SlideShare a Scribd company logo
1 of 66
Download to read offline
Do More with ESET’s
new IT security products
for business
ESET – a pioneer of IT security
since 1987
1987 1992 1998
1st version
of NOD antivirus
ESET spol. s. r. o. founded
ESET NOD32 v1.0 wins
its first VB100 award
2009 2010
INC. Magazine ranks ESET
one of America’s
Fastest-Growing Private
Companies
ESET becomes the first
company to
receive 60 VB100
awards
2013
10 years of VB100 awards
2014
Research Breakthrough:
ESET uncovers Windigo
2015
More than one 1000
employees works at
ESET across the world
2016
ESET opens office in
Bournemouth, UK
Europe, Middle East & Africa
Bratislava (Slovakia) – Headquarters
Kosice (Slovakia)
Prague (Czech Republic)
Jablonec nad Nisou (Czech Republic)
Jena (Germany)
Krakow (Poland)
Taunton (UK) – DESlock+
Bournemouth (UK)
North America
San Diego (USA)
Montreal (Canada)
Toronto (Canada)
Latin America
Buenos Aires (Argentina)
Sao Paulo (Brasil)
Asia Pacific
Singapore (Singapore)
Sydney (Australia)
ESET has
15 offices
worldwide
135
EMPLOYEES
1200+
EMPLOYEES
4
FOUNDERS
2006
2016
1987
As the internet has
Grown, so has ESET
Global presence,
global protection
PROTECTED USERS WORLDWIDE
100,000,000
Numerous awards worldwide
ESET received the highest score,
with the least impact on system
performance among all tested
internet security products.
Successive ,Top Rated´ Awards
AV-Comparatives 2015, 2014,
2013, 2012, 2011
In the recent test of Mac OS X
security solutions by AV-TEST, ESET
Endpoint Security for OS X achieved
the best score in each of the tested
parameters.
The only vendor
with record-breaking
protection
Numerous awards worldwide
Voted Security Insider of
Business Antivirus 2015
ESET Mail Security for
Microsoft Exchange Server
earns another maximum score
with no false positives
Antivirus Battle Royale, ESET
receives 9/10 points
ESET Wins PCMag Consumer
Recommended Award for
Security Suites and Stand Alone
Antivirus Software
Numerous awards worldwide
Leading enterprises entrust their
IT security to ESET
Leading enterprises entrust their
IT security to ESET
WHY ESET?
We are focused solely
on IT security – and
nothing else
Our only objective is to keep
your systems secure.
By securing your IT, we
let you Do More with
your business
Our solutions free up
customers’ IT resources.
Our software is easy
to use and won’t
slow your hardware
ESET solutions are famed
for their low system impact
Our technology is among
the best in the world
ESET products have now passed
every VB100 test for over 11
years, also a record.
With rapid ROI, our
solutions pay for
themselves
Almost two-thirds of surveyed
ESET customers say they see a
return on their investment in
less than 6 months.
We operate globally
With offices in Europe, the
Americas and Asia, we have
a sales presence in 180
countries worldwide.
OUR COMPREHENSIVE
RANGE OF BUSINESS
PRODUCTS
DELIVERING
BENEFITS TO
MEDIUM AND LARGE
BUSINESSES
SOLUTION
Built-in Data Access Protection.
ESET Endpoint Security comes
with built-in Anti-Phishing,
Device Control, Web Control,
Firewall and other
functionalities to cover these
security demands.
BENEFIT
No need to pay for and maintain
dedicated tools, or upgrade your
hardware to cope with them.
PROBLEM
We need to manage online and
offline data access but
dedicated tools are expensive,
need additional management,
and increase endpoint hardware
demands.
Built-in Data Access Protection
Lower costs
“
It does what it promised
to do, at reasonable cost.
I like it.
Dooley, Head of IT, Pinewood Healthcare, Ireland
Two-factor Authentication
Mobile capabilities
SOLUTION
ESET Secure Authentication,
our mobile-based two-factor,
one-time password (2FA OTP)
solution, is easy to deploy,
and can be set up in just
10 minutes.
BENEFIT
Only authorized users are able
to access sensitive data.
PROBLEM
We need to be sure that only
authorized users can access our
systems remotely.
It is a relief to know that
our business data
is always secure.
Jake Slegers, Executive Director,
The American Chamber of Commerce in Slovakia
“
Low System Demands
Outstanding usability
SOLUTION
ESET is famous for its low
demands on systems. All our
products are optimized to
ensure high-speed running, as
confirmed by independent
testing.
BENEFIT
Your computers don’t run
slower – and nor do your
people. The result: no more
user complaints.
PROBLEM
IT security solutions slow down
our computers and our people
too, leading to complaints from
users.
We especially liked ESET as it had
very little impact on system
performance…you don’t even know
it’s running.
Prabhat Gautam, IT Head, Oswal Castings Pvt. Ltd, India
“
DELIVERING BENEFITS
TO ENTERPRISES
Automation by Agent
Lower costs
SOLUTION
Automation by Agent: All tasks
are run by an independent
agent directly on the endpoint,
