ESET Protect Complete On-Premise

300.482380 Inc.VAT

  • On-Premise Console
  • Advanced Endpoint Protection
  • File Server Security
  • Full Disk Encryption
  • Cloud Sandbox
  • Mail Security

For more than 20 users & Support Services, please contact us

🚚 We deliver all over Cyprus

Guaranteed Safe Checkout

payment-options

ESET PROTECT Complete On-Premise
ESET Protect Complete On-Premise
300.482380 Inc.VAT


    I understand that this form collects my name and email so I can be contacted. For more info, check our Privacy Policy


    ESET-BUSINESS-SECURITY

    ESET Protect Complete Security For Business

    ESET Protect Complete is a scalable and customizable solution that keeps you one step ahead of any threat.
    ESET Protect Complete offers a Cloud-based security backed by multilayered endpoint protection

    ESET PROTECT COMPLETE SUMMARY

    On-Premise Console

    ✅ Full Security Management - from Prevention to Response
    ✅ Automated security management and threat remediation
    ✅ Flexible, comprehensive reporting
    ✅ Complete network visibility
    ✅ Includes ESET PROTECT on-premises

    Advanced Endpoint Protection

    ✅ Comprehensive, cross-platform protection for computers and mobile devices
    ✅ Block targeted attacks
    ✅ Stop fileless attacks
    ✅ Secure Browser
    ✅ Includes ESET Endpoint Antivirus ESET Endpoint Security

    File Server Security

    ✅ Multilayered protection for the file server system
    ✅ Safeguard the file storage
    ✅ Network Attack Protection improves server resilience
    ✅ Detect advanced persistent threats
    ✅ Includes ESET Server Security

    Full Disk Encryption

    ✅ Manage encryption on Windows and macOS machines
    ✅ Deploy, activate and encrypt devices in a single action
    ✅ Encrypt system disks, partitions or entire drives
    ✅ Includes ESET Full Disk Encryption

    Cloud Sandbox

    ✅ Ransomware and zero-day threats detection
    ✅ Powerful cloud sandbox analysis backed by machine learning techniques
    ✅ Behavior-based Detection
    ✅ Granular reports with detailed information about samples and their behavior
    ✅ Includes ESET Dynamic Threat Defense

    Mail Security

    ✅ Multilayered technology filtering spam and malware
    ✅ Anti-phishing protection
    ✅ Protection for the server's file system
    ✅ Robust quarantive management
    ✅ Includes ESET Mail Security


    ESET PROTECT COMPLETE ON-PREMISE COMPONENTS

    ON-PREMISE CONSOLE

    Dynamic & custom reporting

    ESET PROTECT provides over 170 built-in reports and allows you to create custom reports from over 1000 data points.

    Advanced RBAC

    Starting with MFA-protected access, the console is equipped with an advanced Role-Based Access Control (RBAC) system.

    Completely multitenant

    Multiple users and permission groups can be created to allow access to a limited portion of the ESET PROTECT console. This allows full streamlining of responsibilities across large enterprise teams.

    Cloud MDM

    A ready-to-use solution, integrated with our cloud management console. It’s easy to get started for organizations of any size, as it requires no prerequisites such as certificates or additional components. Cloud MDM covers Android phones, with iOS being on the roadmap.

    Cloud sandbox

    The support for cloud sandbox greatly improves detection of zero-day threats such as ransomware by quickly analyzing suspicious files in the powerful ESET cloud sandbox.

    Granular policy control

    Organizations can set up multiple policies for the same computer or group and can nest policies for inherited permissions. In addition, organizations can configure policy settings as user-configurable, so you can lock down any number of settings from the end users.

    Always the latest features

    Leave the updating of the console up to us. We’ll do it in the background, and you’ll always be on the latest version with the latest components.

    Automation framework

    Dynamic groups can sort computers based on current device status or defined inclusion criteria.

    SIEM & SOC support

    ESET PROTECT fully supports SIEM tools and can output all log information in the widely accepted JSON or LEEF format, allowing for integration with Security Operations Centers (SOC).

