3. The Next-gen and Machine Learning buzz
Recent and still current hype on the enterprise is about Next-gen vendors and their
Machine Learning/Artificial Intelligence technology.
4. Cause of Data Breaches
Root cause of data breaches globally from IBM & Ponemon Institute
Report by 2018
5. 4 Main of Malicious & Criminal Attack
1. Ransomware
2. File-less Attacks (PowerShell)
3. Targeted Attacks / APT
4. Vulnerabilities and Exploits
8. Point of Presence (Jakarta, Bekasi, Semarang, Surabaya)
500+ Resellers (Online & Offline Distributions)
Company established in 2008, focusing business in distribution software
9. COMPLIANCE
POLICY
CLOSING
THE LOOP
ESET Endpoint Security
ESET Virtualization Security
ESET Security Management Center
ESET Secure Authentication
ESET Endpoint Encryption
ESET Endpoint Security
ESET Security Management Center
ESET Enterprise Inspector
ESET Dynamic Threat Defense
ESET Enterprise Inspector
ESET Security Management Center
ESET Virus Radar
ESET Threat Intelligence
ESET Dynamic Threat Defense
WeLive Security
NEW
NEW
ESET Holistic Approach to Security
NEW
NEW
13. Low False-positives
Multilayered technology assures best
detection rates and minimal false positives
Human Expertise
World-class security researchers sharing
elite know-how and intelligence
Easy Deployment
Effortless implementation. Single pane of glass,
one-click management for all products
Signature Light-footprint
Lightweight on performance & lowest
impact on network
ESET technologies
16. ESET Business for Linux
NOD32 Antivirus Business
Antivirus & Antispyware
Cloud-based Protection
Cross-platform Protection
Local Quarantine
Machine Learning
Removable Media Blocking
17. ESET for Mobile
Endpoint Security for Android
Antivirus & Antispyware
Anti-Phishing Protection
Anti-Theft
Application Control
Device Security
Machine Learning
On-charger Scan
SMS & Call Filter
iOS Management
Anti-Theft
Application Control
Device Security
iCloud/Passcode Management
Mobile Device Management
Push Account Settings
SMS & Call Filter
Web Content Filtering
18. ESET Security for Server
File Security for Windows Server/Azure
Endpoint Antivirus *
Automatic Exclusions
Azure VM Extension*
Cluster Protection
eShell
Hyper-V Protection
OneDrive Scanner
Processes Exclusions
File Security for Linux/BSD
Antivirus & Antispyware
Cloud-based Protection
Cross-platform Protection
Machine Learning
Web Interface
19. ESET Security for Mail
Mail Security for Exchange/IBM Domino
Endpoint Antivirus *
Automatic Exclusions
Anti-SPAM Protection
Cluster Protection
eShell
Hyper-V Protection
Mailbox Database Scan
Mail Transport Protection
Mail Quarantine
Processes Exclusions
Mail Security for Linux/BSD
Antivirus & Antispyware
Cloud-based Protection
Cross-platform Protection
Machine Learning
Web Interface
Anti-SPAM Protection
Mail Transport Protection
20. ESET Security for Gateway
Security for Kerio
Antivirus & Antispyware
Anti-Stealth
Behavioral Detetcion - HIPS
Cloud-based Protection
Device Control
Local Quarantine
Machine Learning
Web Access Protection
Automatic Exclusions
Cluster Protection
eShell
Gateway Server Protection
Hyper-V Protection
Mail Server Protection
Processes Exclusions
Gateway Security for Linux/BSD
Antivirus & Antispyware
Cloud-based Protection
Cross-platform Protection
Machine Learning
Web Interface
Blacklist & Whitelist
HTTP & FTP Scanning
ICAP Filtering
SafeSquid Proxy Filtering
21. ESET Security for Sharepoint
Security for Sharepoint Server
Endpoint Antivirus *
Automatic Exclusions
Cluster Protection
eShell
Hyper-V Protection
OneDrive Scanner
On-Access Filter
On-Demand Database Scan
Processes Exclusions
User-defined Rules
22. ESET for Virtualization
Virtualization Security Appliance
Agent-less Protection
Antivirus & Antispyware
Cloud-based Protection
Machine Learning
3rd Party Integration
Native Support of NSX
vCenter Supported
Virtual Appliance Support
vMotion Supported
Shared Local Cache Server
Agent-based Protection
Boosted Scanning Speed
No Duplicate Scanning
Hyper-V Supported
Linux Supported
Virtual Appliance Support
23. ESET Security for Threat Analysis
Dynamic Threat Defense
Zero-day Threats Detection
Cloud-based Sandboxing
Automatic File Submission
Manual File Submission
Endpoint Support (Windows)
File Security Support (Windows)
Mail Security Support (Exchange)
Managed by ESMC
24. ESET Security for Threat Analysis
Enterprise Inspector
Endpoint Detection & Response
Incidents Detection
Incidents Management & Response
