ESET PROTECT Entry On-Prem

HK$4,100
A locally-based solution designed specifically for enterprise protection, it can be flexibly utilized and integrated according to users' requirements, saving significant resources and costs. The version combines endpoint and server functionalities and utilizes remote centralized management, providing convenient and multiple safeguards for enterprise information security.

Devices: 10

10
15
20
25
30
40
50
60
70
80
90

Years: 1

1
3

apple paygoogle payvisamaster
Main Features

ESET Endpoint Solutions

  • Antivirus / Antispyware
  • Anti-Phishing
  • Device Control
  • Advanced Memory Scanner
  • Host-Based Intrusion Prevention System (HIPS)
  • Exploit Blocker
  • ESET Live Grid Cloud Detection
  • Botnet Protection
  • Two-Way Firewall
    (Endpoint Security only)
  • Web Control
    (Endpoint Security only)
  • Antispam
    (Endpoint Security only)
  • Secure Browser
    (Endpoint Security only)
  • WMI Scanner

ESET Server Security

  • Antivirus / Antispyware
  • Host-Based Intrusion Prevention System (HIPS)
  • Device Control
  • Web Access Protection
  • Cluster Support
  • Hyper-V Support
  • Automatic Exclusion
  • Low System Resource Usage
  • ESET Live Grid Cloud Detection
  • OneDrive Scanning

ESET Mobile Solutions

  • Real-time Protection
  • Anti-Phishing
  • SMS and Call Filtering
  • Centralized Management Functionality
  • Application Control
  • Anti-Theft
  • Remote Deployment of Account Settings
    (MDM for iOS only)
  • Advanced Management
    (MDM for iOS only)
  • Simplified Authorization Management Mechanism
    (MDM for iOS only)
  • Remote Management
    (MDM for iOS only)

ESET Endpoint Solutions

  • Antivirus / Antispyware
  • Anti-Phishing
  • Device Control
  • Advanced Memory Scanner
  • Host-Based Intrusion Prevention System (HIPS)
  • Exploit Blocker
  • ESET Live Grid Cloud Detection
  • Botnet Protection
  • Two-Way Firewall
    (Endpoint Security only)
  • Web Control
    (Endpoint Security only)
  • Antispam
    (Endpoint Security only)
  • Secure Browser
    (Endpoint Security only)
  • WMI Scanner


ESET Server Security

  • Antivirus / Antispyware
  • Host-Based Intrusion Prevention System (HIPS)
  • Device Control
  • Web Access Protection
  • Cluster Support
  • Hyper-V Support
  • Automatic Exclusion
  • Low System Resource Usage
  • ESET Live Grid Cloud Detection
  • OneDrive Scanning


ESET Mobile Solutions

  • Real-time Protection
  • Anti-Phishing
  • SMS and Call Filtering
  • Centralized Management Functionality
  • Application Control
  • Anti-Theft
  • Remote Deployment of Account Settings
    (MDM for iOS only)
  • Advanced Management
    (MDM for iOS only)
  • Simplified Authorization Management Mechanism
    (MDM for iOS only)
  • Remote Management
    (MDM for iOS only)
Additional Protection

Remote Console

  • Flexible Installation Mechanism
  • User-Friendly Interface
  • Ability to Create Multiple User Permission Groups
  • Hardware Information Management
  • Customizable Reporting and Notification System
  • Virtual Desktop Infrastructure (VDI) Support
  • Enhanced Ransomware Protection
  • Tags

Remote Console

  • Flexible Installation Mechanism
  • User-Friendly Interface
  • Ability to Create Multiple User Permission Groups
  • Hardware Information Management
  • Customizable Reporting and Notification System
  • Virtual Desktop Infrastructure (VDI) Support
  • Enhanced Ransomware Protection
  • Tags
Technical Advantages

Our unique, multilayered approach to security

A single layer of defense is not enough in today’s constantly evolving threat landscape. ESET employs a multitude of proprietary, layered technologies, working together as ESET LiveSense, that goes far beyond the capabilities of basic antivirus. We also use advanced machine learning, which ESET pioneered to combat emerging threats. And we were among the earliest adopters of cloud technology, which powers our ESET LiveGrid® global reputation system to constantly update threat intelligence. Advances like these are the work of ESET’s team of dedicated people, who have been researching malware and innovating technology for more than three decades.


Detailed Description

Remote Console
In recent years, one of the most threatening attacks has been ransomware, which encrypts user files and demands a ransom for file decryption. ESET Enterprise Product V8 has strengthened its protection against this type of attack, providing defense against all known ransomware threats and blocking zero-day vulnerability attacks. With the emergence of various new variants of ransomware, upgrading to the latest version of ESET V8 can help keep you safe from disasters.

Flexible Installation Mechanism It can be installed on Windows, Linux, or virtual devices. After installation, administrators can easily log in and manage everything through the web console from any device or operating system.
User-Friendly Interface (UI) To facilitate readability and operation for managers, the main menu, user interface, and icons have been updated and enhanced.
Multiple user permission groups can be created Multiple user permission groups can be created to hierarchically set their login/management scope permissions, simplifying the responsibilities of large enterprise teams.
Hardware information management Hardware information can be collected from Windows, macOS, and Linux systems.
Customizable reporting and notification system The notification system features a comprehensive WYSIWYG (What You See Is What You Get) editor, allowing you to configure the desired format of the content you receive. Additionally, there are over 170 built-in reports to easily and quickly customize reports.
Support for Virtual Desktop Infrastructure (VDI) Every time a machine connects to the server, an entry is created based on its hardware fingerprint, which remains unchanged even after machine reinstallation. This fingerprint can be used to compare the newly connected machine with previously connected machines, making it easy to resolve conflicts between replicated computers.
Enhanced ransomware protection feature (Ransomware Shield) This feature is a part of the "Host-based Intrusion Prevention System (HIPS)" developed by ESET, which protects computers from ransomware threats.
Tags Use any number of user-defined tags to label related objects, making it easy to identify and find sets of related objects.

Support for ESET's new network security products (additional purchase required for the provided paid service). br> ESET Dynamic Threat Defense
ESET Enterprise Inspector
ESET Full Disk Encryption

System Requirements
Microsoft Windows Server: 2022, 2019, 2016, 2012, 2012 R2
Linux Server: RHEL, CentOS, Ubuntu, SLED, and other major distributions
Virtualization: VMware vSphere / ESXi, VMware Workstation, VMware Player, Hyper-V, Oracle VirtualBox, Citrix
Hardware Requirements: 4GB of memory, 100GB of disk space, 500 MBps disk IOPS, 4 cores; 20GHz or higher processor, recommended network connection of 1Gbit/s




Endpoint Solution
Network security products, developed specifically for enterprises, utilize ThreatSense scanning engine technology, which combines two-way firewall and anti-spam modules to enhance speed and accuracy, ensuring computer security. This product offers a comprehensive security solution that combines robust protection with low system resource usage. With advanced artificial intelligence technology, it actively eliminates viruses, spyware, Trojan horses, worms, adware, rootkits, and other internet-based intrusion attacks, without compromising system performance or interrupting computer operations.

