SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

Similar documents
Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

What is a mobile protection product?

SOLUTION OVERVIEW. Smooth initial setup and business continuity ensured by ESET experts

PRODUCT OVERVIEW. On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources

What is an Endpoint Protection Platform?

PRODUCT OVERVIEW. Extend your security intelligence from local network to global cyberspace

SOLUTION OVERVIEW. Manage your network security for up to 250 seats from a single cloud-based console

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Securing the Modern Data Center with Trend Micro Deep Security

Commercial Product Matrix

AKAMAI CLOUD SECURITY SOLUTIONS

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Comodo Certificate Manager

SYMANTEC DATA CENTER SECURITY

Managed Endpoint Defense

Technical Evaluation Best Practices Guide

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

BETTER Mobile Threat Defense (BMTD)

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Reducing the Cost of Incident Response

CloudSOC and Security.cloud for Microsoft Office 365

TREND MICRO SMART PROTECTION SUITES

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Ekran System v Program Overview

The threat landscape is constantly

TREND MICRO SMART PROTECTION SUITES

ForeScout Extended Module for Carbon Black

Quick Heal Mobile Device Management. Available on

ForeScout Extended Module for Bromium Secure Platform

ForeScout Extended Module for Symantec Endpoint Protection

ESET Remote Administrator 6. Version 6.0 Product Details

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Ekran System v Program Overview

Sophos. Allan Widell Channel Account Executive. 24. August 2017

ForeScout Extended Module for Splunk

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Deep Instinct v2.1 Extension for QRadar

Comodo Endpoint Manager Software Version 6.26

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Comodo cwatch Network Software Version 1.4

with Advanced Protection

Panda Security. Corporate Presentation. Gianluca Busco Arré Country Manager

Comodo Unknown File Hunter Software Version 2.1

McAfee Endpoint Threat Defense and Response Family

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Securing Today s Mobile Workforce

Security Made Simple by Sophos

Trend Micro and IBM Security QRadar SIEM

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Data Retrieval Firm Boosts Productivity while Protecting Customer Data

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

Guide to Cyber Security Compliance with GDPR

Comodo Endpoint Manager Software Version 6.25

Endpoint Security for DeltaV Systems

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

McAfee epolicy Orchestrator

Office 365 Integration Guide Software Version 6.7

Seqrite Endpoint Security

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

Cybersecurity The Evolving Landscape

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation

Cisco Start. IT solutions designed to propel your business

The 2017 State of Endpoint Security Risk

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ForeScout CounterACT. Configuration Guide. Version 2.2

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE

Securing Your Amazon Web Services Virtual Networks

Comodo cwatch Network Software Version 2.23

ForeScout Extended Module for VMware AirWatch MDM

INTEGRATION BRIEF DFLabs and Jira: Streamline Incident Management and Issue Tracking.

Comodo Endpoint Manager Software Version 6.25

Comodo One Home Edition - FAQ

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

INTRODUCING SOPHOS INTERCEPT X

CounterACT IOC Scanner Plugin

Office 365 Buyers Guide: Best Practices for Securing Office 365

Comodo One Home Edition - FAQ

in collaboration with

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

for businesses with more than 25 seats

MESSAGING SECURITY GATEWAY. Solution overview

Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 FOCUS AREAS FOR BREACH PREVENTION

ForeScout CounterACT Pervasive Network Security Platform Network Access Control Mobile Security Endpoint Compliance Threat Management

ForeScout ControlFabric TM Architecture

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Transcription:

SOLUTION OVERVIEW Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

What is an endpoint security management console? ESET Security Management Center utilizes a web console to provide real-time visibility for on-premise and off-premise endpoints as well as full reporting and security management for all OSes. It is a single pane of glass over all ESET security solutions deployed in the network and controls endpoint prevention, detection & response layers across all platforms covering desktops, servers, agentless virtual machines and even managed mobile devices. 3

