classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


New security solutions
June 2018, Cyber Security, Products

Cybersecurity firm ESET ushers in a new generation of enterprise security products and services. The standouts in the latest suite of enterprise offerings include the all-new ESET Enterprise Inspector, an Endpoint Detection and Response (EDR) solution with features and granularity that surpass anything on the market; and ESET Dynamic Threat Defence, a tool that provides off-premise cloud sandboxing, which leverages machine learning and behaviour-based detection to prevent zero-day attacks.

ESET also says goodbye to ESET Remote Administrator and hello to the all-new ESET Security Management Centre, an enterprise-grade server that provides visibility management and reporting across all operating systems. All of ESET’s enterprise solutions integrate seamlessly into this single pane of glass and allow for visibility into threats like zero-days, APTs and botnets, while also making adjustments to policies and configurations of endpoint security products seamless and easy.

“We travelled around the world to talk to enterprise IT security specialists, to hear what their needs were,” said ESET CTO, Juraj Malcho. ”What we found is that they needed a single console that allowed for visibility into all stages of threat interception: prediction, prevention, detection and remediation. So that is what we made. And, you won’t find us using the term ‘next-gen’ in any of our messaging or product names, because the reality is, since 2005 we have been doing what people are just now calling ‘next-gen.’ We are focused less on hype and more on R&D, and on building solutions that work.”

ESET’s enterprise solutions are built by cybersecurity experts and backed by machine learning. The use of machine learning to automate decisions and evaluate possible threats is a vital part of ESET’s approach – but it is only as strong as the people who stand behind the system.

Human expertise is paramount in providing the most accurate threat intelligence possible due to threat actors being intelligent opponents. ESET’s endpoint products contain a cloud reputation system that feeds relevant information about the most recent threats and benign files. ESET’s reputation system, ESET LiveGrid, is made up of 110 million sensors worldwide and verified by research and development centres, which allows customers to have the highest level of confidence when viewing information and reports within their console.

New products and services

Products

• ESET Security Management Centre

• ESET Enterprise Inspector

• ESET Dynamic Threat Defence

Services

• ESET Threat Monitoring

• ESET Threat Hunting

• ESET Threat Intelligence (re-release)

“I think many people don’t know that ESET has some of the most iconic enterprise companies in the world as customers,” concluded Malcho. “Now, more enterprises will be able to leverage ESET to respond and react to the increasing volume and sophistication of cyber attacks.”


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Intelligence and compliance ­depend on data governance
    June 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    The growth of data in all its forms caused data governance to become increasingly complex, to the point where it is a skill in itself.
  • Data governance and security
    June 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    Data governance has become a key issue for all businesses, and as with all things data-related these days, security is a key component of data governance.
  • The dark side of the Internet
    June 2018, Check Point South Africa, This Week's Editor's Pick, Cyber Security
    Research from Check Point Software Technologies shows that Telegram may be the new channel of choice for conducting cybercrime anonymously.
  • Vulnerabilities in industrial protocol
    June 2018, Kaspersky Lab, News, Cyber Security
    Kaspersky Lab discovers critical vulnerabilities in popular industrial protocol, affecting products from multiple vendors.
  • Arecont releases Contera range
    June 2018, Arecont Vision, CCTV, Surveillance & Remote Monitoring, Products
    The Contera range of cameras by Arecont Vision has hit the market, offering new high-end megapixel (MP) IP cameras at affordable price points.
  • New Turbo HD 5.0 security solutions
    June 2018, Hikvision South Africa, CCTV, Surveillance & Remote Monitoring, Products
    Hikvision has announced the Turbo HD 5.0 family of surveillance products, which includes AcuSense Turbo HD DVRs and ColorVu Turbo HD cameras.
  • Dahua launches HDCVI-IoT series
    June 2018, Zhejiang Dahua Technology, CCTV, Surveillance & Remote Monitoring, Products
    HDCVI-IoT is an IoT infrastructure offering an ecosystem linking conventional HD-over-coax video and audio data with sensor information and alarms.
  • Outdoor-ready RFID readers
    June 2018, Suprema, Access Control & Identity Management, Products
    Suprema extends enterprise access control solutions with XPass D2, a series of new RFID readers.
  • Dahua launches dual-biometric T&A terminals
    June 2018, Zhejiang Dahua Technology, Access Control & Identity Management, Products
    Dahua Technology has launched new access control terminals that support both face and fingerprint identification for access control and time and attendance.
  • NEC XON gets ISO 27001 cybersecurity certification
    June 2018, News, Cyber Security
    NEC XON has obtained ISO 27001 certification for its Cyber Defence Operations Centre and Network Operations Centre.
  • Netgear home security camera
    June 2018, Duxbury Networking, CCTV, Surveillance & Remote Monitoring, Products
    The new Arlo Pro2, features 1080p HD video, a plug-in backup solar power option, and support for applications such as Amazon Alexa.
  • New ransomware variant in the wild
    June 2018, Cyber Security
    New variant of SynAck ransomware uses sophisticated Doppelgänging technique to evade security.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.