This article is the final in a five-part series profiling companies that are leading the field in disruptive technology.
As we’ve explored in previous articles, combatting today’s IT security threats means identifying and responding to threats in real-time.
To meet this demand, ESET has developed software that uses a two pronged approach to react immediately to both known and emerging threats. First, they compare known virus signatures to deal with what’s already out there. And then they employ sophisticated heuristics to detect and destroy threats that others miss. What makes ESET’s approach unique is a low system footprint that delivers faster scanning and response without impacting performance of other infrastructure.
ESET focuses on multiple techniques for detection, including:
All ESET products use heuristics to detect viruses, Trojans and other threats. This is a technique that implements a set of guidelines or rules in order to problem-solve efficiently. It allows ESET solutions to detect variants or modified forms of malware, but also new previously unknown malicious programs.
As ESET’s scanning tools find malicious code, these newly-created signatures are then packed together and released to ESET users in the form of a Virus Signature Database Update rolled out several times daily.
As the first step towards proactive protection, ESET analysts create generic signatures that make it possible to capture a larger group of malware, including undiscovered variants of known malware. Generic signatures are signatures that are specific to certain types of behavior, rather than a specific, individual piece of malware.
ESET solutions enhance detection by analyzing files for any resemblance to known malicious code samples before virus signatures can be developed. Based on the code’s behavior, ThreatSense determines whether the given sample poses a threat, and immediately flags or eliminates all harmful applications.
ESET subjects suspected malicious code to active monitoring, while it is executed in a protected environment (also known as a sandbox). Based on the code’s behavior, ThreatSense determines whether the given sample poses a threat, and immediately flags or eliminates all harmful applications.
ESET offers numerous advantages, ranging from scanning speed and detection accuracy to ease of use. In particular, their solutions are well-known for:
- A light footprint (under 90 MB) that keeps systems running fast and interruption-free;
- Proactive detection and elimination of new and emerging threats; and,
- Easy-to-use remote management from a single console via Remote Administrator.
“Isn’t antivirus dead?”
Antivirus is not dead. Still, ESET goes beyond the static detection signatures of traditional endpoint protection. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running uninterrupted.
ESET Endpoint Security provides comprehensive endpoint protection for Windows, MAC, Linux and mobile devices both in physical and virtualized environments. Clients can protect their Windows endpoints with comprehensive IT security via multiple layers of security, including ESET’s field-proven ESET NOD32 detection technology, complete data access protection and fully adjustable scanning and update options. Because of the low system demands, systems can keep running at near peak performance, and businesses can take advantage of disruptive technologies such as virtualization or cloud, thanks to support for both and optional cloud-powered scanning.
Connect with ESET to learn how their real-time security solutions are disrupting the IT security industry.