even without connectivity to
ESET Remote Administrator.
Results (logs) are then
synchronized upon connection.
BENEFIT
IT administrators’ day-to-day
tasks are minimized, saving
time and allowing them to focus
on more important or
sophisticated tasks.
PROBLEM
We spend a lot of time on
repetitive day-to-day tasks. And
our mobile workforce isn't
always connected to the
corporate network - so how can
we control security?
Encryption
Mobile capabilities
SOLUTION
Encryption: ESET features an
easy to deploy and manage
encryption solution, which is
scalable according to your
needs.
BENEFIT
ESET encryption keeps company
data secure even if they fall into
the wrong hands.
PROBLEM
Our mobile workforce sends
and receives sensitive data.
What if the data were to fall
into the wrong hands, or if a
laptop were lost or stolen?
As a service provider and working to service-level
agreements, it is reassuring that we can recommend,
procure, commission and support an encryption
solution which helps keep continuity across
Staffordshire educational establishments, reducing
overall costs.
Arnold, CS Team Leader of System Solutions
at Staffordshire Learning Technologies (SLT), UK
“
User-friendly Management Console
Outstanding usability
SOLUTION
Our new web-console combines
extremely user-friendly
interface and data visualization
with drill-down capabilities, and
was developed based on
in-depth consultation with IT
professionals.
BENEFIT
Straightforward IT security
management via a simple yet
powerful web-console, which is
completely intuitive to use and
accessible from anywhere.
PROBLEM
We need a “look & see” security
overview that is easily
accessible, while retaining full
management of IT security.
I have to highlight the overall design and functionality
of ESET Remote Administrator, as well as its
accessibility through the web. The environment is very
intuitive and easy to use. The big advantage is the
ability to create, edit the dashboard in ERA and thus
have an overview of what interests me. Also, facilities
management and licensing has been 100% revised.
Ivan Rábek, IT Manager, DKI Plast, s.r.o., Slovakia
“
ESET for Enterprises
83% of surveyed Large Enterprise
and Medium Enterprise customers chose
ESET security solutions for its light footprint.
TechValidate survey of 263 users of ESET Security Solutions. Source: https://www.techvalidate.com/productresearch/eset-security-solutions/facts/8E4-730-20B
65% of customers switched to ESET because of “Remote
administration dashboard and ease of management"
Light footprint
High malware detection rates with low false positives
Remote administration dashboard and ease of management
TechValidate survey of 1,034 users of ESET Security Solutions. Sample composed of customers who switched to ESET from Trend Micro, Symantec, McAfee, Kaspersky or Sophos answering
question: "What features led you to choose ESET security solutions?" Source: https://www.techvalidate.com/product-research/eset-security-solutions/charts/CA1-A71-146
82% of customers say they switched to ESET
because of its light footprint
Light footprint
High malware detection rates with low false positives
Remote administration dashboard and ease of management
TechValidate survey of 1,034 users of ESET Security Solutions. Sample composed of customers who switched to ESET from Trend Micro, Symantec, McAfee, Kaspersky or Sophos.
Source: https://www.techvalidate.com/productresearch/eset-security-solutions/charts/CA1-A71-146
64% of ESET customers see ROI in less than 6 months,
75% within 9 months.
7 – 9 months
11%
4 – 6 months
28%
0 – 3 months
36%
10 – 12 months
19%
13 – 18 months
3%
18 months
or more
3%
TechValidate survey of 552 users of ESET Security Solutions answering question: "Please estimate how long did it take to realize a return on your investment with ESET security solutions?"
Source: https://www.techvalidate.com/productresearch/eset-security-solutions/charts/3DB-C32-72B
What are the operational benefits you have seen
from deploying ESET security solutions?
Protected organizational intellectual property and data
Increased end-user efficiency
Freed IT resources to pursue other projects
Lowered costs
TechValidate survey of 1,213 users of ESET Security Solutions. Source: https://www.techvalidate.com/product-research/eset-securitysolutions/charts/159-B6C-752
THE NEXT
GENERATION
OF ENDPOINT
SECURITY
How ESET endpoint
security technology
has evolved
1995 2002 2005
Heuristic Detection
Advanced Heuristics
Behavioral Detection
Cloud Malware
Feedback System
in the form of
ESET LiveGrid®
2005 2012
DNA Signatures
Network Attack
Protection
2013
Exploit Blocker
Advanced Memory
Scanner CMPS / DNA
Hash Device Control
2014
Network Attack Protection
v2 – Botnet Protection
ESET Shared Local Cache
2015
Network Attack
Protection v3
