ESET Dynamic Threat Defense
Prevent zero-day threats with powerful cloud-based sandboxing
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Click Here for more pricing!
Please Note: All Prices are Inclusive of GST
Overview:
ESET Dynamic Threat Defense
provides another layer of security for ESET products like Mail Security and Endpoint products by utilizing a cloud-based sandboxing technology to detect new, never before seen type of threats. Future proof your company IT security with:
- Behavior-based Detection
- Machine Learning
- Zero-day Threats Detection
- Cloud Sandbox
Multilayered protection
Within ESET Dynamic Threat Defenses, ESET utilizes 3 different machine learning models once a file is submitted. After this process the sample is run through a full sandbox which simulates user behavior to trick anti-evasive techniques.
Unparalleled speed
Every minute counts. That is why ESET Dynamic Threat Defense is designed to analyze the majority of samples in under 5 minutes. If samples were previously analyzed, it simply takes a few seconds until all devices at your organization are protected.
Full visibility
Every sample analyzed by ESET Dynamic Threat Defense is listed in the "Submitted files" section of ESET Security Management Center, which also provides transparency for all data sent to ESET LiveGrid® - cloud malware protection system.
Benefits:
PROBLEM
Ransomware tends to enter unsuspecting users' mailboxes through email.
solution
- ESET Mail Security automatically submits suspicious email attachments to ESET Dynamic Threat Defense.
- ESET Dynamic Threat Defense analyzes the sample, then submits the result back to Mail Security usually within 5 minutes.
- ESET Mail Security detects and automatically remediates attachments that contain the malicious content.
- The malicious attachment never reaches the recipient.
The ESET difference
Automatic protection
The endpoint or server product automatically decides whether a sample is good, bad or unknown. If the sample is unknown, it is sent to ESET Dynamic Threat Defense for analyzing. Once analysis is finished, the result is shared and the endpoint products respond accordingly.
Mobility
Nowadays, employees are constantly traveling and not on premise. That is why ESET Dynamic Threat Defense is able to analyze files no matter where users are. The best part is that if anything malicious is detected, the whole company is immediately protected.
Mail Security protection
Not only does ESET Dynamic Threat Defense work with files, but it also works directly with ESET Mail Security, to ensure that malicious emails are not delivered to your organization.
Tailored customization
ESET allows per-computer detailed policy configuration for ESET Dynamic Threat Defense so the admin can control what is sent, and what should happen based off the received result.
Looking for more?
Upgrade to full-service protection
ESET Dynamic Threat Defense
As well as protecting all your computers, laptops, and file servers, make your email gateway impenetrable. ESET mail security eliminates email-borne malware at the server level, before it can do any damage.
- Cloud-based management
- Endpoint security
- File server security
- Mail security
Add data access protection
ESET Secure Authentication
A simple, effective way for businesses of all sizes to implement multi-factor authentication across commonly utilized systems.
- Prevent data breaches
- Meet compliance requirements
- Easily manage authentication
Endpoint protection
- Comprehensive endpoint security for desktop & mobile devices, VMs, file and mail servers.
- Cloud-based or on-premise endpoint management included.
Endpoint encryption
- Powerful, easy-to-use encryption for hard drives (FDE), removable media, files and email.
- Full remote device management without requiring VPNs.
System Requirements:
For computers
- Microsoft Windows 10, 8.1, 8, 7, Vista
- macOS 10.9 and later
- Debian and RedHat based distributions (Ubuntu, OpenSuse, Fedora, Mandriva, RedHat etc.)
- kernel 2.6.x and later
- GNU C Library 2.3 or newer
- GTK+ 2.6 or newer
- LSB 3.1 compatibility recommended
For smartphones and tablets
- Android 5 (Lollipop) and later
- iOS 8 and later
For file servers
- Microsoft Windows Server 2019, 2016, 2012, 2008
- Microsoft Windows Storage Server 2016, 2012, 2008
- Microsoft Windows MultiPoint Server 2012, 2011, 2010
- Microsoft Windows Small Business Server 2011, 2008
- Ubuntu 18.04 LTS, 14.04 LTS, 12.04 LTS
- Red Hat Enterprise Linux 7, 6
- Centos 7
- FreeBSD 9
- Sles 12
For virtual environments
- VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
- VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
- VMware Guest Introspection 6.2.4+, 6.3+, 6.4+
Screenshots:
Documentation:
Download the ESET Dynamic Threat Defense Datasheet (PDF).
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote