Enjoy Safer Technology.

Product Overview
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint and mobile security, to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give consumers and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real-time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D centers worldwide, ESET becomes the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003
- ESET® ENDPOINT PROTECTION ADVANCED
- ESET® SECURE BUSINESS
- ESET® ENTERPRISE INSPECTOR
- ESET® DYNAMIC THREAT DEFENSE
- ESET® FULL DISK ENCRYPTION
- ESET® ENDPOINT ENCRYPTION
- XOPERO - BACKUP AND RECOVERY
- SAFETICA® - DATA LOSS PREVENTION
- ESET® SECURE AUTHENTICATION
- GREYCORTEX - NETWORK TRAFFIC ANALYSIS
- ESET® THREAT INTELLIGENCE
Multilayered technology, machine learning and human expertise combined with automated security management. Provides:
- Protection against targeted attacks
- Protection against ransomware
- Prevention of fileless attacks
- Remote management
Endpoint Security
ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives.
File Server Security
Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity.
click here to visit vendor product page>>
Complete bundled security solution for endpoints and file servers. Email-borne threats blocked at server level. Provides:
- Protection against targeted attacks
- Protection against ransomware
- Prevention of fileless attacks
- Protection of email gateway
- Remote management
Endpoint Security
ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives.
File Server Security
Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity.
Mail security
ESET Mail Security filters out all spam and malware before they reach users’ mailboxes. Built using proven NOD32 technology, ESET Mail Security is a first line of defense complementing the security of your network.
click here to visit vendor product page>>
An Endpoint Detection & Response tool designed to exploit ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analysis and remediation of any security issue in the network enabling organizations to take immediate action to:
- Detect advanced persistent threats
- Stop file less attacks
- Block zero-day threats
- Protect against ransomware
- Neutralize state-sponsored attacks
Open architecture & integrations
ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning or easily created to match the needs of specific enterprise environments, including SIEM integrations.
Adjustable sensitivity
Utilize ESET’s Endpoint Detection and Response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name / path / hash / command line / signer to fine-tune the trigger conditions.
Synchronized response
ESET’s Endpoint Detection and Response tool is built on top of existing ESET endpoint security solutions, creating a consistent ecosystem that allows cross-linking of all relevant objects and synchronized remediation of incidents.
click here to visit vendor product page>>
provides another layer of security for ESET products like Mail Security and Endpoint products by utilizing a cloud-based sandboxing technology to detect new, never before seen type of threats. Future proof your company IT security with:
- Behavior-based Detection
- Machine Learning
- Zero-day Threats Detection
- Cloud Sandbox
Multilayered protection
Within ESET Dynamic Threat Defenses, ESET utilizes 3 different machine learning models once a file is submitted. After this process the sample is run through a full sandbox which simulates user behavior to trick anti-evasive techniques.
Unparalleled speed
Every minute counts. That is why ESET Dynamic Threat Defense is designed to analyze the majority of samples in under 5 minutes. If samples were previously analyzed, it simply takes a few seconds until all devices at your organization are protected.
Full visibility
For every analyzed sample, you can view the final verdict in ESET Security Management Center or in ESET Cloud Administrator, which also provides transparency for all data sent to ESET LiveGrid® - cloud malware protection system.
click here to visit vendor product page>>
By encrypting data on your endpoints, you can meet the demands of data protection laws
- Comply with data protection regulations like GDPR and others
- Monitor encryption on user machines remotely
- Protect company data with a simple yet powerful solution
ESET Full Disk Encryption provides powerful encryption managed natively by ESET remote management consoles, and increases your organization’s data security to meet compliance regulations.
- Encrypt system disks, partitions or entire drives
- Manage from ESET Cloud Administrator and ESET Security Management Center
- Deploy, activate and encrypt devices in a single action
click here to visit vendor product page>>
A simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:
- Zero data breaches
- Compliance with requirements
- Seamless encryption
ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs nor any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity making it extremely simple for businesses of any size to install and setup.