Enjoy more peace of
mind when you’re
secured by ESET
“As an IT I’ve been worry-free since the first time we used it
and I’m still worry-free now. It has made my life as an
IT much easier.”
Thony Avestruz, jr.
Senior Technical Support Engineer - Honda Philippines, Inc.
ESET allows you to do more
of what you want and less
of what you don’t
“I thought it was normal that security software installed on
PCs caused slowdowns. But ESET is very much different.
It does its job in the background without us even noticing.”
Hirokazu Minoguchi
IT Division Expert - Mitsubishi Motors
ESET enables you to do more
in multi-platform environment
“I would definitely recommend ESET to other companies
based on performance but also the support too, which is
great. I think the manageability is the best you can get.”
Mark Kaiser
IT Specialist - Unigarant Insurance
What features led our customers to
choose ESET security solutions
Light footprint
High malware detection rates with low false positives
Remote administration dashboard and ease of management
TechValidate survey of 1,272 users of ESET Security Solutions. Source: https://www.techvalidate.com/productresearch/eset-security-solutions/charts/2BE-8F5-CAD
CUTTING-EDGE
TECHNOLOGY
“The biggest thing that stands out is its strong technical
advantage over other products in the marketplace. ESET offers
us reliable security, meaning that I can work on any project at
any time knowing our computers are protected 100%.”
ESET’S
MULTI-LAYERED
APPROACH
TO SECURITY
The more multi-layered your
security, the fewer incidents
you’ll need to resolve
Network Attack Protection
Any detected attack
attempts
are then blocked and
reported to the user.
Network Attack Protection
adds an extra layer of
protection against known
network vulnerabilities for
which a patch has not been
released or deployed yet.
Our technology looks
for exploits
by analyzing the content
of network protocols.
Cloud Malware Protection System
ESET clients learn about
these automated detections
via the ESET LiveGrid
Reputation system without
the need to wait for the next
signature database update.
Suspicious unknown
applications and potential
threats are monitored and
submitted to ESET cloud via the
ESET LiveGrid feedback system.
Collected samples are subjected
to automatic sandboxing and
behavioral analysis, which
results in the creation of
automated signatures where
malicious activity is confirmed.
Exploit Blocker
It blocks any threat,
sending its fingerprint to
ESET LiveGrid toward off
future attacks.
Exploit Blocker is designed
to fortify applications on
users’ systems that are
often exploited.
It keeps a constant
lookout over processes for
any signs of suspicious
activity or behavior.
Advanced Memory Scanner
Any identified malware is
flagged and subsequently
eliminated by this
additional layer of
protection.
Advanced Memory Scanner
uncovers malware which
employs sophisticated
obfuscation and encryption
tricks to avoid detection by
conventional means.
Our technology monitors
the behavior of a
malicious process and
scans it once it decloaks
in the system memory.
Enhanced Botnet Protection
Any detected malicious
communication is blocked
and reported to the user.
Botnet Protection provides
another layer of
network-based detection
to reveal possible running
threats.
It searches outgoing
network communication
for known malicious
patterns, and matches the
remote site against a
blacklist of malicious ones.
Reputation & Cache
Our cloud server logic
automatically evaluates
this data and provides
rapid response via black-
and white-listing.
ESET LiveGrid cloud system
collects threat-related
information from millions of
ESET users to determine file
age and prevalence.
Unkown, previously
unseen threats are
submitted to ESET for
further analysis and
processing.
DNA Detection
Advanced techniques,
such as DNA-based
scanning, identify
threats based on the
code structure.
Our Advanced Heuristics
approach proactively detects
malware we haven't come
across before.
We detect malware based
on its functionality by
uncovering the way it
behaves.
Core strengths in
every product
PROACTIVE
DETECTION
at the core is our award-winning
ESET NOD32® malware detection
technology
SPEED
our technology works
fast, and has the lowest
possible impact on your
systems
USABILITY
designed by IT
professionals for ultimate
ease of use
ESET
ADDING
VALUE
PREMIUM SUPPORT
Provides 24/7 access to senior ESET customer care specialists with
years of experience in IT security for assistance while installing
major upgrades, conducting migrations or any other task.
RIP & REPLACE
from ESET uninstalls all redundant anti-malware solutions
from your system as it installs the latest ESET solution,
resulting in seamless, easy migration.
Svarbiausios ESET technologijos