Data Collection
Indicators of Compromise (IOC) Detection
Anomaly Detection
Behaviour Detection
Policy Violations
Email Notifications by ESMC
25. ESET Security Management Center
On-premise Management Center
Web Console HTTPS Support
Secure per communication (TLS 1.0)
2FA Protected-Login
Interactive Dashboard
Certificates Management
Client & Server Tasks
Computer Group Management
License Management
Notification Management
Package Installer
Policies Management
Quarantine Management
Reports Management
Server Settings
Trigger & Throttling
User Settings
26. ESET Cloud Administrator
On-premise Management Center
Web Console HTTPS Support
Secure per communication (TLS 1.0)
2FA Protected-Login
Interactive Dashboard
Tasks Management
Notification Management
Package Installer
Policies Management
Quarantine Management
Reports Management
27. ESET Business Account
Access ESET Cloud Administrator
Create free trial license
Import & Deactivate license
Overview of license
Share license for branch
User assign for branch
Unit assign for branch
2FA Protected-Login
Integration to ESMC
29. ESET Endpoint Protection Standard
Endpoint Antivirus
File Security
Mobile Security
Virtualization Security
Security Management Center
ESET Endpoint Protection Advance
Endpoint Antivirus
Endpoint Security
File Security
Mobile Security
Virtualization Security
Security Management Center
ESET Secure Business Edition
Endpoint Antivirus
Endpoint Security
File Security
Mobile Security
Virtualization Security
Mail Security
Security Management Center
Business
Solutions
30. ESET Endpoint Protection Standard Cloud
Endpoint Antivirus
File Security
Cloud-based Management Center
ESET Endpoint Protection Advance Cloud
Endpoint Antivirus
Endpoint Security
File Security
Cloud-based Management Center
ESET Secure Business Edition Cloud
Endpoint Antivirus
Endpoint Security
File Security
Mail Security
Cloud-based Management Center
Cloud
Solutions
31. ESET Targeted Attack Protection
Endpoint Protection Platform
Security Management Center
Dynamic Threat Defense
Enterprise Inspector
ESET Dynamic Endpoint Protection
Endpoint Protection Platform
Security Management Center
Dynamic Threat Defense
Enterprise
Solutions
32. Server
Solutions
File Server Security
ESET File Security for Windows
ESET File Security for Linux/Free BSD
ESET File Security for Microsoft Azure
Mail Security
ESET Mail Security for Microsoft Exchange
ESET Mail Security for Linux/Free BSD
ESET Mail Security for IBM Domino
ESET Security for Kerio
SharePoint Security
ESET Security for Microsoft SharePoint
Gateway Security
ESET Gateway Security for Linux/FreeBSD
Virtualization Security
ESET Virtualization Security for VMware
ESET Shared Local Cache
Editor's Notes
4
5
We provide a wide portfolio of business solutions for all major platforms.
And our goal as a security vendor is to provide enterprise customers existing and new tools to be able to close the loop holes to secure their environment.
Besides our existing solutions, we are going to extend our portfolio by additional tools and services.
On the prevent side we have endpoint security products with features like Device control, Network Attack Protection and Advanced Memory Scanner and Botnet protection - to be able to prevent incidents on endpoint layer. As I already mentioned, the basic proactive prevention for the customer is to update the endpoint protection to the latest version as it contains our latest technology.
From the prevention perspective, we also offer multi factor authentication of desktop logins. We also offer the option to enable second factor authentication into Remote Management, this is quite a unique feature among our competitors.
Last but not least, we provide desktop encryption.
On detect part, we have ESET Enterprise Inspector, our Detection and Response solution I will be talking about in few minutes. EDR functionality is becoming a feature of Endpoint protection platform for improved visibility and helping tools for advanced threat detection.
And finally on the predict part, we have ESET Threat Intelligence, ESET Virus Radar and WeLiveSecurity
All the systems report the data to our DNA detections, DNA/HIPS data are sent to LiveGrid, processed there and by utilizing machine learning generation model we create some detection, we create update for AV product, or we update the models internally which can be queried for instant protection and we send the data back to endpoints.