Antivirus / Antispyware Stay protected from network threats by detecting unknown variants or known threats through identification codes and genetic codes. Remove all types of viruses, including viruses, hidden malware, worms, and spyware.
Anti-Phishing Prevent counterfeit websites from stealing personal and corporate account information.
Device Control Set access permissions for different users to deny access, provide read-only access, or allow read and write access. It can also be set as a whitelist.
Advanced Memory Scanner Accurately detect and block malicious programs with multiple layers of encryption and hidden disguises by analyzing program behavior in the cache memory.
Host-Based Intrusion Prevention System (HIPS) Precisely block unknown virus threats and enhance system protection capabilities through self-defined rule settings using code behavior rules.
Exploit Blocker Detect vulnerabilities in web browsers (IE, Google, etc.), PDF readers, Java, Flash, and other web 2.0 related technologies to prevent malicious programs or other threat attacks.
ESET Live Grid Cloud Detection An early warning system in the cloud that streams real-time relevant information provided by "cloud" technology to keep protection functions up to date.
Botnet Protection Prevent the intrusion of malicious software such as botnets, stop computers within the enterprise from sending spam emails, network attacks, and external hacker attacks, thereby avoiding greater losses.
Ransomware Shield Utilizing breakthrough core technology, in addition to strengthening protection against ransomware, detect vulnerabilities in systems and applications, and perform in-depth analysis of multi-layer encrypted malicious programs, preventing them from bypassing scans.
Reputation and Cache Before checking documents, web pages, or performing any scans, ESET products verify the existence of known malicious or whitelisted benign objects in the local cache, thereby improving scanning performance.
UEFI Scanning ESET is the first internet security provider to incorporate UEFI scanning functionality into its retail endpoint protection products. Just like other components of a computer system, once UEFI is compromised by hackers, they can gain unauthorized access to the system and its data. The function of the UEFI scanning engine is to perform detection and interception before Windows starts.
Deep Behavior Inspection Deep behavior inspection is the latest addition to HIPS (Host-based Intrusion Prevention System) host intrusion defense detection technology. By using code behavior rules, it accurately blocks unknown virus threats and enhances system protection capabilities through self-defined rule settings.
Script-Based Attack Protection Building on ESET's award-winning protection technology, it now supports the detection of malicious Windows PowerShell scripts and Java scripts initiated through browsers.
DNA Detection Detection types range from the most precise hash values to ESET DNA detection, which encompasses a comprehensive set of complex definitions for malicious behavior and program characteristics. While attackers can easily modify malicious code or pack it, the targeted behavior is difficult to change, and ESET DNA detection is designed based on this principle.
Network Protection Test and scan for vulnerabilities in the network and detect any untrusted devices currently connected or previously connected, including computers or smartphones. The scan results will also display and classify these devices.
Deep Learning Detection Engine With efficient design, the analysis time for most samples is controlled within 5 minutes. For samples that have already been analyzed, results can be provided in just a few seconds, ensuring real-time protection for all company devices.
Two-Way Firewall (only applicable to ESET Endpoint Security) Prevent unauthorized remote connections to the company network, providing anti-hacker protection and preventing the leakage of confidential data.
Web Control (only applicable to ESET Endpoint Security) Allow administrators to block websites that may contain potentially offensive information.
Antispam (only applicable to ESET Endpoint Security) The spam filter works in conjunction with the system to prevent threats, effectively filtering advertising emails or emails sent from bulk mail servers, mitigating the risks associated with receiving emails.
Secure Browser (only applicable to ESET Endpoint Security) Adopt a zero-trust approach, assuming that the computer or its protection features have been compromised or are insufficient. It prevents the tampering of browser memory space, thus preventing the modification of browser window content. (Not enabled by default)
WMI Scanner Improves registry scanning by searching for and eliminating malicious references or dangerous content in the registry or WMI repository.

Two-Way Firewall (only applicable to ESET Endpoint Security) System Requirements
Windows: 10, 11
macOS 11 (Big Sur) and higher
Linux: (only ESET Endpoint Antivirus) Ubuntu Desktop LTS 18.04 and higher
Red Hat Enterprise Linux 8, 9 with supported desktop environment installed
Linux Mint 20, 21
Android: Android 6 (Marshmallow) and higher




ESET Server Security
Fully compatible with the ESET V8 Central Control Console (ESET PROTECT) tool, it can easily and effectively meet the network needs of servers by providing proactive threat detection, high-speed scanning, and detection rates for all types of malicious attacks, all while occupying extremely low system resources.

Antivirus / Antispyware Stay protected from network threats by detecting unknown variants or known threats through identification codes and genetic codes, and eliminate all types of viruses, including viruses, hidden malware, worms, and spyware.
Host-Based Intrusion Prevention System (HIPS) Precisely block unknown virus threats and enhance system protection capabilities through self-defined rule settings using code behavior rules.
Device Control Set different access permissions for users, such as deny access, read-only, read and write, and create whitelists.
Web Access Protection Scan communication protocols such as HTTP/HTTPS and manage URL addresses.
Cluster Support This infrastructure allows ESET server products to communicate and exchange data with each other, such as configuration and notification, and synchronize the data required for proper operation in a group of product instances.
Hyper-V Support Supports Microsoft virtualization technology.
Automatic Exclusion Detect known services (DC, SQL Server, IIS, etc.) and automatically exclude relevant folder files according to best practices.
Low System Resource Usage Provides powerful protection performance while reserving more system resources for everyday applications.
ESET Live Grid Cloud Detection A cloud-based early warning system that utilizes real-time streaming of relevant information provided by "cloud" technology to keep protection capabilities up to date.
OneDrive Scanning Can be used to scan files stored in the OneDrive cloud storage. Suitable for Office 365 Business accounts.

