SlideShare a Scribd company logo
1 of 32
IT security for business
Trusted by companies throughout the world
The Cybersecurity
Landscape
The Next-gen and Machine Learning buzz
Recent and still current hype on the enterprise is about Next-gen vendors and their
Machine Learning/Artificial Intelligence technology.
Cause of Data Breaches
Root cause of data breaches globally from IBM & Ponemon Institute
Report by 2018
4 Main of Malicious & Criminal Attack
1. Ransomware
2. File-less Attacks (PowerShell)
3. Targeted Attacks / APT
4. Vulnerabilities and Exploits
WHO WE ARE
110m+
users worldwide
400k+
business customers
200+
countries & territories
13
global R&D centers
NOD is developed by ESET's founders, 1987
1992, ESET, spol. s r.o. is established
Point of Presence (Jakarta, Bekasi, Semarang, Surabaya)
500+ Resellers (Online & Offline Distributions)
Company established in 2008, focusing business in distribution software
COMPLIANCE
POLICY
CLOSING
THE LOOP
ESET Endpoint Security
ESET Virtualization Security
ESET Security Management Center
ESET Secure Authentication
ESET Endpoint Encryption
ESET Endpoint Security
ESET Security Management Center
ESET Enterprise Inspector
ESET Dynamic Threat Defense
ESET Enterprise Inspector
ESET Security Management Center
ESET Virus Radar
ESET Threat Intelligence
ESET Dynamic Threat Defense
WeLive Security
NEW
NEW
ESET Holistic Approach to Security
NEW
NEW
Multi-platform
Heterogeneous environments &
customizable bundled solutions
Universal ESET Unilicense system
Our unique cross-platform security licensing system
Low False-positives
Multilayered technology assures best
detection rates and minimal false positives
Human Expertise
World-class security researchers sharing
elite know-how and intelligence
Easy Deployment
Effortless implementation. Single pane of glass,
one-click management for all products
Signature Light-footprint
Lightweight on performance & lowest
impact on network
ESET technologies
Customized IT security solutions for your organization
Endpoint Antivirus
 Antivirus & Antispyware
 Advanced Memory Scanner
 Behavioral Detection – HIPS
 Cloud-based Protection
 Cross-platform Protection
 Device Control
 Email Client Protection
 In-product Sandbox
 Local Quarantine
 Machine Learning
 SysInspector
 Web Access Protection
ESET Endpoint for Windows/Mac
Endpoint Security
 Anti-SPAM Protection*
 Two-way Firewall
 Web Control
 Anti-Phishing Protection *
 Anti-Stealth*
 Botnet Protection *
 Exploit Blocker*
 Network Attack Protection – IDS*
 Ransomware Shield*
ESET Business for Linux
NOD32 Antivirus Business
 Antivirus & Antispyware
 Cloud-based Protection
 Cross-platform Protection
 Local Quarantine
 Machine Learning
 Removable Media Blocking
ESET for Mobile
Endpoint Security for Android
 Antivirus & Antispyware
 Anti-Phishing Protection
 Anti-Theft
 Application Control
 Device Security
 Machine Learning
 On-charger Scan
 SMS & Call Filter
iOS Management
 Anti-Theft
 Application Control
 Device Security
 iCloud/Passcode Management
 Mobile Device Management
 Push Account Settings
 SMS & Call Filter
 Web Content Filtering
ESET Security for Server
File Security for Windows Server/Azure
 Endpoint Antivirus *
 Automatic Exclusions
 Azure VM Extension*
 Cluster Protection
 eShell
 Hyper-V Protection
 OneDrive Scanner
 Processes Exclusions
File Security for Linux/BSD
 Antivirus & Antispyware
 Cloud-based Protection
 Cross-platform Protection
 Machine Learning
 Web Interface
ESET Security for Mail
Mail Security for Exchange/IBM Domino
 Endpoint Antivirus *
 Automatic Exclusions
 Anti-SPAM Protection
 Cluster Protection
 eShell
 Hyper-V Protection
 Mailbox Database Scan
 Mail Transport Protection
 Mail Quarantine
 Processes Exclusions
Mail Security for Linux/BSD
 Antivirus & Antispyware
 Cloud-based Protection
 Cross-platform Protection
 Machine Learning
 Web Interface
 Anti-SPAM Protection
 Mail Transport Protection
ESET Security for Gateway
Security for Kerio
 Antivirus & Antispyware
 Anti-Stealth
 Behavioral Detetcion - HIPS
 Cloud-based Protection
 Device Control
 Local Quarantine
 Machine Learning
 Web Access Protection
 Automatic Exclusions
 Cluster Protection
 eShell
