ESET® THREAT INTELLIGENCE SERVICE

Extend your security intelligence from local network to global cyberspace

1bn+
users worldwide

400k+
business customers

195
countries & territories

13
global R&D centers

ESET Threat Intelligence Service

Get in-depth, up-to-date global knowledge about specific threats and attack sources, traditionally difficult to detect for security engineers, who access information only within their own networks. Enable your organization to:

Block targeted attacks

Protect against phishing

Stop botnet attacks

Detect advanced persistent threats


Real-time data feed

ESET Threat Intelligence data feeds utilize widely supported STIX/TAXII format, which makes it easy to integrate with existing SIEM tools. Integration helps to deliver the latest information on the threat landscape to predict and prevent threats before they strike.

Robust API

ESET Threat Intelligence features a full API that is available for automation of reports, YARA rules and other functionalities to allow for integration with other systems used within organizations.

YARA rules

These allow organizations to set up custom rules to obtain company-specific information that security engineers are interested in. Organizations receive valuable details such as the number of times specific threats have been seen worldwide, URLs containing malicious code, malware behavior on the system, where it was detected, and more.

Use cases

PROBLEM

Businesses want to prevent infiltrations from being able to communicate in or out of their network.

SOLUTION

  • ESET Threat Intelligence proactively notifies security teams of the most recent targeted attacks and command and control (C&C) servers that have occurred elsewhere.
  • Threat intelligence provides TAXII feeds which can be connected to UTM devices to stop connectivity to or from malicious actors, thus preventing data leaks or damages.
  • Businesses input rules and mitigations to prevent the intrusion of malware into their organization.

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 million customer base

ESET proprietary early warning reports and feeds

Targeted malware report

Keeps the user informed about a potential attack that is under preparation or an ongoing attack aimed specifically against their organization. This report includes YARA rule strings, reputation information, similar binaries, file details, sandbox output and more.

Botnet activity report

Delivers regular and quantitative data about identified malware families and variants of botnet malware. The report provides actionable data that includes Command and Control (C&C) servers involved in botnet management, samples of botnet, global weekly statistics, and a list of targets of this malware.

Forged SSL certificate report

Generated when ESET detects a newly released SSL certificate by a certificate authority which has a very similar asset as the one provided by the customer during initial setup. This may include details such as upcoming phishing campaigns that are attempting to leverage this certificate. The report provides key attributes of the certificate, YARA matches and certificate data.

Targeted phishing report

Shows data about all phishing email activities targeted for the selected organization. The report provides phishing campaign information that includes campaign size, number of clients, URL screenshots, preview of phishing email, location of servers and much more.

Automated sample analysis report

Creates a custom report based on the submitted file or hash, which provides valuable information for fact-based decisions and incident investigations.


Domain feed

Features domains which are considered malicious including domain name, ip address, detection of file downloaded from URL and detection of file which was trying to access the URL.

Malicious file feed

Features executables which are considered malicious and recognizes and shares information such as SHA1, MD5, SHA256, detection, size, and file format.

Botnet feed

Features three types of feeds that check over 1000+ targets per day including information on the botnet itself, servers involved and their targets. Data provided include items such as detection, hash, last alive, files downloaded, ip addresses, protocols, targets.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Looking for more security options?

Security Management Remote management available as cloud‑based or on‑premises deployment.

Endpoint
Protection Advanced multilayered protection for computers, smartphones and virtual machines.

File Server
Security Real-time protection for your company’s data passing through all general servers.

Full Disk
Encryption Robust encryption solution for system disks, partitions or entire devices to achieve legal compliance.

Cloud Sandbox Proactive protection against zero-day threats that analyses suspicious samples in an isolated cloud sandbox environment.

Mail Security Blocks all spam and malware at server level, before they reach users’ mailboxes.

Cloud App Protection Advanced preventive protection for your Microsoft 365 cloud email and storage. With a dedicated console.

Endpoint Detection & Response Highly customizable EDR enables identification of anomalous behavior and further investigation with subsequent response capabilities to incidents and breaches.

*manageable only via on-premises ESET PROTECT console

Starting at
XX.xx €
per seat

Starting at
XX.xx €
per seat

Starting at
XX.xx €
per seat

RECOMMENDED


Price available on request

Starting at
XX.xx €
per seat

Related business solutions

Protection category

Security management

Real-time network security visibility, reporting and management on a single screen.​​​​​​​

Learn more

Protection category

Cloud sandbox

Cloud-based sandboxing technology that detects never before seen or zero-day threats.

Learn more

Protection category

Endpoint detection & response

EDR tool that detects APTs, targeted attacks, file-less attacks and enables risk assessment and forensic investigation.

Learn more

Cybersecurity service

ESET Threat Hunting

Search service through networks to detect and isolate threats evading security solutions.

Learn more

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Games, apps, websites… anything can be abused. How to protect your family from mobile threats

ESET levels up its Mobile Security app to be even more effective against phishing.

ETeC 2024: Prevention first, Success second: An ESET MDR tale

ESET MDR successes were one of the highlight of 2024's ESET Technology Conference, and for a very good reason.

See more

We Live Security blog

Month in security with Tony Anscombe – October 2024 edition

Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories

How to remove your personal information from Google Search results

Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.