
pioneer of the antivirus industry for 25 years
Antivirus and Antispyware Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your
network protected online and o. Optional cloudpowered scanning utilizes our reputation
database for increased scanning speed and minimal false positives.
Host-based Intrusion Prevention
System (HIPS)
Provides tampering protection and protects the system registry, processes, applications and
files from unauthorized modification. You can customize the behavior of the system down to
every last detail and detect even unknown threats based on suspicious behavior.
Web Control Allows to limit access to select website categories by a way of automatic inthecloud
classification. Create detailed rules for user groups to comply with your company policies
and block sites generating high trac volume.
Trusted Network Detection Lets you define trusted networks and protect all other connections with strict mode, making
company laptops invisible in public WiFi networks in hotels, airports and at conferences.
Two-way Firewall Prevents unauthorized access to company network and protects company data from
exposure. Remote administration provides a firewall rule merge wizard that makes
aggregating firewall rules in the network a snap.
Client Antispam Protects your company communications from spam and emailborne threats. Set white
and blacklists and selflearning separately for each client or group. The antispam natively
supports Microsoft Outlook and also filters POP, IMAP, MAPI and HTTP protocols.
Device Control Lets you block unauthorized media and devices based on preset rules and parameters. Set
access permissions read/write, read, block for individual media, devices, users and groups.
Component-based Installation Install any or all of these security components: firewall, antispam, web control, device
control, Microsoft NAP support, and web access protection. Saves disk space by only
installing the modules you need. You can also remotely enable/disable installed modules.
Low System Demands Ensure proven detection while leaving more system resources for programs you use daily.
Our software also runs smoothly on older hardware, saving your time and costs of having to
upgrade your endpoints.
Multiple Log Formats Save logs in common formats CSV, plain text, or Windows event log for immediate analysis
or harvesting. Take advantage of data being readable by rd party SIEM tools; RSA enVision is
supported directly via a plugin.
ESET Endpoint Antivirus
ESET NOD Antivirus Business Edition for Mac OS X
ESET NOD Antivirus Business Edition for Linux Desktop
ESET Endpoint Security for Android
ESET Mobile Security Business Edition
ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris
ESET Endpoint Security
ESET Mail Security for Microsoft Exchange Server
ESET Mail Security for IBM Lotus Domino
ESET Mail Security for Linux/BSD/Solaris
ESET NOD Antivirus Business Edition for Kerio Connect
ESET Remote Administrator
See the previous and following pages for benefits
and features of the products that are colorcoded in grey.
Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.
ESET Secure Business
Commenti su questo manuale