ESET PROTECT Entry On-Prem

HK$4,100
A locally-based solution designed specifically for enterprise protection, it can be flexibly utilized and integrated according to users' requirements, saving significant resources and costs. The version combines endpoint and server functionalities and utilizes remote centralized management, providing convenient and multiple safeguards for enterprise information security.

Devices: 10

10
15
20
25
30
40
50
60
70
80
90

Years: 1

1
3

apple paygoogle payvisamaster
Main Features

ESET Endpoint Solutions

  • Antivirus / Antispyware
  • Anti-Phishing
  • Device Control
  • Advanced Memory Scanner
  • Host-Based Intrusion Prevention System (HIPS)
  • Exploit Blocker
  • ESET Live Grid Cloud Detection
  • Botnet Protection
  • Two-Way Firewall
    (Endpoint Security only)
  • Web Control
    (Endpoint Security only)
  • Antispam
    (Endpoint Security only)
  • Secure Browser
    (Endpoint Security only)
  • WMI Scanner

ESET Server Security

  • Antivirus / Antispyware
  • Host-Based Intrusion Prevention System (HIPS)
  • Device Control
  • Web Access Protection
  • Cluster Support
  • Hyper-V Support
  • Automatic Exclusion
  • Low System Resource Usage
  • ESET Live Grid Cloud Detection
  • OneDrive Scanning

ESET Mobile Solutions

  • Real-time Protection
  • Anti-Phishing
  • SMS and Call Filtering
  • Centralized Management Functionality
  • Application Control
  • Anti-Theft
  • Remote Deployment of Account Settings
    (MDM for iOS only)
  • Advanced Management
    (MDM for iOS only)
  • Simplified Authorization Management Mechanism
    (MDM for iOS only)
  • Remote Management
    (MDM for iOS only)

ESET Endpoint Solutions

  • Antivirus / Antispyware
  • Anti-Phishing
  • Device Control
  • Advanced Memory Scanner
  • Host-Based Intrusion Prevention System (HIPS)
  • Exploit Blocker
  • ESET Live Grid Cloud Detection
  • Botnet Protection
  • Two-Way Firewall
    (Endpoint Security only)
  • Web Control
    (Endpoint Security only)
  • Antispam
    (Endpoint Security only)
  • Secure Browser
    (Endpoint Security only)
  • WMI Scanner


ESET Server Security

  • Antivirus / Antispyware
  • Host-Based Intrusion Prevention System (HIPS)
  • Device Control
  • Web Access Protection
  • Cluster Support
  • Hyper-V Support
  • Automatic Exclusion
  • Low System Resource Usage
  • ESET Live Grid Cloud Detection
  • OneDrive Scanning


ESET Mobile Solutions

  • Real-time Protection
  • Anti-Phishing
  • SMS and Call Filtering
  • Centralized Management Functionality
  • Application Control
  • Anti-Theft
  • Remote Deployment of Account Settings
    (MDM for iOS only)
  • Advanced Management
    (MDM for iOS only)
  • Simplified Authorization Management Mechanism
    (MDM for iOS only)
  • Remote Management
    (MDM for iOS only)
Additional Protection

Remote Console

  • Flexible Installation Mechanism
  • User-Friendly Interface
  • Ability to Create Multiple User Permission Groups
  • Hardware Information Management
  • Customizable Reporting and Notification System
  • Virtual Desktop Infrastructure (VDI) Support
  • Enhanced Ransomware Protection
  • Tags

Remote Console

  • Flexible Installation Mechanism
  • User-Friendly Interface
  • Ability to Create Multiple User Permission Groups
  • Hardware Information Management
  • Customizable Reporting and Notification System
  • Virtual Desktop Infrastructure (VDI) Support
  • Enhanced Ransomware Protection
  • Tags
Technical Advantages

Our unique, multilayered approach to security
A single layer of defense is not enough in today’s constantly evolving threat landscape. ESET employs a multitude of proprietary, layered technologies, working together as ESET LiveSense, that goes far beyond the capabilities of basic antivirus. We also use advanced machine learning, which ESET pioneered to combat emerging threats. And we were among the earliest adopters of cloud technology, which powers our ESET LiveGrid® global reputation system to constantly update threat intelligence. Advances like these are the work of ESET’s team of dedicated people, who have been researching malware and innovating technology for more than three decades.