 Gateway Server Protection
 Hyper-V Protection
 Mail Server Protection
 Processes Exclusions
Gateway Security for Linux/BSD
 Antivirus & Antispyware
 Cloud-based Protection
 Cross-platform Protection
 Machine Learning
 Web Interface
 Blacklist & Whitelist
 HTTP & FTP Scanning
 ICAP Filtering
 SafeSquid Proxy Filtering
ESET Security for Sharepoint
Security for Sharepoint Server
 Endpoint Antivirus *
 Automatic Exclusions
 Cluster Protection
 eShell
 Hyper-V Protection
 OneDrive Scanner
 On-Access Filter
 On-Demand Database Scan
 Processes Exclusions
 User-defined Rules
ESET for Virtualization
Virtualization Security Appliance
 Agent-less Protection
 Antivirus & Antispyware
 Cloud-based Protection
 Machine Learning
 3rd Party Integration
 Native Support of NSX
 vCenter Supported
 Virtual Appliance Support
 vMotion Supported
Shared Local Cache Server
 Agent-based Protection
 Boosted Scanning Speed
 No Duplicate Scanning
 Hyper-V Supported
 Linux Supported
 Virtual Appliance Support
ESET Security for Threat Analysis
Dynamic Threat Defense
 Zero-day Threats Detection
 Cloud-based Sandboxing
 Automatic File Submission
 Manual File Submission
 Endpoint Support (Windows)
 File Security Support (Windows)
 Mail Security Support (Exchange)
 Managed by ESMC
ESET Security for Threat Analysis
Enterprise Inspector
 Endpoint Detection & Response
 Incidents Detection
 Incidents Management & Response
 Data Collection
 Indicators of Compromise (IOC) Detection
 Anomaly Detection
 Behaviour Detection
 Policy Violations
 Email Notifications by ESMC
ESET Security Management Center
 On-premise Management Center
 Web Console HTTPS Support
 Secure per communication (TLS 1.0)
 2FA Protected-Login
 Interactive Dashboard
 Certificates Management
 Client & Server Tasks
 Computer Group Management
 License Management
 Notification Management
 Package Installer
 Policies Management
 Quarantine Management
 Reports Management
 Server Settings
 Trigger & Throttling
 User Settings
ESET Cloud Administrator
 On-premise Management Center
 Web Console HTTPS Support
 Secure per communication (TLS 1.0)
 2FA Protected-Login
 Interactive Dashboard
 Tasks Management
 Notification Management
 Package Installer
 Policies Management
 Quarantine Management
 Reports Management
ESET Business Account
 Access ESET Cloud Administrator
 Create free trial license
 Import & Deactivate license
 Overview of license
 Share license for branch
 User assign for branch
 Unit assign for branch
 2FA Protected-Login
 Integration to ESMC
SOLUTIONS OVERVIEW
ESET Endpoint Protection Standard
 Endpoint Antivirus
 File Security
 Mobile Security
 Virtualization Security
 Security Management Center
ESET Endpoint Protection Advance
 Endpoint Antivirus
 Endpoint Security
 File Security
 Mobile Security
 Virtualization Security
 Security Management Center
ESET Secure Business Edition
 Endpoint Antivirus
 Endpoint Security
 File Security
 Mobile Security
 Virtualization Security
 Mail Security
 Security Management Center
Business
Solutions
ESET Endpoint Protection Standard Cloud
 Endpoint Antivirus
 File Security
 Cloud-based Management Center
ESET Endpoint Protection Advance Cloud
 Endpoint Antivirus
 Endpoint Security
 File Security
 Cloud-based Management Center
ESET Secure Business Edition Cloud
 Endpoint Antivirus
 Endpoint Security
 File Security
 Mail Security
 Cloud-based Management Center
Cloud
Solutions
ESET Targeted Attack Protection
 Endpoint Protection Platform
 Security Management Center
 Dynamic Threat Defense
 Enterprise Inspector
ESET Dynamic Endpoint Protection
 Endpoint Protection Platform
 Security Management Center
 Dynamic Threat Defense
Enterprise
Solutions
Server
Solutions
File Server Security
 ESET File Security for Windows
 ESET File Security for Linux/Free BSD
 ESET File Security for Microsoft Azure
Mail Security
 ESET Mail Security for Microsoft Exchange
 ESET Mail Security for Linux/Free BSD
 ESET Mail Security for IBM Domino
 ESET Security for Kerio
SharePoint Security
 ESET Security for Microsoft SharePoint
Gateway Security
 ESET Gateway Security for Linux/FreeBSD
Virtualization Security
 ESET Virtualization Security for VMware
 ESET Shared Local Cache

