ESET Enterprise Inspector 5000 - 9999 User Antivirus security 5000 - 9999 license(s) 2 year(s)
- Brand: Eset
- Category:
- SKU: EEI-R2-J
- EAN:
Enterprise Inspector Years 2 User 5000 - 9999
Offer details
Description
An Endpoint Detection & Response tool designed to leverage ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analysis and remediation of any security issue in the network enabling organizations to take immediate action to:
- Detect advanced persistent threats
- Stop file less attacks
- Block zero-day threats
- Protect against ransomware
- Neutralize state-sponsored attacks
The ESET difference
Threat Hunting
Apply filters to sort data based on file popularity, reputation, digital signature, behavior or contextual information. Setting up multiple filters enables automated, easy threat hunting, including for APTs and targeted attacks, which can be customized to each company’s environment.
Investigation and Remediation
Use a built-in set of rules or create your own rules to respond to detected incidents. Each triggered alarm features a proposed next step to be performed for remediation. This quick response functionality helps to ensure that any single incident will not fall through the cracks.
Incident Detection (Root cause analysis)
Quickly and easily view all security incidents in the alarms section. With a few clicks security teams can see a full root cause analysis that includes: what was affected, where and when the executable, script, or action was performed.
In cloud or on-premise
Taking advantage of ESET’S flexible and secure architecture, ESET Enterprise Inspector allows on-premise as well as cloud deployment for better scalability based on the company size and needs.
Anomaly and behavior detection
Check actions that were carried out by an executable and utilize ESET’s LiveGrid® Reputation system to quickly assess if executed processes are safe or suspicious. Grouping of computers by user, department or other criteria allows security teams to quickly identify if the user is entitled to perform a specific action or if an action is out of the ordinary.
Company Policy Violation
Block malicious modules from being executed on any computer in your organization’s network. ESET Enterprise Inspector’s open architecture offers the flexibility to detect violations of policies about using specific software like torrent applications, cloud storages, tor browsing or other unwanted software.
- Detect advanced persistent threats
- Stop file less attacks
- Block zero-day threats
- Protect against ransomware
- Neutralize state-sponsored attacks
The ESET difference
Threat Hunting
Apply filters to sort data based on file popularity, reputation, digital signature, behavior or contextual information. Setting up multiple filters enables automated, easy threat hunting, including for APTs and targeted attacks, which can be customized to each company’s environment.
Investigation and Remediation
Use a built-in set of rules or create your own rules to respond to detected incidents. Each triggered alarm features a proposed next step to be performed for remediation. This quick response functionality helps to ensure that any single incident will not fall through the cracks.
Incident Detection (Root cause analysis)
Quickly and easily view all security incidents in the alarms section. With a few clicks security teams can see a full root cause analysis that includes: what was affected, where and when the executable, script, or action was performed.
In cloud or on-premise
Taking advantage of ESET’S flexible and secure architecture, ESET Enterprise Inspector allows on-premise as well as cloud deployment for better scalability based on the company size and needs.
Anomaly and behavior detection
Check actions that were carried out by an executable and utilize ESET’s LiveGrid® Reputation system to quickly assess if executed processes are safe or suspicious. Grouping of computers by user, department or other criteria allows security teams to quickly identify if the user is entitled to perform a specific action or if an action is out of the ordinary.
Company Policy Violation
Block malicious modules from being executed on any computer in your organization’s network. ESET Enterprise Inspector’s open architecture offers the flexibility to detect violations of policies about using specific software like torrent applications, cloud storages, tor browsing or other unwanted software.
Specifications
| License | |
|---|---|
| Type | Antivirus security |
| License level | J |
| License quantity | 5000 - 9999 license(s) |
| Software type | Renewal |
| License level purchase required | 9999 license(s) |
| License term in years | 2 year(s) |
| Features | |
| Distribution type | Download |
| Type | Antivirus security |
| System requirements | |
| Windows operating systems supported | Windows 10, Windows 10 x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64 |
| Mac operating systems supported | No |
| Linux operating systems supported | Yes |
| Server operating systems supported | Windows Server 2012 x64, Windows Server 2013, Windows Server 2016, Windows Server 2019 |
| Minimum system requirements | MySQL 5.7.19 |