  • ESET Live Grid 雲端防禦
    為雲端的預早警告系統,利用從「雲端」技術所提供的相關資訊即時串流,將防護功能維持在最新狀態。

  • 防禦殭屍網絡
    防範殭屍網絡等惡意軟件入侵,預防企業內部的電腦發出垃圾郵件、網絡攻擊、黑客對外攻擊、避免造成更大的損失。

  • 勒索軟件防護
    突破性核心技術,除了加強對勒索軟件的防護外,針對系統及應用程式上的漏洞,進行漏洞偵測並深入分析多層加密的惡意程式,避免惡意程式及未知威脅繞過掃描。

  • 進階記憶體掃描器
    針對多層加殼及隱藏偽裝的惡意軟件,藉由快取記憶體中的程式行為分析,準確判斷並阻擋惡意程式。

  • 深度行為檢查
    深度行為檢查是 HIPS 主機入侵防禦偵測的最新補充技術,藉由代碼行為規則,精準阻擋未知型病毒威脅,並可透過自主規則設定,加強系統防護能力。

  • 腳本攻擊保護
    秉承 ESET 獲獎無數的優異防護技術,現在更進一步,支援檢測利用瀏覽器發起的 Windows PowerShell 惡意腳本和 Java 腳本攻擊。

  • 防禦程式漏洞
    針對網絡瀏覽器(IE、Google ⋯⋯ 等網頁瀏覽器)、PDF 閱讀器、JAVA、Flash 及其它 web2.0 相關技術進行漏洞偵測,防止惡意程式或其它威脅攻擊。

  • 聲譽和緩存
    在檢查文件或網頁時,或在進行任何掃描之前,ESET 產品會檢查本地緩存中是否存在已知的惡意或列入白名單的良性對象,藉此提高掃描性能。

  • DNA 檢測
    檢測類型涵蓋從最精準哈希值(hash)到 ESET DNA 檢測,即對惡意行為和惡意程式特徵的一整套複雜定義。儘管攻擊者很容易修改惡意代碼或加殼,但目標行為難以改變,ESET DNA 檢測正是基於這一原則而設計。

  • UEFI 掃描
    ESET 是首家在零售終端防護產品中加入 UEFI 掃描功能的互聯網安全提供商。與電腦系統的其他組件一樣,一旦 UEFI 被黑客攻擊後,便可獲取系統及其數據的非法訪問權限。UEFI 掃描引擎的功能,就是在 Windows 啟動之前執行檢測和攔截。

  • 裝置控制
    依使用者權限不同來設定為拒絕存取、讀取或讀取與寫入,也可將其設為白名單。

  • 網絡防護
    測試並掃描網絡是否存有漏洞,及其他任何不信任裝置正在連接網絡,而掃瞄結果亦會顯示並分類出正在、或曾經連接過的裝置,包括電腦或智能手機等。

  • 產品內置沙盒
    內置沙盒能夠輔助識別,加殼惡意程式表面下隱藏的真實行為。利用此項技術,ESET 方案模擬電腦軟硬件的各個組成部分,在完全隔離的虛擬化環境下處理可疑樣本。

  • 深度學習偵測引擎
    採用高效率設計,將多數樣本的分析時間控制在 5 分鐘以內,對於原先已分析過的樣本,只需要幾秒鐘便可反饋結果,令公司所有設備均可及時得到防護。
Detailed Description

Remote Console
In recent years, one of the most threatening attacks has been ransomware, which encrypts user files and demands a ransom for file decryption. ESET Enterprise Product V8 has strengthened its protection against this type of attack, providing defense against all known ransomware threats and blocking zero-day vulnerability attacks. With the emergence of various new variants of ransomware, upgrading to the latest version of ESET V8 can help keep you safe from disasters.

