For Businesses with more than 25 seats. www.eset.com



Similar documents
ESET Endpoint Protection Advanced

Features IT Perspective.

Features Business Perspective.

ESET Mobile Security Business Edition for Windows Mobile

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ESET SMART SECURITY 6

ESET Security Solutions for Your Business

ESET SMART SECURITY 9

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

BitDefender Client Security Workstation Security and Management

NOD32 Antivirus 3.0. User Guide. Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware. we protect your digital worlds

contents 1. ESET Smart Security Installation Beginner s guide Work with ESET Smart Security...12

Feature List for Kaspersky Security for Mobile

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

Sophos for Microsoft SharePoint startup guide

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

ESET NOD32 Antivirus. Table of contents

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

ESET MOBILE SECURITY FOR ANDROID

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

Endpoint protection for physical and virtual desktops

ESET ENDPOINT SECURITY FOR ANDROID

ESET NOD32 Antivirus 4

Symantec Endpoint Protection

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

ESET NOD32 ANTIVIRUS 8

Ad-Aware Management Server Installed together with Ad-Aware Business Client Ad-Aware Update Server Before You Start the Deployment...

ESET NOD32 ANTIVIRUS 9

anomaly, thus reported to our central servers.

Symantec Protection Suite Small Business Edition

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Trend Micro OfficeScan Best Practice Guide for Malware

Symantec Protection Suite Small Business Edition

Symantec Endpoint Protection

AVG AntiVirus. How does this benefit you?

IBM Endpoint Manager for Core Protection

Endpoint protection for physical and virtual desktops

Mobile Device Management Version 8. Last updated:

BUILT FOR YOU. Contents. Cloudmore Exchange

Kaspersky Security 10 for Mobile Implementation Guide

ESET SECURITY FOR KERIO

Did you know your security solution can help with PCI compliance too?

Copyright 2013, 3CX Ltd.

Host-based Intrusion Prevention System (HIPS)

ESET FILE SECURITY FOR MICROSOFT WINDOWS SERVER. Installation Manual and User Guide. Microsoft Windows Server 2000 / 2003 / 2008 / 2008 R2

SMALL BUSINESS EDITION. Sophos Control Center startup guide

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

Parla, Secure Cloud

3. Security Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

Sophos Enterprise Console policy setup guide. Product version: 5.2

Comodo Mobile Security for Android Software Version 3.0

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Sophos Enterprise Console Help

Kaspersky Security for Mobile Administrator's Guide

Symantec Endpoint Protection Small Business Edition Installation and Administration Guide

Proven. Trusted.

MDaemon Vs. Microsoft Exchange Server 2013 Standard

Eiteasy s Enterprise Filter

Patch Management SoftwareTechnical Specs

Kaspersky Endpoint Security 8 for Smartphone for Android OS

escan Comparison (Enterprise, Corporate, SMB, SOHO)

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WatchGuard Training. Introduction to WatchGuard Dimension

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

Best Practice Configurations for OfficeScan (OSCE) 10.6

Section 12 MUST BE COMPLETED BY: 4/22

Symantec Mail Security for Domino

AV Management Dashboard

Symantec Endpoint Protection Small Business Edition Implementation Guide

Client side. DESlock + Data Encryption

ESET NOD32 Antivirus 4

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Administrator's Guide

Getting Started with Symantec Endpoint Protection

K7 Business Lite User Manual

Get Started Guide - PC Tools Internet Security

Integrated Protection for Systems. João Batista Territory Manager

AntiVirus and AntiSpam scanning The Axigen-Kaspersky solution

Junos Pulse for Google Android

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Comodo Antivirus for Linux Software Version 1.0

A Buyer's Guide to Data Loss Protection Solutions

ESET File Security for Microsoft Windows Server

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

ES Exchange Server - How to Remove XMON

Transcription:

