Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Similar documents
What is a mobile protection product?

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

What is an Endpoint Protection Platform?

PRODUCT OVERVIEW. On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources

PRODUCT OVERVIEW. Extend your security intelligence from local network to global cyberspace

SOLUTION OVERVIEW. Smooth initial setup and business continuity ensured by ESET experts

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Securing Today s Mobile Workforce

Commercial Product Matrix

Securing the Modern Data Center with Trend Micro Deep Security

PROTECTION SERVICE FOR BUSINESS. Datasheet

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

SOLUTION OVERVIEW. Manage your network security for up to 250 seats from a single cloud-based console

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Personal Cybersecurity

Mobile Device Management: A Real Need for the Mobile World

mhealth SECURITY: STATS AND SOLUTIONS

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Quick Heal Mobile Device Management. Available on

AKAMAI CLOUD SECURITY SOLUTIONS

Built without compromise for users who want it all

Kaspersky Small Office Security 5. Product presentation

with Advanced Protection

Make security part of your client systems refresh

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Cybersecurity experts on your side. Your enterprise cybersecurity partner trusted by customers and analysts alike

Censornet. CensorNet Unified Security Service (USS) FREEDOM. VISIBILITY. PROTECTION. Lars Gotlieb Regional Manager DACH

AT&T Endpoint Security

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

Securing the SMB Cloud Generation

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

TREND MICRO SMART PROTECTION SUITES

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

MOBILE SECURITY OVERVIEW. Tim LeMaster

TOMORROW S SECURITY, DELIVERED TODAY. Protection Service for Business

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Cybersecurity The Evolving Landscape

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Enterprise Security Solutions by Quick Heal. Seqrite.

10 easy steps to secure your retail network

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Symantec Endpoint Protection 14

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

For Businesses with more than 25 seats.

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

Carbon Black PCI Compliance Mapping Checklist

Enterprise Security Solutions by Quick Heal. Seqrite.

Security Made Simple by Sophos

Mobile Devices prioritize User Experience

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Agenda. BYOD, Texting & Social Media How to Keep BYODFrom Becoming OMG! Introduction BYOD Defined Trends By the Numbers

The best for everyday PC users

Google Identity Services for work

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

CYBERSECURITY RISK LOWERING CHECKLIST

TREND MICRO SMART PROTECTION SUITES

Managing Windows 8.1 Devices with XenMobile

Case Study Public and Commercial Services Union Strengthens Backup Infrastructure for Cybersecurity and Compliance Challenges

Mobile Security and Public Networks

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

HPE Intelligent Management Center

Best Practices Guide to Electronic Banking

Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018

Kaspersky Security. The Power to Protect Your Organization

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

XenApp, XenDesktop and XenMobile Integration

BETTER Mobile Threat Defense (BMTD)

KEEP YOUR BUSINESS SECURE WITH ESET. Proven. Trusted.

The First Six Steps to Securing Remote Locations 1

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

October 2016 Issue 07/16

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

ESET Secure Business. Simple and Straightforward

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Services solutions for Managed Service Providers (MSPs)

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Symantec Endpoint Protection 11.0

Go mobile. Stay in control.

Bring Your Own Device (BYOD) Best Practices & Technologies

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Kaspersky Open Space Security

Panda Security. Corporate Presentation. Gianluca Busco Arré Country Manager

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

for businesses with more than 25 seats

DOCUMENT* PRESENTED BY

Transcription:

SOLUTION OVERVIEW Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

What is a mobile protection product? A mobile protection product can be separated into two distinct categories: security and management. The security features range includes antimalware, anti-phishing, limiting access to unsecure connections and much more. The management includes remotely wiping devices, restricting application installs, pre-configuring devices for users and other items related to IT management. One important distinction to note is that Apple mobile devices are unable to leverage security features such as antimalware due to restrictions placed on non-apple applications. Therefore, Apple devices only have the management portion of mobile protection products.