More Related Content

What's hot

Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015SLBdiensten
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General PresentationKsenia Kondratieva
 
<marquee>html title testfsdjk34254</marquee>
<marquee>html title testfsdjk34254</marquee><marquee>html title testfsdjk34254</marquee>
<marquee>html title testfsdjk34254</marquee>slideshareperson2
 
odix introduction ransomware prevention in WFH reality 2020
odix introduction ransomware prevention in WFH reality 2020odix introduction ransomware prevention in WFH reality 2020
odix introduction ransomware prevention in WFH reality 2020odix (ODI LTD)
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environmentMASIT MACEDONIA
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3InTTrust S.A.
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecuritySophos Benelux
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!MSHOWTO Bilisim Toplulugu
 
The security story behind critical industrial networks
The security story behind critical industrial networks The security story behind critical industrial networks
The security story behind critical industrial networks odix (ODI LTD)
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentationtechworldvn
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security Zack Fabro
 
McAfee MOVE & Endpoint Security
McAfee MOVE & Endpoint SecurityMcAfee MOVE & Endpoint Security
McAfee MOVE & Endpoint Securitynetlogix
 
MID_Complex_Network_Security_Alex_de_Graaf_EN
MID_Complex_Network_Security_Alex_de_Graaf_ENMID_Complex_Network_Security_Alex_de_Graaf_EN
MID_Complex_Network_Security_Alex_de_Graaf_ENVladyslav Radetsky
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksAkram Qureshi
 

What's hot (20)

Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
<marquee>html title testfsdjk34254</marquee>
<marquee>html title testfsdjk34254</marquee><marquee>html title testfsdjk34254</marquee>
<marquee>html title testfsdjk34254</marquee>
 
odix introduction ransomware prevention in WFH reality 2020
odix introduction ransomware prevention in WFH reality 2020odix introduction ransomware prevention in WFH reality 2020
odix introduction ransomware prevention in WFH reality 2020
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environment
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
 
The security story behind critical industrial networks
The security story behind critical industrial networks The security story behind critical industrial networks
The security story behind critical industrial networks
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentation
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security
 
McAfee MOVE & Endpoint Security
McAfee MOVE & Endpoint SecurityMcAfee MOVE & Endpoint Security
McAfee MOVE & Endpoint Security
 
MID_Complex_Network_Security_Alex_de_Graaf_EN
MID_Complex_Network_Security_Alex_de_Graaf_ENMID_Complex_Network_Security_Alex_de_Graaf_EN
MID_Complex_Network_Security_Alex_de_Graaf_EN
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
 

Similar to IT security for busines

Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Secure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat ProtectionSecure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat ProtectionAmmar Hasayen
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overviewAllessandra Negri
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 FinalVinod Kumar
 
Checkpoint Portfolio.pptx
Checkpoint Portfolio.pptxCheckpoint Portfolio.pptx
Checkpoint Portfolio.pptxMarioCruz664886
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaAndy Shutka
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...PlatformSecurityManagement
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-securityÜstün Koruma
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceDean Iacovelli
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAmazon Web Services
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefingguestb099f64c
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)PT Datacomm Diangraha
 

Similar to IT security for busines (20)

ESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEETESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEET
 