Zero impact on productivity
The implementation of encryption is completely transparent for the users and requires no action on their part. There is no extra overhead for IT departments and no need for user training.
Fast, seamless deployment
Server installation of ESET Endpoint Encryption usually takes less than 10 minutes, with complete setup of the solution under one hour.
click here to visit vendor product page>>
Total protection, backup and recovery of your business data onsite or in the cloud. Covers endpoints to Microsoft Exchange to virtual environments. Benefit from:
- Complete protection for critical files
- Control over all backups
- Easy to use and cost savings
- Remote management
Reliable backup to the cloud
Xopero Cloud Business is an advanced backup for PCs, servers and virtual environments. It enables the protection and flexible storage of unlimited computers, mobile devices, databases and physical and virtual environments. Once installed it becomes the complete solution for protecting critical files, allowing your organization to manage backup processes and monitor and validate their accuracy.
Designed for QNAP NAS servers
Dedicated centrally-managed complete backup solution for QNAP network drives protects critical files by providing a safe backup environment for professional protection of all your organization’s business data.
Disaster recovery
Comprehensive, all-in-one software backup and data recovery that you install on your organization’s existing IT infrastructure. Fast installation and deployment process. Simple management that is intuitive and easy to use. You can manage backups, monitor their accuracy and make all necessary account configurations in one place – remotely if you wish.
Xopero Cloud Business
Backup multiple devices – servers, endpoints, mobiles and virtual systems. Simple, fast and seamless data migration. Central management that lets you control all backup tasks. AES 256 encryption guarantees no-one can access your organization’s data without permission. Advanced, secure data synchronization. Long-term data storage and archiving using twin locations.
Xopero QNAP Appliance
Easy to configure and use. Can be installed within a few minutes. Remotely manage backups, monitor their accuracy and configure all accounts and applications installed on workstations and servers. Ensure instant recovery of your organization’s critical data. Backup and restore files, folders, endpoints, servers, databases, mail accounts, network locations and virtual environment. Combines safe data storage, automatic backup and central management.
Xopero Backup & Restore
Protect unlimited endpoints, servers and virtual machines. Save money using your organization’s existing infrastructure. Implement secure AES encryption and SSL transmission to protect your organization’s data.
click here to visit vendor product page>>
Prevent expensive data leaks, lost time and unnecessary personnel expense and enable your organization to:
- Cover all data leak channels
- Identify suspicious trends and activities
- Save the cost of repairing a data breach
- Reduce personnel costs
Prevents data loss
Safetica safeguards key data inside your company. BYOD security keeps employee-owned devices under control. No data in a company’s protected zone can sneak out on these devices. Employees are prevented from utilizing key data to start their own business or give vital information to a competitor.
Safeguards misdirected files
It prevents misdirected important files from getting into the wrong hands, either inside or outside an organization and alerts management to potential dangers. Employees are prevented from utilizing key data to start their own business or give vital information to a competitor.
Encrypts data to prevent misuse
Important data is protected even if laptops & thumbdrives are lost or stolen on the road. The whole disc or selected files remain encrypted and unreadable by the thief.
Detects attacks
Safetica identifies socially engineered attacks and blackmail attempts at the initial stages, preventing them from damaging your company.
Manages resources
Safetica controls printer use, applications and limits excessive online activities. It identifies changes in productivity to reveal potentially dangerous trends on a timely basis.
The Safetica difference
Comprehensive DLP solution
The capabilities of Safetica Data Loss Prevention cover a wide range of events and areas, helping your organization to stay clear of unwanted incidents.
Data Loss Prevention events and areas
Extends to all hard drives, network file transfer, emails, SSL/HTTPS, printers, Bluetooth, CD/DVD/BluRay readers & recorders, control of Application File Access, and cloud disk detection and restriction.
Reporting and activity blocking
Reports all file operations, long-term trends, short-term fluctuations in activity, all websites, emails & webmails plus instant messaging, printers, screen activity and keylogging.
click here to visit vendor product page>>
A simple, effective way for businesses of all sizes to implement multi-factor authentication across commonly utilized systems. Enables your organization to:
- Prevent data breaches
- Meet compliance requirements
- Manage centrally from your browser
- Use your phone, or HW tokens
Authentication is easy: just answer a prompt to your phone. Works on iOS and Android devices, and for all platforms and services.
