Contact Us

|

Careers

|

Change Locale
close

ESET: Putting People at the Forefront of Enterprise Security

Enterprise Software | Posted on September 14, 2016 by Tania Stadnik

This article is the final in a five-part series profiling companies that are leading the field in disruptive technology

As we’ve explored in previous articles, combatting today’s IT security threats means identifying and responding to threats in real-time.

To meet this demand, ESET has developed software that uses a two pronged approach to react immediately to both known and emerging threats. First, they compare known virus signatures to deal with what’s already out there. And then they employ sophisticated heuristics to detect and destroy threats that others miss. What makes ESET’s approach unique is a low system footprint that delivers faster scanning and response without impacting performance of other infrastructure.

Detection

ESET focuses on multiple techniques for detection, including:

Heuristics:

All ESET products use heuristics to detect viruses, Trojans and other threats. This is a technique that implements a set of guidelines or rules in order to problem-solve efficiently. It allows ESET solutions to detect variants or modified forms of malware, but also new previously unknown malicious programs.

Virus signatures:

As ESET’s scanning tools find malicious code, these newly-created signatures are then packed together and released to ESET users in the form of a Virus Signature Database Update rolled out several times daily.

Generic signatures.

As the first step towards proactive protection, ESET analysts create generic signatures that make it possible to capture a larger group of malware, including undiscovered variants of known malware. Generic signatures are signatures that are specific to certain types of behavior, rather than a specific, individual piece of malware.

Code analysis.

ESET solutions enhance detection by analyzing files for any resemblance to known malicious code samples before virus signatures can be developed. Based on the code’s behavior, ThreatSense determines whether the given sample poses a threat, and immediately flags or eliminates all harmful applications.

Emulation.

ESET subjects suspected malicious code to active monitoring, while it is executed in a protected environment (also known as a sandbox). Based on the code’s behavior, ThreatSense determines whether the given sample poses a threat, and immediately flags or eliminates all harmful applications.

Approach

ESET offers numerous advantages, ranging from scanning speed and detection accuracy to ease of use. In particular, their solutions are well-known for:

  • A light footprint (under 90 MB) that keeps systems running fast and interruption-free;
  • Proactive detection and elimination of new and emerging threats; and,
  • Easy-to-use remote management from a single console via Remote Administrator.

Misconceptions 

“Isn’t antivirus dead?”

Antivirus is not dead. Still, ESET goes beyond the static detection signatures of traditional endpoint protection. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running uninterrupted.

Spotlight

ESET Endpoint Security provides comprehensive endpoint protection for Windows, MAC, Linux and mobile devices both in physical and virtualized environments. Clients can protect their Windows endpoints with comprehensive IT security via multiple layers of security, including ESET’s field-proven ESET NOD32 detection technology, complete data access protection and fully adjustable scanning and update options. Because of the low system demands, systems can keep running at near peak performance, and businesses can take advantage of disruptive technologies such as virtualization or cloud, thanks to support for both and optional cloud-powered scanning.

Connect with ESET to learn how their real-time security solutions are disrupting the IT security industry.

Related Articles

Enterprise Software | October 10, 2019 by Susana Byun

With hundreds of VMware ELA negotiations under our belt, we decided to shed some light on the situation. Below you will find a high-level summary of a recent webinar hosted by our VMware experts

Moving to SAP HANA is a lot like moving to a new home. The destination is exciting, but the process of moving isn’t. For most enterprises, migration brings significant difficulties. It’s tempting to just put it off.

Enterprise Software | June 3, 2019 by Susana Byun

Signing up for the VMware Enterprise Licensing Agreement (VMware ELA) is a major undertaking, one that comes with many questions and considerations.