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEETESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
 
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEETESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Secure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat ProtectionSecure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat Protection
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overview
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
 
Checkpoint Portfolio.pptx
Checkpoint Portfolio.pptxCheckpoint Portfolio.pptx
Checkpoint Portfolio.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conference
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - Intel
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)
 

More from Adi Saputra

Chapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs RansomwareChapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs RansomwareAdi Saputra
 
Chapter 2, keamanan email
Chapter 2, keamanan emailChapter 2, keamanan email
Chapter 2, keamanan emailAdi Saputra
 
Chapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirusChapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirusAdi Saputra
 
Uncover security incidents with ESET Enterprise Inspector
Uncover security incidents with ESET Enterprise InspectorUncover security incidents with ESET Enterprise Inspector
Uncover security incidents with ESET Enterprise InspectorAdi Saputra
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseAdi Saputra
 
Pencegahan Enkripsi Ransomware dengan FSRM Windows
Pencegahan Enkripsi Ransomware dengan FSRM WindowsPencegahan Enkripsi Ransomware dengan FSRM Windows
Pencegahan Enkripsi Ransomware dengan FSRM WindowsAdi Saputra
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPAdi Saputra
 
Identify Security Risk in your company with Safetica Auditor
Identify Security Risk in your company with Safetica AuditorIdentify Security Risk in your company with Safetica Auditor
Identify Security Risk in your company with Safetica AuditorAdi Saputra
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionAdi Saputra
 

More from Adi Saputra (9)

Chapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs RansomwareChapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs Ransomware
 
Chapter 2, keamanan email
Chapter 2, keamanan emailChapter 2, keamanan email
Chapter 2, keamanan email
 
Chapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirusChapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirus
 
Uncover security incidents with ESET Enterprise Inspector
Uncover security incidents with ESET Enterprise InspectorUncover security incidents with ESET Enterprise Inspector
Uncover security incidents with ESET Enterprise Inspector
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat Defense
 
Pencegahan Enkripsi Ransomware dengan FSRM Windows
Pencegahan Enkripsi Ransomware dengan FSRM WindowsPencegahan Enkripsi Ransomware dengan FSRM Windows
Pencegahan Enkripsi Ransomware dengan FSRM Windows
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLP
 
Identify Security Risk in your company with Safetica Auditor
Identify Security Risk in your company with Safetica AuditorIdentify Security Risk in your company with Safetica Auditor
Identify Security Risk in your company with Safetica Auditor
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak prevention
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

