ESET® DYNAMIC MAIL PROTECTION

Protect your users and their email, the most exploited threat vector

Security Management Center

Mail Security

Cloud Sandbox Analysis

  • Security Management Center

  • Mail Security

  • Cloud Sandbox Analyses

ESET Dynamic Mail Protection

Best-in-class enterprise-grade multi-platform mail security solution augmented by cloud-based sandboxing technology. Incorporates behavior-based detection. Easily managed via a single online console. Provides:

  • Protection against phishing
  • Spam filtering
  • Protection against ransomware
  • Zero-day threats detection
  • Remote management

Bundled solution for enterprise includes

Security Management Center

ESET Security Management Center is an easy-to-use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All features are managed from one single pane of glass.

Mail Security

ESET Mail Security award-winning solutions provide powerful server malware protection, spam filtering, anti-phishing and thorough email scanning against all email-borne threats. It is compatible with all major email platforms including Exchange, Office365, IBM Domino and Kerio.

Cloud-based Sandbox Analysis

ESET Dynamic Threat Defense is a cloud-based sandboxing solution. It evaluates behavior of all submitted samples with threat intelligence feeds, ESET’s multiple internal tools for static and dynamic analysis and reputation data to detect zero-day threats.

Use case: Prevent business continuity issues by reducing spam

PROBLEM

A single user will not be efficient due to having to sift through whether emails are legitimate or not. In addition, every spam email may be forwarded to the IT department to confirm legitimacy.

SOLUTION

  • ESET Mail Security analyzes email using proprietary technology to determine if an email is legitimate or spam.
  • Emails that are determined to be spam are quarantined, and users are delivered a message indicating that emails have been quarantined.
  • Administrators, in addition to the user who received the email, have the ability to release emails or delete them from being delivered.

Use case: Ransomware

PROBLEM

Ransomware tends to enter unsuspecting users’ mailboxes through email.

SOLUTION

  • ESET Mail Security evaluates the attachment to determine whether it is malicious, unknown or safe.
  • ESET Mail Security evaluates whether specific email rules were entered by an administrator to prevent certain attachment types or sizes from being sent to users.
  • If ESET Mail Security is unsure of the potential threat, it can forward the attachment to the additional solution – ESET Dynamic Threat Defense for analysis.
  • ESET Dynamic Threat Defense then analyzes the sample in a cloud sandbox, then submits the result back to Mail Security within minutes.
  • If the file was found to be malicious, ESET Mail Security automatically destroys the email that contained the malicious content.

Use case: Stop phishing in its tracks

PROBLEM

Users are constantly targeted via phishing campaigns that may contain other malicious components.

SOLUTION

  • Early warning system such as ESET Threat Intelligence notifies about a phishing campaign.
  • Rules can be implemented in ESET Mail Security to prevent emails from being received from known malicious countries and domains.
  • ESET Mail Security uses a sophisticated parser that searches message body and subject line to identify malicious links.
  • Any email containing malicious files or links is quarantined and prevented from being received by the users.

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 million customer base

Recommended cybersecurity services

ESET Deployment & Upgrade Service

Installation and configuration of a specific product in your environment to reduce complexity and ensure business continuity.

ESET Threat Intelligence

Early warnings about threats and comprehensive data feeds from cloud-based cyberspace intelligence that ESET collects from over 110 million sensors worldwide.

ESET Premium Support

Premium support from highly-trained ESET professionals 24/7 ensuring minimum reaction times to maximize productivity and the value of your ESET security solutions.

The biggest thing that stands out is its strong technical advantage over other products in the marketplace. ESET offers us reliable security, meaning that I can work on any project at any time knowing our computers are protected 100%.

- Fiona Garland, Business Analyst Group IT; Mercury Engineering, Ireland; 1.300 seats

Bronze Award Winner of the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Looking for more?

Add complete endpoint security

Add data access protection

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Games, apps, websites… anything can be abused. How to protect your family from mobile threats

ESET levels up its Mobile Security app to be even more effective against phishing.

ETeC 2024: Prevention first, Success second: An ESET MDR tale

ESET MDR successes were one of the highlight of 2024's ESET Technology Conference, and for a very good reason.

See more

We Live Security blog

Month in security with Tony Anscombe – October 2024 edition

Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories

How to remove your personal information from Google Search results

Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.