How do we utilize technology to ensure we have the best possible future?

Ayana Elizabeth Johnson - Marine biologist, ocean policy expert Dr. Ayana Elizabeth Johnson is co-founder of Urban Ocean Lab, a think tank for coastal cities, and co-creator of the Spotify/Gimlet podcast How to Save a Planet on climate solutions. She co-edited the bestselling climate anthology All We Can Save and co-founded The All We Can Save Project. She is on the 2021 Time 100 Next List and was named one of Elle’s 27 Women Leading on Climate. She publishes widely, including in The New York Times, Washington Post, and Scientific American.





Ayana Elizabeth Johnson
Marine biologist


How do we utilize technology to ensure we have the best possible future?

Ayana Elizabeth Johnson - Marine biologist

"When it comes to climate solutions, the question is how we deploy technology and transform society. It’s time for governments to play their role, and corporations to step up. We must harness human ingenuity to create the future that we want to live in."

Illustration by: Bruno Mangyoku



When technology enables progress,
ESET is here to protect it





Protected users worldwide


Unique new malware
samples detected daily


Research and development experts


Business customers in 200+
countries and territories

Technology can change the world. Protecting technology is our world.

ESET has been at the forefront of digital security innovation for more than three decades. We provide our global customers with the best possible protection of technologies that help them build a better world and a brighter future for everyone.

Driving progress via thought leadership

We use our expertise to create a safer digital environment and enable progress in all walks of life.

We educate the public and share our insights and malware discoveries on our dedicated news website.

We created EECD to broadcast to government bodies the expert view on current cybersecurity topics.

Our mission is to recognize and support exceptional scientists and their achievements.

Protecting the progress of our customers

Our business customers deliver amazing innovations to their clients, communities and markets. We are proud to protect their technologies.

Hawk-Eye Innovations

Delivering split-second, millimeter accurate decision-making tech for major sports

Learn how the company helps referees around the world make the right call, turning science fiction into everyday technology.

Pixel Federation

Gaming enthusiasts who leveraged advanced technology to achieve global growth

Watch their co-founder Simon Sicko talk about succeeding in a notoriously competitive market and how ESET protects this journey.

"ESET shares its knowledge and experience of security in the broadest sense of the word. They are not just concerned with their own products, but with what they can truly do for the customer."

De Volksbank,  The Netherlands

"The biggest thing that stands out is its strong technical advantage over other products in the marketplace. ESET offers us reliable security, meaning that I can work on any project at any time knowing our computers are protected 100%."

Mercury Engineering, Ireland

"IT, project management? First-class. Deployment? Brilliant. Technical resources? Fabulous. Users? They never even noticed a change in the environment. For us, that's key."

CCS Media, UK

Enable progress, rely on ESET

ESET Prevention, Detection and Response

Holistic multilayered cybersecurity solution for enterprise, combining products, services and research.

Machine learning & human expertise

Cross-platform solutions for all OSes

Locally-based customer care

Signature-light footprint

Top-rated detection

Respected by industry analysts

Awarded in independent tests

ESET PROTECT Advanced is a leader in Endpoint Protection Suites on G2

Appreciated by customers worldwide

Referenced and active contributor

Useful resources to keep your technologies safe

Top five security challenges for CISOs

What to look out for in the post-pandemic era, where to anticipate risk, and which measures can best mitigate it.

RDP: Configuring security for a remote but not distant future

Leveraging RDP to manage your network? Use this guide to help efficiently secure your computers from RDP attacks.

From Crisis Response to Transformation

This handbook can assist and inspire you on your digital transformation journey towards secure IT solutions.


A look at the criminal art of malicious code, pressure and manipulation.