For Businesses with more than 25 seats www.eset.com

ESET Secure Enterprise Whether your business is just starting or Simple and Straightforward established, there are a few things you expect With ESET Business Solutions you can mix and match endpoint protection according to your actual needs, deploying it on a range of platforms (Windows, Mac, and Linux) and devices: computers, smartphones, tablets, and servers. from software you use daily. At ESET, we feel that running software Light on Your System in the business environment should be easy Our solutions are built for small footprint, which also makes them suitable for older hardware, saving IT-related costs on hardware upgrades. In addition, program updates are small and can download from a cenral mirror server. and simple. That s why we have created ESET Business Solutions, a perfect match for any size business utilizing our 25 years experience Easy to Manage Easily deploy, configure and manage your software from a single console. It no longer takes a bunch of IT professionals to run your company s IT but from our remote management console your company can be tweaked to every last detail. pioneering the antivirus industry. I N N O VAT I V E TOP-RATED ANTIVIRUS P R OT E C T I O N endpoint antivirus mobile file endpoint mail gateway eset endpoint protection standard eset endpoint protection advanced eset secure business eset secure enterprise ESET Endpoint Protection Standard Keep your network clean and protect your endpoints (computers, smartphones, tablets, and fileserver) against emerging threats. ESET Endpoint Protection Standard provides essential protection for the company network that is easily manageable from a single console. ESET Endpoint Protection Advanced In addition to ESET Endpoint Protection Standard, the Advanced version comes with the powerful Web Control, Firewall and Anti-Spam filter to provide additional layers of protection for the company network and your mobile workforce. ESET Secure Business Eliminating email-borne threats at the server level, ESET Secure Business gives your company s data an extra level of that complements the protection of computers, mobile devices and fileservers. ESET Secure Enterprise Choose this option if you operate your own Internet gateway server to safeguard your HTTP and FTP communications. In addition, ESET Secure Enterprise gives you all the products and tools for the maximum level of protection on your endpoints and servers across multiple platforms.

Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your network protected online and off.eset s cloud-powered reputation database increases scanning speed and minimizes false positives. Host-based Intrusion Prevention System (HIPS) Provides tamper protection and secures the system registry, processes, applications and files from unauthorized modification. You can customize the behavior of the system down to every last detail and detect even unknown threats based on suspicious behavior. for Android Core Device Control Auto-Scan of Removable Media Cross-platform Protection Low System Demands Multiple Log Formats Update Rollback Lets you block unauthorized media and devices based on pre-set rules and parameters. Set access permissions (read/write, read, block) for individual media, devices, users and groups. Automatically scans USBs, CDs, and DVDs for threats upon insertion to eliminate autorun and other removable risks. Choose from these scanning options: start automatically/notify (prompt user)/do not scan. Exchange files and email attachments among Windows, Mac and Linux endpoints with confidence that malware targeting any of these platforms will be automatically detected and eliminated. Prevent Macs from turning into carriers of malware in the company network. Leaves more system resources for programs you use daily. Our software also runs smoothly on older hardware, saving your time and costs of having to upgrade your endpoints. Save logs in common formats - CSV, plain text, or Windows event log for immediate analysis or harvesting. Take advantage of data being readable by 3rd party SIEM tools; RSA envision is supported directly via a plug-in. Revert virus signature and module updates to a known good state in case of encountering system incompatibilities. Opt to freeze updates temporarily or until manually changed. See the following pages for benefits and features of the products that are color-coded in grey.

for Android Core Remote Lock Remote Wipe GPS Localization SIM Matching Admin Contacts Call Blocking Uninstall Protection SMS/MMS Antispam Real-time Protection Security Audit On-access Scanning On-demand Scanning Remote Administration Administrator Message Locks lost or stolen devices by a remote SMS command. After locking, no unauthorized person will be able to access data stored on the device. Safely deletes all contacts, messages and data on removable memory cards. Advanced cleaning procedures ensure that it is not be possible to restore wiped data (Android 2.2 and higher). Remotely locates the phone using a remote SMS command and tracks the phone s GPS coordinates. Stay in control of your company smartphones remotely, even when an unauthorized SIM card is inserted. The Admin Contacts phone numbers will receive a wealth of information about the inserted SIM, including the phone number, IMSI and IMEI codes. Set up one or more Admin Contacts for your company mobile fleet to receive all the important information in the event of a loss or theft. Blocks calls from unknown or hidden numbers and also calls to unwanted numbers. Define a list of allowed/blocked contacts and keep your phone bills under control. One password controls it all. Only authorized persons will be able to uninstall ESET Endpoint Security for Android (version 2.2 and higher). Filters out unwanted SMS/MMS messages. Allows you to define custom blacklists/ whitelists or simply block all unknown numbers. Protects all applications, files and memory cards with the ESET NOD32 proactive technology optimized for mobile platforms. An on-demand audit checks the status of all vital phone functions, including battery level, Bluetooth status, home network, disk space and running processes. Advanced scanning protects company smartphones and tablets from threats attempting to access the system via Bluetooth or Wi-Fi. On-demand Scanning provides reliable scanning and cleaning of integrated memory and exchangeable media. Scanning of specific folders is also supported. Enables you to check the status of your smartphone fleet, run on-demand scans, push policies and set uninstall password. Get overview of the platforms, OS versions and other information and stay up-to-date on your smartphones. Allows administrator to push a message to the device with custom text via ESET Remote Administrator. The message priority can be set to normal, warning or critical warning.

Eliminates all types of threats including viruses, rootkits, worms and spyware. Provides real-time on-access scanning of the server-stored data. ESET Self-defense prevents malware and unauthorized users from disabling the of the system. Powered by the advanced ThreatSense technology combining speed, accuracy and minimal system impact. for Android Core Cross-platform Protection Low System Demands Smooth Operation Eliminates malware targeting all platforms, including Windows, Mac and Linux operating systems. Prevents malware from spreading from one platform to another. Delivers proven protection while leaving more system resources for the server s vital tasks. Identification of user accounts used in infiltration attempts. Password protected uninstallation. Automatically excludes critical server files. Automatically detects server roles to exclude critical server files like data stores and paging files from on-access scanning to decrease overhead.

Host-based Intrusion Prevention System (HIPS) Web Control Trusted Network Detection Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your network protected online and off. Optional cloud-powered scanning utilizes our reputation database for increased scanning speed and minimal false positives. Provides tampering protection and protects the system registry, processes, applications and files from unauthorized modification. You can customize the behavior of the system down to every last detail and detect even unknown threats based on suspicious behavior. Allows to limit access to select website categories by a way of automatic in-the-cloud classification. Create detailed rules for user groups to comply with your company policies and block sites generating high traffic volume. Lets you define trusted networks and protect all other connections with strict mode, making company laptops invisible in public Wi-Fi networks in hotels, airports and at conferences. for Android Core Two-way Firewall Client Antispam Device Control Component-based Installation Low System Demands Multiple Log Formats Prevents unauthorized access to company network and protects company data from exposure. Remote administration provides a firewall rule merge wizard that makes aggregating firewall rules in the network a snap. Protects your company communications from spam and email-borne threats. Set whiteand blacklists and self-learning separately for each client or group. The antispam natively supports Microsoft Outlook and also filters POP3, IMAP, MAPI and HTTP protocols. Lets you block unauthorized media and devices based on pre-set rules and parameters. Set access permissions (read/write, read, block) for individual media, devices, users and groups. Install any or all of these components: firewall, antispam, web control, device control, Microsoft NAP support, and web access protection. Saves disk space by only installing the modules you need. You can also remotely enable/disable installed modules. Ensure proven detection while leaving more system resources for programs you use daily. Our software also runs smoothly on older hardware, saving your time and costs of having to upgrade your endpoints. Save logs in common formats - CSV, plain text, or Windows event log for immediate analysis or harvesting. Take advantage of data being readable by 3rd party SIEM tools; RSA envision is supported directly via a plug-in.

