Contact Us

|

Careers

|

Change Locale
close

ESET: Putting People at the Forefront of Enterprise Security

Enterprise Software | Posted on September 14, 2016 by Tania Stadnik

This article is the final in a five-part series profiling companies that are leading the field in disruptive technology

As we’ve explored in previous articles, combatting today’s IT security threats means identifying and responding to threats in real-time.

To meet this demand, ESET has developed software that uses a two pronged approach to react immediately to both known and emerging threats. First, they compare known virus signatures to deal with what’s already out there. And then they employ sophisticated heuristics to detect and destroy threats that others miss. What makes ESET’s approach unique is a low system footprint that delivers faster scanning and response without impacting performance of other infrastructure.

Detection

ESET focuses on multiple techniques for detection, including:

Heuristics:

All ESET products use heuristics to detect viruses, Trojans and other threats. This is a technique that implements a set of guidelines or rules in order to problem-solve efficiently. It allows ESET solutions to detect variants or modified forms of malware, but also new previously unknown malicious programs.

Virus signatures:

As ESET’s scanning tools find malicious code, these newly-created signatures are then packed together and released to ESET users in the form of a Virus Signature Database Update rolled out several times daily.

Generic signatures.

As the first step towards proactive protection, ESET analysts create generic signatures that make it possible to capture a larger group of malware, including undiscovered variants of known malware. Generic signatures are signatures that are specific to certain types of behavior, rather than a specific, individual piece of malware.

Code analysis.

ESET solutions enhance detection by analyzing files for any resemblance to known malicious code samples before virus signatures can be developed. Based on the code’s behavior, ThreatSense determines whether the given sample poses a threat, and immediately flags or eliminates all harmful applications.

Emulation.

ESET subjects suspected malicious code to active monitoring, while it is executed in a protected environment (also known as a sandbox). Based on the code’s behavior, ThreatSense determines whether the given sample poses a threat, and immediately flags or eliminates all harmful applications.

Approach

ESET offers numerous advantages, ranging from scanning speed and detection accuracy to ease of use. In particular, their solutions are well-known for:

  • A light footprint (under 90 MB) that keeps systems running fast and interruption-free;
  • Proactive detection and elimination of new and emerging threats; and,
  • Easy-to-use remote management from a single console via Remote Administrator.

Misconceptions 

“Isn’t antivirus dead?”

Antivirus is not dead. Still, ESET goes beyond the static detection signatures of traditional endpoint protection. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running uninterrupted.

Spotlight

ESET Endpoint Security provides comprehensive endpoint protection for Windows, MAC, Linux and mobile devices both in physical and virtualized environments. Clients can protect their Windows endpoints with comprehensive IT security via multiple layers of security, including ESET’s field-proven ESET NOD32 detection technology, complete data access protection and fully adjustable scanning and update options. Because of the low system demands, systems can keep running at near peak performance, and businesses can take advantage of disruptive technologies such as virtualization or cloud, thanks to support for both and optional cloud-powered scanning.

Connect with ESET to learn how their real-time security solutions are disrupting the IT security industry.

Related Articles

Cloud | May 25, 2020 by Softchoice Advisor

The Softchoice Virtual Discovery Expo (VDX) 2020 has now wrapped. Over 2,000 people registered to hear from Softchoice and our exhibitor partners about the areas driving their digital transformation today. This year, our full-day virtual tech expo happened in a much different context than the inaugural event in 2019. Attendees took away an important message: […]

In the initial response to COVID-19 most organizations focused on enabling and stabilizing remote access, collaboration, security and network capabilities. As new financial pressures present themselves, leaders in every vertical are now looking for immediate steps they can take to reduce spending. The Spiceworks State of IT Report 2020 finds that software and cloud-based services […]

Enterprise Software | October 31, 2019 by Akhil Vishwanath

Before Jumping into AI, Conquer Your Data & Analytics Why is it that of all the thousands of artificial intelligence (AI) use cases being considered today, only 5% are in production? Because too many companies jump into AI without planning. They jump straight from identifying a business requirement to data modeling. They skip the steps […]