SlideShare a Scribd company logo
ESET NOD32
The beginnings of ESET


The beginnings of ESET date back to 1987 when two young programming 
enthusiasts, Peter Paško and Miroslav Trnka, discovered one of the early 
computer viruses. They dubbed it “Vienna” and wrote a program for its 
detection. 
 
Many other virus discoveries quickly followed, which sparked the idea to 
devise a universal software solution to counter these then relatively 
unknown computer threats. 
  
 
   
Global Headquarters


           Bratislava, Slovakia
Regional Centers
Research and Development Centers
Presence in more than




countries worldwide
growth over the past 5 years
Protecting




Crore users worldwide
and it means




combined ESS/NOD32 installation
  share on all PCs and laptops
ESET India growth in 2010




 
More than 22 00 000 Indian users trust ESET* 
 
* Total number of Installations 
ESET World Map 2011
Countries where the brand ranks among top 3 (Online Security Brand Tracker 2011 survey)
Top 10 ESET Performance Markets 
  Russia                                                   49,850,000

   Brazil                                31,137,000

  Turkey                                30,415,000

Argentina                  22,782,000

  Mexico                  22,185,000

    India                21,222,000

    USA           18,182,000

Colombia     15,200,000

 Thailand    14,967,000                               Total Brand 
 Ukraine    14,000,000
                                                      Awareness 
ESET in India


 
ESET India growth in last two 
years 300% 
 
MORE than 22 00 000 Indian 
users trust ESET* 
 
* Total number of Installations 
  
ESET Technology
Real-Time Adaptive Scanning Technology


• Engineered to be fast, light and accurate
• ESET solutions are among most effective malware scanners in
  the industry.
• The ThreatSense® technology.
• Combined with global malware intelligence and unobtrusive
  updates
• ESET users get maximum protection at all times.
Real-Time Adaptive Scanning Technology




   VIRUS SIGNATURES       GENERIC SIGNATURES
    Common protection     Future mutations


      CODE ANALYSIS       EMULATION
        Static analysis   Advanced detection
ESET Heuristics
• Heuristics is a technique that implements a set of guidelines or
  rules to solve the problem of detecting known and unknown
  malicious program s. Heuristics helps to detect malware
  behavior, without need to uniquely identify the specific threat
  .
• ESET Smart Security and ESET NOD32 Antivirus use heuristics
  to detect both known and unknown threats and malware.
  Two forms of heuristics are used, passive and active.
Heuristic
Effectiveness
AV-comparatives.org retrospective
testing with detection and false
positives results (May 2007)
Passive heuristics
• Passive heuristics analyze a potential threat as it is scanned, tracing through
  the instructions in the program before passing the code to the processor for
  execution. Passive heuristics look for patterns, routines or program calls that
  indicate malicious behavior. Though an important tool, passive heuristics alone
  are only part of the solution, as there is no single action that a malicious
  program can perform that is not also allowed in a legitimate program. This is
  why the simultaneous use of active heuristics is important.
Active heuristics
• ESET's active heuristic technology creates a virtual computer within the
  scanning engine that allows the scanner to observe what the program might
  do if allowed to run on a real computer. This can reveal potentially malicious
  activities that other detection techniques would not identify.
ESET Live Grid




 Long before cloud computing gained traction in the antimalware industry,
ESET developed a unique cloud-based technology. ESET Live Grid serves as an
early warning system that intercepts hundreds of thousands of new threats
 daily across the globe to keep our clients secure in face of emerging threats.
LIVE GRID
UNILICENSE




ESET Unilicense – allows protecting multiple platforms with a
  single license. ESET security solutions can be deployed on
  operating systems of choice in a mix-and-match fashion.
UNILICENSE:
Multi-Platform Support
ESET for Consumers




 Smart Detection
 Small System Footprint
 Optimized Startup Procedure
V5 Security Features