Eliminates all types of threats, including viruses, rootkits, worms and spyware. Filters out email-borne threats, including spyware at the gateway level. Provides all tools for fully-fledged server protection, including the resident shield and on-demand scanner. Powered by the advanced ThreatSense technology combining speed, accuracy and minimal system impact. Antispam Stops spam and phishing messages with high interception rates. for Android Core Logs & Statistics Smooth Operation Features improved antispam engine and an option to define antispam threshold scores with greater precision. Real file type detection lets the admin apply policies for specific type of content in e-mail attachments. Spam log - Displays sender, recipient, spam score, classification reason and action taken. Greylisting log - Displays greylisted sender, recipient, action taken and status until connection denial period ends. Give you the option to monitor the server performance in real time. Automatically excludes critical server files from scanning including Microsoft Exchange folders. The built-in license manager automatically merges two or more licenses with the same customer name.

Eliminates all types of threats, including viruses, rootkits, worms and spyware. Provides real-time on-access scanning of HTTP, FTP, SMTP, IMAP and POP3 protocols. Powered by the advanced ThreatSense technology combining speed, accuracy and minimal system impact. Antispam Stops spam and phishing messages with high interception rates. Allows you to define antispam threshold scores with a high level of precision. for Android Core Cross-platform Protection Remote Administration Logs & Statistics Smooth Operation Eliminates malware targeting all platforms, including Windows, Mac and Linux operating systems. Prevents malware from spreading from one platform to another. Fully compatible with. Offers a set of pre-defined actions upon scanning results. Allows you to remotely deploy, manage, and update and report on all instances of ESET software in the company network. Lets you keep abreast of status with detailed and comprehensive logs and statistics. Spam log - Displays sender, recipient, spam score, classification reason and action taken. Gives you the option to monitor the server performance in real time. Offers customizable black/white -listing of websites. Allows you to set rules by protocols. Protects 3 in 1 communication protocols, emails, and the server s file system. Automatically excludes critical server files from scanning.

The tool comes standard with each version of ESET Business Solutions. Copyright 1992 2012 ESET, spol. s r. o. ESET, logo ESET, NOD32, ThreatSense, ThreatSense.Net and/or other mentioned products of ESET, spol. s r. o., are registered trademarks of ESET, spol. s r. o. Other here mentioned companies or products might be registered trademarks of its proprietors. Produced according to quality standards of ISO 9001:2000. Remote Administration Real-time Web Dashboard Role-based Management Dynamic Client Groups Event Notifications Randomized Task Execution Local Update Server Update Rollback Postponed updates Microsoft NAP Support Manage all servers, endpoints, and even smartphones and virtual machines from a single console. Support for IPv6 infrastructure makes management of network even easier. The comprehensive console interface lets you view all -related events, including logs from antivirus, firewall, web control, device control and others. Access web-based dashboard from anywhere for quick at-a-glance status using live streaming of data. Customize the information displayed on the dashboard to get the most up-to-date information on the status from the server and clients. Assign privileges to different remote administration users and delegate responsibilities accordingly. The built-in password strength checker and audit functionality ensure that administrator accounts are properly secured. Create dynamic and static client groups for easier policy enforcement and to address any pressing issues. Select from these parameters for groups: operating system, client name mask, IP mask, recent threat detected, and many more. Clients are moved automatically to the corresponding group if parameters change. Specify log and report parameters or choose from more than 50 templates. Have notification sent immediately or in batches based on custom threshold for related events. Minimizes AV storms on virtual endpoints and reduces resource contention on networked drives. Random task execution helps offset the effect of simultaneous system scans on the network performance. Have all clients update from a local mirror server and minimize Internet bandwidth usage. For your mobile workforce define policies to update from ESET online servers when outside of home network. The local update server supports secured (HTTPS) communication channel. Revert virus signature and module updates to a known good state in case of encountering system incompatibilities. Opt to freeze updates temporarily or until manually changed. Opt to download from 3 specialized update servers: pre-release (beta users), regular release (regular users) and postponed release (approx. 12 hours after regular release). Apply antivirus updates to non-critical systems first, followed by critical ones with the option of clearing the update cache. Helps resolve compliance issues with company network access policy. You can set compliance requirements such as age of virus database, antivirus product version, protection status, availability of antivirus protection, as well as firewall status and force database updates.