More Related Content

What's hot

Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Flexera
 
Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...Melina Black
 
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...Mighty Guides, Inc.
 
Intel Symantec Alliance Infographic
Intel Symantec Alliance InfographicIntel Symantec Alliance Infographic
Intel Symantec Alliance InfographicKenn Peterson
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachSridhar Karnam
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...UBM_Design_Central
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance NetworkCollaborators
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?Symantec
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security failEnclaveSecurity
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
 
Wind river webinar deck v1 as of april 23 2014 dw2
Wind river webinar deck v1 as of april 23 2014 dw2Wind river webinar deck v1 as of april 23 2014 dw2
Wind river webinar deck v1 as of april 23 2014 dw2Intel IoT
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Perficient, Inc.
 
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoTAlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoTAlphaGuardian Networks
 

What's hot (20)

Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...
 
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
 
Intel Symantec Alliance Infographic
Intel Symantec Alliance InfographicIntel Symantec Alliance Infographic
Intel Symantec Alliance Infographic
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breach
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
 
BPOS sales deck
BPOS sales deckBPOS sales deck
BPOS sales deck
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Wind river webinar deck v1 as of april 23 2014 dw2
Wind river webinar deck v1 as of april 23 2014 dw2Wind river webinar deck v1 as of april 23 2014 dw2
Wind river webinar deck v1 as of april 23 2014 dw2
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoTAlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
 

Viewers also liked (20)

Malcha nov12 shilav deal
Malcha nov12 shilav dealMalcha nov12 shilav deal
Malcha nov12 shilav deal
 
Erosic3b3n educacic3b3n-y-pedagogc3ada-h-lenoir
Erosic3b3n educacic3b3n-y-pedagogc3ada-h-lenoirErosic3b3n educacic3b3n-y-pedagogc3ada-h-lenoir
Erosic3b3n educacic3b3n-y-pedagogc3ada-h-lenoir
 
3 de maig trobada novel·la negra rural a la llibreria serret
3 de maig trobada novel·la negra rural a la llibreria serret3 de maig trobada novel·la negra rural a la llibreria serret
3 de maig trobada novel·la negra rural a la llibreria serret
 
i
ii
i
 
Diagnóstico de prueba
Diagnóstico de pruebaDiagnóstico de prueba
Diagnóstico de prueba
 
Criterio sucursal
Criterio sucursalCriterio sucursal
Criterio sucursal
 
El bosque
El bosqueEl bosque
El bosque
 
Logogif
LogogifLogogif
Logogif
 
Revista Yes Cosmetics - Ciclo 01 - janeiro 2014
Revista Yes Cosmetics - Ciclo 01 - janeiro 2014Revista Yes Cosmetics - Ciclo 01 - janeiro 2014
Revista Yes Cosmetics - Ciclo 01 - janeiro 2014
 
U Villas Rendering
U Villas RenderingU Villas Rendering
U Villas Rendering
 
La presi¢n arterial y su salud
La presi¢n arterial y su saludLa presi¢n arterial y su salud
La presi¢n arterial y su salud
 
Xgfvdfgv
XgfvdfgvXgfvdfgv
Xgfvdfgv
 
Tesis5xx
Tesis5xxTesis5xx
Tesis5xx
 
Kishor_Resume experi
Kishor_Resume experiKishor_Resume experi
Kishor_Resume experi
 
Las drogas
Las drogasLas drogas
Las drogas
 
Cyzone-março 2013
Cyzone-março 2013Cyzone-março 2013
Cyzone-março 2013
 
Invitación iii juegos
Invitación iii juegosInvitación iii juegos
Invitación iii juegos
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ipa pics fall 2016
Ipa pics fall 2016Ipa pics fall 2016
Ipa pics fall 2016
 
Creating a Future Proof Taxonomy
Creating a Future Proof TaxonomyCreating a Future Proof Taxonomy
Creating a Future Proof Taxonomy
 

Similar to Svarbiausios ESET technologijos

ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
SecureDELTA - Pitch Deck Gallery - Innovation Labs
SecureDELTA - Pitch Deck Gallery - Innovation LabsSecureDELTA - Pitch Deck Gallery - Innovation Labs
SecureDELTA - Pitch Deck Gallery - Innovation Labsstartupro
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional BrochureKaganMinare
 
looksoftware Case Study: All Out Security
looksoftware Case Study: All Out Securitylooksoftware Case Study: All Out Security
looksoftware Case Study: All Out SecurityFresche Solutions
 
