Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

An easy-to-use, standalone encryption solution offers comprehensive remote management of endpoint encryption keys and security policies for data stored on hard drives, portable devices, and emails. Utilizing patented technology, it safeguards data for organizations of any size. ESET Endpoint Encryption is validated under FIPS 140-2 standards and employs 256-bit AES encryption. This system does not necessitate a server for installation and efficiently accommodates remote users. It allows for the management of encryption across Windows machines and integrates with native macOS encryption (FileVault) all through a unified dashboard. With ESET Endpoint Encryption, businesses gain enhanced capabilities to secure specific files, folders, virtual disks, or archives. By encrypting emails along with their attachments and limiting access to removable media for designated users, organizations can ensure data protection during transit and mitigate the risk of data breaches. Additionally, administrators maintain complete oversight of licensing, software functionalities, security policies, and encryption keys from a specialized ESET Endpoint Encryption console, offering a robust framework for data security management.

Description

ESET's Endpoint Detection and Response tool provides continuous and thorough oversight of real-time endpoint activities, allowing for detailed investigation of suspicious actions and rapid reaction to security incidents. When utilized alongside the ESET Endpoint Protection Platform, ESET Enterprise Inspector offers a comprehensive solution for prevention, detection, and remediation of threats. This tool includes an API that facilitates the access and exportation of threat detections and their resolutions, ensuring seamless integration with various systems such as SIEM, SOAR, and ticketing platforms. Additionally, ESET Enterprise Inspector boasts remote PowerShell capabilities, enabling security professionals to examine and configure their organization's computers from afar, thus ensuring an effective response without disrupting user operations. Users can also utilize data filters to categorize information based on criteria like file popularity, reputation, digital signature, behavior, or contextual details, enhancing the overall efficiency of threat management. This multifaceted approach provides organizations with a robust framework for maintaining their cybersecurity posture.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Axonius

Integrations

Axonius

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

ESET

Founded

1992

Country

Slovakia

Website

www.eset.com/int/business/solutions/identity-and-data-protection/

Vendor Details

Company Name

ESET

Founded

1992

Country

Slovakia

Website

www.eset.com/us/business/solutions/endpoint-detection-and-response/

Product Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Product Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Alternatives

Alternatives

CLEAR Reviews

CLEAR

Quantum Knight