0% found this document useful (0 votes)
29 views7 pages

ESET Mobile Protection Product Overview

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views7 pages

ESET Mobile Protection Product Overview

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

OVERVIEW

Multilayered technology, machine learning and


human expertise working together to provide
comprehensive security for all platforms
What is a mobile
protection product?
A mobile protection product The management includes remotely wiping devices,
can be separated into two restricting application installs, preconfiguring devices
for users, and other items related to IT management.
distinct categories: security
Mobile protection typically covers Android and Apple
and management. devices, the two most widespread mobile operating
The security features range from antimalware, anti- systems. As these OSes are different, also mobile
phishing, limiting access to unsecure connections, protection capabilities can vary between these
and much more. systems.
ESET solutions
for mobile devices
✓ ESET Endpoint Security for Android
✓ ESET MDM for iOS & iPadOS

ESET
PROTECT

With ESET PROTECT, you get a full visibility of the network, from mobiles to workstations and servers.
The ESET Difference
COST EFFECTIVE UNPARALLELED PERFORMANCE
No need for dedicated solutions for full Mobile Countless times, organizations’ biggest concern
Device Management. Oversee smartphones and is the performance impact of a mobile protection
other endpoint devices from a single point with solution. This is an area in which ESET has long
ESET PROTECT. excelled. For instance, in July 2021 ESET Endpoint
Security 2.11 (Android) achieved a nearly perfect
MULTILAYERED PROTECTION score in each of the three categories in AV-TEST’s
“Best Android antivirus for business users”.
ESET combines multilayered technology, machine
learning and human expertise to provide its
WORLDWIDE PRESENCE
customers with the best level of protection
possible. ESET technology is constantly updated to ESET has 22 offices worldwide, 13 R&D facilities and
provide the best balance of detection, false positives presence in over 200 countries and territories. This
and performance. helps to provide its customers with a worldwide
perspective on all the most recent trends and
ESET CLOUD MALWARE threats.
PROTECTION SYSTEM
Whenever a zero-day threat such as ransomware
is seen, the file is sent to the cloud-based system
ESET LiveGrid®, where the threat is detonated and
behavior is monitored. Results of this system are
provided to all mobile endpoints without requiring
any updates.

PROVEN AND TRUSTED


ESET has been in the security industry for over 30
years, and continues to evolve its technology to
stay one step ahead of the newest threats. As a
result, ESET is now trusted by over 110 million users
worldwide.
Technical features
Android/ Android iOS only
iOS only A SINGLE POINT OF
CONTROL
ANTI-THEFT MULTILAYERED DEFENSE No need for dedicated solutions
– oversee security of all
Easily remote lock, wipe, or kick A single layer of defense is
company iOS devices from
off a siren when a device may not enough for the constantly
a single point with ESET
be lost or stolen. In addition, evolving threat landscape. All
PROTECT.
send custom messages directly endpoint products have the
to devices, or set up lock screen ability to detect malware pre-
PUSH ACCOUNT
information to help ensure execution, during execution
SETTINGS REMOTELY
devices get returned to proper and post-execution, all while
owners. remaining optimized for mobile. Remotely push out account
settings such as Wi-Fi, VPN and
APPLICATION CONTROL MACHINE LEARNING Exchange information.

Offers administrators the option ESET uses machine learning in


ABM COMPATIBILITY
to monitor installed applications, conjunction with all its other
block access to defined layers of defense – and has done APPLE BUSINESS MANAGER
applications, permissions, or since 1997. Specifically, machine (ABM) is a powerful method of
categories and prompt users to learning is used in consolidated enrolling corporate iOS devices.
uninstall particular applications. outputs and neural networks. With ABM compatibility you
can enroll devices into ESET
DEVICE SECURITY ANTI-PHISHING protection automatically,
without needing direct contact
Left up to a user, device security Protects users from fake
with the device and with
is usually not implemented websites that attempt to
minimal interaction from the
properly. So ESET allows admins acquire passwords, banking
user. This allows complete
to define password complexity data, and other sensitive
customization of device setup,
requirements, set screen lock information
saving you time and money.
timers, prompt users to encrypt
their device, block cameras and APPLICATION AUDIT
more.
Tracks applications and their
access to personal/company
UNIFIED MANAGEMENT
data sorted by categories,
CONSOLE
allowing administrators
Manage all your endpoints, to monitor and control
devices and servers from ESET applications’ access.
PROTECT, our unified endpoint
management (UEM) console, WEB CONTROL
which delivers a full security
Control or restrict websites
overview of your network.
that users of managed devices
can access, in order to avoid
inappropriate, harmful or
productivity-impacting content.
Use default report templates,
or set up your own customized
reports.

*The availability of the features above is dependent on Android/iOS system restrictions and the version of the mobile OS.
Use Cases
Ransomware Data loss
PROBLEM PROBLEM
Not only is ransomware a desktop and server Organizations are not only concerned with devices
threat, but it is also a threat on mobile devices. being lost or stolen, but also concerned with data
Businesses want to make sure that all of their data theft when an employment is terminated.
is protected from being ransomed.
SOLUTION
SOLUTION
✓ Enforce security policy that requires mobile
✓ Deploy ESET Endpoint Security for Android to all devices to be encrypted.
mobile devices to ensure that Android devices
are protected from any type of malware.
✓ Implement security policies that require
passcodes or pins to be set on all devices.
✓ Restrict Android devices from installing
applications from unknown sources to limit risk.
✓ Lock-out or remotely wipe devices
when needed.

Device compliance
PROBLEM
Different organizations have different policies related to use of mobile devices,
and administrators want to ensure that all devices and users remain in compliance.

SOLUTION
✓ Restrict which applications can be installed on devices.
✓ Restrict access to unsecured Wi-Fi networks.
✓ Ensure that security features of phones are enabled and implemented.
About ESET
WHEN TECHNOLOGY ENABLES PROGRESS, ESET® IS HERE TO PROTECT IT.

ESET brings over 30 years of technology-driven innovation and provides the most
advanced cybersecurity solutions on the market. Our modern endpoint protection
is powered by unique ESET LiveSense® multilayered security technologies,
combined with the continuous use of machine learning and cloud computing.
Backed by the world’s best threat intelligence and research, ESET products offer
the perfect balance of prevention, detection and response capabilities. With high
usability and unparalleled speed, we are dedicated to protecting the progress of
our customers, ensuring maximum protection.

ESET IN NUMBERS

1bn+ 400k+ 195 13


protected business countries and global R&D
internet users customers territories centers

SOME OF OUR CUSTOMERS

protected by ESET since 2017 protected by ESET since 2016 protected by ESET since 2016 ISP security partner since 2008
more than 9,000 endpoints more than 4,000 mailboxes more than 32,000 endpoints 2 million customer base

RECOGNITION

ESET received the Business ESET consistently achieves top rankings ESET has been recognized asa ‘Top
Security APPROVED award from on the global G2 user review platform Player’ for the fourth year in a row in
AV - Comparatives in the Business and its solutions are appreciated by Radicati’s 2023 Advanced Persistent
Security Test in December 2022. customers worldwide. Threat Market Quadrant.

You might also like