Rhea corporate presentation v2
Rhea corporate presentation v2Rhea corporate presentation v2
Rhea corporate presentation v2Mark Adam
 
PT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefPT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefValery Boronin
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite
 
It's safer to be OK! v2.53
It's safer to be OK! v2.53It's safer to be OK! v2.53
It's safer to be OK! v2.53Manuel Mejías
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 

Similar to Svarbiausios ESET technologijos (20)

ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
SecureDELTA - Pitch Deck Gallery - Innovation Labs
SecureDELTA - Pitch Deck Gallery - Innovation LabsSecureDELTA - Pitch Deck Gallery - Innovation Labs
SecureDELTA - Pitch Deck Gallery - Innovation Labs
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional Brochure
 
looksoftware Case Study: All Out Security
looksoftware Case Study: All Out Securitylooksoftware Case Study: All Out Security
looksoftware Case Study: All Out Security
 
Rhea corporate presentation v2
Rhea corporate presentation v2Rhea corporate presentation v2
Rhea corporate presentation v2
 
PT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefPT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product brief
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Presentation 1
Presentation 1Presentation 1
Presentation 1
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive Briefing
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
It's safer to be OK! v2.53
It's safer to be OK! v2.53It's safer to be OK! v2.53
It's safer to be OK! v2.53
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Windows 7
Windows 7Windows 7
Windows 7
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 

More from Baltimax

The Tableau Experience Kaunas - TOC Sales and Marketing prezentacija
The Tableau Experience Kaunas - TOC Sales and Marketing prezentacijaThe Tableau Experience Kaunas - TOC Sales and Marketing prezentacija
The Tableau Experience Kaunas - TOC Sales and Marketing prezentacijaBaltimax
 
Bendrasis duomenų apsaugos reglamentas
Bendrasis duomenų apsaugos reglamentasBendrasis duomenų apsaugos reglamentas
Bendrasis duomenų apsaugos reglamentasBaltimax
 
Integruotas IT valdymas ir apsauga su „Axence nVision 9“
Integruotas IT valdymas ir apsauga su „Axence nVision 9“Integruotas IT valdymas ir apsauga su „Axence nVision 9“
Integruotas IT valdymas ir apsauga su „Axence nVision 9“Baltimax
 
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentas
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentasKibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentas
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentasBaltimax
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
RingTime telefoninės sistemos
RingTime telefoninės sistemosRingTime telefoninės sistemos
RingTime telefoninės sistemosBaltimax
 
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimu
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimuRizikos susijusios su nelicencijuotos programinės įrangos naudojimu
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimuBaltimax
 
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...Baltimax
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Baltimax
 
Duomenų praradimo rizika ir atsarginių kopijų svarba
Duomenų praradimo rizika ir atsarginių kopijų svarbaDuomenų praradimo rizika ir atsarginių kopijų svarba
Duomenų praradimo rizika ir atsarginių kopijų svarbaBaltimax
 
"Baltimax" œ– progresīvi risinājumi Jūsu biznesam
"Baltimax" œ– progresīvi risinājumi Jūsu biznesam"Baltimax" œ– progresīvi risinājumi Jūsu biznesam
"Baltimax" œ– progresīvi risinājumi Jūsu biznesamBaltimax
 
„Baltimax“ produktų katalogas
„Baltimax“ produktų katalogas„Baltimax“ produktų katalogas
„Baltimax“ produktų katalogasBaltimax
 

More from Baltimax (12)

The Tableau Experience Kaunas - TOC Sales and Marketing prezentacija
The Tableau Experience Kaunas - TOC Sales and Marketing prezentacijaThe Tableau Experience Kaunas - TOC Sales and Marketing prezentacija
The Tableau Experience Kaunas - TOC Sales and Marketing prezentacija
 
Bendrasis duomenų apsaugos reglamentas
Bendrasis duomenų apsaugos reglamentasBendrasis duomenų apsaugos reglamentas
Bendrasis duomenų apsaugos reglamentas
 
Integruotas IT valdymas ir apsauga su „Axence nVision 9“
Integruotas IT valdymas ir apsauga su „Axence nVision 9“Integruotas IT valdymas ir apsauga su „Axence nVision 9“
Integruotas IT valdymas ir apsauga su „Axence nVision 9“
 
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentas
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentasKibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentas
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentas
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
RingTime telefoninės sistemos
RingTime telefoninės sistemosRingTime telefoninės sistemos
RingTime telefoninės sistemos
 
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimu
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimuRizikos susijusios su nelicencijuotos programinės įrangos naudojimu
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimu
 
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?
 
