Cyber Security Complete is a comprehensive cybersecurity solution offered by ESET
Provides an additional layer of security to organizations who want to stop threats from ever reaching their users
Our second layer of protection built into ESET Mail Security provides detection of suspicious or malicious attachments to prevent users from being infected.
Emails are automatically provided to users about their spam emails that were quarantined. Then users can log in and manage their own spam rather than this solely being managed by the admin.
Robust Quarantine Management
In case messages are quarantined, users receive emails via which they can handle the message management themselves. In addition, administrators can have summary reports sent to them on a regular basis. However, anytime someone is waiting for an email, an administrator can easily decide to delete or release messages from a central quarantine.
Prevents users from accessing web pages that are known to be phishing sites. Email messages can contain links that lead to phishing web pages. Such emails are filtered.
Now using an enhanced, award-winning engine with improved performance, this essential component filters all spam emails and keeps user mailboxes free of unsolicited or undesired messages.
Leverages a multilayered approach that utilizes multiple technologies working together to balance performance, detection and false positives, and with automated malware removal and mediation.
Block Targeted Attacks
ESET’s endpoint protection solutions use threat intelligence information based on their global presence to prioritize and effectively block the newest threats prior to their delivery anywhere else in the world. In addition, our solutions feature cloud-based updating to respond quickly in the case of a missed detection without having to wait for a regular update.
Safeguard The Web Browser
Designed to protect an organization’s assets with a special layer of protection that focuses on the browser, as the main tool used to access critical data inside the intranet perimeter and in the cloud. Secure Browser provides enhanced memory protection for the browser process, coupled with keyboard protection, and lets admins add URLs to be protected by it.
Stop Fileless Attacks
ESET endpoint protection platforms have mitigations in place to detect malformed or hijacked applications to protect against fileless attacks. Dedicated scanners were also created to constantly check memory for anything suspicious.
All ESET Endpoint products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks. For an in-depth inspection of the network, admins can turn on the special aggressive machine learning mode that works even without an internet connection.
ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware.
Network Attack Protection
ESET Network Attack Protection improves detection of known vulnerabilities on the network level.
An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble ransomware behavior.
ESET is the first endpoint security provider to add a dedicated layer into its solution that protects the Unified Extensible Firmware Interface (UEFI). ESET UEFI Scanner checks and enforces the preboot environment's security and is designed to monitor the integrity of the firmware. If modification is detected, it notifies the user.
ESET Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java and more), and instead of just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.
Brute Force Attack Protection
Detects and blocks automated attacks that try to use password guessing techniques to gain access to your network.
Advanced Memory Scanner
ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory. Fileless malware operates without needing persistent components in the ﬁle system that can be detected conventionally. Only memory scanning can successfully discover and stop such malicious attacks.
ESET Botnet Protection detects malicious communication used by botnets, and at the same time, identifies the offending processes. Any detected malicious communication is blocked and reported to the user.
Advanced Threat Defense
Cloud Office Security
Advanced Thread Defense
Proactive threat defense against new, never-before-seen type of threats. Utilizes advanced adaptive scanning, cutting-edge machine learning, cloud sandboxing and in-depth behavioral analysis.
Provides advanced protection for your company’s data passing through all general servers, network file storage including OneDrive, and multi-purpose servers to ensure business continuity.
Office 365 OneDrive Storage
After registration is done on a single server, ESET has the ability to scan OneDrive to provide visibility and monitor the trusted source of company storage.