ESET Enterprise Inspector
Uncover the unknown in your network with our EDR solution
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Click Here for more pricing!
Please Note: All Prices are Inclusive of GST
Overview:
ESET ENTERPRISE INSPECTOR
An Endpoint Detection & Response tool designed to leverage ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analysis and remediation of any security issue in the network enabling organizations to take immediate action to:
- Detect advanced persistent threats
- Stop file less attacks
- Block zero-day threats
- Protect against ransomware
- Neutralize state-sponsored attacks
OPEN ARCHITECTURE AND INTEGRATIONS
ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning or easily created to match the needs of specific enterprise environments, including SIEM integrations.
ADJUSTABLE SENSISTIVITY
Utilize ESET's Endpoint Detection and Response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name / path / hash / command line / signer to fine-tune the trigger conditions.
Historic Threat Hunting
Easily adjust behavior rules with ESET Enterprise Inspector, then "re-scan" the entire events database. This allows you to then identify any new alerts triggered by the adjusted detection rules. No longer are you searching for a static IOC, but for dynamic behavior with multiple parameters.
Benefits:
PROBLEM: Threat Hunting & Blocking
Your early warning system or Security Operation Center (SOC) delivers a new threat warning. What are your next steps?
solution
- Leverage early warning system to retrieve data on upcoming or new threats.
- Search all computers for existence of new threat.
- Search all computers for indicators of compromise that threat existed prior to warning.
- Block threat from being able to infiltrate network or execute within organization.
The ESET difference
Threat Hunting
Apply filters to sort data based on file popularity, reputation, digital signature, behavior or contextual information. Setting up multiple filters enables automated, easy threat hunting, including for APTs and targeted attacks, which can be customized to each company’s environment.
Incident Detection (Root cause analysis)
Quickly and easily view all security incidents in the alarms section. With a few clicks security teams can see a full root cause analysis that includes: what was affected, where and when the executable, script, or action was performed.
Anomaly and behavior detection
Check actions that were carried out by an executable and utilize ESET’s LiveGrid® Reputation system to quickly assess if executed processes are safe or suspicious. Grouping of computers by user, department or other criteria allows security teams to quickly identify if the user is entitled to perform a specific action or if an action is out of the ordinary.
Investigation and Remediation
Use a built-in set of rules or create your own rules to respond to detected incidents. Each triggered alarm features a proposed next step to be performed for remediation. This quick response functionality helps to ensure that any single incident will not fall through the cracks.
In cloud or on-premise
Taking advantage of ESET’S flexible and secure architecture, ESET Enterprise Inspector allows on-premise as well as cloud deployment for better scalability based on the company size and needs.
Company Policy Violation
Block malicious modules from being executed on any computer in your organization’s network. ESET Enterprise Inspector’s open architecture offers the flexibility to detect violations of policies about using specific software like torrent applications, cloud storages, tor browsing or other unwanted software.
Looking for more?
Upgrade to full-service protection
ESET Enterprise Inspector
As well as protecting all your computers, laptops, and file servers, make your email gateway impenetrable. ESET mail security eliminates email-borne malware at the server level, before it can do any damage.
- Cloud-based management
- Endpoint security
- File server security
- Mail security
Add data access protection
ESET Secure Authentication
A simple, effective way for businesses of all sizes to implement multi-factor authentication across commonly utilized systems.
- Prevent data breaches
- Meet compliance requirements
- Easily manage authentication
Endpoint protection
- Comprehensive endpoint security for desktop & mobile devices, VMs, file and mail servers.
- Cloud-based or on-premise endpoint management included.
Endpoint encryption
- Powerful, easy-to-use encryption for hard drives (FDE), removable media, files and email.
- Full remote device management without requiring VPNs.
System Requirements:
For computers
- Microsoft Windows 10, 8.1, 8, 7, Vista
- macOS 10.9 and later
- Debian and RedHat based distributions (Ubuntu, OpenSuse, Fedora, Mandriva, RedHat etc.)
- kernel 2.6.x and later
- GNU C Library 2.3 or newer
- GTK+ 2.6 or newer
- LSB 3.1 compatibility recommended
For smartphones and tablets
- Android 5 (Lollipop) and later
- iOS 8 and later
For file servers
- Microsoft Windows Server 2019, 2016, 2012, 2008
- Microsoft Windows Storage Server 2016, 2012, 2008
- Microsoft Windows MultiPoint Server 2012, 2011, 2010
- Microsoft Windows Small Business Server 2011, 2008
- Ubuntu 18.04 LTS, 14.04 LTS, 12.04 LTS
- Red Hat Enterprise Linux 7, 6
- Centos 7
- FreeBSD 9
- Sles 12
For virtual environments
- VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
- VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
- VMware Guest Introspection 6.2.4+, 6.3+, 6.4+
Screenshots:
Documentation:
Download the ESET Enterprise Inspector Datasheet (PDF).
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote