ESET PROTECT Advanced

HK$4,740
Designed specifically for enterprise protection, our cloud-based solution differs from local endpoint solutions. The cloud version places the host in a cloud environment maintained by ESET, allowing users to utilize and combine it flexibly according to their needs, resulting in significant resource and cost savings. This version combines endpoint and server security, utilizing remote centralized management to provide convenient and multiple layers of protection for enterprise information security.
Loading subscriptions ...

Devices: 10

10
15
20
25
30
35
40
50
如想購買其他選項,請點這裡

Years: 1

1
3

apple paygoogle payvisamaster
Main Features

ESET Endpoint Solutions

  • Antivirus / Antispyware
  • Anti-Phishing
  • Device Control
  • Advanced Memory Scanner
  • Host-Based Intrusion Prevention System (HIPS)
  • Exploit Blocker
  • ESET LiveGrid Cloud Detection
  • Botnet Protection
  • Two-Way Firewall
    (Endpoint Security only)
  • Web Control
    (Endpoint Security only)
  • Antispam
    (Endpoint Security only)
  • Secure Browser
    (Endpoint Security only)
  • WMI Scanner

ESET Server Security

  • Antivirus / Antispyware
  • Host-Based Intrusion Prevention System (HIPS)
  • Device Control
  • Web Access Protection
  • Cluster Support
  • Hyper-V Support
  • Automatic Exclusion
  • Low System Resource Usage
  • ESET LiveGrid Cloud Detection
  • OneDrive Scanning

ESET Mobile Solutions

  • Real-time Protection
  • Anti-Phishing
  • SMS and Call Filtering
  • Centralized Management Functionality
  • Application Control
  • Anti-Theft
  • Remote Deployment of Account Settings
    (MDM for iOS only)
  • Advanced Management
    (MDM for iOS only)
  • Simplified Authorization Management Mechanism
    (MDM for iOS only)
  • Remote Management
    (MDM for iOS only)

ESET Endpoint Solutions

  • Antivirus / Antispyware
  • Anti-Phishing
  • Device Control
  • Advanced Memory Scanner
  • Host-Based Intrusion Prevention System (HIPS)
  • Exploit Blocker
  • ESET LiveGrid Cloud Detection
  • Botnet Protection
  • Two-Way Firewall
    (Endpoint Security only)
  • Web Control
    (Endpoint Security only)
  • Antispam
    (Endpoint Security only)
  • Secure Browser
    (Endpoint Security only)
  • WMI Scanner


ESET Server Security

  • Antivirus / Antispyware
  • Host-Based Intrusion Prevention System (HIPS)
  • Device Control
  • Web Access Protection
  • Cluster Support
  • Hyper-V Support
  • Automatic Exclusion
  • Low System Resource Usage
  • ESET LiveGrid Cloud Detection
  • OneDrive Scanning


ESET Mobile Solutions

  • Real-time Protection
  • Anti-Phishing
  • SMS and Call Filtering
  • Centralized Management Functionality
  • Application Control
  • Anti-Theft
  • Remote Deployment of Account Settings
    (MDM for iOS only)
  • Advanced Management
    (MDM for iOS only)
  • Simplified Authorization Management Mechanism
    (MDM for iOS only)
  • Remote Management
    (MDM for iOS only)
Additional Protection

Cloud Console

  • Flexible Installation Mechanism
  • User-Friendly Interface
  • Ability to Create Multiple User Permission Groups
  • Hardware Information Management
  • Customizable Reporting and Notification System
  • Virtual Desktop Infrastructure (VDI) Support
  • Enhanced Ransomware Protection
  • Tags

Full Disk Encryption

  • Manage all products through a single console
  • Comprehensive authentication
  • Powerful encryption
  • Cross-platform coverage
  • One-click deployment
  • Ability to add additional devices anytime

Dynamic Threat Defense

  • Multi-layered defense, filtering and screening with greater clarity
  • Deep learning detection engine, analyzing on average within 5 minutes
  • Message integrity and real-time synchronization
  • Behavioral analysis detection
  • Machine learning technology
  • Zero-day threat defense
  • Cloud sandbox

Cloud Console

  • Flexible Installation Mechanism
  • User-Friendly Interface
  • Ability to Create Multiple User Permission Groups
  • Hardware Information Management
  • Customizable Reporting and Notification System
  • Virtual Desktop Infrastructure (VDI) Support
  • Enhanced Ransomware Protection
  • Tags

Full Disk Encryption

  • Manage all products through a single console
  • Comprehensive authentication
  • Powerful encryption
  • Cross-platform coverage
  • One-click deployment
  • Ability to add additional devices anytime

Dynamic Threat Defense

  • Multi-layered defense, filtering and screening with greater clarity
  • Deep learning detection engine, analyzing on average within 5 minutes
  • Message integrity and real-time synchronization
  • Behavioral analysis detection
  • Machine learning technology
  • Zero-day threat defense
  • Cloud sandbox
Technical Advantages

Our unique, multilayered approach to security

A single layer of defense is not enough in today’s constantly evolving threat landscape. ESET employs a multitude of proprietary, layered technologies, working together as ESET LiveSense, that goes far beyond the capabilities of basic antivirus. We also use advanced machine learning, which ESET pioneered to combat emerging threats. And we were among the earliest adopters of cloud technology, which powers our ESET LiveGrid® global reputation system to constantly update threat intelligence. Advances like these are the work of ESET’s team of dedicated people, who have been researching malware and innovating technology for more than three decades.


Detailed Description

Cloud Console
In recent years, one of the most threatening attacks has been ransomware, which encrypts user files and demands a ransom for file decryption. ESET Enterprise Product V8 has strengthened its protection against this type of attack, providing defense against all known ransomware threats and blocking zero-day vulnerability attacks. With the emergence of various new variants of ransomware, upgrading to the latest version of ESET V8 can help keep you safe from disasters.

Flexible Installation Mechanism It can be installed on Windows, Linux, or virtual devices. After installation, administrators can easily log in and manage everything through the web console from any device or operating system.
User-Friendly Interface(UI) To facilitate readability and operation for managers, the main menu, user interface, and icons have been updated and enhanced.
Ability to Create Multiple User Permission Groups Multiple user permission groups can be created to hierarchically set their login/management scope permissions, simplifying the responsibilities of large enterprise teams.
Hardware Information Management Hardware information can be collected from Windows, macOS, and Linux systems.
Customizable Reporting and Notification System The notification system features a comprehensive WYSIWYG (What You See Is What You Get) editor, allowing you to configure the desired format of the content you receive. Additionally, there are over 170 built-in reports to easily and quickly customize reports.
Virtual Desktop Infrastructure (VDI) Support(Virtual Desktop Infrastructure,VDI) Every time a machine connects to the server, an entry is created based on its hardware fingerprint, which remains unchanged even after machine reinstallation. This fingerprint can be used to compare the newly connected machine with previously connected machines, making it easy to resolve conflicts between replicated computers.
Enhanced Ransomware Protection(Ransomware Shield) This feature is a part of the "Host-based Intrusion Prevention System (HIPS)" developed by ESET, which protects computers from ransomware threats.
Tags Use any number of user-defined tags to label related objects, making it easy to identify and find sets of related objects.

Support for ESET's new network security products (additional purchase required for the provided paid service).
ESET Dynamic Threat Defense
ESET Enterprise Inspector
ESET Full Disk Encryption

Supported browsers
Mozilla Firefox, Microsoft Edge, Google Chrome, Safari, Opera


Endpoint Solution
Network security products, developed specifically for enterprises, utilize ThreatSense scanning engine technology, which combines two-way firewall and anti-spam modules to enhance speed and accuracy, ensuring computer security. This product offers a comprehensive security solution that combines robust protection with low system resource usage. With advanced artificial intelligence technology, it actively eliminates viruses, spyware, Trojan horses, worms, adware, rootkits, and other internet-based intrusion attacks, without compromising system performance or interrupting computer operations.

Antivirus / AntispywareStay protected from network threats by detecting unknown variants or known threats through identification codes and genetic codes. Remove all types of viruses, including viruses, hidden malware, worms, and spyware.
Anti-PhishingPrevent counterfeit websites from stealing personal and corporate account information.
Device ControlSet access permissions for different users to deny access, provide read-only access, or allow read and write access. It can also be set as a whitelist.
Advanced Memory ScannerAccurately detect and block malicious programs with multiple layers of encryption and hidden disguises by analyzing program behavior in the cache memory.
Host-Based Intrusion Prevention System (HIPS)Precisely block unknown virus threats and enhance system protection capabilities through self-defined rule settings using code behavior rules.
Exploit BlockerDetect vulnerabilities in web browsers (IE, Google, etc.), PDF readers, Java, Flash, and other web 2.0 related technologies to prevent malicious programs or other threat attacks.
ESET LiveGrid Cloud DetectionAn early warning system in the cloud that streams real-time relevant information provided by "cloud" technology to keep protection functions up to date.
Botnet ProtectionPrevent the intrusion of malicious software such as botnets, stop computers within the enterprise from sending spam emails, network attacks, and external hacker attacks, thereby avoiding greater losses.
Ransomware ShieldUtilizing breakthrough core technology, in addition to strengthening protection against ransomware, detect vulnerabilities in systems and applications, and perform in-depth analysis of multi-layer encrypted malicious programs, preventing them from bypassing scans.
Reputation and CacheBefore checking documents, web pages, or performing any scans, ESET products verify the existence of known malicious or whitelisted benign objects in the local cache, thereby improving scanning performance.
UEFI ScanningESET is the first internet security provider to incorporate UEFI scanning functionality into its retail endpoint protection products. Just like other components of a computer system, once UEFI is compromised by hackers, they can gain unauthorized access to the system and its data. The function of the UEFI scanning engine is to perform detection and interception before Windows starts.
Deep Behavior InspectionDeep behavior inspection is the latest addition to HIPS (Host-based Intrusion Prevention System) host intrusion defense detection technology. By using code behavior rules, it accurately blocks unknown virus threats and enhances system protection capabilities through self-defined rule settings.
Script-Based Attack Protection Building on ESET's award-winning protection technology, it now supports the detection of malicious Windows PowerShell scripts and Java scripts initiated through browsers.
DNA DetectionDetection types range from the most precise hash values to ESET DNA detection, which encompasses a comprehensive set of complex definitions for malicious behavior and program characteristics. While attackers can easily modify malicious code or pack it, the targeted behavior is difficult to change, and ESET DNA detection is designed based on this principle.
Network ProtectionTest and scan for vulnerabilities in the network and detect any untrusted devices currently connected or previously connected, including computers or smartphones. The scan results will also display and classify these devices.
Deep Learning Detection EngineWith efficient design, the analysis time for most samples is controlled within 5 minutes. For samples that have already been analyzed, results can be provided in just a few seconds, ensuring real-time protection for all company devices.
Two-Way Firewall (ESET ENDPOINT SECURITY only)Prevent unauthorized remote connections to the company network, providing anti-hacker protection and preventing the leakage of confidential data.
Web Control(only applicable to ESET Endpoint Security)Allow administrators to block websites that may contain potentially offensive information.
Antispam(only applicable to ESET Endpoint Security)The spam filter works in conjunction with the system to prevent threats, effectively filtering advertising emails or emails sent from bulk mail servers, mitigating the risks associated with receiving emails.
Secure Browser(only applicable to ESET Endpoint Security)Adopt a zero-trust approach, assuming that the computer or its protection features have been compromised or are insufficient. It prevents the tampering of browser memory space, thus preventing the modification of browser window content. (Not enabled by default)
WMI ScannerImproves registry scanning by searching for and eliminating malicious references or dangerous content in the registry or WMI repository.

System Requirements
Windows: 10, 11
macOS 11 (Big Sur) and higher
Linux: (only ESET Endpoint Antivirus) Ubuntu Desktop LTS 18.04 and higher
Red Hat Enterprise Linux 8, 9 with supported desktop environment installed
Linux Mint 20, 21
Android: Android 6 (Marshmallow) and higher


ESET Server Security
Fully compatible with the ESET V8 Central Control Console (ESET PROTECT) tool, it can easily and effectively meet the network needs of servers by providing proactive threat detection, high-speed scanning, and detection rates for all types of malicious attacks, all while occupying extremely low system resources.

