ESET Endpoint Security for Windows

ESET
Online
Bratislava, Slovakia
1987
$500MN to $1BN
73
Likes
67 Buyers are Negotiating "Group Buyer Deal" for ESET
Are you from this company?

ESET USP

ESET specializes in providing anti-virus and firewall products. ESET Endpoint solutions are easy to set up, as they offers straightforward deployment, simplified navigation and effortless updates. The company's Set-and-forget protection feature secures users, systems and data and alloes professionals to focus on other business priorities. ESET endpoint protection delivers unparalleled protection across multiple platforms and processes. ESET offers Push Authentication with its solutions which provides users with a single-touch authentication via mobile devices for maximum convenience and it runs on iOS, Android and Windows 10 mobile devices.
Request ESET Pricing to get more information.

Summary

ESET endpoint security solutions are categorized into Anti-malware protection anti-phishing, exploit blocker, data access control, antispam, host intrusion prevention systems (HIPS), advanced memory scanner, and anti-virus. ESET Endpoint Protection is a well defined endpoint security for solution that has been developed specifically for desktop, mobile devices, and mail servers. The solution offers a consolidates view of the organization's network security and also allows them to receive instant notifications as incidents occur. Two Factor Authentication is an effiecient multi-factor authentication solution designed for commonly utilized systems. The company also provides Endpoint Encryption which is powerful and offers removable media, files and email. 

Top Usecases

  1. Insider Threat
  2. Threat Hunting

360 Quadrants

Strengths and Weaknesses
  • +8 Android
  • +6 Installed
  • +7 iOS
  • +5 Web-Based
  • +13 Education & Certification
  • +14 Free Downloads
  • +12 Renewals & Registration
  • +10 Technical Support
  • +11 Virus & Threat Help
  • +8 Business
  • +9 Enterprise
  • +11 $ per license
  • +10 $ per Month/Yearly
  • +12 Block targeted attacks
  • +11 Root Cause Analysis
  • +14 Encryption of Data
  • +7 Disk and Boot Record Protection (WipeGuard)
  • +6 Anti-Malware File Scanning
  • +13 Application Control
  • +14 Client Firewal
  • -13 Cloud
  • -14 Hybrid
  • -12 On-Premises
  • -5 Free Clean-up Tools
  • -9 Automated Malware Removal
  • -10 Synchronized Security Heartbeat
  • -6 Control File Integrity
  • -7 Monitor the Data access
  • -5 Prevent Data Loss
  • -13 Segregation of Network
  • -5 Active Adversary Mitigations
  • -14 Malicious Traffic Detection (MTD)
  • -8 Man-in-the-Browser Protection (Safe Browsing)
  • -6 Ransomware File Protection (CryptoGuard)
  • -13 Runtime Behavior Analysis (HIPS)
  • -5 Deep Learning malware detection
  • -7 Live Protection
Discussions
nodiscussion
There is no interaction
Invite one or more vendors for a discussion.


Top Features

  1. Product Features and Functionality / Prevention
  2. Product Features and Functionality / Costs & Units
  3. Product Features and Functionality / Licensing
  4. Product Features and Functionality / Respond
  5. Services / Technical Support
  6. Services / Education & Certification
  7. Services / Renewals & Registration
  8. Services / Virus & Threat Help
  9. Product Features and Functionality / Data Security
  10. Product Features and Functionality / Detection