Flexible Installation Mechanism It can be installed on Windows, Linux, or virtual devices. After installation, administrators can easily log in and manage everything through the web console from any device or operating system.
User-Friendly Interface (UI)(UI) To facilitate readability and operation for managers, the main menu, user interface, and icons have been updated and enhanced.
Multiple user permission groups can be created Multiple user permission groups can be created to hierarchically set their login/management scope permissions, simplifying the responsibilities of large enterprise teams.
Hardware information management Hardware information can be collected from Windows, macOS, and Linux systems.
Customizable reporting and notification system The notification system features a comprehensive WYSIWYG (What You See Is What You Get) editor, allowing you to configure the desired format of the content you receive. Additionally, there are over 170 built-in reports to easily and quickly customize reports.
Support for Virtual Desktop Infrastructure (VDI) Every time a machine connects to the server, an entry is created based on its hardware fingerprint, which remains unchanged even after machine reinstallation. This fingerprint can be used to compare the newly connected machine with previously connected machines, making it easy to resolve conflicts between replicated computers.
Enhanced ransomware protection feature (Ransomware Shield) This feature is a part of the "Host-based Intrusion Prevention System (HIPS)" developed by ESET, which protects computers from ransomware threats.
Tags Use any number of user-defined tags to label related objects, making it easy to identify and find sets of related objects.

Support for ESET's new network security products (additional purchase required for the provided paid service). br> ESET Dynamic Threat Defense
ESET Enterprise Inspector )
ESET Full Disk Encryption

System Requirements
Microsoft Windows Server: 2022, 2019, 2016, 2012, 2012 R2
Linux Server: RHEL, CentOS, Ubuntu, SLED, and other major distributions
Virtualization: VMware vSphere / ESXi, VMware Workstation, VMware Player, Hyper-V, Oracle VirtualBox, Citrix
Hardware Requirements: 4GB of memory, 100GB of disk space, 500 MBps disk IOPS, 4 cores; 20GHz or higher processor, recommended network connection of 1Gbit/s




Endpoint Solution
Network security products, developed specifically for enterprises, utilize ThreatSense scanning engine technology, which combines two-way firewall and anti-spam modules to enhance speed and accuracy, ensuring computer security. This product offers a comprehensive security solution that combines robust protection with low system resource usage. With advanced artificial intelligence technology, it actively eliminates viruses, spyware, Trojan horses, worms, adware, rootkits, and other internet-based intrusion attacks, without compromising system performance or interrupting computer operations.

