Identity & data protection

Malware and antivirus software

Identity & data protection

Identity & data protection

Seamless and fully validated encryption and multi-factor authentication ensure an organization’s data is protected in accordance with compliance requirements.

We can help your business with:

Endpoint protection

Endpoint protection platform (EPP) is a security solution deployed on company devices to prevent cyber attacks, detect malicious activity, and provide instant remediation capabilities.

ESET Endpoint Security 

Multilayered protection across all platforms

BENEFITS    |    USE CASES
SOLUTION    |    SYS REQUIREMENTS

Why do customers appreciate our identity and data protection?

Data breaches prevention

Minimize risks of business continuity disruptions and ensure the organization and its data are protected anywhere and anytime.

Fast seamless deployment

Whether encryption or authentication, both solutions are tailored to keep setup time to the absolute minimum.

Regulatory compliance

Meet legal requirements and regulations such as GDPR, CCPA, LGPD, or POPI.

Common use cases

Worried about

Data breaches?

Businesses appear in the news every single day to alert their customers that a data breach has occurred.




Worried about

Managing remote employees?

Companies need the ability to protect sensitive data in the case of employee termination or when devices are lost or stolen.


Worried about

Data leakage?

Every company uses removable media devices to move data from one computer to another, but most companies do not have a way to verify that the data is staying only on company devices.

Worried about

Verifying user login?

Businesses use shared computers in shared workspaces and require verification of all parties logging in throughout the workday

Worried about

Weak passwords?

Users tend to employ the same passwords across multiple applications and web services, thus putting businesses at risk


What makes our solution a perfect fit for your needs?

 

Encryption


Identity and data protection

ESET Full Disk Encryption

A powerful encryption managed natively by ESET remote management console. It increases your organization's data security that meets compliance regulations.

  • Encrypt system disks, partitions or entire drives
  • Manage from ESET PROTECT Console
  • Deploy, activate and encrypt devices in a single action
See interactive demo or start a free trial

Explore ESET Full Disk Encryption features

All products managed from one console

ESET Full Disk Encryption works within the ESET PROTECT console, helping administrators to save time thanks to familiarity with the existing management environment and concepts.

Fully validated

Patented technology to protect data for businesses of all sizes. ESET Full Disk Encryption is FIPS 140-2 validated with 256 bit AES encryption. 


Powerful encryption

ESET Full Disk Encryption encrypts system disks, partitions and entire drives to ensure that everything stored on each PC or laptop is locked down and secure, protecting you against loss or theft.

Cross-platform coverage

Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. 





Single-click deployment

Manage full disk encryption across your entire network from a cloud‑based console. ESET PROTECT single pane of glass allows admins to deploy, activate and manage encryption on their connected endpoints with a single click.

Add additional devices at any time

You can increase the number of devices covered by your license at any time.








 

Encryption


Identity and data protection

ESET Endpoint Encryption

A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:

  • Zero data breaches
  • Meet compliance requirements
  • Seamless encryption

Explore ESET Endpoint Encryption features

Fully validated

Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption.

No server required

ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. 

No special hardware required

TPM chips are optional but not required for using full disk encryption.


Granular data protection

ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives.


Protect data in transit

By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company.

Centralized management 

Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.





 

Authentication


Identity and data protection

ESET Secure Authentication

A simple, effective way for businesses of all sizes to implement multi-factor authentication across commonly uses systems. Enables your organization to:

  • Prevent data breaches
  • Meet compliance requirements
  • Manage centrally from your browser
  • Use your phone, or HW tokens

Explore ESET Secure Authentication features

2FA made easy

Authentication is easy: just answer a prompt sent to your phone. Works on iOS and Android devices, and for all platforms and services.



Multiple ways to authenticate

ESET Secure Authentication supports mobile applications, push notifications, hardware tokens, FIDO security keys, as well as custom methods.


Cloud support

In addition to on-premises applications, ESET Secure Authentication also supports web/cloud services such as Office 365, Google Apps, Dropbox and many others, via ADFS 3.0 or SAML protocol integration.

Remote management

ESET Secure Authentication uses its own streamlined management console accessible via a web browser.



10-minute setup

The aim was to create an application that a small business with no IT staff at all could set up and configure.



No dedicated hardware required

All the costs of ESET Secure Authentication are built in so no dedicated hardware is necessary. Simply install the solution on a server and start provisioning.



Try before you buy

Try out the ESET PROTECT platform in action

  • One click access to interactive Demo
  • No installation needed
  • Cloud Management in full force
ESET Cloud Administrator image

Full 30-day free trial

  • Create an account and try full license, no commitment
  • Install and deploy our protection solutions
  • Experience light footprint on your systems

Committed to the highest industry standards

Respected by industry analysts

Learn more

AV Comparatives Real World Protection JUN 2020

Awarded in independent tests

See test results

ESET Endpoint Security is a leader in Small-Business Endpoint Protection Suites on G2

Appreciated by customers worldwide

Read full reviews

Purchase your identity and data protection today

ESET's identity and data protection is available in the following solutions

Eliminate ransomware and zero-day threats with Cloud Sandbox.


Encryption

All included components:
  • Cloud-based Console
  • Endpoint Protection
  • File Server Security
  • Full Disk Encryption
  • Cloud Sandbox
  • Mail Security
    Cloud App Protection

Secured cloud applications and multilayered endpoint protection.


Encryption

Other included products:
  • Cloud-based Console
  • Endpoint Protection
  • File Server Security
  • Full Disk Encryption
  • Cloud Sandbox
  • Mail Security
  • Cloud App Protection


Powerful two-factor authentication for safe access to networks and data.


Multi-factor
authentication

  • Prevent data breaches
  • Meet compliance requirements
  • Manage centrally from your browser
  • Use your phone or HW tokens




Future ready cybersecurity for powerful enterprise protection


Encryption

All included components:
  • Cloud-based Console
  • Endpoint Protection
  • File Server Security
  • Full Disk Encryption
  • Cloud Sandbox
  • Mail Security
    Cloud App Protection
  • Endpoint Detection & Response

Simple and powerful encryption for organizations of all sizes.


Encryption

  • Full disk encryption
  • Removable media encryption
  • File and folder encryption
  • Virtual disks and encrypted archives
  • Centralized management compatible









ESET Technology Alliance solutions

Backup and recovery

Xopero

Total protection, backup and recovery of your business data onsite or in the cloud. Advanced cloud backup for computers, servers and virtual environment, Xopero offers comprehensive data. Benefit from:

  • Complete protection for critical files
  • Control over all backups
  • Easy to use and cost savings
  • Remote management

Download product overview

Data loss prevention

Safetica

Prevent expensive data leaks, lost time and unnecessary personnel expense and enable your organization to:


  • Cover all data leak channels
  • Identify suspicious trends and activities
  • Save the cost of repairing a data breach
  • Reduce personnel costs

Download product overview

Why ESET?

ESET has over 25 years' experience of helping people to Enjoy Safer Technology. Our software is light on hardware, but hard on malware.

Our Technology

ESET’s award-winning NOD32® Antivirus technology is at the cutting edge of digital security. It’s updated daily to keep you secure.

Free Support

Enjoy your free, industry-leading customer support locally. For technical, sales and marketing enquires dial +65 6296 4268.