ESET launches new business product portfolio 2022

ESET launches new business product portfolio 2022

Share post

The IT security manufacturer ESET has further refined its range of business security solutions. The ESET PROTECT platform has undergone a number of changes to help IT admins manage their network and combat cyberattacks.

The focus is on the Enterprise Inspector in two respects. Firstly, the successful Endpoint Detection and Response (EDR) solution will be renamed “ESET Inspect”. On the other hand, it is now also available as a cloud version. As an enabling component, ESET Inspect elevates the ESET PROTECT platform to a so-called "Extended Endpoint Protection and Response" (XDR) platform. It helps to protect organizations more comprehensively than ever before.

Advanced endpoint products

In addition, several endpoint products for Windows, macOS and Android have been further developed. The new ESET business portfolio is now available from over 6.500 retail partners in Germany, Austria and Switzerland.

“With these various updates to our product portfolio, we have created a wealth of diagnostic systems that prevent malware from entering. When a threat is identified, our technologies recognize and respond to it even better than ever,” says Pavol Balaj, ESET Enterprise Segment Director.

ESET Inspect: from EDR to XDR thanks to ESET PROTECT

One of the most important innovations is the renaming of the EDR solution from "ESET Enterprise Inspector" to "ESET Inspect". The reason for the renaming is to bring the name closer to ESET PROTECT.

With an EDR tool, companies lay the foundation for an XDR (Extended Detection and Response) platform. This enables them to uncover suspicious behavior and security gaps and better assess risks. It also enables a quick response to incidents and extensive analyzes of how it happened. ESET Inspect uses rules to monitor and evaluate all processes on endpoints inside and outside the organization (user, file, registry, storage and network operations) in real time.

The role-based installation profiles, which can be used to optimally adapt the EDR solution to the network including the externally operated devices (home office, mobile office), should be emphasized. For example, Security Operations Centers (SOC) have different ideas than a security-oriented IT team or a general admin. Optimized rule sets and views are then available according to the selection.

Now also XDR for Linux

One of the highlights in terms of functionality is that in addition to Windows and macOS, the new version also supports Linux. There will also be a cloud version of ESET Inspect, which will initially not be available as a standalone product, but only through the ESET PROTECT Enterprise Bundle.

ESET PROTECT is the linchpin of the new XDR approach. All telemetry data not only from endpoints, but also from networks, e-mails and the cloud sandbox are already coming together here. Combined with ESET Inspect, users get comprehensive threat detection and response capabilities - the component that elevates ESET PROTECT from a management to an XDR platform. This is just the start of ESET's XDR approach, which will be further expanded in the future. This includes, for example, the use of telemetry data from other sources such as cloud applications and the development of an integration framework for third-party providers.

ESET PROTECT further improved for more clarity

The ESET PROTECT platform has many innovations in terms of security management that support IT administrators in their daily work. Firstly, an automatic update mechanism ensures that all ESET endpoint agents and implemented solutions are always up to date. Second, new dashboards provide a quick overview of security events. For example, the cloud sandboxing solution ESET LiveGuard Advanced gets a modern "dashboard". Among other things, analysis results of suspicious files, their location on the endpoints and time evaluations can be displayed on it.

New brute force module and endpoint security for ARM64

To better protect businesses in the age of remote working, ESET PROTECT will include the new Brute-Force Attack Protection module in its security solutions for endpoints (Windows). By combining reputation data from the cloud with password verification and honeypot systems, ESET's Brute-Force Attack Protection module blocks suspicious infiltration attempts.

Whether Microsoft Surface or Samsung Galaxy Book: More and more devices are appearing with ARM processors or an operating system based on them. ESET is one of the first IT security manufacturers in the world to support these systems from now on with its security solutions ESET Endpoint Security and ESET Endpoint Antivirus. All the usual functions of the Windows and Mac versions can now also be used on devices with ARM64.

New version: ESET Endpoint Antivirus for Mac

For Mac users, ESET has also released a new version of ESET Endpoint Antivirus. This is now based on a microservices architecture and replaces the previous, so-called monolithic architecture. ESET Endpoint Antivirus now has an improved multithreading design for faster scanning. The security solution is compatible with Apple M1 devices via Rosetta 2.

More at ESET.com

 


About ESET

ESET is a European company with headquarters in Bratislava (Slovakia). ESET has been developing award-winning security software since 1987 that has already helped over 100 million users enjoy secure technology. The broad portfolio of security products covers all common platforms and offers companies and consumers worldwide the perfect balance between performance and proactive protection. The company has a global sales network in over 180 countries and branches in Jena, San Diego, Singapore and Buenos Aires. For more information, visit www.eset.de or follow us on LinkedIn, Facebook and Twitter.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more