Advanced HIPS Functionality customize the behavior of the system in greater
detail:
Out of Home Network Detection Alerts the user when connecting to an
unknown network prompting to switch to the Strict Protection mode
Parental Control Protects your family from potentially offensive web content
Enhanced Media Control Automatically scans all USB flash discs, memory cards
and CDs/DVDs for threats.
Gamer Mode Streamlines protection during online sessions for continual security
Putting the user in Control the tools pane view is highly intuitive and
transparent, allowing for quick navigation.
ESET Smart Security 5
 All-in-one internet security suite



      Feature Highlights

      •   Antispam
      •   Antispyware
      •   Anti-rootkit
      •   Personal Firewall
      •   Parental Control
      •   Host Intrusion Prevention System
      •   Gamer Mode
      •   Available in 1 user & 3 user pack
      •   ESET Smart Security 1 user: MRP : Rs. 999
      •   ESET Smart Security 3 user: MRP : Rs. 1999
ESET NOD32 Antivirus 5
Professional Protection for Home Computer, Notebook or Workstation!




                       Feature Highlights

                       •   Antispyware
                       •   Anti-rootkit
                       •   Cloud-Powered Scanning
                       •   Removable Media Management
                       •   Host Intrusion Prevention System
                       •   Gamer Mode
                       •   Low System Footprint
                       •   Available in 3 user pack
                       •   MRP : Rs. 1699
ESET NOD32 Antivirus vs.
                            ESET Smart Security

                                           Safer Malware Protection
Antivirus (ThreatSense® technology)

Antispyware

Host-Based Intrusion Prevention System (HIPS)

Cloud-Enhanced Whitelisting

Removable Media Control

Antirootkit

                                            Smarter Online Safety

Antispam

Intelligent Firewall

Gamer Mode

                                  Stronger Parental Controls and Education

Parental Controls
ESET Mobile Security
Key Features

    ANTI‐THEFT FEAUTRES 
     Remote Lock 
     Remote Wipe 
     GPS Localization 
     SIM Matching 
     Trusted Friend 
     Call Blocking 
     Uninstall Protection 
     
    SECURITY FEATURES 
     SMS/MMS Antispam 
     Realtime Protection 
     Security Audit 
     Onaccess Scanning 
     On demand Scanning 
ESET: SOLUTION FOR SMB

  -- NEW LAUNCH -- 




           18 months of validity 
Endpoint Solutions comes in two versions:
                     ESET Endpoint Security
              ESET Endpoint Antivirus (Lighter version)

  Both solutions combine cloud-powered scanning technology and the
award-winning ThreatSense scanning engine for optimized performance.
Key Features




ESET Remote Administrator: centralized and remote
management software, with role-based privileges,
dynamic client groups, remote installation, notifications,
updates management, web dashboard, and everything the
IT administrator need to keep the endpoints secure and up-   ESET provides Endpoint Security software for Windows, Mac
to-date!                                                     and Linux under the Unilicense concept
ESET Gateway/ File/ Mail Security
                   for Windows/ Linux




Provides proactive and              Delivers comprehensive             Safeguards your email 
lightweight security as your        antimalware protection for your    communication channels with 
business network’s first line of    vital business data in a small     award‐winning antivirus and 
defense against malware and         footprint that ensures             antispam technology that 
other cyberthreats                  optimal server performance         proactively detects known and 
                                                                       emerging malware  
Technology Quadrants

                                                                                                                Extensive Proactive Protection
                             Unreliable Technology                 Well-balanced Protection
  High 




                                                                                                                Detecting Unknown Threats

                                                                                                                False positives <–> High Detection
  Proactive Detection Rate




                                                                                                                Rate

                                              BitDefender                                                       Technologically superior product
                                     GDATA 

                                              Alwil                            Kaspersky           Microsoft 
                                                                                               McAfee 
                                                                    Grisoft AVG 
                                                       Norman                               Symantec 
                                                                                      F‐Secure 
                                                                                             Norman 
  Low 




                             Poor Technology                               Inefficient Technology

                             High                        False Positives                           Low 



Source: AV-Comparatives 2008-2011
 
Virus Bulletin VB100 Awards
Long track record of excellent results Highest Number of VB100 Awards
Highest Number of Advance+ Awards
Performance Overhead

