The name of the base system (platform): | ESET NOD32 |
Developers: | ESET (ESET of Softvea) |
Technology: | Cybersecurity - Antiviruses, cybersecurity - the Antispam, the Firewall, cybersecurity - Information loss preventions |
Content |
ESET NOD32 Smart Security Business Edition is complex business solution for operational scanning and recognition of all types of threats at the expense of a combination of intellectual cloud computing and the patented method of the heuristic analysis. Such approach allows to react instantly to all attempts of penetration of malware, to reflect network attacks of cybercriminals and also to block undesirable mail.
Components
- ESET Endpoint Security
- ESET File Security for Microsoft Windows Server,
- LinuxSolaris ESET File Security для /BSD/,
- ESET Mobile Security Business Edition
- ESET Remote Administrator
Reliability
The advanced system of scanning providing effective personal data protection in corporate network.
High-speed performance
Low system requirements and intellectual algorithms of scanning provide high performance.
Minimum system requirements
Economic resource consumption provides does not overload a system, providing stability of its work.
Key features
High level of data security
- identification of all types of difficult threats, including rootkits and butkit
- operational counteraction to the attacks of cybercriminals
- check of reputation of applications before start
- scanning of web content
- prevention of infection of the workstation and epidemics in corporate network
Protection against unknown threats
- detecting of threats on the basis of a cloud service of ESET Live Grid
- recognition of earlier unknown threats by the principle of technology of the heuristic analysis of ThreatSense®
- behavioural analysis of the riskware
- blocking of malicious URLs on the Internet
Control of removable mediums
- automatic scanning of maintenance of the connected external devices
- setup of rules of work with removable mediums of information for each user
- access control of users as the device and to the set attributes
- identification of removable devices
- restriction of connection of USB printers, LPT/COM of ports, modems, Card reader and also devices on Bluetooth network
Differentiation of access rights to the Internet
- possibility of setup of corporate security policy
- access restriction on users to websites on categories
- management of address lists
Protection against external invasions and traffic filtering
- the customized system of detection of external invasions of HIPS (Host-based Intrusion Prevention System)
- filtering of all incoming traffic
- expanded behavioural analysis
- low-level scanning
Check of corporate mail
- filtering of mail and investments on existence of a malicious code
- blocking of undesirable and advertizing messages
- support of the majority of e-mail clients: Microsoft Outlook Outlook Express Mozilla Thunderbird Windows Live Windows Mail, Mail and other stalemate clients supporting the POP3 and POP3S, IMAP and IMAPS protocol
Protection of virtual environment
- the reliable security level during the work on virtual machines
- the compatibility is confirmed with the certificate of VMware and Citrix
- randomization of accomplishment of tasks
Regular updating
- updating of signature bases - 4 times a day
- the optimized size of packets
- possibility of rollback of signature bases to the previous version
- automatic search of new versions of a product
- updating of components without reinstallation and reset
Additional instruments of diagnostics of a system
- ESET SysInspector
- ESET SysRescue
- full diagnostics of a system
- treatment of the infected files
- creation of "boot drive" for system recovery