Antivirus / Antispyware Stay protected from network threats by detecting unknown variants or known threats through identification codes and genetic codes, and eliminate all types of viruses, including viruses, hidden malware, worms, and spyware.
Host-Based Intrusion Prevention System (HIPS) Precisely block unknown virus threats and enhance system protection capabilities through self-defined rule settings using code behavior rules.
Device Control Set access permissions for different users to deny access, provide read-only access, or allow read and write access. It can also be set as a whitelist.
Web Access Protection Scan communication protocols such as HTTP/HTTPS and manage URL addresses.
Cluster Support This infrastructure allows ESET server products to communicate and exchange data with each other, such as configuration and notification, and synchronize the data required for proper operation in a group of product instances.
Hyper-V Support Supports Microsoft virtualization technology.
Automatic Exclusion Detect known services (DC, SQL Server, IIS, etc.) and automatically exclude relevant folder files according to best practices.
Low System Resource Usage Provides powerful protection performance while reserving more system resources for everyday applications.
ESET LiveGrid Cloud Detection An early warning system in the cloud that streams real-time relevant information provided by "cloud" technology to keep protection functions up to date.
OneDrive Scanning Can be used to scan files stored in the OneDrive cloud storage. Suitable for Office 365 Business accounts.

System Requirements
Microsoft Windows Server 2022, 2019, 2016, 2012 R2, 2012
Microsoft Windows Server Core 2022, 2019, 2016
Linux Server: RHEL 7 (x64) and higher, CentOS 7, Ubuntu Server LTS 18.04 and higher, Debian 10 and higher, SLES 15, Alma Linux 8 and higher, Rocky Linux 8 and higher, Oracle Linux 8, Amazon Linux 2


Dynamic Threat Defense
In recent years, Advanced Persistent Threat (APT) attacks have been rampant, with increasing threats from malicious emails, ransomware, and phishing emails. ESET Dynamic Threat Defense (EDTD) is specifically designed to address unknown threats. It is a paid cloud-based service that assists enterprises in automatically submitting suspicious files to ESET cloud servers for analysis using advanced malware detection engines. It provides customers with reports on malicious behavior, offering summaries of observed sample behavior, enabling more effective detection of APT attacks and ransomware, and helping businesses combat elusive network threats.

Multi-layered defense, filtering and screening with greater clarity New types of attack behaviors and ransomware continually evolve through variants and versions. ESET Dynamic Threat Defense applies three different machine learning models to process uploaded file samples and performs simulation analysis in a fully sandboxed environment, leaving no room for malware attempting to deceive or evade detection.
Deep learning detection engine, analyzing on average within 5 minutes With efficient design, the analysis time for most samples is controlled within 5 minutes. For samples that have already been analyzed, results can be provided in just a few seconds, ensuring real-time protection for all company devices.
Message integrity and real-time synchronization Each analyzed sample can be accessed in the ESET V8 Central Control Console (ESET Protect). Additionally, all data from the ESET cloud protection system (ESET LiveGrid*) is synchronized and updated here, allowing enterprises to promptly manage their cybersecurity defenses.

System Requirements
ESET Endpoint Antivirus(version 7 and later)
ESET Endpoint Security(version 7 and later)
ESET Mail Security(version 7 and later)
ESET Server Security for Windows Server(version 7 and later)
Supported Proxy: For Windows users, it is recommended to use Apache 2.4.46.
Not supported: Installation on client computers with Windows XP and Windows Server 2003, with 250 or more devices.


Full Disk Encryption
Providing powerful encryption capabilities managed locally by the ESET Remote Management Console improves the organization's data security. It can be managed using ESET Protect Cloud or ESET Protect, which helps administrators save time due to their familiarity with existing management environments and concepts. It offers a basic encryption solution to achieve legal compliance. It not only protects businesses from data loss but also helps them comply with data protection regulations such as GDPR.

Manage all products through a single console ESET Full Disk Encryption (EFDE) operates within the ESET V8 Central Control Console (ESET Protect), enabling administrators to save time due to their familiarity with existing management environments and concepts.
Comprehensive authentication Patented technology protects data for businesses of various sizes. ESET Full Disk Encryption (EFDE) is validated with FIPS 140-2 and utilizes 256-bit AES encryption.
Powerful encryption It encrypts system disks, partitions, and entire drives to ensure that everything stored on each computer or laptop is locked and protected, preventing loss or theft.
Cross-platform coverage Manages encryption on Windows computers and local macOS encryption (FileVault) through a single dashboard.
One-click deployment Deploys full disk encryption across the entire network from the cloud-based console. The ESET V8 Central Control Console (ESET Protect) allows administrators to deploy, activate, and manage encryption on their connected endpoints with just one click.
Ability to add additional devices anytime You can add devices covered by the license at any time.

