, block) for individual media, devices, users and groups. Component-based Installation Install any or all of these security components: firewall, antispam, web control, device control, Microsoft NAP support, and web access protection. Saves disk space by only installing the modules you need. You can also remotely enable/disable installed modules. Low System Demands Ensure proven detection while leaving more system resources for programs you use daily. Our software also runs smoothly on older hardware, saving your time and costs of having to upgrade your endpoints. Multiple Log Formats Save logs in common formats - CSV, plain text, or Windows event log for immediate analysis or harvesting. Take advantage of data being readable by 3rd party SIEM tools; RSA enVision is supported directly via a plug-in. ESET Endpoint Antivirus ESET NOD32 Antivirus Business Edition for Mac OS X ESET NOD32 Antivirus Business Edition for Linux Desktop ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Endpoint Security ESET Remote Administrator See the previous and following page(s) for benefits and features of the products that are color-coded in grey. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features. pioneer of the antivirus industry for 25 years
  • 7. ESET Endpoint Protection Advanced Remote Administration Manage all servers, endpoints, and even smartphones and virtual machines from a single console. Support for IPv6 infrastructure makes management of network security even easier. The comprehensive console interface lets you view all security-related events, including logs from antivirus, firewall, web control, device control and others. Real-time Web Dashboard Access web-based dashboard from anywhere for quick at-a-glance security status using live streaming of data. Customize the information displayed on the dashboard to get the most up-to-date information on the security status from the server and clients. Role-based Management Assign privileges to different remote administration users and delegate responsibilities accordingly. The built-in password strength checker and audit functionality ensure that administrator accounts are properly secured. Dynamic Client Groups Create dynamic and static client groups for easier policy enforcement and to address any pressing issues. Select from these parameters for groups: operating system, client name mask, IP mask, recent threat detected, and many more. Clients are moved automatically to the corresponding group if parameters change. Event Notifications Specify log and report parameters or choose from more than 50 templates. Have notification sent immediately or in batches based on custom threshold for securityrelated events. Randomized Task Execution Minimizes AV storms on virtual endpoints and reduces resource contention on networked drives. Random task execution helps offset the effect of simultaneous system scans on the network performance. Local Update Server Have all clients update from a local mirror server and minimize Internet bandwidth usage. For your mobile workforce define policies to update from ESET online servers when outside of home network. The local update server supports secured (HTTPS) communication channel. Update Rollback Revert virus signature and module updates to a known good state in case of encountering system incompatibilities. Opt to freeze updates temporarily or until manually changed. Postponed updates Opt to download from 3 specialized update servers: pre-release (beta users), regular release (regular users) and postponed release (approx. 12 hours after regular release). Apply antivirus updates to non-critical systems first, followed by critical ones with the option of clearing the update cache. Microsoft NAP Support Helps resolve compliance issues with company network access policy. You can set compliance requirements such as age of virus database, antivirus product version, protection status, availability of antivirus protection, as well as firewall status − and force database updates. The ESET Remote Administrator tool comes standard with each version of ESET Business Solutions. Product features may vary depending on operating system. Please consult the individual product pages at www.eset.com for specific product features. Copyright © 1992–2012 ESET, spol. s r. o. ESET, logo ESET, NOD32, ThreatSense, ThreatSense.Net and/or other mentioned products of ESET, spol. s r. o., are registered trademarks of ESET, spol. s r. o. Other here mentioned companies or products might be registered trademarks of its proprietors. Produced according to quality standards of ISO 9001:2000. pioneer of the antivirus industry for 25 years