IT security for busines

  • 1. IT security for business Trusted by companies throughout the world
  • 3. The Next-gen and Machine Learning buzz Recent and still current hype on the enterprise is about Next-gen vendors and their Machine Learning/Artificial Intelligence technology.
  • 4. Cause of Data Breaches Root cause of data breaches globally from IBM & Ponemon Institute Report by 2018
  • 5. 4 Main of Malicious & Criminal Attack 1. Ransomware 2. File-less Attacks (PowerShell) 3. Targeted Attacks / APT 4. Vulnerabilities and Exploits
  • 7. 110m+ users worldwide 400k+ business customers 200+ countries & territories 13 global R&D centers NOD is developed by ESET's founders, 1987 1992, ESET, spol. s r.o. is established
  • 8. Point of Presence (Jakarta, Bekasi, Semarang, Surabaya) 500+ Resellers (Online & Offline Distributions) Company established in 2008, focusing business in distribution software
  • 9. COMPLIANCE POLICY CLOSING THE LOOP ESET Endpoint Security ESET Virtualization Security ESET Security Management Center ESET Secure Authentication ESET Endpoint Encryption ESET Endpoint Security ESET Security Management Center ESET Enterprise Inspector ESET Dynamic Threat Defense ESET Enterprise Inspector ESET Security Management Center ESET Virus Radar ESET Threat Intelligence ESET Dynamic Threat Defense WeLive Security NEW NEW ESET Holistic Approach to Security NEW NEW
  • 10.
  • 12. Universal ESET Unilicense system Our unique cross-platform security licensing system
  • 13. Low False-positives Multilayered technology assures best detection rates and minimal false positives Human Expertise World-class security researchers sharing elite know-how and intelligence Easy Deployment Effortless implementation. Single pane of glass, one-click management for all products Signature Light-footprint Lightweight on performance & lowest impact on network ESET technologies
  • 14. Customized IT security solutions for your organization
  • 15. Endpoint Antivirus  Antivirus & Antispyware  Advanced Memory Scanner  Behavioral Detection – HIPS  Cloud-based Protection  Cross-platform Protection  Device Control  Email Client Protection  In-product Sandbox  Local Quarantine  Machine Learning  SysInspector  Web Access Protection ESET Endpoint for Windows/Mac Endpoint Security  Anti-SPAM Protection*  Two-way Firewall  Web Control  Anti-Phishing Protection *  Anti-Stealth*  Botnet Protection *  Exploit Blocker*  Network Attack Protection – IDS*  Ransomware Shield*
  • 16. ESET Business for Linux NOD32 Antivirus Business  Antivirus & Antispyware  Cloud-based Protection  Cross-platform Protection  Local Quarantine  Machine Learning  Removable Media Blocking
  • 17. ESET for Mobile Endpoint Security for Android  Antivirus & Antispyware  Anti-Phishing Protection  Anti-Theft  Application Control  Device Security  Machine Learning  On-charger Scan  SMS & Call Filter iOS Management  Anti-Theft  Application Control  Device Security  iCloud/Passcode Management  Mobile Device Management  Push Account Settings  SMS & Call Filter  Web Content Filtering
  • 18. ESET Security for Server File Security for Windows Server/Azure  Endpoint Antivirus *  Automatic Exclusions  Azure VM Extension*  Cluster Protection  eShell  Hyper-V Protection  OneDrive Scanner  Processes Exclusions File Security for Linux/BSD  Antivirus & Antispyware  Cloud-based Protection  Cross-platform Protection  Machine Learning  Web Interface
  • 19. ESET Security for Mail Mail Security for Exchange/IBM Domino  Endpoint Antivirus *  Automatic Exclusions  Anti-SPAM Protection  Cluster Protection  eShell  Hyper-V Protection  Mailbox Database Scan  Mail Transport Protection  Mail Quarantine  Processes Exclusions Mail Security for Linux/BSD  Antivirus & Antispyware  Cloud-based Protection  Cross-platform Protection  Machine Learning  Web Interface  Anti-SPAM Protection  Mail Transport Protection
  • 20. ESET Security for Gateway Security for Kerio  Antivirus & Antispyware  Anti-Stealth  Behavioral Detetcion - HIPS  Cloud-based Protection  Device Control  Local Quarantine  Machine Learning  Web Access Protection  Automatic Exclusions  Cluster Protection  eShell  Gateway Server Protection  Hyper-V Protection  Mail Server Protection  Processes Exclusions Gateway Security for Linux/BSD  Antivirus & Antispyware  Cloud-based Protection  Cross-platform Protection  Machine Learning  Web Interface  Blacklist & Whitelist  HTTP & FTP Scanning  ICAP Filtering  SafeSquid Proxy Filtering
  • 21. ESET Security for Sharepoint Security for Sharepoint Server  Endpoint Antivirus *  Automatic Exclusions  Cluster Protection  eShell  Hyper-V Protection  OneDrive Scanner  On-Access Filter  On-Demand Database Scan  Processes Exclusions  User-defined Rules
  • 22. ESET for Virtualization Virtualization Security Appliance  Agent-less Protection  Antivirus & Antispyware  Cloud-based Protection  Machine Learning  3rd Party Integration  Native Support of NSX  vCenter Supported  Virtual Appliance Support  vMotion Supported Shared Local Cache Server  Agent-based Protection  Boosted Scanning Speed  No Duplicate Scanning  Hyper-V Supported  Linux Supported  Virtual Appliance Support
  • 23. ESET Security for Threat Analysis Dynamic Threat Defense  Zero-day Threats Detection  Cloud-based Sandboxing  Automatic File Submission  Manual File Submission  Endpoint Support (Windows)  File Security Support (Windows)  Mail Security Support (Exchange)  Managed by ESMC
  • 24. ESET Security for Threat Analysis Enterprise Inspector  Endpoint Detection & Response  Incidents Detection  Incidents Management & Response  Data Collection  Indicators of Compromise (IOC) Detection  Anomaly Detection  Behaviour Detection  Policy Violations  Email Notifications by ESMC
  • 25. ESET Security Management Center  On-premise Management Center  Web Console HTTPS Support  Secure per communication (TLS 1.0)  2FA Protected-Login  Interactive Dashboard  Certificates Management  Client & Server Tasks  Computer Group Management  License Management  Notification Management  Package Installer  Policies Management  Quarantine Management  Reports Management  Server Settings  Trigger & Throttling  User Settings
  • 26. ESET Cloud Administrator  On-premise Management Center  Web Console HTTPS Support  Secure per communication (TLS 1.0)  2FA Protected-Login  Interactive Dashboard  Tasks Management  Notification Management  Package Installer  Policies Management  Quarantine Management  Reports Management
  • 27. ESET Business Account  Access ESET Cloud Administrator  Create free trial license  Import & Deactivate license  Overview of license  Share license for branch  User assign for branch  Unit assign for branch  2FA Protected-Login  Integration to ESMC
  • 29. ESET Endpoint Protection Standard  Endpoint Antivirus  File Security  Mobile Security  Virtualization Security  Security Management Center ESET Endpoint Protection Advance  Endpoint Antivirus  Endpoint Security  File Security  Mobile Security  Virtualization Security  Security Management Center ESET Secure Business Edition  Endpoint Antivirus  Endpoint Security  File Security  Mobile Security  Virtualization Security  Mail Security  Security Management Center Business Solutions
  • 30. ESET Endpoint Protection Standard Cloud  Endpoint Antivirus  File Security  Cloud-based Management Center ESET Endpoint Protection Advance Cloud  Endpoint Antivirus  Endpoint Security  File Security  Cloud-based Management Center ESET Secure Business Edition Cloud  Endpoint Antivirus  Endpoint Security  File Security  Mail Security  Cloud-based Management Center Cloud Solutions
  • 31. ESET Targeted Attack Protection  Endpoint Protection Platform  Security Management Center  Dynamic Threat Defense  Enterprise Inspector ESET Dynamic Endpoint Protection  Endpoint Protection Platform  Security Management Center  Dynamic Threat Defense Enterprise Solutions
  • 32. Server Solutions File Server Security  ESET File Security for Windows  ESET File Security for Linux/Free BSD  ESET File Security for Microsoft Azure Mail Security  ESET Mail Security for Microsoft Exchange  ESET Mail Security for Linux/Free BSD  ESET Mail Security for IBM Domino  ESET Security for Kerio SharePoint Security  ESET Security for Microsoft SharePoint Gateway Security  ESET Gateway Security for Linux/FreeBSD Virtualization Security  ESET Virtualization Security for VMware  ESET Shared Local Cache

