Create Account
Customer Support
Need Help!

This is Marketplace Sandbox (Demo), you can go to our Marketplace Production (Live) to purchase your business services Marketplace (Production)

Process Exclusions

Allows you to define processes which are ignored by the real-time protection module – especially useful for backup or live virtual machine migration.


Component-Based Installation

Allows you to choose to install only those components you need:

  • Real-Time File System Protection
  • Web and Email
  • Device Control
  • Graphical User Interface (GUI)
  • ESET Log Collector
  • and more

Remote Management

ESET Security solutions come fully manageable via ESET Remote Administrator, delivering a perfect “look & see” overview of the network security status.


ESET Log Collector

Collects all logs relevant for troubleshooting into one archive, which can be emailed or uploaded to a shared network drive to speed up the troubleshooting process.

Optimized for the Virtual Environment

ESET Shared Local Cache stores the metadata of scanned files so replica files on one machine are not scanned again on other virtual machines.


Native Clustering Support

Interconnect several installed nodes of ESET Security for Microsoft SharePoint Server within a cluster and manage them as one, eliminating the need to replicate changes in configuration manually.

Windows Management Instrumentation (WMI) Provider

Monitors key functionalities of ESET Security via WMI framework. This allows integration of ESET Security solution into third-party management and SIEM software.


Snapshot Independence

Updates and program modules can be stored outside of the default location – so updates and modules don’t have to be downloaded every time a virtual machine is reverted to an earlier snapshot.

Parallelized scanning

Database scan queries can be parallelized into multiple scanning threads to significantly improve on-demand scanning time.


Antivirus and Antispyware Protection

Eliminates all types of threats, including viruses, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection.

Exploit Blocker - Fighting Targeted Attacks

New detection technology that strengthens protection against targeted attacks and previously unknown exploits – i.e. zero-day attacks.


Content processing rules

Customize and chain object scanning rules, e.g. real file type, file size, corrupted or password-protected archives and match the rules towards a specific action.

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

Have Account?
Login

Having troubles logging into your account ?
What is my username? | Password Reset

No Account?
Create Account

Loading ...