Why endpoint security management? VISIBILITY Zero-days, advanced persistent threats, targeted attacks and botnets are all concerns for industries across the world. Having visibility into these threats in real time is extremely important to allow IT staff to respond promptly and mitigate any risk that may have developed. Due to a continued emphasis of companies to add a mobile workforce, visibility is not just needed on-premise but offpremise as well. ESET Security Management Center provides up-to-date information to provide IT staff with the status of all computers whether they are on-premise or off-premise. It also provides visibility into all OSes that a company might have, not just a limited few. In most instances, visibility is also enhanced to show device-level information such as hardware or software inventories. MANAGEMENT Today s cybersecurity landscape is constantly evolving with new attack methods and never-beforeseen threats. When an attack or data breach occurs, organizations are typically surprised that their defenses were compromised or are completely unaware that the attack even happened. After the attack is discovered, organizations may then want to execute specific tasks across devices such as scans. In addition, this may lead organizations to completely change their configuration policies to better protect against a future attack. ESET Security Management Center allows organizations to adjust the policies or configurations of endpoint security products at any point in time. In addition, tasks can be executed remotely and automatically on devices to save IT admins the time from manually having to execute tasks on each individual computer. REPORTING Most organizations nowadays, if they do not need to meet any compliance, have internal requirements related to reporting. No matter the organization, there will be reports that need to be generated at scheduled intervals and provided to relevant parties, or stored for a future date. ESET Security Management Center allows organizations to set up reports to be generated at scheduled intervals and saved to specific folders, or emailed directly to someone who requested it. Reports can be customized to provide the requestor the reports exactly how they might want them. This process is paramount to saving IT admins time in the busy work associated with on-going reporting. The major advantage of ESET is that you have all users from one console and can manage and properly review their security status. Jos Savelkoul, Team Leader ICT-Department; Zuyderland Hospital, Netherlands; 10,000+ seats 4

Reports can be customized to provide the requestor the reports exactly how they want them. Having visibility into security incidents in real time is extremely important to allow IT staff to respond promptly and mitigate any risk that may have developed. No matter the organization, there will be reports that need to be generated on scheduled intervals and provided to relevant parties, or stored for a future date. 5

The ESET Security Management Center provides over 170 built-in reports and allows you to create custom reports from over 1000 data points. Dynamic groups can sort and filter computers based on current device status which changes over time. 6

The ESET difference PREVENTION TO RESPONSE ESET combines the management of our Endpoint products with our Endpoint Detection and Response solution, ESET Enterprise Inspector and our sophisticated online sandbox ESET Dynamic Threat Defense into a single easy-to-use management console. SINGLE-CLICK INCIDENT REMEDIATIONS From the threats tab, an IT admin can create an exclusion, submit files for further analysis or initiate a scan from a single click. Exclusions can be made by threat name, URL, hash or combination. FULLY CUSTOMIZABLE NOTIFICATION SYSTEM The notification system features a full what you see is what you get editor, where you will be able to fully configure notifications to be alerted on the exact information you want to be notified about. DYNAMIC AND CUSTOM REPORTING The ESET Security Management Center provides over 170 built-in reports and allows you to create custom reports from over 1000 data points. This allows organizations to create reports to look and feel exactly as they might want. Once created, reports can be set up to be generated and emailed at scheduled intervals. AUTOMATION FRAMEWORK Dynamic groups can sort computers based on current device status or defined inclusion criteria. Tasks can then be set up to trigger actions such as scans, policy changes or software installs/ uninstalls based off dynamic group membership changes. FULLY AUTOMATED VDI SUPPORT A comprehensive hardware detection algorithm is used to determine the identity of the machine based on its hardware. This allows automated re-imaging and cloning of non-persistent hardware environments. Therefore, ESET s VDI support requires no manual interaction and is fully automated. PROVEN AND TRUSTED ESET has been in the security industry for over 30 years, and we continue to evolve our technology to stay one step ahead of the newest threats. This has led us to be trusted by over 110 million users worldwide. Our technology is constantly scrutinized and validated by third-party testers who show how effective our approach is at stopping the latest threats. Outstanding company, superb technical support, provides strong threat protection and central management. Dave, Manager of IT; Deer Valley Unified School District, USA; 15,500+ seats 7

Use cases Ransomware Code developers A user opens a malicious email containing a new form of ransomware. SOLUTION IT department receives a notification via email and their SIEM that a new threat was detected on a certain computer. Programmers who work with code on their work computer can tend to create false positives due to compiling software. SOLUTION IT department receives a notification via email and its SIEM that a new threat was found. A scan is initiated with a single click on the infected computer. The file is submitted to ESET Dynamic Threat Defense by another click. After confirming the threat has been contained, warnings in ESET Security Management Center are cleared automatically. The notification shows the threat came from a developer s computer. With one click, the file is submitted to ESET Dynamic Threat Defense to confirm the file is not malicious. IT department, with one click, puts an exclusion in place to prevent future false positives from being displayed on this folder. ESET Security Management Center dashboard Incidents Overview 8