Antivirus / Antispyware Stay protected from network threats by detecting unknown variants or known threats through identification codes and genetic codes. Remove all types of viruses, including viruses, hidden malware, worms, and spyware.
Anti-Phishing Prevent counterfeit websites from stealing personal and corporate account information.
Device Control Set access permissions for different users to deny access, provide read-only access, or allow read and write access. It can also be set as a whitelist.
Advanced Memory Scanner Accurately detect and block malicious programs with multiple layers of encryption and hidden disguises by analyzing program behavior in the cache memory.
Host-Based Intrusion Prevention System (HIPS) Precisely block unknown virus threats and enhance system protection capabilities through self-defined rule settings using code behavior rules.
Exploit Blocker Detect vulnerabilities in web browsers (IE, Google, etc.), PDF readers, Java, Flash, and other web 2.0 related technologies to prevent malicious programs or other threat attacks.
ESET Live Grid Cloud Detection An early warning system in the cloud that streams real-time relevant information provided by "cloud" technology to keep protection functions up to date.
Botnet Protection Prevent the intrusion of malicious software such as botnets, stop computers within the enterprise from sending spam emails, network attacks, and external hacker attacks, thereby avoiding greater losses.
Ransomware Shield Utilizing breakthrough core technology, in addition to strengthening protection against ransomware, detect vulnerabilities in systems and applications, and perform in-depth analysis of multi-layer encrypted malicious programs, preventing them from bypassing scans.
Reputation and Cache Before checking documents, web pages, or performing any scans, ESET products verify the existence of known malicious or whitelisted benign objects in the local cache, thereby improving scanning performance.
UEFI Scanning ESET is the first internet security provider to incorporate UEFI scanning functionality into its retail endpoint protection products. Just like other components of a computer system, once UEFI is compromised by hackers, they can gain unauthorized access to the system and its data. The function of the UEFI scanning engine is to perform detection and interception before Windows starts.
Deep Behavior Inspection Deep behavior inspection is the latest addition to HIPS (Host-based Intrusion Prevention System) host intrusion defense detection technology. By using code behavior rules, it accurately blocks unknown virus threats and enhances system protection capabilities through self-defined rule settings.
Script-Based Attack Protection Building on ESET's award-winning protection technology, it now supports the detection of malicious Windows PowerShell scripts and Java scripts initiated through browsers.
DNA Detection Detection types range from the most precise hash values to ESET DNA detection, which encompasses a comprehensive set of complex definitions for malicious behavior and program characteristics. While attackers can easily modify malicious code or pack it, the targeted behavior is difficult to change, and ESET DNA detection is designed based on this principle.
Network Protection Test and scan for vulnerabilities in the network and detect any untrusted devices currently connected or previously connected, including computers or smartphones. The scan results will also display and classify these devices.
Deep Learning Detection Engine With efficient design, the analysis time for most samples is controlled within 5 minutes. For samples that have already been analyzed, results can be provided in just a few seconds, ensuring real-time protection for all company devices.
Two-Way Firewall (only applicable to ESET Endpoint Security) Prevent unauthorized remote connections to the company network, providing anti-hacker protection and preventing the leakage of confidential data.
Web Control (only applicable to ESET Endpoint Security) Allow administrators to block websites that may contain potentially offensive information.
Antispam (only applicable to ESET Endpoint Security) The spam filter works in conjunction with the system to prevent threats, effectively filtering advertising emails or emails sent from bulk mail servers, mitigating the risks associated with receiving emails.
Secure Browser (only applicable to ESET Endpoint Security) Adopt a zero-trust approach, assuming that the computer or its protection features have been compromised or are insufficient. It prevents the tampering of browser memory space, thus preventing the modification of browser window content. (Not enabled by default)
WMI Scanner Improves registry scanning by searching for and eliminating malicious references or dangerous content in the registry or WMI repository.

Two-Way Firewall (only applicable to ESET Endpoint Security) System Requirements
Windows: 10, 8.1, 8, 7 (SP1)
macOS: 10.12 and above
Linux: (only ESET Endpoint Antivirus) Ubuntu, Red Hat
Android: Android 5 and above




ESET Server Security
Fully compatible with the ESET V8 Central Control Console (ESET PROTECT) tool, it can easily and effectively meet the network needs of servers by providing proactive threat detection, high-speed scanning, and detection rates for all types of malicious attacks, all while occupying extremely low system resources.

