Categories:

#57

ESET Endpoint Antivirus is ranked #57 in the Endpoint Management Software product directory based on the latest available data collected by SelectHub. Compare the leaders with our In-Depth Report.

ESET Endpoint Antivirus Benefits and Insights

Why use ESET Endpoint Antivirus?

Key differentiators & advantages of ESET Endpoint Antivirus

  • Multilayered Defense: Integrates multilayered technology, machine learning and human expertise to detect malware pre, during and post-execution. Its continuously changing and adjusting security approach extends a balance of detection, performance and false positives. 
  • Low System Demands: Delivers complete protection while utilizing fewer system resources and leaving them for essential end-user programs. Extends hardware lifetime by letting users deploy software on older machines without any upgrade. 
  • Centralized Management: Offers a security management center for real-time visibility into endpoints from a single place. It can be installed on Windows and Linux systems, and customers with over 250 seats can deploy a cloud administrator. 
  • Advanced Techniques: Utilizes an in-house machine learning engine with other defense layers. Generates consolidated outputs and labels incoming samples as clean, potentially unwanted or malicious through a combination of neural networks and six classification algorithms. 
  • Protection Against Zero-Day Threats: Leverages machine learning and heuristics to protect against unknown malware. Combines automated threat evaluation with security researchers in 13 global R&D centers. Protects against new threats before subsequent detection updates through its cloud malware protection system. 

Industry Expertise

It is an award-winning endpoint protection platform used by over 110 million users worldwide. It has achieved the highest scores in SE Labs, AV-Comparatives Performance and VBSpam tests in 2019. It has been recognized as the best business antivirus for macOS by AV-TEST.

Key Features

  • Ransomware Shield: Monitors and evaluates executed applications based on their reputation and behavior for additional protection against ransomware. Detects and blocks processes resembling ransomware behavior. 
  • Network Attack Protection: Improves known vulnerability detection on the network level via network attack protection, an extension of firewall technology. Safeguards against spreading malware, network-conducted attacks and exploitation of vulnerabilities without patches. 
  • In-Product Sandbox: Identify actual behavior of obfuscated malware through in-product sandboxing. Emulates computer hardware and software components to execute suspicious samples in isolated virtualized environments. 
  • Advanced Memory Scanner: Monitors malicious process behavior and scans after it decloaks in memory. Leverage memory scanning to discover and block fileless malware that operates without any file system component requirements. 
  • Exploit Blocker: Observes typically exploitable applications such as email clients, browsers, document readers, Java, Flash and more and focuses on CVE identifiers and exploitation techniques. Analyzes process behavior and blocks suspicious threats immediately on machines. 

Limitations

User feedback indicates the following limitations, as of the time of this review:

  •  Its threat database takes a long time to update. 
  •  File scanning can be slow sometimes. 
  •  Settings are complicated to understand. 

Suite Support

mail_outlineEmail: Not mentioned.
phonePhone: Not specified.
schoolTraining: A knowledge base, user guides, forums and YouTube videos.
local_offerTickets: Customers can send an email to technical support through interactive forms on its contact page.