- Joined
- Apr 13, 2016
- Posts
- 4,964
- Solutions
- 1
- Reaction
- 170,336
- Points
- 21,113
ESET Endpoint Antivirus is antivirus software, ESET Endpoint Antivirus is an enterprise-grade antivirus software workstation protection, the scanning engine is combined with a customized firewall and anti-spam modules to improve the speed and accuracy to protect your computer Safety.
ESET Endpoint Antivirus is antivirus software. It is an enterprise-grade antivirus software workstation protection. The difference from ESET Endpoint Security is that EES has one more firewall. The scanning engine is combined with a customized firewall and anti-spam modules to improve the speed and accuracy to protect your computer security.The result is an intelligent system that constantly monitors for attacks and malware that can damage your computer. Mainly designed for workstations in small business environments. Using ESET Endpoint Antivirus with ESET Remote Administrator in a corporate environment allows you to easily manage any number of client workstations, apply policies and rules, monitor detections, and configure clients remotely from any networked computer.
Management server
ESET Security Manager manages endpoint products from a single pane of glass and can be installed on Windows or Linux. In addition to installation, ESET has a virtual appliance for quick and easy setup with a simple import.
Machine Learning
All ESET Endpoint Antivirus products currently use machine learning in conjunction with all of our other defense layers and have been doing so since 1997. Specifically, machine learning is used in the form of unified outputs and neural networks.
Multiple layers of defense
For today’s evolving threat landscape, a single layer of defense is not enough. All ESET endpoint products are capable of detecting malware pre-execution during and after execution. Focusing on the entire malware lifecycle, not just specific parts, ESET can provide the highest level of protection.
Behavior Detection HIPS
ESET’s Host-based Intrusion Prevention System (HIPS) monitors system activity and uses predefined rule sets to identify and block suspicious system behavior.
Ransomware Shield
Another layer protects users from ransomware attacks. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that behave like ransomware.
Cyber attack protection
ESET Cyber Attack Protection improves the detection of known vulnerabilities at the network level. It constitutes another important layer of protection against the spread of malware, cyber-attacks, and exploitation of vulnerabilities, for which no patches have been released or deployed.
Advanced Memory Scanner
A unique ESET technology that effectively addresses an important problem with modern malware – heavy use of obfuscation and/or encryption. Advanced Memory Scanner monitors the behavior of malicious processes and scans them after they are downloaded into memory.
Product built-in sandbox
ESET’s products help identify the real behaviors that lie beneath the surface of obfuscated malware. Using this technology, ESET solutions emulate different components of computer hardware and software to execute suspicious samples in an isolated virtualized environment.
Exploit Blocker
ESET Exploit Blocker monitors commonly exploitable applications (browser, document reader, email client, Flash, Java, etc.), not just for specific CVE identifiers, it focuses on development techniques. Threats are blocked on the computer immediately after being triggered.
Two-way firewall
Prevent unauthorized access to the corporate network. It provides anti-häçking protection, and data exposure protection, and supports defining trusted networks, making all other connections (like public Wi-Fi) restricted by default.
Botnet Protection
ESET Botnet Protection detects malicious communications used by botnets while identifying offending processes. Any detected malicious communication is blocked and reported to the user.
System Requirements
Operating Systems: Microsoft Windows® 11/10/8/7/Vista/XP/2000Hard Disk Space: 80 MB of free space required
Memory (RAM): 1 GB of RAM required
Processor: Intel or AMD x86-x64
Data Sheet
File Name: EEA.v9.1.2057.0Language: Multilangual
Developer: You do not have permission to view the full content of this post. Log in or register now.
License: Pre_Activated
You do not have permission to view the full content of this post. Log in or register now.
Attachments
-
You do not have permission to view the full content of this post. Log in or register now.