System Requirements
Microsoft Windows 10, 11
macOS 10.14 (Mojave) and higher

※ Requires the deployment of ESET V10 Central Control Console (ESET Protect Console) in the cloud or locally.
※ Do not install the EFDE client application on the same workstation as the ESET PROTECT server database.


ESET Endpoint Security for Android
Protect enterprise mobile devices from malicious software threats and ensure data security even in the event of device loss or theft. Administrators can monitor installed applications, block application access based on category, permissions, and source, and prompt users to uninstall dangerous applications to reduce their exposure risk. The system supports ESET V8 Central Control Console (ESET PROTECT).

Real-time Protection Utilizing ThreatSense scanning engine technology specifically designed for mobile devices, it provides real-time protection for all applications and files.
Anti-Phishing Prevents fraudulent websites from stealing sensitive information such as usernames, passwords, and online banking data.
SMS and Call Filtering Protects users from unknown numbers or specified contacts for calls and text message harassment, and allows for setting up do-not-disturb periods.
Centralized Management Functionality Automatically notifies users and administrators when device settings do not comply with company security policies and suggests adjustments.
Application Control Provides administrators with monitoring of installed applications, blocking of connections, and prompts users to remove specific applications.
Anti-Theft Allow for setting up trusted SIM card protection, remote commands for screen lock, data deletion, siren activation, and more.

System Requirements
Android: Android 6 (Marshmallow) and higher
※ Dual SIM card smartphones and tablet devices without calling capabilities are not supported for features like anti-theft, SMS, and call filtering.


ESET Mobile Device Management for iOS
Enhance iOS device security to ensure data safety even in the event of device loss or theft. Administrators can monitor installed applications, block application access based on categories, permissions, and sources, and prompt users to uninstall dangerous applications to reduce their exposure risk. The system supports ESET V8 Central Control Console (ESET Protect) for centralized management across multiple platforms.

Anti-Theft In the event of accidental device loss, it allows for remote wiping of all data stored on the device, including emails and contacts.
Application Restrictions Administrators can create configurations to limit the use of Safari browser, iTunes Store, YouTube, multiplayer games, and prompt users to remove specific applications.
Remote Deployment of Account Settings Enables remote bulk deployment of settings for iOS devices, including Exchange, Wi-Fi, and VPN account settings.
Advanced Management Manages passwords, iCloud, privacy settings, device usage, and restriction settings.
Simplified Authorization Management Mechanism Allows for flexible management of authorization quantities, enabling cross-system authorization transfer between devices.
Remote Management ESET iOS Mobile Device Management software supports ESET V8 Central Control Console (ESET Protect), providing complete network security status and centralized viewing capabilities, allowing for unified management of all endpoint devices and servers.

System Requirements
Compatible with iPhones and iPads running iOS 9.0 or later.


The package includes

Cloud Console
  • ESET PROTECT Console


Endpoint Product
  • ESET Endpoint Security for Windows
  • ESET Endpoint Antivirus for Windows
  • ESET Endpoint Security for macOS
  • ESET Endpoint Antivirus for macOS
  • ESET Endpoint Antivirus for Linux


Mobile Device Product
  • ESET Mobile Device Management for iOS
  • ESET Endpoint Security for Android
ESET Server Security Product
  • ESET Server Security


Mail Security Product
  • ESET Mail Security


Additional Protection Product
  • ESET Dynamic Threat Defense
  • ESET Full Disk Encryption

The package includes

Cloud Central Control Console
  • ESET PROTECT Console


Endpoint Product
  • ESET Endpoint Security for Windows
  • ESET Endpoint Antivirus for Windows
  • ESET Endpoint Security for macOS
  • ESET Endpoint Antivirus for macOS
  • ESET Endpoint Antivirus for Linux


Mobile Device Product
  • ESET Mobile Device Management for iOS
  • ESET Endpoint Security for Android


ESET Server Security Product
  • ESET Server Security


Mail Security Product
  • ESET Mail Security


Additional Protection Product
  • ESET Dynamic Threat Defense
  • ESET Full Disk Encryption