ESET Server Security for Microsoft Windows Server (3-year license)


Price:
Sale priceHK$1,950.00

Description

Server security

ESET Server Security

Provides advanced protection for your company's data flowing through all general-purpose servers, network file storage (including OneDrive) and multi-function servers to ensure business continuity.

  • Ransomware prevention
  • Zero-day threat detection
  • Data leakage prevention
  • Botnet protection
  • Server security

    ESET Server Security

    machine learning
    Currently, all ESET products use machine learning in conjunction with all our other defense layers, and have done so since 1997.

    Ransomware protection
    An additional layer to protect users from ransomware. Our technology monitors and evaluates all executing applications based on their behavior and reputation. It is designed to detect and block processes that behave like ransomware.

    Network attack protection
    ESET Network Attack Protection improves the detection of known vulnerabilities at the network level. It forms another important layer of protection against the spread of malware, network attacks, and exploits for which patches have not yet been released or deployed.

    Botnet protection
    ESET Botnet Protection detects malicious communications used by botnets and identifies offending processes. Any malicious traffic detected will be blocked and reported to the user.

    Optional advanced threat defense
    ESET LiveGuard Advanced adds another layer of security to ESET Server Security solutions by leveraging cloud-based sandboxing technology to detect new, never-before-seen threat types.

    Exploit Blocker
    ESET Exploit Blocker monitors typical exploitable applications (browsers, file readers, email clients, Flash, Java, etc.) and doesn't just target specific CVE identifiers, it also focuses on exploit techniques. Once triggered, the threat is immediately blocked on the computer.

    Support XDR
    ESET Security for Microsoft SharePoint supports ESET Inspect, the XDR-enabled component of the ESET PROTECT platform, to instantly analyze and fix network security issues.

    Behavior Detection-HIPS
    ESET Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a set of predefined rules to identify and block suspicious system behavior.

    Advanced memory scanner
    ESET Advanced Memory Scanner monitors the behavior of malicious processes and scans them after they are decrypted in memory. Fileless malware does not require routinely detectable persistent elements in the file system to operate. Only memory scanning can successfully detect and block such malicious attacks.

    Linux server protection
    ESET provides installers for the most popular Unix-based system distributions, including "Ready" variants of RedHat and SuSE that comply with the file system hierarchy standard. It does not require any external libraries except LIBC.

    Office 365 OneDrive storage
    Once registered on a single server, ESET can scan OneDrive to provide visibility and monitor trusted sources of corporate storage.

    AMSI/Protected Services Support
    ESET products leverage the Anti-Malware Scanning Interface (AMSI) to provide enhanced malware protection for users, data, applications and workloads. In addition, it leverages the Protected Services Interface, a new security module built into Windows that allows only trusted signed code to be loaded and better protects against code injection attacks.

    In-product sandbox
    ESET's in-product sandbox helps identify the true behavior hidden beneath the surface of obfuscated malware.

    Server host firewall
    Control all communications on your Windows server by enabling ESET Server Security firewall, customized for your server environment. Features available in ESET PROTECT Entry and higher

    Vulnerability and patch management
    Extend vulnerability and patch management capabilities to servers. Fully managed through the ESET PROTECT platform, this feature reduces the attack surface by proactively tracking vulnerabilities in the operating system and common applications, allowing for efficient patching.

You may also like

Recently viewed