ESET unveils improvements to security for home users

1 October 2019 Information Security, Products & Solutions

The latest versions of ESET NOD32 Antivirus, ESET Internet Security and ESET Smart Security Premium, offering multiplatform integration, advanced machine learning, an improved password manager and secure data encryption, has been released.

“The surging numbers of Internet-connected devices present a tantalising opportunity for hackers to exploit. Home users are at risk of falling victim to cybercrime without security products that can consistently confront hackers’ attempts at every level. That’s what ESET aims to do with this new edition of our home security products – to give home users the peace of mind knowing that over 30 years of security intelligence is at work actively protecting their devices against the hackers of today,” says Carey van Vlaanderen, CEO at ESET South Africa.

In addition to protection, ESET’s home solutions have also demonstrated results in terms of low system footprint and high performance. AV-Comparatives has awarded ESET Internet Security with five consecutive Advanced+ awards for high performance since May 2017.

The latest edition of ESET’s offering for home users includes a host of new features and improvements:

New multiplatform compatibility – ESET Internet Security (EIS), ESET Smart Security Premium (ESSP), and ESET Cyber Security Pro (ECSP) product licences are now compatible across platforms. So, customers who purchase a licence for EIS, ESSP, or ECSP can now use the same licence to protect their other Windows, Mac, Linux, and Android devices with solutions such as ESET Mobile Security for Android, ESET Parental Control for Android and ESET Smart TV Security.

New advanced machine learning layer – Machine learning employs a wide variety of algorithms to correctly classify samples as clean, malicious or potentially unwanted. Thus, by adding a machine learning layer to home solutions, users are better protected against never-before-seen or zero-day cyber threats.

Improved Host-based Intrusion Prevention System (HIPS) – HIPS conducts an advanced behavioural analysis and detection procedure of running processes, files and registry keys. The current improvement further strengthens the existing detection capabilities of HIPS.

Improved anti-phishing – Anti-phishing technology protects end-users from malicious emails, links, and attachments. The current improvement provides protection against homoglyph attacks where the attacker tries to fool end users by replacing characters in addresses with lookalike characters in order to impersonate legitimate addresses.

Improved banking and payment protection – Financial portals and transactions online require extra protection from prying eyes. Now there is a predefined list of websites that will trigger a secure ‘banking’ browser to open. The list contains not only bank sites, but also PayPal, Apple, and online-based crypto wallets. In addition, trusted media sites are also protected, which prevents fake news from gaining undeserved coverage.

Improved Connected Home Monitor (CHM) – Home users can use CHM to scan their home Internet router for vulnerabilities such as weak passwords, port vulnerabilities, known firmware vulnerabilities, malicious domains, malware infections, etc. CHM will provide improved user guidance for any detected issues. CHM can also discover all devices connected to your home Wi-Fi network – now with improved device recognition including IP address, MAC address, device name, model, and vendor details.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
The role of safe storage in mitigating burglary and fire risk
Smart Home Automation Fire & Safety
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.