Duomenų praradimo rizika ir atsarginių kopijų svarba
Duomenų praradimo rizika ir atsarginių kopijų svarbaDuomenų praradimo rizika ir atsarginių kopijų svarba
Duomenų praradimo rizika ir atsarginių kopijų svarba
 
"Baltimax" œ– progresīvi risinājumi Jūsu biznesam
"Baltimax" œ– progresīvi risinājumi Jūsu biznesam"Baltimax" œ– progresīvi risinājumi Jūsu biznesam
"Baltimax" œ– progresīvi risinājumi Jūsu biznesam
 
„Baltimax“ produktų katalogas
„Baltimax“ produktų katalogas„Baltimax“ produktų katalogas
„Baltimax“ produktų katalogas
 

Recently uploaded

Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 

Svarbiausios ESET technologijos

  • 1. Do More with ESET’s new IT security products for business
  • 2. ESET – a pioneer of IT security since 1987
  • 3. 1987 1992 1998 1st version of NOD antivirus ESET spol. s. r. o. founded ESET NOD32 v1.0 wins its first VB100 award
  • 4. 2009 2010 INC. Magazine ranks ESET one of America’s Fastest-Growing Private Companies ESET becomes the first company to receive 60 VB100 awards 2013 10 years of VB100 awards
  • 5. 2014 Research Breakthrough: ESET uncovers Windigo 2015 More than one 1000 employees works at ESET across the world 2016 ESET opens office in Bournemouth, UK
  • 6. Europe, Middle East & Africa Bratislava (Slovakia) – Headquarters Kosice (Slovakia) Prague (Czech Republic) Jablonec nad Nisou (Czech Republic) Jena (Germany) Krakow (Poland) Taunton (UK) – DESlock+ Bournemouth (UK) North America San Diego (USA) Montreal (Canada) Toronto (Canada) Latin America Buenos Aires (Argentina) Sao Paulo (Brasil) Asia Pacific Singapore (Singapore) Sydney (Australia) ESET has 15 offices worldwide
  • 8. Global presence, global protection PROTECTED USERS WORLDWIDE 100,000,000
  • 9. Numerous awards worldwide ESET received the highest score, with the least impact on system performance among all tested internet security products. Successive ,Top Rated´ Awards AV-Comparatives 2015, 2014, 2013, 2012, 2011 In the recent test of Mac OS X security solutions by AV-TEST, ESET Endpoint Security for OS X achieved the best score in each of the tested parameters.
  • 10. The only vendor with record-breaking protection Numerous awards worldwide Voted Security Insider of Business Antivirus 2015 ESET Mail Security for Microsoft Exchange Server earns another maximum score with no false positives
  • 11. Antivirus Battle Royale, ESET receives 9/10 points ESET Wins PCMag Consumer Recommended Award for Security Suites and Stand Alone Antivirus Software Numerous awards worldwide
  • 12. Leading enterprises entrust their IT security to ESET
  • 13. Leading enterprises entrust their IT security to ESET
  • 15. We are focused solely on IT security – and nothing else Our only objective is to keep your systems secure. By securing your IT, we let you Do More with your business Our solutions free up customers’ IT resources. Our software is easy to use and won’t slow your hardware ESET solutions are famed for their low system impact
  • 16. Our technology is among the best in the world ESET products have now passed every VB100 test for over 11 years, also a record. With rapid ROI, our solutions pay for themselves Almost two-thirds of surveyed ESET customers say they see a return on their investment in less than 6 months. We operate globally With offices in Europe, the Americas and Asia, we have a sales presence in 180 countries worldwide.
  • 17. OUR COMPREHENSIVE RANGE OF BUSINESS PRODUCTS
  • 18.
  • 19.
  • 21. SOLUTION Built-in Data Access Protection. ESET Endpoint Security comes with built-in Anti-Phishing, Device Control, Web Control, Firewall and other functionalities to cover these security demands. BENEFIT No need to pay for and maintain dedicated tools, or upgrade your hardware to cope with them. PROBLEM We need to manage online and offline data access but dedicated tools are expensive, need additional management, and increase endpoint hardware demands. Built-in Data Access Protection Lower costs
  • 22. “ It does what it promised to do, at reasonable cost. I like it. Dooley, Head of IT, Pinewood Healthcare, Ireland
  • 23. Two-factor Authentication Mobile capabilities SOLUTION ESET Secure Authentication, our mobile-based two-factor, one-time password (2FA OTP) solution, is easy to deploy, and can be set up in just 10 minutes. BENEFIT Only authorized users are able to access sensitive data. PROBLEM We need to be sure that only authorized users can access our systems remotely.
  • 24. It is a relief to know that our business data is always secure. Jake Slegers, Executive Director, The American Chamber of Commerce in Slovakia “
  • 25. Low System Demands Outstanding usability SOLUTION ESET is famous for its low demands on systems. All our products are optimized to ensure high-speed running, as confirmed by independent testing. BENEFIT Your computers don’t run slower – and nor do your people. The result: no more user complaints. PROBLEM IT security solutions slow down our computers and our people too, leading to complaints from users.