Why mobile protection? RANSOMWARE Ransomware has traditionally been a major concern on desktops or servers, but since 2014, ransomware has also existed on Android devices. In 2014, we saw the first Android ransomware in the form of Simplocker. Just like the desktop variants, mobile ransomware has continued to evolve to employ new practices and new payload techniques to ransom mobile devices. When a business experiences a ransomware attack, it quickly realizes that the backups it has are not recent enough, so the business feels as though it must pay the ransom. ESET Endpoint Security for Android provides layers of defense not just to prevent ransomware, but to detect it if it ever exists within an organization s mobile workforce. It is important for all businesses to prevent and detect ransomware, as every time a ransom is paid, it convinces the criminals to continue to utilize this attack method. STOLEN OR LOST DEVICES Nowadays, organizations are enabling employees to work from remote locations, such as their homes or coffee shops. By allowing employees to work remotely, organizations have realized that this freedom brings with it a new set of challenges in the form of lost and stolen devices. These devices not only contain work-related documents, files and emails, but also can contain information that could harm an organization s reputation. ESET security and mobile device management (MDM) solutions for mobile platforms provide an organization the ability to remotely lock or remotely wipe devices. This ensures that sensitive information is not compromised when a device is lost or stolen or during an employee termination. DEVICE MANAGEMENT Organizations, due to liability reasons as well as timemanagement reasons, want to ensure that their employees are using work-provided devices only for work reasons. Also, mobile devices become more risky when they are allowed to connect to insecure networks or when they have certain features enabled. ESET solutions for mobile platforms provide organizations the ability to restrict users from certain applications and from calling certain numbers, as well as restricting the use of device features, such as cameras, Wi-Fi and Bluetooth. In addition, all of this functionality can be deployed as a time-based policy so features are locked down only during work hours. In 2014, we saw the first Android ransomware in the form of Simplocker.

Allowing employees the freedom to work remotely, organizations have realized that this freedom brings with it a new set of challenges in the form of lost and stolen devices. These devices not only contain work-related documents, files and emails, but also can contain information that could harm an organization s reputation. It is important for all businesses to prevent and detect ransomware, as every time a ransom is paid, it convinces the criminals to continue to utilize this attack method.

No need for dedicated solutions for full mobile device management. Oversee all company ios, Android and other endpoint devices from a single point with ESET No needmanagement for dedicated solutions for full Mobile Security Center. Device Management. Oversee all company ios, Android and all other endpoint devices from a single point with ESET Security Management Center. The major advantage of ESET is that you have all users from one console and can manage and properly review their security status. Jos Savelkoul, Team Leader ICT-Department; Zuyderland Hospital, Netherlands; 10,000+ seats

The ESET difference COST-EFFECTIVE No need for dedicated solutions for full mobile device management. Oversee all company ios, Android and other endpoint devices from a single point with ESET Security Management Center. PROVEN AND TRUSTED ESET has been in the security industry for over 30 years and continues to evolve its technology to stay one step ahead of the newest threats. This has led us to be trusted by over 110 million users worldwide. MULTILAYERED PROTECTION ESET combines multilayered technology, machine learning and human expertise to provide its customers with the best level of protection possible. Our technology is constantly adjusting and changing to provide the best balance of detection, false positives and performance. UNPARALLELED PERFORMANCE Countless times, an organization s biggest concern is the performance impact of a mobile protection solution. ESET products continue to excel in the performance arena and win third-party tests that prove how lightweight our endpoints are on systems. ESET CLOUD MALWARE PROTECTION SYSTEM Whenever a zero-day threat such as ransomware is seen, the file is sent to our cloud-based system ESET LiveGrid, where the threat is detonated and behavior is monitored. Results of this system are provided to all mobile endpoints without requiring any updates. WORLDWIDE PRESENCE ESET has 22 offices worldwide, 13 R&D facilities and presence in over 200 countries and territories. This helps to provide our customers with a worldwide perspective on all the most recent trends and threats. ESET security solutions have protected and alerted Primoris IT department on numerous occasions to serious threats and infections, most importantly ransomware. Joshua Collins, Data Center Operations Manager; Primoris Services Corporation, USA; 4,000+ seats

Use cases Ransomware Not only is ransomware a desktop and server threat, but it is also a threat on mobile devices. Businesses want to make sure that all of their data is protected from being ransomed. SOLUTION Deploy ESET Endpoint Security for Android to all mobile devices to ensure that Android devices are protected from any type of malware. Device compliance Different organizations have different policies related to the use of mobile devices, and administrators want to ensure that all devices and users remain in compliance. SOLUTION Restrict which applications can be installed on devices. Restrict Android devices from installing applications from unknown sources to limit risk. Data loss Restrict access to unsecured Wi-Fi networks. Ensure that security features of phones are enabled and implemented. Organizations are not only concerned with devices being lost or stolen but also with data theft when employment is terminated. SOLUTION Enforce a security policy that requires mobile devices to be encrypted. Implement security policies that require passcodes or pins to be set on all devices. Lockout or remotely wipe devices when needed.