          Superior performance and small footprint at the same time

                                                                                                                                                 Boot Time Test        File Copying         Encoding/Transcoding




                                                                                                            106%




                                                                                                                                                                                                     161%
                                                                                60%
                                            66%




                                                                                                                                                     49%




                                                                                                                                                                         58%




                                                                                                                                                                                               56%
                          45%




                                                                                                 39%




                                                                                                                                                                               63%
                                                                                                                               29%
                                                                                                                   28%
                                                        70%




                                                                          70%




                                                                                                                                     35%
                                                              53%
                                      25%




                                                                                                                                                           52%
                                                                                           32%
                    22%




                                                                                                                         10%




                                                                                                                                                                                      10%
                                                                                                                                           19%
                                                  16%




                                                                    14%
         31%




                                                                                                                                                                                                            31%
                                13%
   12%




                                                                                      9%




                                                                                                                                                                  6%
               3%




                                                                                                       7%




Source: AV-Comparatives 2004-2011
Latest Awards and Achievements




The only company with unbroken             All certification from AV-Test and TUV,
string of 49 VB100 awards (70 overall)   first and only certified Mac OS X product




      Scores high in all tests                Second in Stiftung Warentest
      14 Advanced+ Awards                         and Consumer Reports
Thank You

More Related Content

What's hot

Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Prime Infoserv
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
Angelo Corsaro
 
Exchange server.pptx
Exchange server.pptxExchange server.pptx
Exchange server.pptx
Vignesh kumar
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
Nafaâ TAYACHI
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
SBWebinars
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
prachupanchal
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx
AdiWidyanto2
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
Stelios Krasadakis
 
Citrix XenApp and XenDesktop 7.X
Citrix XenApp and XenDesktop 7.XCitrix XenApp and XenDesktop 7.X
Citrix XenApp and XenDesktop 7.X
Izaak Salman
 
Cloud-Based Big Data Analytics
Cloud-Based Big Data AnalyticsCloud-Based Big Data Analytics
Cloud-Based Big Data Analytics
Sateeshreddy N
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
Hossain Md Shakhawat
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation finalRizwan S
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
milad saber
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
Cristian Garcia G.
 
Message Authentication Requirement-MAC
Message Authentication Requirement-MACMessage Authentication Requirement-MAC
Message Authentication Requirement-MAC
Sou Jana
 

What's hot (20)

Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
 
Exchange server.pptx
Exchange server.pptxExchange server.pptx
Exchange server.pptx
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Citrix XenApp and XenDesktop 7.X
Citrix XenApp and XenDesktop 7.XCitrix XenApp and XenDesktop 7.X
Citrix XenApp and XenDesktop 7.X
 
Cloud-Based Big Data Analytics
Cloud-Based Big Data AnalyticsCloud-Based Big Data Analytics
Cloud-Based Big Data Analytics
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
Soc
SocSoc
Soc
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Message Authentication Requirement-MAC
Message Authentication Requirement-MACMessage Authentication Requirement-MAC
Message Authentication Requirement-MAC
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 

Similar to Eset India General Presentation

Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
MarketingArrowECS_CZ
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
Üstün Koruma
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
MdZabedHossain2
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product InformationZeeshan Humayun
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
Brett L. Scott
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
laonap166
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
university of education,Lahore
 
Sophos
SophosSophos
Sophos
Jean Amani
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
ESET Technology: The multi-layered approach and its effectiveness
ESET Technology: The multi-layered approach and its effectivenessESET Technology: The multi-layered approach and its effectiveness
ESET Technology: The multi-layered approach and its effectiveness
ESET Middle East
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
K7 Total Security Datasheet
K7 Total Security DatasheetK7 Total Security Datasheet
K7 Total Security Datasheet
K7 Computing Pvt Ltd
 

Similar to Eset India General Presentation (20)

Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
cb-EDR-V7_a4_Digital
cb-EDR-V7_a4_Digitalcb-EDR-V7_a4_Digital
cb-EDR-V7_a4_Digital
 