  • 26. We especially liked ESET as it had very little impact on system performance…you don’t even know it’s running. Prabhat Gautam, IT Head, Oswal Castings Pvt. Ltd, India “
  • 28. Automation by Agent Lower costs SOLUTION Automation by Agent: All tasks are run by an independent agent directly on the endpoint, even without connectivity to ESET Remote Administrator. Results (logs) are then synchronized upon connection. BENEFIT IT administrators’ day-to-day tasks are minimized, saving time and allowing them to focus on more important or sophisticated tasks. PROBLEM We spend a lot of time on repetitive day-to-day tasks. And our mobile workforce isn't always connected to the corporate network - so how can we control security?
  • 29. Encryption Mobile capabilities SOLUTION Encryption: ESET features an easy to deploy and manage encryption solution, which is scalable according to your needs. BENEFIT ESET encryption keeps company data secure even if they fall into the wrong hands. PROBLEM Our mobile workforce sends and receives sensitive data. What if the data were to fall into the wrong hands, or if a laptop were lost or stolen?
  • 30. As a service provider and working to service-level agreements, it is reassuring that we can recommend, procure, commission and support an encryption solution which helps keep continuity across Staffordshire educational establishments, reducing overall costs. Arnold, CS Team Leader of System Solutions at Staffordshire Learning Technologies (SLT), UK “
  • 31. User-friendly Management Console Outstanding usability SOLUTION Our new web-console combines extremely user-friendly interface and data visualization with drill-down capabilities, and was developed based on in-depth consultation with IT professionals. BENEFIT Straightforward IT security management via a simple yet powerful web-console, which is completely intuitive to use and accessible from anywhere. PROBLEM We need a “look & see” security overview that is easily accessible, while retaining full management of IT security.
  • 32. I have to highlight the overall design and functionality of ESET Remote Administrator, as well as its accessibility through the web. The environment is very intuitive and easy to use. The big advantage is the ability to create, edit the dashboard in ERA and thus have an overview of what interests me. Also, facilities management and licensing has been 100% revised. Ivan Rábek, IT Manager, DKI Plast, s.r.o., Slovakia “
  • 33. ESET for Enterprises 83% of surveyed Large Enterprise and Medium Enterprise customers chose ESET security solutions for its light footprint. TechValidate survey of 263 users of ESET Security Solutions. Source: https://www.techvalidate.com/productresearch/eset-security-solutions/facts/8E4-730-20B
  • 34. 65% of customers switched to ESET because of “Remote administration dashboard and ease of management" Light footprint High malware detection rates with low false positives Remote administration dashboard and ease of management TechValidate survey of 1,034 users of ESET Security Solutions. Sample composed of customers who switched to ESET from Trend Micro, Symantec, McAfee, Kaspersky or Sophos answering question: "What features led you to choose ESET security solutions?" Source: https://www.techvalidate.com/product-research/eset-security-solutions/charts/CA1-A71-146
  • 35. 82% of customers say they switched to ESET because of its light footprint Light footprint High malware detection rates with low false positives Remote administration dashboard and ease of management TechValidate survey of 1,034 users of ESET Security Solutions. Sample composed of customers who switched to ESET from Trend Micro, Symantec, McAfee, Kaspersky or Sophos. Source: https://www.techvalidate.com/productresearch/eset-security-solutions/charts/CA1-A71-146
  • 36. 64% of ESET customers see ROI in less than 6 months, 75% within 9 months. 7 – 9 months 11% 4 – 6 months 28% 0 – 3 months 36% 10 – 12 months 19% 13 – 18 months 3% 18 months or more 3% TechValidate survey of 552 users of ESET Security Solutions answering question: "Please estimate how long did it take to realize a return on your investment with ESET security solutions?" Source: https://www.techvalidate.com/productresearch/eset-security-solutions/charts/3DB-C32-72B
  • 37. What are the operational benefits you have seen from deploying ESET security solutions? Protected organizational intellectual property and data Increased end-user efficiency Freed IT resources to pursue other projects Lowered costs TechValidate survey of 1,213 users of ESET Security Solutions. Source: https://www.techvalidate.com/product-research/eset-securitysolutions/charts/159-B6C-752
  • 39. How ESET endpoint security technology has evolved
  • 40. 1995 2002 2005 Heuristic Detection Advanced Heuristics Behavioral Detection Cloud Malware Feedback System in the form of ESET LiveGrid®