Two-Way Firewall (only applicable to ESET Endpoint Security) System Requirements
Microsoft Windows Server 2022, 2019, 2016, 2012 R2, 2012
Microsoft Windows Server Core 2022, 2019, 2016
Linux Server: RHEL 7 (x64) and higher, CentOS 7, Ubuntu Server LTS 18.04 and higher, Debian 10 and higher, SLES 15, Alma Linux 8 and higher, Rocky Linux 8 and higher, Oracle Linux 8, Amazon Linux 2




ESET Endpoint Security for Android
Protect enterprise mobile devices from malicious software threats and ensure data security even in the event of device loss or theft. Administrators can monitor installed applications, block application access based on category, permissions, and source, and prompt users to uninstall dangerous applications to reduce their exposure risk. The system supports ESET V8 Central Control Console (ESET PROTECT).

Real-time Protection Utilizing ThreatSense scanning engine technology specifically designed for mobile devices, it provides real-time protection for all applications and files.
Anti-Phishing Prevents fraudulent websites from stealing sensitive information such as usernames, passwords, and online banking data.
SMS and Call Filtering Protects users from unknown numbers or specified contacts for calls and text message harassment, and allows for setting up do-not-disturb periods.
Centralized Management Capability Automatically notifies users and administrators when device settings do not comply with company security policies and suggests adjustments.
Application Control Provides administrators with monitoring of installed applications, blocking of connections, and prompts users to remove specific applications.
Anti-Theft Allow for setting up trusted SIM card protection, remote commands for screen lock, data deletion, siren activation, and more.

Two-Way Firewall (only applicable to ESET Endpoint Security) System Requirements
Android: Android 6 (Marshmallow) and higher
※ Dual SIM card smartphones and tablet devices without calling capabilities are not supported for features like anti-theft, SMS, and call filtering.




ESET Mobile Device Management for iOS
Enhance iOS device security to ensure data safety even in the event of device loss or theft. Administrators can monitor installed applications, block application access based on categories, permissions, and sources, and prompt users to uninstall dangerous applications to reduce their exposure risk. The system supports ESET V8 Central Control Console (ESET Protect) for centralized management across multiple platforms.

Anti-Theft In the event of accidental device loss, it allows for remote wiping of all data stored on the device, including emails and contacts.
Application Restrictions Administrators can create configurations to limit the use of Safari browser, iTunes Store, YouTube, multiplayer games, and prompt users to remove specific applications.
Remote Account Deployment Enables remote bulk deployment of settings for iOS devices, including Exchange, Wi-Fi, and VPN account settings.
Advanced Management Manages passwords, iCloud, privacy settings, device usage, and restriction settings.
Simplified Authorization Management Mechanism Allows for flexible management of authorization quantities, enabling cross-system authorization transfer between devices.
Remote Management ESET iOS Mobile Device Management software supports ESET V8 Central Control Console (ESET Protect), providing complete network security status and centralized viewing capabilities, allowing for unified management of all endpoint devices and servers.

Two-Way Firewall (only applicable to ESET Endpoint Security) System Requirements
Compatible with iPhones and iPads running iOS 9.0 or later.




The package includes

Remote Console
  • ESET PROTECT Console

Endpoint Product
  • ESET Endpoint Security for Windows
  • ESET Endpoint Antivirus for Windows
  • ESET Endpoint Security for macOS
  • ESET Endpoint Antivirus for macOS
  • ESET Endpoint Antivirus for Linux

Mobile Device Product
  • ESET Mobile Device Management for iOS
  • ESET Endpoint Security for Android

File Security Product
  • ESET Server Security