Sophos
SophosSophos
Sophos
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
ESET Technology: The multi-layered approach and its effectiveness
ESET Technology: The multi-layered approach and its effectivenessESET Technology: The multi-layered approach and its effectiveness
ESET Technology: The multi-layered approach and its effectiveness
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 
K7 Total Security Datasheet
K7 Total Security DatasheetK7 Total Security Datasheet
K7 Total Security Datasheet
 

Eset India General Presentation

  • 2. The beginnings of ESET The beginnings of ESET date back to 1987 when two young programming  enthusiasts, Peter Paško and Miroslav Trnka, discovered one of the early  computer viruses. They dubbed it “Vienna” and wrote a program for its  detection.    Many other virus discoveries quickly followed, which sparked the idea to  devise a universal software solution to counter these then relatively  unknown computer threats.          
  • 3. Global Headquarters Bratislava, Slovakia
  • 6. Presence in more than countries worldwide
  • 7. growth over the past 5 years
  • 9. and it means combined ESS/NOD32 installation share on all PCs and laptops
  • 10. ESET India growth in 2010   More than 22 00 000 Indian users trust ESET*    * Total number of Installations 
  • 11. ESET World Map 2011 Countries where the brand ranks among top 3 (Online Security Brand Tracker 2011 survey)
  • 12. Top 10 ESET Performance Markets  Russia 49,850,000 Brazil 31,137,000 Turkey 30,415,000 Argentina 22,782,000 Mexico 22,185,000 India 21,222,000 USA 18,182,000 Colombia 15,200,000 Thailand 14,967,000 Total Brand  Ukraine 14,000,000 Awareness 
  • 15. Real-Time Adaptive Scanning Technology • Engineered to be fast, light and accurate • ESET solutions are among most effective malware scanners in the industry. • The ThreatSense® technology. • Combined with global malware intelligence and unobtrusive updates • ESET users get maximum protection at all times.
  • 16. Real-Time Adaptive Scanning Technology VIRUS SIGNATURES GENERIC SIGNATURES Common protection Future mutations CODE ANALYSIS EMULATION Static analysis Advanced detection
  • 17. ESET Heuristics • Heuristics is a technique that implements a set of guidelines or rules to solve the problem of detecting known and unknown malicious program s. Heuristics helps to detect malware behavior, without need to uniquely identify the specific threat . • ESET Smart Security and ESET NOD32 Antivirus use heuristics to detect both known and unknown threats and malware. Two forms of heuristics are used, passive and active.
  • 18. Heuristic Effectiveness AV-comparatives.org retrospective testing with detection and false positives results (May 2007)
  • 19. Passive heuristics • Passive heuristics analyze a potential threat as it is scanned, tracing through the instructions in the program before passing the code to the processor for execution. Passive heuristics look for patterns, routines or program calls that indicate malicious behavior. Though an important tool, passive heuristics alone are only part of the solution, as there is no single action that a malicious program can perform that is not also allowed in a legitimate program. This is why the simultaneous use of active heuristics is important. Active heuristics • ESET's active heuristic technology creates a virtual computer within the scanning engine that allows the scanner to observe what the program might do if allowed to run on a real computer. This can reveal potentially malicious activities that other detection techniques would not identify.
  • 20. ESET Live Grid Long before cloud computing gained traction in the antimalware industry, ESET developed a unique cloud-based technology. ESET Live Grid serves as an early warning system that intercepts hundreds of thousands of new threats daily across the globe to keep our clients secure in face of emerging threats.
  • 22. UNILICENSE ESET Unilicense – allows protecting multiple platforms with a single license. ESET security solutions can be deployed on operating systems of choice in a mix-and-match fashion.
  • 24. ESET for Consumers  Smart Detection  Small System Footprint  Optimized Startup Procedure
