ESET launches Smart Security 9

November 2015 News & Events, Information Security, Products & Solutions

ESET has announced the availability of its new security solutions for Windows home users: ESET Smart Security 9 and ESET NOD32 Antivirus 9. Both have a re-engineered user interface and ESET Smart Security 9 features a new tool to protect customers’ banking transactions and online payments.

Maintaining its lightweight footprint, ESET has re-engineered its security products to improve usability and performance, with a completely re-designed user interface. Both products are compatible with Microsoft’s newest operating system, Windows 10. ESET Smart Security 9 is an all-in-one Internet security solution built around the ESET NOD32 detection technology.

On top of other technologies that protect customers from Internet threats in ESET Smart Security 9 is new Banking & Payment Protection. This feature secures the user’s browser of choice to ensure that all their online financial transactions are processed safely – for online banking sites it works automatically.

The demand for such a feature arose from the growing use of online banking by consumers worldwide, which has made this service a target for cyber criminals. ESET products are engineered with a multi-layered approach that protects users from all types of threats at different levels. “We see a constant increase in malware that targets banking and financial information and operations, and while we have technologies in place that can block them, ESET has designed a completely new feature that improves the experience of our customers and secures their online money-related activities at a whole different level”, says Carey van Vlaanderen, CEO at ESET Southern Africa.

ESET Smart Security 9 multi-layered security also includes proven technologies such as Botnet Protection, Exploit Blocker and Vulnerability Shield. Botnet Protection protects the user’s computer from being taken over by a remote attacker and used as part of a network of infected computers for malicious purposes. Exploit Blocker is designed to fortify applications on the user’s system that are often exploited, such as web browsers, PDF readers, email clients or MS Office components, while Vulnerability Shield improves detection of known vulnerabilities on the network level..

For more information contact ESET-SA,+27 (0)21 659 2000, info@eset.co.za, www.eset.co.za.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
DeepAlert appoints Howard Harrison as CEO
DeepAlert News & Events AI & Data Analytics
DeepAlert has appointed Howard Harrison as chief executive officer. DeepAlert’s founder and CEO of the past six years, Dr Jasper Horrell, will transition into a newly created role as chief innovation officer.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.