Features IT Perspective. www.eset.com



Similar documents
Features Business Perspective.

For Businesses with more than 25 seats.

ESET Endpoint Protection Advanced

Patch Management SoftwareTechnical Specs

escan Comparison (Enterprise, Corporate, SMB, SOHO)

ESET SECURITY FOR KERIO

NOD32 Antivirus 3.0. User Guide. Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware. we protect your digital worlds

ESET FILE SECURITY FOR MICROSOFT WINDOWS SERVER. Installation Manual and User Guide. Microsoft Windows Server 2000 / 2003 / 2008 / 2008 R2

ESET NOD32 Antivirus. Table of contents

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Maintaining, Updating, and Protecting Windows 7

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Best Practice Configurations for OfficeScan (OSCE) 10.6

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

Trend Micro OfficeScan Best Practice Guide for Malware

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

IBM Endpoint Manager for Core Protection

Symantec Endpoint Protection

Symantec Protection Suite Small Business Edition

contents 1. ESET Smart Security Installation Beginner s guide Work with ESET Smart Security...12

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

AVeS Cloud Security powered by SYMANTEC TM

Ad-Aware Management Server Installed together with Ad-Aware Business Client Ad-Aware Update Server Before You Start the Deployment...

Comodo Endpoint Security Manager SME Software Version 2.1

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Symantec Endpoint Protection

Sophos Enterprise Console Help

AVG AntiVirus. How does this benefit you?

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

ESET Mobile Security Business Edition for Windows Mobile

GFI Cloud User Guide A guide to administer GFI Cloud and its services

ESET SMART SECURITY 6

LabTech Integration Instructions

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

isheriff CLOUD SECURITY

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

End-user Security Analytics Strengthens Protection with ArcSight

Endpoint protection for physical and virtual desktops

Parla, Secure Cloud

Endpoint protection for physical and virtual desktops

Bitdefender Internet Security 2015 User's Guide

Section 12 MUST BE COMPLETED BY: 4/22

Installation and Setup: Setup Wizard Account Information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MaaS360 Mobile Service

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Symantec Protection Suite Small Business Edition

IBM Security QRadar SIEM Version MR1. Administration Guide

Move over, TMG! Replacing TMG with Sophos UTM

Symantec Backup Exec System Recovery

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

ESET NOD32 Antivirus 4

Symantec Endpoint Protection Analyzer Report

Getting Started with Symantec Endpoint Protection

BitDefender Client Security Workstation Security and Management

Introduction. PCI DSS Overview

K7 Business Lite User Manual

Introduction to Endpoint Security

Total Defense Endpoint Premium r12

Getting Ahead of Malware

Upgrading Client Security and Policy Manager in 4 easy steps

Get Started Guide - PC Tools Internet Security

ESET NOD32 Antivirus 4

F-Secure Internet Gatekeeper Virtual Appliance

Nessus Agents. October 2015

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

SMALL BUSINESS EDITION. Sophos Control Center startup guide

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

User's Guide. Copyright 2013 Bitdefender

QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10

Small and Midsize Business Protection Guide

McAfee Web Reporter Turning volumes of data into actionable intelligence

NAC at the endpoint: control your network through device compliance

Sophos for Microsoft SharePoint startup guide

Workspace Manager 2014 Module Comparison Chart

D-View 7 Network Management System

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Microsoft Windows Intune: Cloud-based solution

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

AVG 8.5 Anti-Virus Network Edition

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Symantec Endpoint Protection Datasheet

AV Management Dashboard

Transcription:

Features IT Perspective www.eset.com

Endpoint Protection Antivirus / Antispyware Host-based Intrusion Prevention System (HIPS) Auto-Scan of Removable Media Component-based Installation Client Antispam Low System Demands Cross-platform Protection ESET SysRescue Eliminates all types of threats, including viruses, rootkits, worms and spyware Optional cloud-powered scanning: Whitelisting of safe files based on file reputation database in the cloud Only information about executable and archive files sent to the cloud Enables you to define rules for system registry, processes, applications and files Provides tampering protection Detects threats based on system behavior Allows you to scan devices and media for malware immediately upon insertion Scanning options include: start automatically/notify (prompt user)/do not scan Gives you the option to install any and all of the following security components: firewall, antispam, web control, device control, Microsoft NAP support, and web access protection Effectively filters out spam on the user s endpoint device Scans all incoming emails for malware Delivers proven protection while leaving more system resources for programs you regularly use Detects and eliminates malware targeting Windows, Mac and Linux operating systems Allows you to create an automatically bootable OS image with installed security solution to clean deeply infected endpoints Clean endpoints mean trouble-free work. With ESET solutions deployed on company endpoints your data is safe and protected. Choose from a range of customization options and set automatic actions if threats are detected. ESET s cloud-powered scanning ensures faster scanning and better detection of In-the-Wild viruses, while reducing false positives to minimum. No confidential data is sent to the cloud, only information about executable and archive files. Additionally, the sent data is not personally attributable. Customize the behavior of the whole system and each of its parts. Block unauthorized actions and use detailed HIPS logs for compliance auditing and reporting. Integrated Self- Defense ensures ESET software components are protected from tampering and that your systems have maximum protection. Automatic scanning of removable storage media ensures advanced protection against offline threats carried on USB, CDs, DVDs and other devices. Deploy only the desired protection modules for each group of endpoints so your systems can run at peak performance without wasted resources. Remotely enable/disable installed modules anytime you need to fine tune your endpoints. Powerful antispam with white/black list and self-learning can be set up separately for each client or group. Native support for Microsoft Outlook enhances protection (POP3, IMAP, MAPI, HTTP) from online threats without additional work from you. Minimizes slowdowns found with other bloated antivirus solutions and keeps your company computers performing at their best. Extends the lifetime of hardware by deploying ESET on older machines without having to upgrade. Conserve battery life for laptops that are away from the office with battery mode. Delivers better protection in multi-platform environment because ESET security solutions for Windows are capable of detecting Mac OS threats and vice versa. Increase the chances of data retrieval in case of an emergency by booting and cleaning deeply infected endpoints from a CD or USB stick. Features marked with an asterisk are available only for ESET Endpoint Security; all other listed features are available also for ESET Endpoint Antivirus.

Data Access Control Web Control Device Control Limits website access by category Enables you to create rules for user groups to comply with your company policies Blocks unauthorized media and devices from the system Lets you set rules/parameters for specific media, devices, users and clients Prevents unauthorized access to company network Provides anti-hacker protection and data exposure prevention Regulate and monitor the web pages accessed by users or user groups with multiple website categories (gaming, social networking, shopping, and others). Websites are automatically classified into categories via cloud-based service. Block sites generating high volume of traffic, conserve company network bandwidth and meet your company s Internet acceptable usage policies. Centrally managed rules and policies for media and devices by pre-set attributes like serial number, manufacturer or model. Set read, read/write or block access permissions for individual users or groups. Detailed access and scan logs simplify policy enforcement and compliance reporting. Trusted Network Detection Provides stricter protection when clients connect to new/unauthorized network Create stricter policies for accessing unauthorized networks, such as public Wi-Fi. Define trusted networks, making all other connections in strict mode by default. Users and the data on their laptops will be protected from Internet threats as they hop from trusted networks to public hotspots at a café, airport or hotel. Two-way Firewall Firewall comes with easy setup, powerful customization rules and intelligent learning mode. ESET Remote Administrator provides a firewall rules merge wizard to simplify aggregating firewall rules, so that you can easily construct sets of rules to be applied across the network. Features marked with an asterisk are available only for ESET Endpoint Security; all other listed features are available also for ESET Endpoint Antivirus.

Remote Administration Centralized Management Dynamic Client Groups Role-based Management Lets you manage all ESET security solutions software from a central management tool Enables you to create static and dynamic clients groups and using different parameters for populating the groups Assigns different privileges to different ESET Remote Administrator users Audit users with ESET Remote Administrator Enforce password complexity ESET Remote Administrator lets you manage all ESET security solutions from a single console, whether you are running Windows, Mac, or Linux. The solution supports IPv6 infrastructure and even your virtual machines and smartphones can be managed from the same single console. Create groups of users with different parameters such as operating system, client name mask, IP mask, recent threat detected and more. Set specific policies for different groups, moving clients automatically to the corresponding group if parameters change. Delegate responsibilities among different individuals or groups. Detailed audit logs simplify compliance reporting and the built-in password strength checker ensures your administrator accounts are properly protected. Remote Installation Performs remote installation of ESET software to multiple endpoints at once Deploy ESET Endpoint solution and any other msi-based installers via push installation. ESET Remote Administrator can perform push installation of ESET Endpoint Solutions for Windows and the new generation of endpoint solutions for Mac and Linux. Export/Import Policies Enables you to import/export/edit policies in XML Save time and prevent errors by defining configuration settings once, export and apply them to desired endpoints or groups. Remote Module Switch Remotely activates or deactivates protection modules installed on a given client, including firewall, anti-stealth, real-time file system protection, web-access and e-mail client protection Automatic re-activation can be set for: 10 min, 30 min, 1 hour, 4 hours or never Simplify system maintenance or debugging by remotely enabling or disabling installed modules.set automatic timer to restore prior setting to avoid unintended system. All modules, with the exception of Anti-stealth, automatically switch back on upon endpoint restart.

Reports, Logs & Notifications Real-time Web Dashboard Ensures complete oversight of the company network and lets you check the security status from anywhere Access web-based dashboard from the console or anywhere on the network for quick security status at-a-glance. Customize the information displayed on dashboard via ESET Remote Administrator's report interface. Monitor network security status and server load statistics using live streaming of the desired data. Multiple Log Formats Lets you save logs in common formats - CSV, plain text, Windows event log - readable by SIEM tools Stores logs on endpoint side for later harvesting Event Notifications Allows you to specify log and report parameters or choose from more than 50 templates available for different system/client events Gives you the option to set threshold for event notifications Perform data parsing via compatible data formats for further processing and easy harvesting. ESET s support for multiple log formats makes it easy to take advantage of 3rd party Security Information and Event Management (SIEM) tools. Helps quickly identify potential problems, make the task of network monitoring easier and helps with compliance reporting. Set up priority and time for pass-through notifications, sent immediately or in batches at pre-set time periods. Create notification rules, scale the verbosity of logs and forward each event notification using email, syslog, SNMP trap, or text file. Device Control Reports Device Control Reports deliver comprehensive logs and reports for all devicerelated events Detailed removable media and device usage logs simplify compliance reporting from one central place. Reports include timestamp, username, computer name, group name, device class, event details, and triggered action. RSA envision Support Integrates with the RSA envision SIEM tool via a plug-in Support for RSA envision ensures ease of integration with this popular 3rd party SIEM tool. ESET SysInspector Performs in-depth analysis of endpoint systems to identify possible security risks Identify all running processes, installed software, hardware configuration on all endpoints. Uncover potential security risks by comparing the last two snapshots of endpoint.

Network Speed and Stability Randomized Task Execution Enables you to set random time periods for executing scheduled security tasks Set a random time offset during which to execute tasks. Minimize AV storms on virtual endpoints and resource contention on networked drives due to simultaneous system scans so your end users don t experience performance slowdown. Update Rollback Postponed Updates Local Update Server Faster Database Access Database Cleanup Microsoft NAP Support Lets you revert to a previous version of protection modules and virus signature database Provides an option to download from 3 specialized update servers: pre-release (beta users), regular release (regular users) and postponed release (approx. 12 hours after regular release) Saves company bandwidth by downloading updates only once to a local mirror server Secured (HTTPS) communication channel is supported Provides an optimized and streamlined database access to endpoint security-related data Allows you to set database storage attributes such as time period and threshold values for entries to be kept in database Deploys server side System Health Validator (SHV) plug-in and client side System Health Agent (SHA) Grants full network access for compliant clients and limited/no network access for non-compliant clients Address incompatibilities or other system disruptions by rolling back virus signature and module updates to a known good state with a few simple clicks. Freeze updates as desired - opt for temporary rollback or until manually changed. Helps ensure smooth updating, with focus on continuity of operations. Apply antivirus updates to non-critical systems first, followed by critical ones with the option of clearing the update cache. Use the ESET Remote Administrator as your company s mirror update server for endpoints and minimize Internet bandwidth usage. For your mobile workforce, define a secondary update profile so endpoints update directly from ESET servers when your internal mirror is not accessible. Support for HTTPS. Optimized database performances gives you higher productivity by aggregating data from your endpoints and generating reports faster. Keep the database working flawlessly, responding quickly, and at a reasonable size. Helps ensure compliance and network monitoring (readiness / status). SHA plug-in collects information on the client and communicates it on the server side within NAP framework. Set client compliance requirements such as: age of virus database, antivirus product version, protection status, availability of antivirus protection, and firewall status. Bring endpoints to compliance by forcing database update.