What is ESET ENDPOINT NETWORK SECURITY?
Show Less- Free trial available
- Free version available
Top Industries Represented
Data from Grid Report for Network Security Software
View grid dataDeployment & Support
Deployment
- Cloud, Saas, Web-based
- Desktop-mac
- Desktop-Windows
- Desktop-Linux
- Desktop-Chromebook
- On Promise Windows
- On Premise Linux
- Mobile-Android
- Mobile-Iphone
- Mobile-Ipad
Support
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live Recap)
Training
- In Person
- Live Online
- Webinars
- Documentation
- Videos
ESET ENDPOINT NETWORK SECURITY Pricing View vendors pricing
Check out our offers for each of our packages to get best out of the software
Protect entry
$239
5 devices per year
Modern multilayered endpoint protection featuring strong machine learning and easy-to-use management
Protect Advanced
$310.5
5 devices per year
Best-in-class endpoint protection against ransomware & zero-day threats, backed by powerful data security
Protect complete
$382.5
5 devices per year
Complete, multilayered protection for endpoints, cloud applications & email, the #1 threat vector
Visit us on our website to know more
Get a custom quote
ESET ENDPOINT NETWORK SECURITY Features
Primary Features
Access Controls/Permissions
Access control is a security technique that regulates who or what can view or use resources in a computing environment. It is a fundamental concept in security that minimizes risk to the business or organization.
Activity Monitoring
User activity monitoring is the process of actively monitoring and tracking the behavior of employees across IT resources owned by your company, such as devices and networks.
Event Tracking
Event tracking, or action tracking, usually refers to the monitoring of interactions on a website beyond a simple web page load. Event tracking provides data on how visitors are engaging (or not engaging) with a website
Intrusion Detection System
An Intrusion Detection System (IDS) is a monitoring system that detects suspicious activities and generates alerts when they are detected.
Firewalls
A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Threat Response
Threat Response monitors activity in real time and generates alerts when potential malicious behavior is detected.
Vulnerability Scanning
Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes.
Activity Tracking
Sometimes called user activity tracking, user activity monitoring is a form of surveillance, but serves as a proactive review of end user activity to determine misuse of access privileges or data protection policies either through ignorance or malicious intent.
Real Time Monitoring
RTM, therefore, allows network administrators and engineers to see and respond to network events such as faults, failures, performance, health and usage, slow systems among other issues that can cause organization systems or network downtime as they occur.
Secure Data Storage
Secure Data Storage collectively refers to the manual and automated computing processes and technologies used to ensure stored data security and integrity.
Reporting/Analytics
It is an approach to cybersecurity that uses data collection, data aggregation and analysis tools for threat detection and security monitoring.
Alerts/Notifications
Network alerts are a crucial aspect of network performance monitoring, as they're designed to provide IT admins with quick insight into network issues, allowing for faster troubleshooting.
Policy Management
Network Policy Management is based on a central repository of rules, profiles and objects required for building security policies.
Secondary Features
- Vulnerability Protection
- Application Security
- Monitoring
- Web Traffic Reporting
- Encryption
- Endpoint Protection
- Compliance Tracking
- Vpn
- Server Monitoring
Compare with Similar Products
GLASSWIRE network security
Watchguard
Webroot
Avast
Gfi languard
Mcafee network security
Sophos
Norton 360
Broadcom
FireEye Network security