Antivirus / Antispyware Stay protected from network threats by detecting unknown variants or known threats through identification codes and genetic codes, and eliminate all types of viruses, including viruses, hidden malware, worms, and spyware.
Host-Based Intrusion Prevention System (HIPS) Precisely block unknown virus threats and enhance system protection capabilities through self-defined rule settings using code behavior rules.
Device Control Set different access permissions for users, such as deny access, read-only, read and write, and create whitelists.
Web Access Protection Scan communication protocols such as HTTP/HTTPS and manage URL addresses.
Cluster Support This infrastructure allows ESET server products to communicate and exchange data with each other, such as configuration and notification, and synchronize the data required for proper operation in a group of product instances.
Hyper-V Support /strong> Supports Microsoft virtualization technology. /td>
Automatic Exclusion Detect known services (DC, SQL Server, IIS, etc.) and automatically exclude relevant folder files according to best practices.
Low System Resource Usage Provides powerful protection performance while reserving more system resources for everyday applications.
ESET Live Grid Cloud Detection A cloud-based early warning system that utilizes real-time streaming of relevant information provided by "cloud" technology to keep protection capabilities up to date.
OneDrive Scanning Can be used to scan files stored in the OneDrive cloud storage. Suitable for Office 365 Business accounts.

Two-Way Firewall (only applicable to ESET Endpoint Security) System Requirements
Microsoft Windows Server 2022, 2019, 2016, 2012, 2008 R2 SP1
Microsoft Windows Server Core 2012, 2008R2 SP1
Microsoft Small Business Server 2011 SP1
Linux Server: RHEL 7 (x64) and above, CentOS 7 (x64) and above, Ubuntu Server 16.04 LTS (164) and above, Debian 10, SLES 12 (x64) and above.




ESET Endpoint Security for Android
Protect enterprise mobile devices from malicious software threats and ensure data security even in the event of device loss or theft. Administrators can monitor installed applications, block application access based on category, permissions, and source, and prompt users to uninstall dangerous applications to reduce their exposure risk. The system supports ESET V8 Central Control Console (ESET PROTECT).

Real-time Protection Utilizing ThreatSense scanning engine technology specifically designed for mobile devices, it provides real-time protection for all applications and files.
Anti-Phishing Prevents fraudulent websites from stealing sensitive information such as usernames, passwords, and online banking data.
SMS and Call Filtering Protects users from unknown numbers or specified contacts for calls and text message harassment, and allows for setting up do-not-disturb periods.
Centralized Management Capability Automatically notifies users and administrators when device settings do not comply with company security policies and suggests adjustments.
Application Control Provides administrators with monitoring of installed applications, blocking of connections, and prompts users to remove specific applications.
Anti-Theft Allow for setting up trusted SIM card protection, remote commands for screen lock, data deletion, siren activation, and more.

Two-Way Firewall (only applicable to ESET Endpoint Security) System Requirements
Android 5 (Lollipop) and later versions
※ Dual SIM card smartphones and tablet devices without calling capabilities are not supported for features like anti-theft, SMS, and call filtering.




ESET Mobile Device Management for iOS
Enhance iOS device security to ensure data safety even in the event of device loss or theft. Administrators can monitor installed applications, block application access based on categories, permissions, and sources, and prompt users to uninstall dangerous applications to reduce their exposure risk. The system supports ESET V8 Central Control Console (ESET Protect) for centralized management across multiple platforms.

Anti-Theft In the event of accidental device loss, it allows for remote wiping of all data stored on the device, including emails and contacts.
Application Restrictions Administrators can create configurations to limit the use of Safari browser, iTunes Store, YouTube, multiplayer games, and prompt users to remove specific applications.
Remote Account Deployment Enables remote bulk deployment of settings for iOS devices, including Exchange, Wi-Fi, and VPN account settings.
Advanced Management Manages passwords, iCloud, privacy settings, device usage, and restriction settings.
Simplified Authorization Management Mechanism Allows for flexible management of authorization quantities, enabling cross-system authorization transfer between devices.
Remote Management ESET iOS Mobile Device Management software supports ESET V8 Central Control Console (ESET Protect), providing complete network security status and centralized viewing capabilities, allowing for unified management of all endpoint devices and servers.

Two-Way Firewall (only applicable to ESET Endpoint Security) System Requirements
Compatible with iPhones and iPads running iOS 9.0 or later.