VDI deployments Non-persistent hardware environments typically require manual interaction from an IT department or create reporting and visibility nightmares. SOLUTION After deploying a master image to computers already present in ESET Security Management Center, computers will continue reporting to the previous instance despite a complete re-image of the system. Machines that after the end of a work shift return back to their initial state will not cause duplicate machines and instead will be matched into one record. On deployment of non-persistent images, you can create an image that includes the agent, then whenever a new machine is created with another hardware fingerprint, it automatically will create new records in ESET Security Management Center. Hardware and software inventory Organizations need to know what software is installed on each computer, as well as how old each computer is. SOLUTION View every installed piece of software, including version number, in the computer record. View every computer s hardware details, such as device, manufacturer, model, serial number, processor, RAM, HD space and more. Run reports to view a more holistic view of an organization to make budgetary decisions on hardware upgrades in future years based off current make and models. Software remediation Organizations need to know when an unapproved software has been installed, then are required to remediate the software afterwards. Set up a software uninstall task in the ESET Security Management Center to execute automatically when a computer meets the dynamic group criteria. SOLUTION Set up a dynamic group within ESET Security Management Center to look for a specific unwanted piece of software. Set up a user notification that automatically pops up on the user s screen indicating that they committed a software installation violation by installing the above software. Create a notification to alert the IT department when a computer meets this criterion. 9

ESET Security Management Center can be installed on Windows, Linux or deployed as Virtual Appliance. Multi-tenancy support and 2FA secured logins allow full streamlining of responsibilities across large enterprise teams. Centrally managed security on all endpoints, servers and mobile devices was a key benefit for us. IT Manager; Diamantis Masoutis S.A., Greece; 6,000+ seats 10

ESET Security Management Center technical features FLEXIBLE INSTALL ESET Security Management Center can be installed on Windows, Linux or via Virtual Appliance. After install, all management is done via a web-console, allowing easy access and management from any device or operating system. SINGLE PANE OF GLASS All ESET Endpoint products despite the OS can be managed from a single ESET Security Management Center instance. In addition, ESET Security Management Center supports full Mobile Device Management (MDM) of Android and ios devices. COMPLETELY MULTI-TENANT Multiple users and permission groups can be created to allow access to a limited portion of the ESET Security Management Center instance. This allows full streamlining of responsibilities across large enterprise teams. HARDWARE/SOFTWARE INVENTORY Not only does ESET Security Management Center report on all installed software applications across an organization, it also reports on installed hardware. This allows you to do more from a single location by dynamically grouping computers based off make, model, OS, processor, RAM, HD space and many more items. GRANULAR POLICY CONTROL Organizations can set up multiple policies for the same computer or group and can nest policies for inherited permissions. In addition, organizations can configure policy settings as user-configurable, so you can lock down any number of settings from the end users. SIEM SUPPORT ESET Security Management Center fully supports SIEM tools and can output all log information in the widely accepted JSON or LEEF format. Dashboard of ESET Security Management Center 11

About ESET ESET a global player in information security has been named as the only challenger in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms.* For more than 30 years, ESET has been developing industry-leading IT security software and services, delivering instant, comprehensive protection against evolving cybersecurity threats for businesses and consumers worldwide. ESET is privately owned. With no debts and no loans, we have the freedom to do what needs to be done for the ultimate protection of all our customers. ESET IN NUMBERS 110M + 400k+ 200+ 13 users worldwide business customers countries & territories global R&D centers ESET EMPLOYEES ESET REVENUE More than a third of all ESET employees work in Research & Development in million 500 1,400 400 300 700 200 100 1987 1997 2007 2017 2 1987 1997 2007 2017 0 *Gartner does not endorse any vendor, product or service depicted in its research publications. Gartner research publications consist of the opinions of Gartner s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 12

SOME OF OUR CUSTOMERS protected by ESET since 2011 license prolonged 3x, enlarged 2x protected by ESET since 2008 license prolonged/enlarged 10x protected by ESET since 2016 more than 14,000 endpoints ISP security partner since 2008 2 million customer base SOME OF OUR TOP AWARDS Given the good features for both anti-malware and manageability, and the global reach of customers and support, ESET should be on the shortlist for consideration in enterprise RFPs for anti-malware solutions. KuppingerCole Leadership Compass Enterprise Endpoint Security: Anti-Malware Solutions, 2018 13