An Endpoint Detection & Response tool designed to leverage ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analysis and remediation of any security issue in the network enabling organizations to take immediate action to: - Detect advanced persistent threats - Stop file less attacks - Block zero-day threats - Protect against ransomware - Neutralize state-sponsored attacks The ESET difference Threat Hunting Apply filters to sort data based on file popularity, reputation, digital signature, behavior or contextual information. Setting up multiple filters enables automated, easy threat hunting, including for APTs and targeted attacks, which can be customized to each company’s environment. Investigation and Remediation Use a built-in set of rules or create your own rules to respond to detected incidents. Each triggered alarm features a proposed next step to be performed for remediation. This quick response functionality helps to ensure that any single incident will not fall through the cracks. Incident Detection (Root cause analysis) Quickly and easily view all security incidents in the alarms section. With a few clicks security teams can see a full root cause analysis that includes: what was affected, where and when the executable, script, or action was performed. In cloud or on-premise Taking advantage of ESET’S flexible and secure architecture, ESET Enterprise Inspector allows on-premise as well as cloud deployment for better scalability based on the company size and needs. Anomaly and behavior detection Check actions that were carried out by an executable and utilize ESET’s LiveGrid® Reputation system to quickly assess if executed processes are safe or suspicious. Grouping of computers by user, department or other criteria allows security teams to quickly identify if the user is entitled to perform a specific action or if an action is out of the ordinary. Company Policy Violation Block malicious modules from being executed on any computer in your organization’s network. ESET Enterprise Inspector’s open architecture offers the flexibility to detect violations of policies about using specific software like torrent applications, cloud storages, tor browsing or other unwanted software.
Products specifications
Attribute name | Attribute value |
---|
License level purchase required | 499 license(s) |
License level | F |
Distribution type | Download |
License quantity | 250 - 499 license(s) |
Number of years | 3 year(s) |
Linux operating systems supported | Y |
Minimum system requirements | J |
Server operating systems supported | Windows Server 2012 x64, Windows Server 2013, Windows Server 2016, Windows Server 2019 |
Windows operating systems supported | Windows 10, Windows 10 x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64 |
Mac operating systems supported | N |
Software type | Electronic License Delivery (ELD) |