Features Business Perspective. www.eset.com



Similar documents
Features IT Perspective.

For Businesses with more than 25 seats.

ESET Endpoint Protection Advanced

Patch Management SoftwareTechnical Specs

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

Section 12 MUST BE COMPLETED BY: 4/22

Get Started Guide - PC Tools Internet Security

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

ESET SMART SECURITY 6

BitDefender Client Security Workstation Security and Management

Symantec Endpoint Protection

Trend Micro OfficeScan Best Practice Guide for Malware

Introduction. PCI DSS Overview

Best Practice Configurations for OfficeScan (OSCE) 10.6

ESET SMART SECURITY 9

Symantec Endpoint Protection Datasheet

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

IBM Endpoint Manager for Core Protection

Symantec AntiVirus Enterprise Edition

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops

Lumension Endpoint Management and Security Suite

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Integrated Protection for Systems. João Batista Territory Manager

Maintaining, Updating, and Protecting Windows 7

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Host-based Intrusion Prevention System (HIPS)

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

AVG AntiVirus. How does this benefit you?

ESET NOD32 ANTIVIRUS 9

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

End-user Security Analytics Strengthens Protection with ArcSight

Symantec Protection Suite Small Business Edition

ESET NOD32 ANTIVIRUS 8

ESET NOD32 Antivirus. Table of contents

Managed Service Plans

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

NetDefend Firewall UTM Services

ESET Mobile Security Business Edition for Windows Mobile

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Agnitum SMB Solutions. Outpost Network Security Version 3.2 Securing your network

Using WMI Scripts with BitDefender Client Security

McAfee Endpoint Protection Products

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

QUICK START GUIDE FOR CORE AND SELECT SECURITY CENTER 10 ENDPOINT SECURITY 10

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

escan Comparison (Enterprise, Corporate, SMB, SOHO)

Symantec Endpoint Protection

Ovation Security Center Data Sheet

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

FISMA / NIST REVISION 3 COMPLIANCE

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Features and benefits guide for partners and their customers

System Security Policy Management: Advanced Audit Tasks

NetDefend Firewall UTM Services

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

IBM Endpoint Manager Product Introduction and Overview

ESET Security Solutions for Your Business

Network Security and the Small Business

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Next Gen Firewall and UTM Buyers Guide

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Symantec Protection Suite Small Business Edition

Chapter 4 Application, Data and Host Security

What Do You Mean My Cloud Data Isn t Secure?

Configuration Information

LabTech Integration Instructions

How To Manage A System Vulnerability Management Program

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Getting Started with Symantec Endpoint Protection

Comodo Endpoint Security Manager SME Software Version 2.1

Information Technology Solutions

Sophos Endpoint Security and Control Help. Product version: 11

Seven for 7: Best practices for implementing Windows 7

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Best Practice Configurations for OfficeScan 10.0

Automate your IT Security Services

AVeS Cloud Security powered by SYMANTEC TM

NOD32 Antivirus 3.0. User Guide. Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware. we protect your digital worlds

Did you know your security solution can help with PCI compliance too?

Enabling Security Operations with RSA envision. August, 2009

isheriff CLOUD SECURITY

A Buyer's Guide to Data Loss Protection Solutions

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Sophos Enterprise Console Help

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Transcription:

Features Business Perspective www.eset.com

Endpoint Protection Antivirus / Antispyware Auto-Scan of Removable Media Host-based Intrusion Prevention System (HIPS) Client Antispam Cross-platform Protection ESET SysRescue Eliminates all types of threats, including viruses, rootkits, worms and spyware Optional cloud-powered scanning: Whitelisting of safe files based on file reputation database in the cloud Only information about executable and archive files sent to the cloud Allows you to scan devices and media for malware immediately upon insertion Scanning options include: start automatically/notify (prompt user)/do not scan Enables you to define rules for system registry, processes, applications and files Provides tampering protection Detects threats based on system behavior Effectively filters out spam on the user s endpoint device Scans all incoming emails for malware Detects and eliminates malware targeting Windows, Mac and Linux operating systems Allows you to create an automatically bootable OS image with installed security solution to clean deeply infected endpoints Keep company data safe and prevent malware from infecting endpoints, no matter what operating system they target. Cloud-powered file reputation speeds up system scans and keeps false positives to an absolute minimum, while preserving confidentiality of your data. Automatically scan USBs, CDs, and DVDs upon insertion to eliminate autorun and other removable media. Company endpoints are always safe as our HIPS behavioral scanner protects ESET security solutions against tampering. Critical system registry entries, processes, applications and files are protected from unauthorized access and changes. Automatically filter unwanted email to increase employee work efficiency and reduce the risk of phishing attacks. Customize settings by user type to meet your business email communication requirements. Exchange files and email attachments between Windows, Mac and Linux endpoints knowing that malware targeting any of these platforms will be automatically detected and eliminated. Boot and clean infected endpoints from CD or USB and increase the chance of data retrieval when no other options exist. Features marked with an asterisk are available only for ESET Endpoint Security; all other listed features are available also for ESET Endpoint Antivirus.

Data Access Control Two-way Firewall Device Control Prevents unauthorized access to company network Provides anti-hacker protection and data exposure prevention Blocks unauthorized media and devices from the system Lets you set rules/parameters for specific media, devices, users and clients Keep company data safe from foreign interference and protect your company s proprietary information from leaking through unauthorized unbound connections. Prevent company data from unauthorized copying to USB, CD, DVD or other removable media. Flexible device control policies allow for access control by individual users or groups based on device parameters like serial number, manufacture ID, model and others. Trusted Network Detection Provides stricter protection when clients connect to new/unauthorized network Maintain the confidentiality of company data as your mobile workforce hops from trusted networks to public hotspots at a café, airport or hotel. Prevent unauthorized persons listening in to company communication. Employee Effectiveness Web Control Limits website access by category Enables you to create rules for user groups to comply with your company policies Prevent unproductive web surfing and enforce your company s acceptable Internet use policy by blocking access to unauthorized web sites or categories. Keep employees off inappropriate, unwanted or non-work-related pages like social networks or freemail to prevent overloading the network. Low System Demands Delivers proven protection while leaving more system resources for programs you regularly use Improve ROI by keeping company computers running smoothly and extending the lifetime of hardware. Increase employee effectiveness by not having to worry about computer slowdowns due to a bloated antivirus solution. Presentation Mode Blocks pop-up messages and postpones security tasks when in full-screen mode Prevent embarrassing moments or disruptions during slideshows, presentations or during any other full-screen applications. Component-based Installation Gives you the option to install any and all of the following security components: firewall, antispam, web control, device control, Microsoft NAP support, and web access protection Extend hardware lifecycles and save money by minimizing CPU overheads and conserving memory and disk space used by the security solution. Features marked with an asterisk are available only for ESET Endpoint Security; all other listed features are available also for ESET Endpoint Antivirus.

Administrator Effectiveness Centralized Management Role-based Management Dynamic Client Groups Lets you manage all ESET security solutions software from a central management tool Assigns different privileges to different ESET Remote Administrator users Audit users with ESET Remote Administrator Enforce password complexity Enables you to create static and dynamic clients groups and using different parameters for populating the groups Keep IT budgets under control - with ESET Remote Administrator for management of past, present and future ESET solutions. Easily manage all endpoints, servers, smartphones and even virtual machines from a single console, no matter if you are running Windows, Mac or Linux systems. Role based administration makes it easy for your IT team to delegate responsibilities among different individuals or groups. Detailed audit logs simplify compliance reporting. The security rules are easily adjustable for different groups of employees. Dynamic groups can be created on-the-fly based on specified conditions to simplify identification and remediation of endpoints that trigger security events. Event Notifications Allows you to specify log and report parameters or choose from more than 50 templates available for different system/client events Gives you the option to set threshold for event notifications Save your IT team s time by prioritizing notifications and setting up what type security event is important, how detailed it should be and in what interval it should be reported, so they get actionable information without being overloaded. Remote Installation Performs remote installation of ESET software to multiple endpoints at once Have your IT manage endpoint security with a few clicks by deploying ESET security software on all endpoints from one central location. Export/Import Policies Enables you to import/export/edit policies in XML Save time and prevent errors by defining the configuration settings once, and then exporting and applying them to desired endpoints or groups. Remote Module Switch Remotely activates or deactivates protection modules installed on a given client, including firewall, anti-stealth, real-time file system protection, web-access and e-mail client protection Automatic re-activation can be set for: 10 min, 30 min, 1 hour, 4 hours or never Reduce potential downtimes during system maintenance by remotely enabling and disabling security modules.

Reporting Real-time Web Dashboard Ensures complete oversight of the company network and lets you check the security status from anywhere Oversee the security status of the entire network with real-time information about the server load and security. You can access critical information from outside the company network via web-based dashboard. Multiple Log Formats Lets you save logs in common formats - CSV, plain text, Windows event log - readable by SIEM tools Stores logs on endpoint side for later harvesting Take advantage of data mining functions, making correlations of security events easy and quick. Make the data readable to 3rd party Security Information and Event Management (SIEM) tools. Device Control Reports Device Control Reports deliver comprehensive logs and reports for all devicerelated events Monitor the usage of removable media and devices across the entire company, keeping all important information in one place. RSA envision Support Integrates with the RSA envision SIEM tool via a plug-in Support for RSA envision ensures ease of integration with this popular 3rd party SIEM tool. ESET SysInspector Performs in-depth analysis of endpoint systems to identify possible security risks Give your IT admins all the tools to easily find potential security risks and take preventive actions proactively.

Update Management Randomized Task Execution Enables you to set random time periods for executing scheduled security tasks Prevent system slowdowns due to delayed response from servers or AV storms on virtual endpoints. This feature ensures that simultaneously scheduled security tasks will not cause network slowdowns or negatively impact its traffic. Update Rollback Postponed Updates Local Update Server Faster Database Access Database Cleanup Microsoft NAP Support Lets you revert to a previous version of protection modules and virus signature database Provides an option to download from 3 specialized update servers: pre-release (beta users), regular release (regular users) and postponed release (approx. 12 hours after regular release) Saves company bandwidth by downloading updates only once to a local mirror server Secured (HTTPS) communication channel is supported Provides an optimized and streamlined database access to endpoint security-related data Allows you to set database storage attributes such as time period and threshold values for entries to be kept in database Deploys server side System Health Validator (SHV) plug-in and client side System Health Agent (SHA) Grants full network access for compliant clients and limited/no network access for non-compliant clients Address incompatibilities or other system disruptions by rolling back virus signature and module updates with a few simple clicks. Keep the company online systems working smoothly 24/7. Prevent outages of critical systems due to antivirus updates or any events that could impact the company s operations. Keep the connection available for work-related online services, by keeping the antivirus updates traffic to a minimum. Quick database response means faster reporting and data aggregation across your endpoints, increasing IT productivity. Store only security logs that are important and up-to-date, ensuring a tidy database, without unnecessary server slowdowns. Control access to network resources based on a client computer s identity and compliance with corporate governance policy. Microsoft Network Access Protection (NAP) plug-in allows full integration with your company s compliance policies.