The package includes

Remote Console
  • ESET PROTECT Console

Endpoint Product
  • ESET Endpoint Security for Windows
  • ESET Endpoint Antivirus for Windows
  • ESET Endpoint Security for macOS
  • ESET Endpoint Antivirus for macOS
  • ESET Endpoint Antivirus for Linux

Mobile Device Product
  • ESET Mobile Device Management for iOS
  • ESET Endpoint Security for Android

File Security Product
  • ESET Server Security
Flexible Mounting Mechanism It can be installed on Windows, Linux, or a virtual device. After the installation is complete, the administrator can easily log in from any device or operating system through the web console for all management. Simple and easy-to-use user interface (UI) In order to make it easy for administrators to read and operate, the main menu, user interface, and icons have been updated and beautified. Can create permission groups for multiple users Multiple user authority groups can be established, and their login/management scope permissions can be set hierarchically, simplifying the responsibilities of large enterprise teams. Hardware Information Management Installed hardware information can be collected from Windows, macOS and Linux systems. Customizable report and notification system The notification system has a full WYSIWYG (What You See Is What You Get) editor, and you can customize the format content you want to receive.In addition, there are more than 170 built-in reports, allowing you to customize reports easily and quickly. Support for Virtual Desktop Infrastructure (VDI) Every time the machine connects to the server, a project is created from its hardware fingerprint. After reinstalling the machine, this fingerprint will not change. It can be used to compare the newly connected machine with the previously connected machine, allowing you to easily Resolve conflicts between cloned computers. Enhanced ransomware protection (Ransomware Shield) This feature is part of the Host-based Intrusion Prevention System (HIPS: Host-based Intrusion Prevention System) developed by ESET to protect computers from ransomware threats. Label Tag related objects with any number of fully user-definable tags, easily used to identify and find related sets of objects.

Support for ESET's new Internet security products (an additional purchase is required for paid services provided.)
ESET Dynamic Threat Defense
ESET Endpoint Advanced Threat Detection System (ESET Enterprise Inspector)
ESET Full Disk Encryption

System Requirements
Microsoft Windows Server:2022, 2019, 2016, 2012, 2012 R2
Linux Server: RHEL, CentOS, Ubuntu, SLED and other major distributions
virtual device: VMware vSphere / ESXi, VMware Workstation, VMware Player, Hyper-V, Oracle VirtualBox Citrix
Hardware requirements: memory 4GB, hard disk space 100GB, hard disk IOPS 500 MBps, processor 4 cores; 20GHz or above, network connection recommended 1Gbit/s




Endpoint Solution
A network security product specially developed for enterprises, the ThreatSense scanning engine technology combines a two-way firewall and an anti-spam module to speed up and ensure computer security with precision.This product has a complete security solution, combining the strongest protection with low system usage, advanced technology based on artificial intelligence, which can actively eliminate viruses, spyware, Trojan horses, worms, adware, rootkits and other Internet-based intrusions attacks without impairing system performance or interrupting computer operations.