  • 41. 2005 2012 DNA Signatures Network Attack Protection 2013 Exploit Blocker Advanced Memory Scanner CMPS / DNA Hash Device Control
  • 42. 2014 Network Attack Protection v2 – Botnet Protection ESET Shared Local Cache 2015 Network Attack Protection v3
  • 43. Enjoy more peace of mind when you’re secured by ESET
  • 44. “As an IT I’ve been worry-free since the first time we used it and I’m still worry-free now. It has made my life as an IT much easier.” Thony Avestruz, jr. Senior Technical Support Engineer - Honda Philippines, Inc.
  • 45. ESET allows you to do more of what you want and less of what you don’t
  • 46. “I thought it was normal that security software installed on PCs caused slowdowns. But ESET is very much different. It does its job in the background without us even noticing.” Hirokazu Minoguchi IT Division Expert - Mitsubishi Motors
  • 47. ESET enables you to do more in multi-platform environment
  • 48. “I would definitely recommend ESET to other companies based on performance but also the support too, which is great. I think the manageability is the best you can get.” Mark Kaiser IT Specialist - Unigarant Insurance
  • 49. What features led our customers to choose ESET security solutions Light footprint High malware detection rates with low false positives Remote administration dashboard and ease of management TechValidate survey of 1,272 users of ESET Security Solutions. Source: https://www.techvalidate.com/productresearch/eset-security-solutions/charts/2BE-8F5-CAD
  • 51. “The biggest thing that stands out is its strong technical advantage over other products in the marketplace. ESET offers us reliable security, meaning that I can work on any project at any time knowing our computers are protected 100%.”
  • 53. The more multi-layered your security, the fewer incidents you’ll need to resolve
  • 54. Network Attack Protection Any detected attack attempts are then blocked and reported to the user. Network Attack Protection adds an extra layer of protection against known network vulnerabilities for which a patch has not been released or deployed yet. Our technology looks for exploits by analyzing the content of network protocols.
  • 55. Cloud Malware Protection System ESET clients learn about these automated detections via the ESET LiveGrid Reputation system without the need to wait for the next signature database update. Suspicious unknown applications and potential threats are monitored and submitted to ESET cloud via the ESET LiveGrid feedback system. Collected samples are subjected to automatic sandboxing and behavioral analysis, which results in the creation of automated signatures where malicious activity is confirmed.
  • 56. Exploit Blocker It blocks any threat, sending its fingerprint to ESET LiveGrid toward off future attacks. Exploit Blocker is designed to fortify applications on users’ systems that are often exploited. It keeps a constant lookout over processes for any signs of suspicious activity or behavior.
  • 57. Advanced Memory Scanner Any identified malware is flagged and subsequently eliminated by this additional layer of protection. Advanced Memory Scanner uncovers malware which employs sophisticated obfuscation and encryption tricks to avoid detection by conventional means. Our technology monitors the behavior of a malicious process and scans it once it decloaks in the system memory.
  • 58. Enhanced Botnet Protection Any detected malicious communication is blocked and reported to the user. Botnet Protection provides another layer of network-based detection to reveal possible running threats. It searches outgoing network communication for known malicious patterns, and matches the remote site against a blacklist of malicious ones.
  • 59. Reputation & Cache Our cloud server logic automatically evaluates this data and provides rapid response via black- and white-listing. ESET LiveGrid cloud system collects threat-related information from millions of ESET users to determine file age and prevalence. Unkown, previously unseen threats are submitted to ESET for further analysis and processing.
  • 60. DNA Detection Advanced techniques, such as DNA-based scanning, identify threats based on the code structure. Our Advanced Heuristics approach proactively detects malware we haven't come across before. We detect malware based on its functionality by uncovering the way it behaves.
  • 62. PROACTIVE DETECTION at the core is our award-winning ESET NOD32® malware detection technology SPEED our technology works fast, and has the lowest possible impact on your systems USABILITY designed by IT professionals for ultimate ease of use
  • 64. PREMIUM SUPPORT Provides 24/7 access to senior ESET customer care specialists with years of experience in IT security for assistance while installing major upgrades, conducting migrations or any other task.
  • 65. RIP & REPLACE from ESET uninstalls all redundant anti-malware solutions from your system as it installs the latest ESET solution, resulting in seamless, easy migration.