    Full disk encryption (FDE)

    Full Disk Encryption is native to ESET PROTECT, managing encryption of data on both Windows and Mac (FileVault) endpoints, improving data security and helping organizations solving the problem of data regulation compliance.

    Hardware / software inventory

    Not only does ESET PROTECT report on all installed software applications across an organization, it also reports on installed hardware.

    Fully automated VDI support

    A comprehensive hardware detection algorithm is used to determine the identity of the machine based on its hardware. This allows automated re-imaging and cloning of non-persistent hardware environments. Therefore, ESET’s VDI support requires no manual interaction and is fully automated.

    ADVANCED ENDPOINT PROTECTION

    Managed from a unified console

    All ESET endpoints, including endpoints and mobiles, can be managed from our cloud-based unified management console ESET PROTECT.

    Block targeted attacks

    ESET’s endpoint protection solutions use threat intelligence information based on their global presence to prioritize and effectively block the newest threats prior to their delivery anywhere else in the world. In addition, our solutions feature cloud-based updating to respond quickly in the case of a missed detection without having to wait for a regular update.

    Network Attack Protection

    ESET Network Attack Protection improves detection of known vulnerabilities on the network level.

    Machine learning

    All ESET Endpoint products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks. For an in-depth inspection of the network, admins can turn on the special aggressive machine learning mode that works even without an internet connection. 

    Ransomware Shield

    An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble ransomware behavior.

    UEFI Scanner

    ESET is the first endpoint security provider to add a dedicated layer into its solution that protects the Unified Extensible Firmware Interface (UEFI). ESET UEFI Scanner checks and enforces the preboot environment’s security and is designed to monitor the integrity of the firmware. If modification is detected, it notifies the user.

    Exploit Blocker

    ESET Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java and more), and instead of just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.

    Stop fileless attacks

    ESET endpoint protection platforms have mitigations in place to detect malformed or hijacked applications to protect against fileless attacks. Dedicated scanners were also created to constantly check memory for anything suspicious.

    Safeguard the web browser

    Designed to protect an organization’s assets with a special layer of protection that focuses on the browser, as the main tool used to access critical data inside the intranet perimeter and in the cloud. Secure Browser provides enhanced memory protection for the browser process, coupled with keyboard protection, and lets admins add URLs to be protected by it.

    Botnet Protection

    ESET Botnet Protection detects malicious communication used by botnets, and at the same time, identifies the offending processes. Any detected malicious communication is blocked and reported to the user.

    In-product Sandbox

    ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware.

    Behavioral Detection - HIPS

    ESET’s Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognize and stop suspicious system behavior.

    Advanced Memory Scanner

    ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory. Fileless malware operates without needing persistent components in the file system that can be detected conventionally. Only memory scanning can successfully discover and stop such malicious attacks.

    FILE SERVER SECURITY

    Machine learning

    All ESET products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks.

    Ransomware Shield

    An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble the behavior of ransomware.

    Network Attack Protection

    ESET Network Attack Protection improves detection of known vulnerabilities on the network level. It constitutes another important layer of protection against spreading malware, network-conducted attacks, and exploitation of vulnerabilities, for which a patch has not yet been released or deployed.

    Botnet Protection

    ESET Botnet Protection detects malicious communication used by botnets, and at the same time, identifies the offending processes. Any detected malicious communication is blocked and reported to the user.

    Optional Cloud Sandbox Analysis

    ESET Dynamic Threat Defense provides another layer of security for ESET File Security solutions by utilizing cloud-based sandboxing technology to detect new, never before seen type of threats.

    Exploit Blocker

    ESET Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java and more), and instead of just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.

    Behavioral Detection - HIPS

    ESET’s Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognize and stop suspicious system behavior.

    Advanced Memory Scanner

    ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory. Fileless malware operates without needing persistent components in the file system that can be detected conventionally. Only memory scanning can successfully discover and stop such malicious attacks.

    Protection for Linux servers

    ESET provides installers for the most popular distributions of Unix-based systems, including the ‘Ready’ variations of RedHat and SuSE that comply with the File-System-Hierarchy standard. It requires no external libraries except for LIBC.

