ESET Endpoint Security 6 ESET Endpoint Antivirus 6

2y ago
10 Views
3 Downloads
1.13 MB
6 Pages
Last View : 15d ago
Last Download : 3m ago
Upload by : Abby Duckworth
Transcription

ESET EndpointSecurity 6ESET EndpointAntivirus 6for WindowsProducts Details

ESET Endpoint Security 6, ESET Endpoint Antivirus 6ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspiciousactivity and lets the user or admin know if there is something out of order. The 6th generation of our Endpoint securitywith ESET Remote Administrator management console makes it a powerful solution for businesses of all sizes.1. NEW FEATURESAnti-PhishingAnti-Phishing technology protects users from attempts to acquire passwords, banking data and other sensitiveinformation by fake websites masquerading as legitimate ones. When user’s computer attempts to access an URL,ESET systems compare it against our database of known phishing sites. If a match is found, connection to the URL isaborted and a warning message is displayed. At this point, user has as well the option to proceed to the URL at his/herown risk or report the URL to us as a potentially false positive warning.Exploit BlockerExploit Blocker has been designed to fortify often exploited application types on users’ systems, such as web browsers,PDF readers, email clients or MS Office components. It adds another layer of protection, one step closer to attackers, byusing a completely different technology compared to techniques focusing on detection of malicious files themselves.Instead, it monitors behavior of processes and watches for suspicious activity typical for exploits. When triggered, thebehavior of the process is analyzed. If considered suspicious, the threat may be blocked immediately on the machine, withfurther metadata about the attack being sent to ESET LiveGrid cloud-reputation system which gives Exploit Blocker thepotential to protect users against targeted attacks and previously unknown exploits, so called zero-day attacks.Advanced Memory ScannerAdvanced Memory Scanner couples nicely with Exploit Blocker, as it is also designed to strengthen the protectionagainst modern malware. In an effort to evade detection, malware writers extensively use file obfuscation or/andencryption. This causes problems with unpacking such threats and might pose a challenge to bypass for ordinary antimalware techniques, such as emulation or heuristics. To tackle this problem, the Advanced Memory Scanner monitorsthe behavior of a malicious process and scans it once it decloaks in the memory. This allows for effective infectionprevention even from heavily obfuscated malware. Unlike Exploit Blocker, this is a post-execution method, whichmeans that there is a risk that some malicious activity could have been performed already. However, it steps into theprotection chain as a last resort when all other detection techniques have been bypassed.Vulnerability ShieldVulnerability shield is an extension of Two-way Firewall that improves detection of known vulnerabilities on thenetwork level. By implementing detections for common vulnerabilities in widely used protocols, such as SMB, RPC andRDP, it constitutes another important layer of protection against spreading malware, network-conducted attacks andexploitations of vulnerabilities for which a patch has not been released or deployed yet.

ESET Endpoint Security 6, ESET Endpoint Antivirus 6Specialized cleanersThis functionality is a bundle of most relevant critical malware standalone cleaners for malware which commonlycause problems. Specialized cleaners help with malware that cannot be removed by regular cleaner. This bundle will beupdated as needed and placed in Help and Support page.ESET Shared Local CacheESET Endpoint solutions are now optimized for deployment in virtual environments. ESET Shared Local Cache addsvalue when scanning for threats on the same virtual environment. It caches metadata of already scanned clean filesand compares every single scan data with the cached information. As the communication happens over the samephysical hardware, there is practically no delay in scanning. Caching boosts the performance up to 40-80% dependingon network topology (preliminary data, achieved on ESET internal network).Optimization for “revert to default snapshot” stateWhen virtualized it is a common practice that machines are often reverted to their default snapshot state, even in case of asimple “shut down”. In this case data is stored on a different (logical) drive. ESET improves its detection technologies over timeand provides frequent modular updates. These files together with virus signature files are stored outside of the default locationto prevent repetitive downloads and updating from the same data after each revert as the amount of data downloaded riseswith the increasing age of the default snapshot. Configuring this will be available during the initial installation of the program.This feature cannot be pre-configured before installation. User selects different folders for data and folder structures may vary.Idle-State ScannerIdle-State Scanner will aid system performance by performing full scan proactively when the computer is not in use. Ithelps to speed up next scanning by populating local cache.First Scan after InstallationPerforming low priority on-demand scan 20 minutes after installation, First scan after installation assures protectionfrom the beginning.Ease of useThe new architecture of advanced setup tree, new user interface and easier to find and use actions contribute toimproved user experience that addresses addresses users’ needs. The new version has simple navigation and togetherwith ESET Remote Administrator v6, it creates one family with unified look and feel.Optimization for virtual environmentsESET will provide agentless solution for platforms supporting such approach. ESET also modified the existing solutionsfor virtual environments, so that customers can install resource-effective solution without compromises.The new ESET Endpoint solution is optimized for working within virtual environment. It is capable of storing alreadyscanned files in ESET Shared Local Cache so it does not have to scan the same files over and over again. In addition,virtual machines with “revert to default snapshot” state function enabled will not have to download whole virussignature database every time after restart.