Antivirus / Antispyware Stay away from network threats, detect unknown variants or known threats through identification codes and genetic codes, and remove all types of viruses including: viruses, hidden malware, worms and spyware.
Phishing Site Protection Prevent fake websites from stealing personal and business account information.
device control According to different user permissions, set it to deny access, read or read and write, and it can also be set as a white list.
Advanced Memory Scanner For multi-layer packer and hidden camouflage malware, accurately judge and block malicious programs by analyzing program behavior in cache memory.
HIPS Host Intrusion Prevention Detection By code behavior rules, unknown virus threats can be accurately blocked, and system protection capabilities can be strengthened through independent rule settings.
Defending Program Vulnerabilities Vulnerability detection for web browsers (IE, Google, etc.), PDF readers, JAVA, Flash and other web2.0 related technologies to prevent malicious programs or other threats.
ESET Live Grid Remote Detection A remote early warning system that utilizes real-time streaming of relevant information from "remote" technology to keep protection features up-to-date.
Defense against botnets Prevent malicious software such as botnets from intruding, prevent internal computers from sending spam, network attacks, and hackers to attack externally, and avoid causing greater losses.
Ransomware Protection The breakthrough core technology, in addition to strengthening the protection against ransomware, conducts vulnerability detection and in-depth analysis of multi-layer encrypted malicious programs for system and application vulnerabilities, preventing malicious programs and unknown threats from bypassing scanning.
reputation and caching When checking a file or web page, or before any scan, ESET products improve scanning performance by checking the local cache for known malicious or whitelisted benign objects.
UEFI scan ESET is the first Internet security provider to include UEFI scanning in retail endpoint protection products.Like other components of a computer system, once UEFI is hacked, it can gain unauthorized access to the system and its data.The function of the UEFI scanning engine is to perform detection and interception before Windows starts.
Deep Behavior Inspection Deep behavior inspection is the latest supplementary technology for HIPS host intrusion prevention detection. It accurately blocks unknown virus threats through code behavior rules, and can strengthen system protection capabilities through independent rule settings.
Script Attack Protection Inheriting ESET's award-winning protection technology, it now goes one step further and supports detection of Windows PowerShell malicious scripts and Java script attacks launched from the browser.
dna testing Detection types range from the most accurate hash (hash) to ESET DNA detection, a complex set of definitions of malicious behavior and malware characteristics.Although it is easy for attackers to modify malicious code or pack it, it is difficult to change the behavior of the target, and ESET DNA detection is designed based on this principle.
network protection Test and scan the network for vulnerabilities, and any other untrusted devices that are connecting to the network, and the scan results will also display and classify devices that are or have been connected, including computers or smartphones.
Deep Learning Detection Engine With the high-efficiency design, the analysis time of most samples is controlled within 5 minutes. For the samples that have been analyzed before, the results can be fed back in only a few seconds, so that all the equipment of the company can be protected in time.
2-way firewall (for ESET ENDPOINT SECURITY only) Prevent unauthorized remote connections to the company network, provide anti-hacking protection and prevent leakage of confidential information.
WEB MONITORING (AVAILABLE ONLY FOR ESET ENDPOINT SECURITY) Allows administrators to block websites that may contain potentially offensive information.
SPAM PROTECTION (only available with ESET ENDPOINT SECURITY) The spam filter can work with the system to prevent threats, effectively filter advertising letters or mail servers sent in large quantities, and prevent users from receiving email risks.
SECURE BROWSER (only available with ESET ENDPOINT SECURITY) In a zero-trust approach, it is assumed that the computer or its protection functions have been cracked or insufficient, and tampering with the memory space of the browser is not allowed, so the content of the browser window cannot be tampered with.(disabled by default)
WMI and full registry scan Improved registry scanning to find and eliminate malicious references or dangerous content in registry or WMI repositories.

System Requirements
Windows:10, 8.1, 8, 7(SP1)
macOS: 10.12 or higher
Linux:(only ESET Endpoint Antivirus) Ubuntu Red Hat
Android: Android 5 and above




ESET Server Security
Fully compatible with the ESET V8 central console (ESET PROTECT) tool, which can simply and effectively meet the network needs of the server It can provide active threat detection, high-speed scanning and detection rate for all types of malicious attacks, and it only needs to occupy extremely low system resources to complete.

Antivirus / Antispyware Stay away from network threats, detect unknown variants or known threats through identification codes and genetic codes, and remove all types of viruses including: viruses, hidden malware, worms and spyware.
HIPS Host Intrusion Prevention Detection By code behavior rules, unknown virus threats can be accurately blocked, and system protection capabilities can be strengthened through independent rule settings.
device control According to different user permissions, set it to deny access, read or read and write, and it can also be set as a white list.
Web Access Protection Scan protocols such as HTTP/HTTPS, and set URL address management.
Support cluster environment (Cluster) This infrastructure allows ESET server products to communicate with each other and exchange data, such as configuration and notification and synchronization of data necessary for the products to perform correct operations in individual groups.
Support for Hyper-V Support Microsoft virtualization technology.
auto exclude Detects known services (DC, SQL Server, IIS, etc.) and automatically excludes related folders and files according to the best recommendations.
Low system resource usage While providing powerful protection performance, more system resources are reserved for daily applications.
ESET Live Grid Remote Detection A remote early warning system that utilizes real-time streaming of relevant information from "remote" technology to keep protection features up-to-date.
OneDrive scan Can be used to scan files placed in OneDrive remote storage.Available for Office 365 business accounts.