    Office 365 OneDrive Storage

    After registration is done on a single server, ESET has the ability to scan OneDrive to provide visibility and monitor the trusted source of company storage.

    AMSI/Protected Service Support

    ESET products leverage the Antimalware Scan Interface (AMSI) to provide enhanced malware protection for users, data, applications, and workload. In addition, it utilizes the protected service interface that is a new security module built into Windows that only allows trusted, signed code to load and better protect against code injection attacks.

    In-product Sandbox

    ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware.

    FULL DISK ENCRYPTION

    All products managed from one console

    ESET Full Disk Encryption works within the ESET PROTECT console, helping administrators to save time thanks to familiarity with the existing management environment and concepts.

    Powerful encryption

    ESET Full Disk Encryption encrypts system disks, partitions and entire drives to ensure that everything stored on each PC or laptop is locked down and secure, protecting you against loss or theft.

    Single-click deployment

    Manage full disk encryption across your entire network from a cloud‑based console. ESET PROTECT single pane of glass allows admins to deploy, activate and manage encryption on their connected endpoints with a single click.

    Fully validated

    Patented technology to protect data for businesses of all sizes. ESET Full Disk Encryption is FIPS 140-2 validated with 256 bit AES encryption.

    Cross-platform coverage

    Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard.

    Add additional devices at any time

    You can increase the number of devices covered by your license at any time.

    Password policies

    Admin can set mandatory password attributes, number of passwords retries, and expiry period. From a policy setting it is possible to grant a user the option to change their password whenever they want to.

    CLOUD SANDBOX

    Ransomware and zero-day threats detection

    Detect new, never-before-seen types of threats. ESET utilizes three different machine learning models once a file is submitted. After that, it runs the sample through a full sandbox, simulating user behavior to trick anti-evasive techniques. Next, a deep learning neural network is used to compare the behavior seen versus historical behavioral data. Finally, the latest version of ESET’s scanning engine is used to take everything apart and analyze it for anything unusual.

    Transparent full visibility

    Every analyzed sample status is visible in the ESET PROTECT console, which provides transparency to all data sent to ESET LiveGrid®.

    Automatic protection

    The endpoint or server product automatically decides whether a sample is good, bad or unknown. If the sample is unknown, it is sent to ESET Dynamic Threat Defense for analysis. Once the analysis is finished, the result is shared, and the endpoint products respond accordingly.

    Mail Security protection

    Not only does ESET Dynamic Threat Defense work with files, but it also works directly with ESET Mail Security, to ensure that malicious emails are not delivered to your organization.

    Granular reports

    An admin can create a report of ESET Dynamic Threat Defense data in the ESET PROTECT console. They can either use one of the pre-defined reports or make a custom one. 

    Mobility

    Nowadays, employees often do not work on the premises. The Cloud Sandbox analyzes files no matter where users are.

    Proactive protection

    If a simple is found suspicious, it is blocked from execution while ESET Dynamic Threat Defense analyzes it. That way, potential threats are prevented from wreaking havoc on the system.

    Tailored customization

    ESET allows per-computer detailed policy configuration for ESET Dynamic Threat Defense so the admin can control what is sent and what should happen based on the receiving result.

    Manual submission

    At any time, a user or admin can submit samples via an ESET compatible product for analysis and get the full result. Admins will see who sent what and what the result was directly in the ESET PROTECT console.

    MAIL SECURITY

    Anti-spam

    Now using an enhanced, award-winning engine with improved performance, this essential component filters all spam emails and keeps user mailboxes free of unsolicited or undesired messages.

    Anti-malware

    Our second layer of protection built into ESET Mail Security provides detection of suspicious or malicious attachments to prevent users from being infected.

    Anti-phishing

    Prevents users from accessing web pages that are known to be phishing sites. Email messages can contain links that lead to phishing web pages. Such emails are filtered.

    Hybrid Office 365 scanning

    Supports businesses who utilize Microsoft Exchange in a hybrid setup.