ESET Endpoint Security 6, ESET Endpoint Antivirus 6New Licensing SystemNew licensing framework integrations simplify the deployment and long-term usage of ESET security software.Licenses are now automatically updated in all products regardless of changes made. The customer is able to exchangelicense information for simple to remember e-mail address with his custom password.With new licensing system featuring new format of license keys and automatic license update (upon renewal / or anyother license operation), customers can be sure that they stay protected. The optional licensing portal and possibility oflicense rights authorization towards e-mail based license account simplify license management, deployment, mergingof licenses or delegation of licenses towards other entities (even a 3rd party, without losing control over the license).2. NEW GRAPHIC USER INTERFACECompletely redesigned graphic user interface (GUI) of ESET endpoint security solutions makes it easy to use them andmanage them. Information that was previously difficult to find is now easily accessible.Touch screens supportESET introduces support for touch screens and high resolution displays. The following features contribute towardsimproved usability of our products on tablets and ultra-books running Windows 8: Optimization and modification of the main GUI to fit the high-resolution screen. More padding to main GUI elements. Rearrangement of GUI elements to with respect to the touch interface. Basic frequently used actions accessible from tray menu.Hide GUIThe new version of the ESET Endpoint solution fulfills the needs of virtually any organization. Based on the users’ rolesin the organization it is now possible to decide whether the GUI of the security solution will be hidden from the enduser or displayed to the end user.By hiding GUI partially or completely the presence of Endpoint solution may be lowered to minimum. Even withouttray icon and process egui.exe which results in lower hardware resources consumption.Most commonly, system administrators want the security solution to be as transparent to the end users as possible.The security of endpoints in the network is mainly the concern of system administrator rather than end user. Therefore,notifications are more relevant within the remote management console, visible to administrator.Advanced setup redesignAlongside the main product user interface, ESET has redesigned also the advanced setup. Thetructure has beenreengineered together with layout. The overall format now matches its counterpart in ESET Remote Administrator. Themain goal was to simplify the usage, improve the navigation and user understanding.

ESET Endpoint Security 6, ESET Endpoint Antivirus 63. IMPROVED FEATURESDevice ControlImprovements which make the feature easier to navigate and configure were implemented. Creation of rules, especiallyby allowing the enumeration of a connected device or creation of a single rule to multiple devices is now simplified. Inaddition, user will be able to import the list of device Vendors, Models and Serials from a file. ESET also introduces a softblocking rule - warning, allowing notifying the end user that the device is blocked as a result of company policy. Despitethe fact, the end user will have an option to use the device anyway while activity will be logged.Web ControlTo a certain level, warning or blocking pages may be customized. Administrator may include a short message orcontact so the user knows who to contact in order to solve the situation. As in Device Control, a soft blocking rule wasimplemented. It notifies the end user that the website is blocked as a result of company policy. End user has an optionto access the website anyway while activity will be logged.FirewallAside from simplifying configuration and creation of firewall rules (with pre-defined default values, which solve mostcommon use-cases), the functionality should allow for firewall profiles to be assigned to network interfaces, as well asto the combination of network locations and network interfaces. However, this feature is only supported on WindowsVista SP1 and newer systems. Older systems keep old behavior – only one global active profile.Administrators interested in configuring the client firewall to more detail will be able to review all rules that are appliedto network traffic in order to be able to modify them if necessary.The following features will contribute to enhanced user experience of firewall: Rules can be created directly from a log Rules evaluation - rules will be evaluated from top to bottom and can be simply reordered to change importance Troubleshooting wizardThis wizard will guide the user through a set of questions resulting in identification of the rule that the user might haveexperienced problem with. The user will be able to create new rules that fit the needs directly from the wizard.In addition, the concept of Profiles, Zones, Network interfaces, Trusted zone, Subnets was simplified and reworked.ESET introduces Known networks for easier and understandable use.InstallationThe new installer will offer standard functionality of detecting and uninstalling competitive solutions before migrationto ESET Endpoint solution. Wide range of supported competitive solutions on 32 and 64-bit systems can be uninstalledby ESET installer.When installing the new generation of ESET Endpoint solutions, migration of settings will be available to helpmigration to the new product generation.