Cloud support
In addition to on-premise applications, ESET Secure Authentication also supports web/cloud services such as Office 365, Google Apps, Dropbox and many others, via ADFS 3.0 or SAML protocol integration.
Multiple ways to authenticate
ESET Secure Authentication supports mobile applications, push notifications, hardware tokens, FIDO security keys, as well as custom methods.
click here to visit vendor product page>>
Network traffic analysis tool exploiting artificial intelligence, machine learning and big data to ensure secure IT operations for enterprise, government and critical infrastructure users. Provides:
- Round-the-clock security monitoring
- Powerful rapid detection & response capabilities
- Deep visibility into the internal network
- Easy to use functionality
Higher capability than other protocols
MENDEL collects much more information on network traffic than NetFlow, IPFIX or similar protocols. The web user interface presents comprehensive data on network traffic. Data includes management overviews, communication of the network, subnetworks, users and applications, peers, individual flows and their content - in order to investigate interesting events.
Identifies threats before damage occurs
MENDEL investigates beyond known threats to detect symptoms of malicious behavior at the atomic level. Threats are identified in their early stages. This decreases incident response time, prevents further damage and reduces overall risk to the organization.
Identifies threats in IoT Devices
MENDEL monitors network flow data, also in IoT devices, to identify traffic in and out of the network and communication flows between devices within the network. This includes additional anomalous devices, excessive communication from one device to another or to a host outside the network, and periodic communication that is common in advanced persistent threats.
The ESET® difference
Flow-based and packet-based technology
Instead of relying on older and limited SNMP polling, MENDEL leverages flow-based and content-based monitoring. Flow-based monitoring provides near real-time (1 minute intervals) visibility into network statistics and other summary and detailed issues. Deep content inspection (DCI) extends this information with real-time comprehensive contextual metadata (user identity, applications, for example).
Powerful forensics
MENDEL Analyst generates metadata of network communication providing full contextual awareness – for example destination and source, user's identity and application protocol. Unlike technologies based on full packet capture, it allows the metadata on network traffic to be stored for a much longer time with low demands on storage capacity.
Application monitoring and more
MENDEL Analyst constantly monitors communication of users and network applications of all ports and on TCP, UDP, ICMP and many other protocols. This enables monitoring of current and average bandwidth, response times, transit times, delay, jitter, ports in use, connection peers and more.
Detection methods
These include signature-based detection, deep packet inspection, network behavior analysis, specialized algorithms, network performance monitoring and application performance monitoring.
click here to visit vendor product page>>
Get in-depth, up-to-date global knowledge about specific threats and attack sources, traditionally difficult to detect for security engineers, who access information only within their own networks. Enable your organization to:
- Block targeted attacks
- Protect against phishing
- Stop botnet attacks
- Detect advanced persistent threats
Real-time data feed
ESET Threat Intelligence data feeds utilize widely supported STIX/TAXII format, which makes it easy to integrate with existing SIEM tools. Integration helps to deliver the latest information on the threat landscape to predict and prevent threats before they strike.
Robust API
ESET Threat Intelligence features a full API that is available for automation of reports, YARA rules and other functionalities to allow for integration with other systems used within organizations.
YARA rules
These allow organizations to set up custom rules to obtain company-specific information that security engineers are interested in. Organizations receive valuable details such as the number of times specific threats have been seen worldwide, URLs containing malicious code, malware behavior on the system, where it was detected, and more.
click here to visit vendor product page>>
Enpoint Protection Remote Workforce Endpoint Encrytion Two Factor Authentication Cloud Based Sandboxing Threat intelligence Endpoint Detection & Response
Target Industries
Government
Telecoms
Oil & Gas
Hospitality
Financial
Education
ESET Distribution Team
If you are interested in ESET products and solutions, or would like to find out more, contact our ESET distribution team