ESET Enterprise Inspector 250 - 499 User 250 - 499 license(s) 3 year(s)

ESET Enterprise Inspector 250 - 499 User. License quantity: 250 - 499 license(s), Number of years: 3 year(s), Software type: Electronic License Delivery (ELD). Distribution type: Download
Manufacturer: ESET
Availability: In stock
SKU: 5560337
Manufacturer part number: EEI-N3-F
$75.30
An Endpoint Detection & Response tool designed to leverage ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analysis and remediation of any security issue in the network enabling organizations to take immediate action to: - Detect advanced persistent threats - Stop file less attacks - Block zero-day threats - Protect against ransomware - Neutralize state-sponsored attacks The ESET difference Threat Hunting Apply filters to sort data based on file popularity, reputation, digital signature, behavior or contextual information. Setting up multiple filters enables automated, easy threat hunting, including for APTs and targeted attacks, which can be customized to each company’s environment. Investigation and Remediation Use a built-in set of rules or create your own rules to respond to detected incidents. Each triggered alarm features a proposed next step to be performed for remediation. This quick response functionality helps to ensure that any single incident will not fall through the cracks. Incident Detection (Root cause analysis) Quickly and easily view all security incidents in the alarms section. With a few clicks security teams can see a full root cause analysis that includes: what was affected, where and when the executable, script, or action was performed. In cloud or on-premise Taking advantage of ESET’S flexible and secure architecture, ESET Enterprise Inspector allows on-premise as well as cloud deployment for better scalability based on the company size and needs. Anomaly and behavior detection Check actions that were carried out by an executable and utilize ESET’s LiveGrid® Reputation system to quickly assess if executed processes are safe or suspicious. Grouping of computers by user, department or other criteria allows security teams to quickly identify if the user is entitled to perform a specific action or if an action is out of the ordinary. Company Policy Violation Block malicious modules from being executed on any computer in your organization’s network. ESET Enterprise Inspector’s open architecture offers the flexibility to detect violations of policies about using specific software like torrent applications, cloud storages, tor browsing or other unwanted software.
An Endpoint Detection & Response tool designed to leverage ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analysis and remediation of any security issue in the network enabling organizations to take immediate action to: - Detect advanced persistent threats - Stop file less attacks - Block zero-day threats - Protect against ransomware - Neutralize state-sponsored attacks The ESET difference Threat Hunting Apply filters to sort data based on file popularity, reputation, digital signature, behavior or contextual information. Setting up multiple filters enables automated, easy threat hunting, including for APTs and targeted attacks, which can be customized to each company’s environment. Investigation and Remediation Use a built-in set of rules or create your own rules to respond to detected incidents. Each triggered alarm features a proposed next step to be performed for remediation. This quick response functionality helps to ensure that any single incident will not fall through the cracks. Incident Detection (Root cause analysis) Quickly and easily view all security incidents in the alarms section. With a few clicks security teams can see a full root cause analysis that includes: what was affected, where and when the executable, script, or action was performed. In cloud or on-premise Taking advantage of ESET’S flexible and secure architecture, ESET Enterprise Inspector allows on-premise as well as cloud deployment for better scalability based on the company size and needs. Anomaly and behavior detection Check actions that were carried out by an executable and utilize ESET’s LiveGrid® Reputation system to quickly assess if executed processes are safe or suspicious. Grouping of computers by user, department or other criteria allows security teams to quickly identify if the user is entitled to perform a specific action or if an action is out of the ordinary. Company Policy Violation Block malicious modules from being executed on any computer in your organization’s network. ESET Enterprise Inspector’s open architecture offers the flexibility to detect violations of policies about using specific software like torrent applications, cloud storages, tor browsing or other unwanted software.
Products specifications
Attribute nameAttribute value
License level purchase required499 license(s)
License levelF
Distribution typeDownload
Features
Number of years3 year(s)
License quantity250 - 499 license(s)
Linux operating systems supportedY
Other features
Minimum system requirementsMySQL 5.7.19
System requirements
Windows operating systems supportedWindows 10, Windows 10 x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64
Mac operating systems supportedN
License
Software typeElectronic License Delivery (ELD)
Software
Server operating systems supportedWindows Server 2012 x64, Windows Server 2013, Windows Server 2016, Windows Server 2019