ESET-logo

ESET - Security

(18)
  • Deployment:
  • Company Size:SML
  • Features:
  • Platforms:
  • Pricing:

Details

ESET Endpoint Security is an on-premise anti-malware and security suite for small, midsize and large businesses. Primary functionality includes anti-malware, remote management, endpoint security, file security, firewall, web control and bot protection.

ESET Secure Business is an on-premise anti-malware and security suite for small, midsize and large businesses. Primary functionality includes anti-malware, remote management, endpoint security, file security, firewall, virtualization security, mail security, web control and bot protection.

Features

Pricing Model
  • Monthly subscription per user
  • Yearly subscription per user
  • Metered per minute
  • Monthly site license
  • Yearly site license
  • Flat fee
  • Monthly subscription
  • Percentage-based (% of collections or claims)
  • Fee-based (fixed $/claim)
  • Hybrid (combination of % and fixed amount/claim)
Target Company Size
  • Startup
  • Small-to-Medium Business
  • Enterprise
Service Terms Offered
  • Commitment Free
  • Free Setup
  • Free Cancellation
  • Money Back Guarantee
  • Month-to-Month Option
  • Keep Original Number
  • Customizable Plans
  • Free In-Network Calls
  • Unlimited Minutes
  • International Calls
  • Reduced Price for Multiple Users
  • Account Manager
Mobile Apps Offered
  • None
  • iOS
  • Android
Support Features
  • FAQs Section
  • Tutorials
  • Telephone Support
  • Email Support
  • 24/7 Support
  • Online Chat
  • Forum
  • In-Person Training
  • Social Media
  • Knowledge Base
  • Webinars
Compatible Operating System(s)
  • Windows
  • iOS
  • Linux
  • Mac
  • Android
Deployment
  • Hosted/Cloud
  • On-Premise
  • Mobile
Mobile friendly?
  • Yes
  • No
Price
  • 1 - Inexpensive
  • 2
  • 3 - Moderate
  • 4
  • 5 - Expensive
Features
  • 1 - Limited features
  • 2
  • 3 - Moderate
  • 4
  • 5 - Full featured
Security Features
  • Multi-Factor Authentication
  • Endpoint Security
  • Anti-Virus Protection
  • Malware Protection
  • Single Login
  • App Catalog
  • Unified Directory
  • Adaptive Authentication
  • Mobile Identity
  • Compliance
  • User Provisioning
  • Virtual LDAP
  • Remote Wipe
  • Content Encryption
  • Digital Rights Management
  • Analytics and Reporting
  • Secure Content Storage and Sharing
  • e-Signature
  • Inbound and Outbound Traffic Filtering
  • Data Loss Prevention
  • Device Control
  • eDiscovery
  • Enterprise Mobility Management
  • Whitelists and Blacklists
  • File Tracing and Shadowing
  • Content Filtering
  • Static and Dynamic Attack Protection
  • Dashboards
  • Application Hardening
  • Application Behavior
  • Web Protection
  • Exploit Mitigation
  • Ransomware Mitigation
  • Payload Analysis
  • Policy Management
  • Cloud Protection
  • Network Security
  • Security Management
  • Server Security
  • Data Backup and Recovery
  • Gateway Security
  • Visualization
  • Firewall
  • Sandboxing
  • Spam Blocker
  • Email Protection
  • Security Trend Reporting
  • Password Security Enforcement

Pricing

Request a custom quote for your business

Get Pricing

Recommended Articles

3 Reasons Cloud Security is More Important than Ever

Thanks to the availability and affordability of cloud-based infrastructure and business software solutions, the trend...

The Top 3 Companies Pioneering the IaaS Market

Cloud services and infrastructure companies such as AWS, Google Cloud, and Microsoft Azure give you all the tools and...

Anti-Virus Software Won't Protect Your Business

In today’s era of sophisticated hacks and with unprecedented levels of cybercrime and data breaches occurring, ...

4 Ways AI is Redefining Enterprise Security

Artificial Intelligence (AI) isn’t necessarily a new technology, but it’s been perceived more as a work o...

The Most Notorious Cyber Attacks Of the Past Decade

From Yahoo! to NotPetya - so much happened in the cyberspace during the course of these 10 years. Here's a flashback.

How to Protect Your Business from Known Cyber Security Risks

Maintaining tight cybersecurity within your business has some standard protocols - and the right security software is one of them.

Let's Make a Deal: Basic Steps for Switching to Cloud Computing

Moving your business data online doesn't have to be a scary proposition.

5 Steps Toward PCI DSS Compliance

The latest in credit-card protection requires a new approach.

Identity Theft: OpenID and What It Means for Web Security

The new open-source identity initiative is finally kick-starting online-identity standards.

Colocation-Center Security Trends

What are colocation datacenters doing to protect your company's assets?

The Essential Guide to Spam Control

What you need to know about managing junk messages.
Loading Reviews..