ESET PROTECT

Dmitry
Dmitry
expert on software solutions
Description

Advantages:

  • The new ESET Push Notification Service replication protocol for optimizing data transmission over the network
  • New Incident Overview dashboard
  • Group Security Policies
  • A new audit log for monitoring what is happening on the network
  • The ability to install on the Linux operating system
  • Data access rights management
  • Improved network isolation

ESET PROTECT provides a complete overview of ESET security products, including ESET Dynamic Threat Defense. It is a reporting and notification center for general system management, providing information about installed hardware and software

Components

Multiplatform

The product can be installed on Microsoft Windows Server or Linux operating systems, as well as in a virtual environment.

Server

The main component designed to communicate with agents and store information in a database.

ESET Protect Agent

The lightweight application runs on the end device, managing it and the antivirus product. Receives commands from the server and acts automatically according to predefined rules.

Web Console

A portal for managing devices on the corporate network and ESET antivirus products, via a web browser from any device and from anywhere in the world.

Proxy server

Apache HTTP can work as a proxy server for ESET PROTECT agents. The proxy server does not cache or open the connection, but only redirects it. The new replication protocol uses TLS and HTTP2 protocols.

Rogue Detection Sensor

A standalone component for detecting unknown or unauthorized computers on a corporate network.

New features

Equipment inventory

The ESET Protect agent collects information about hardware installed on computers running Windows, macOS, and Linux.

Support for ESET Dynamic Threat Defense

Provides advanced protection against previously unknown threats. The user can send files to the built-in sandbox based on machine learning technologies for malware analysis and receive reports on the behavior of samples.

ESET Push Notification Service

The new protocol supports the use of third-party proxy server services, such as Apache HTTP, to redirect data exchange between the agent and the server.

Support for VDI environments

Identifies a unique hardware fingerprint and allows you to quickly resolve conflicts between cloned computers.

Audit log

Contains information about actions and changes performed by users on the server

Sent files

A new section containing information about which files were sent to ESET and ESET Dynamic Threat Defense.

Warranty

The equipment and software are purchased through the manufacturer's authorized channel

All purchased IT solutions are covered by the official manufacturer's warranty

All products are eligible for service support and maintenance in accordance with the manufacturer's corporate policies

Shipping

The LWCOM office is located in Dubai, Tameem House Building, Floor 25, Barsha Heights (Tecom)

The company delivers products across the entire territory of the United Arab Emirates

Delivery is carried out at the expense of LWCOM