    Robust quarantine management

    In case messages are quarantined, users receive emails via which they can handle the message management themselves. In addition, administrators can have summary reports sent to them on a regular basis. However, anytime someone is waiting for an email, an administrator can easily decide to delete or release messages from a central quarantine.

    Unparalleled speed

    Performance and stability are among the essential capabilities for a mail product. Companies need assurances that their email is going to be processed without delay. ESET features a true 64-bit product that allows for clustering to ensure that speed is never a concern for organizations of any size.

    Rules

    ESET’s comprehensive rule system allows administrators to manually define email filtering conditions and actions to take with the filtered emails.

    Web-based quarantine

    Emails are automatically provided to users about their spam emails that were quarantined. Then users can log in and manage their own spam rather than this solely being managed by the admin.

    Cluster support

    ESET solutions support creating clusters, which allows products to communicate with each other and exchange configuration, notifications, greylisting database info and more. In addition, this supports Windows Failover Clusters and Network Load Balancing (NLB) clusters to allow for Enterprise-grade protection.

    Flexible and scalable

    ESET Mail Security enables component-based installation, providing admin with an opportunity to select only a certain solution component. Also, ESET Mail Security allows exclusion of specific objects or processes from on-access scanning, thus minimizing interference with the process to improve backup speed and process integrity.

    ESET PROTECT COMPLETE ON-PREMISE SOLUTION

    OTHER ESET PROTECT ON-PREMISE SOLUTIONS

    ESET Protect Solutions

    Additional information

    Brand

    Protection

    Security Management
    Endpoint Protection
    File Server Security
    Full Disk Encryption
    Cloud Sandbox
    Mail Security
    Cloud App Protection

    Security Solution

    Advanced Endpoint Protection, Basic Endpoint Protection, Cloud Sandboxing, Disk Encryption, Mail Security, On-Premise

    Product

    Protect Complete

    Computers

    Microsoft Windows 10, 8.1, 8, 7
    macOS 10.12 and later
    Ubuntu Desktop 18.04 LTS 64-bit and RedHat Enterprise Linux (RHEL) Desktop 7 64-bit

    Smartphone/Tablets

    Android 5 (Lollipop) and later
    iOS 8 and later

    File Servers

    Microsoft Windows Server 2019, 2016, 2012, 2008
    Microsoft Windows Storage Server 2016, 2012, 2008
    Microsoft Windows MultiPoint Server 2012, 2011, 2010
    Microsoft Windows Small Business Server 2011
    RedHat Enterprise Linux (RHEL) 7 64-bit
    CentOS 7 64-bit
    Ubuntu Server 16.04 LTS 64-bit, 18.04 LTS 64-bit
    Debian 9 64-bit
    SUSE Linux Enterprise Server (SLES) 12 64-bit, 15 64-bit

    Mail Servers

    Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007
    Microsoft Small Business Server 2011
    Linux – Kernel version 2.6.x or higher
    Glibc 2.3.6 or higher
    FreeBSD – Version 6.x, 7.x, 8.x & 9.x
    IBM Domino 6.5.4 and newer

    Virtual Environments

    VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
    VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
    VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

    Cloud Applications Protection

    Subscription for Microsoft 365 to connect with the tenant (Exchange Online, OneDrive)

    License Info 1

    Remote management platform is available as cloud-based or on-premises deployment. No need to buy or maintain additional hardware, reducing the total cost of ownership.

    License Info 2

    – Mix and match your licenses as needed
    ESET Unilicense covers all the bases, allowing you to mix and match endpoint protection without wasting a single license.

    – Add additional devices at any time
    You can purchase licenses for additional computers, laptops, mobile devices and servers any time.

    – Transfer a license to another computer
    You can transfer a valid ESET license to a completely new computer from the original one. In addition, you can switch from one OS to another.

    – Switch to a different platform at any time
    It's easy to switch your protection from one platform to another at any point during the license term without having to purchase additional licenses.

    Years

    1 Year, 2 Years, 3 Years

    Reviews

    There are no reviews yet.

    Be the first to review “ESET Protect Complete On-Premise”