Editor's Notes

  1. 4
  2. 5
  3. We provide a wide portfolio of business solutions for all major platforms. And our goal as a security vendor is to provide enterprise customers existing and new tools to be able to close the loop holes to secure their environment. Besides our existing solutions, we are going to extend our portfolio by additional tools and services. On the prevent side we have endpoint security products with features like Device control, Network Attack Protection and Advanced Memory Scanner and Botnet protection - to be able to prevent incidents on endpoint layer. As I already mentioned, the basic proactive prevention for the customer is to update the endpoint protection to the latest version as it contains our latest technology. From the prevention perspective, we also offer multi factor authentication of desktop logins. We also offer the option to enable second factor authentication into Remote Management, this is quite a unique feature among our competitors. Last but not least, we provide desktop encryption. On detect part, we have ESET Enterprise Inspector, our Detection and Response solution I will be talking about in few minutes. EDR functionality is becoming a feature of Endpoint protection platform for improved visibility and helping tools for advanced threat detection. And finally on the predict part, we have ESET Threat Intelligence, ESET Virus Radar and WeLiveSecurity
  4. All the systems report the data to our DNA detections, DNA/HIPS data are sent to LiveGrid, processed there and by utilizing machine learning generation model we create some detection, we create update for AV product, or we update the models internally which can be queried for instant protection and we send the data back to endpoints.