System Requirements
Microsoft Windows Server 2022, 2019, 2016, 2012, 2008 R2 SP1
Microsoft Windows Server Core 2012, 2008R2 SP1
Microsoft Small Business Server 2011 SP1
Linux Server: RHEL 7 (x64) or later, CentOS 7 (x64) or later, Ubuntu Server 16.04 LTS (164) or later, Deblan 10, SLES 120x640) or later




ESET Endpoint Security for Android
Protect corporate mobile devices from malware threats, and ensure data security even if the device is lost or stolen. Administrators can monitor Installed applications, or block application access according to category, permission and program source, and remind users to remove the danger of installation applications to reduce their risk of exposure.ESET V8 Center Console (ESET PROTECT) is supported.

instant protection With ThreatSense scanning engine technology, it is specially designed for mobile devices, which can protect all applications and files in real time.
Phishing Site Protection Prevent fake websites from stealing confidential information, such as user names, passwords, and online banking information...etc.
SMS and call filtering Protect users from phone calls and SMS harassment from unknown numbers or designated contacts, and you can also set the anti-harassment function for specified time periods.
Centralized management function When the settings of the device do not comply with the company's security policy, the program will automatically notify the user and administrator to make adjustment suggestions.
App Control Provides administrators with functions such as monitoring installed programs, blocking connections, and prompting users to remove specific programs.
Anti-theft function You can set trusted SIM card protection and remote commands such as lock screen, data deletion, alarm...etc.

System Requirements
Android 5 (Lollipop) and newer
※ Tablets that do not support dual-SIM smartphone devices and calling functions cannot use functions such as anti-theft, SMS and call filtering.




ESET Mobile Device Management for iOS
Enhance the security of iOS devices to ensure data security even if the device is lost or stolen. The administrator can monitor installed applications, or block application access according to category, permission and program source, and remind users to uninstall dangerous applications programs to reduce their risk of exposure.Support ESET V8 central console (ESET Protect) to realize multi-platform centralized control.

Anti-theft function After the device is accidentally lost, all data stored on the device (including emails and phonebooks) can be remotely erased.
application restrictions Allow administrators to make configurations, restrict the use of Safari browser, iTunes store, YouTube and multiplayer games, etc., and also prompt users to remove specific programs and other functions.
Remote Deployment Account Settings Remotely deploy bulk settings for iOS devices - including Exchange, Wi-Fi and VPN account settings.
Advanced Management Manage passwords, iRemote, privacy settings, device usage and restriction settings.
Simple authorization management mechanism Flexible collocation of authorization management quantity to realize cross-system authorization transfer between devices.
remote management ESET iOS mobile device management software supports ESET V8 central console (ESET Protect), providing you with complete network security status and centralized viewing functions, and unified management of all endpoint devices and servers.

System Requirements
For iPhones and iPads, iOS 9.0




Portfolio content

Remote Center Console
  • ESET PROTECT Console

Endpoint Products
  • ESET Endpoint Security for Windows
  • ESET Endpoint Antivirus for Windows
  • ESET Endpoint Security for macOS
  • ESET Endpoint Antivirus for macOS
  • ESET Endpoint Antivirus for Linux

Mobile Device Products
  • ESET Mobile Device Management for iOS
  • ESET Endpoint Security for Android

File Server Products
  • ESET Server Security