Centrally managed security on all endpoints, servers and mobile devices was a key benefit for us. IT Manager; Diamantis Masoutis S.A., Greece; 6,000+ seats Organizations are not only concerned with devices being lost or stolen but also with data theft when employment is terminated.

Technical features Android/iOS Android only ios only ANTI-THEFT Easily remote lock, wipe or kick off a siren when a device may be lost or stolen. In addition, send custom messages directly to devices, or set up lock-screen information to help ensure devices get returned to proper owners. APPLICATION CONTROL Offers administrators the option to monitor installed applications, block access to defined applications, permissions or categories, and prompt users to uninstall particular applications. DEVICE SECURITY Left up to a user, device security is usually not implemented properly. So ESET allows administrators to define password complexity requirements, set screen lock timers, prompt users to encrypt their devices, block cameras and more. MANAGEMENT SERVER Mobile products are fully managed from a single pane of glass that can be installed on Windows or Linux. In addition to installing, ESET has a virtual appliance that you can simply import for quick and easy setup. MULTILAYERED DEFENSE A single layer of defense is not enough for the constantly evolving threat landscape. All endpoint products have the ability to detect malware preexecution, during execution and post-execution, all while remaining optimized for mobile. MACHINE LEARNING All ESET Endpoint products have been using machine learning in addition to all other layers of defense since 1997. ESET currently uses machine learning in conjunction with all of its other layers of defense. Specifically, machine learning is used in the form of consolidated output and neural networks. ANTI-PHISHING Protects users from fake websites that attempt to acquire passwords, banking data and other sensitive information. APPLICATION AUDIT Tracks applications and their access to personal/company data sorted by categories, allowing administrators to monitor and control applications access. APPLE ios MANAGEMENT FRAMEWORK No need for dedicated solutions take advantage of Apple ios Management Framework, and oversee security of all company ios devices from a single point with ESET Security Management Center. PUSH ACCOUNT SETTINGS REMOTELY Remotely push out account settings such as Wi-Fi, VPN and Exchange information. MOBILE DEVICE MANAGEMENT The user and administrator are automatically notified if the current device settings are not in compliance with corporate security policies and suggests the necessary changes. * The availability of the features above is dependent on Android/iOS system restrictions and the version of the mobile OS.

ESET SECURITY MANAGEMENT CENTER SETTINGS FOR IOS MDM ESET SECURITY MANAGEMENT CENTER SETTINGS FOR ANDROID

About ESET ESET a global player in information security has been named as the only challenger in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms.* For more than 30 years, ESET has been developing industry-leading IT security software and services, delivering instant, comprehensive protection against evolving cybersecurity threats for businesses and consumers worldwide. ESET is privately owned. With no debts and no loans, we have the freedom to do what needs to be done for the ultimate protection of all our customers. ESET IN NUMBERS 110M+ 400K+ 200+ 13 users worldwide business customers countries & territories global R&D centers ESET EMPLOYEES ESET REVENUE More than one-third of all ESET employees work in research & development 1,400 in million 500 400 700 300 200 1987 1997 2007 2017 2 1987 1997 2007 2017 100 0 *Gartner does not endorse any vendor, product or service depicted in its research publications. Gartner research publications consist of the opinions of Gartner s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

SOME OF OUR CUSTOMERS protected by ESET since 2011 license prolonged 3 times and expanded 2 times protected by ESET since 2008 license prolonged/expanded 10 times protected by ESET since 2016 more than 14,000 endpoints ISP security partner since 2008 2 million customer base SOME OF OUR TOP AWARDS Given the good features for both anti-malware and manageability, and the global reach of customers and support, ESET should be on the short list for consideration in enterprise RFPs for anti-malware solutions. KuppingerCole Leadership Compass Enterprise Endpoint Security: Anti-Malware Solutions, 2018