  • 25. V5 Security Features Advanced HIPS Functionality customize the behavior of the system in greater detail: Out of Home Network Detection Alerts the user when connecting to an unknown network prompting to switch to the Strict Protection mode Parental Control Protects your family from potentially offensive web content Enhanced Media Control Automatically scans all USB flash discs, memory cards and CDs/DVDs for threats. Gamer Mode Streamlines protection during online sessions for continual security Putting the user in Control the tools pane view is highly intuitive and transparent, allowing for quick navigation.
  • 26. ESET Smart Security 5 All-in-one internet security suite Feature Highlights • Antispam • Antispyware • Anti-rootkit • Personal Firewall • Parental Control • Host Intrusion Prevention System • Gamer Mode • Available in 1 user & 3 user pack • ESET Smart Security 1 user: MRP : Rs. 999 • ESET Smart Security 3 user: MRP : Rs. 1999
  • 27. ESET NOD32 Antivirus 5 Professional Protection for Home Computer, Notebook or Workstation! Feature Highlights • Antispyware • Anti-rootkit • Cloud-Powered Scanning • Removable Media Management • Host Intrusion Prevention System • Gamer Mode • Low System Footprint • Available in 3 user pack • MRP : Rs. 1699
  • 28. ESET NOD32 Antivirus vs. ESET Smart Security Safer Malware Protection Antivirus (ThreatSense® technology) Antispyware Host-Based Intrusion Prevention System (HIPS) Cloud-Enhanced Whitelisting Removable Media Control Antirootkit Smarter Online Safety Antispam Intelligent Firewall Gamer Mode Stronger Parental Controls and Education Parental Controls
  • 30. Key Features ANTI‐THEFT FEAUTRES   Remote Lock   Remote Wipe   GPS Localization   SIM Matching   Trusted Friend   Call Blocking   Uninstall Protection    SECURITY FEATURES   SMS/MMS Antispam   Realtime Protection   Security Audit   Onaccess Scanning   On demand Scanning 
  • 31. ESET: SOLUTION FOR SMB -- NEW LAUNCH --  18 months of validity 
  • 32.
  • 33. Endpoint Solutions comes in two versions:  ESET Endpoint Security  ESET Endpoint Antivirus (Lighter version) Both solutions combine cloud-powered scanning technology and the award-winning ThreatSense scanning engine for optimized performance.
  • 34. Key Features ESET Remote Administrator: centralized and remote management software, with role-based privileges, dynamic client groups, remote installation, notifications, updates management, web dashboard, and everything the IT administrator need to keep the endpoints secure and up- ESET provides Endpoint Security software for Windows, Mac to-date! and Linux under the Unilicense concept
  • 35. ESET Gateway/ File/ Mail Security for Windows/ Linux Provides proactive and  Delivers comprehensive  Safeguards your email  lightweight security as your  antimalware protection for your  communication channels with  business network’s first line of  vital business data in a small  award‐winning antivirus and  defense against malware and  footprint that ensures  antispam technology that  other cyberthreats   optimal server performance  proactively detects known and  emerging malware  
  • 36. Technology Quadrants Extensive Proactive Protection Unreliable Technology Well-balanced Protection High  Detecting Unknown Threats False positives <–> High Detection Proactive Detection Rate Rate BitDefender  Technologically superior product GDATA  Alwil  Kaspersky  Microsoft  McAfee  Grisoft AVG  Norman  Symantec  F‐Secure  Norman  Low  Poor Technology Inefficient Technology High  False Positives Low  Source: AV-Comparatives 2008-2011  
  • 37. Virus Bulletin VB100 Awards Long track record of excellent results Highest Number of VB100 Awards
  • 38. Highest Number of Advance+ Awards
  • 39. Performance Overhead Superior performance and small footprint at the same time Boot Time Test File Copying Encoding/Transcoding 106% 161% 60% 66% 49% 58% 56% 45% 39% 63% 29% 28% 70% 70% 35% 53% 25% 52% 32% 22% 10% 10% 19% 16% 14% 31% 31% 13% 12% 9% 6% 3% 7% Source: AV-Comparatives 2004-2011
  • 40. Latest Awards and Achievements The only company with unbroken All certification from AV-Test and TUV, string of 49 VB100 awards (70 overall) first and only certified Mac OS X product Scores high in all tests Second in Stiftung Warentest 14 Advanced+ Awards and Consumer Reports