ESET Endpoint Security 6, ESET Endpoint Antivirus 6Update of Virus Signature Database or ModulesESET introduces Resume failed download functionality. When an update of Virus Signature Database or update ofModules is interrupted, new ESET Endpoint solutions will resume the failed download and it would not have to bedownloaded from scratch. This will contribute to lower use of bandwidth and faster updates.Log filesAutomatic scrolling function when generating Log files was bothering many of our customers. In the improved Log filessection, we have placed a switch to turn automatic scrolling off closer to the customer, right where he needs it.4. SYSTEM REQUIREMENTSFor the seamless operation of ESET Endpoint Solution for Windows 6th gen. the system should meet the following hardware and software requirements:Processor: Intel or AMD x86-x64, Operating Systems: Microsoft Windows 8.1/8/7/Vista/XP

ESET Endpoint Security 6, ESET Endpoint Antivirus 6 Update of Virus Signature Database or Modules ESET introduces Resume failed download functionality. When an update of Virus Signature Database or update of Modules is interrupted, new ESET Endpoint solutions will resume the failed down

Related Documents:

ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Remote Administrator See the following pages for benefits and features of the products that are color-coded in grey.

The ESET Shared Local Cache boosts performance in virtualized environments by eliminating the need to scan duplicate files. Each file is scanned once and stored in the share cache. ESET Shared Local Cache (ESLC) records files declared clean by the Anti-virus scanner (represented by ESET Endpoint Security, ESET Endpoint Antivirus or ESET File .

ESET Endpoint Protection Standard v6.5.522.0 FireEye Endpoint Security v4 Fortinet FortiClient v5.6.2 G DATA EndPoint Protection Business v14.1.0.67 Kaspersky Lab Kaspersky Endpoint Security v10 Malwarebytes Endpoint Protection v1.1.1.0 McAfee Endpoint Security v10.5 Palo Alto Networks Traps v4.1 Panda Security Panda Adaptive Defense 360 v2.4.1

ESET Endpoint Protection Standard provides essential protection for the company network that is easily manageable from a single console. ESET Endpoint Protection Advanced In addition to ESET Endpoint Protection Standard, the Advanced version comes with the powerful Web Control, Firewall and Anti-Spam

ESET Endpoint Protection Standard Keep your network clean and protect your endpoints (computers, smartphones, tablets, and fileserver) against emerging threats. ESET Endpoint Protection Standard provides essential protection for the company network that is easily manageable from a single console. ESET Endpoint Protection Advanced

ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris See the following page(s) for benefits and features of the products that are color-coded in gray.

ESET MOBILE SECURITY ESET, spol. s r.o. ESET Mobile Security is ontwikkeld door ESET, spol. s r.o. Ga voor meer informatie naar www.eset.com. Alle rechten voorbehouden. Niets uit deze documentatie mag worden verveelvoudigd, opgeslagen in een systeem voor het ophalen van gegevens of overgedragen, in enige vorm of op enige wijze, hetzij elektronisch,

The Academic Phrasebank is a general resource for academic writers. It aims to provide the phraseological ‘nuts and bolts’ of academic writing organised according to the main sections of a research paper or dissertation. Other phrases are listed under the more general communicative functions of academic writing.