Why do customers appreciate our file server security?
Multilayered defense
A single layer of defense is not enough for today's constantly evolving threat landscape. ESET protection for file servers detects malware pre-execution, during execution and post-execution.
Central management
ESET File Security solutions can be managed from the ESET PROTECT management console, which is a cloud-based, unified threat management tool.
Cross-platform Support
Protect your file servers on multiple OSes and platforms including Windows Server, Office365 OneDrive, Linux and Microsoft Azure.
Common use cases
Worried about
Fileless malware?
Fileless malware is a relatively new threat, and due to only existing in memory, it requires a different approach than traditional file-based malware.
Worried about
Ransomware?
Some businesses require extra insurance against ransomware attacks. They also want to ensure their network drives are safe from undesired encryption.
Worried about
Zero-day threats?
Zero-day threats are a major concern for businesses due to not knowing how to protect themselves against something that they have never seen before.
What makes our solutions a perfect fit for your needs?
File security
File server security
ESET File Security
Provides advanced protection for your company’s data passing through all general servers, network file storage including OneDrive, and multi-purpose servers to ensure business continuity.
- Ransomware prevention
- Zero-day threats detection
- Data breaches prevention
- Botnet protection
Starting at XX.XX € for 5 seats
See interactive demo or start a free trial
Explore ESET File Security features
Machine learning
All ESET products currently use machine learning in conjunction with all of our other defense layers and have done so since 1997.
Behavioral Detection - HIPS
ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognize and stop suspicious system behavior.
Ransomware Shield
An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation.
Advanced Memory Scanner
ESET Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory.
Network Attack Protection
ESET Network Attack Protection improves detection of known vulnerabilities on the network level.
Protection for Linux servers
ESET provides installers for the most popular distributions of Unix-based systems, including the ‘Ready’ variations of RedHat and SuSE that comply with the File-System-Hierarchy standard.
System requirements
Supported Windows operating systems
- Microsoft Windows Server 2019, 2016, 2012, 2008R2, 2008 SP2
- Microsoft Windows Server Core 2016, 2012, 2008R2, 2008
- Microsoft Small Business Server 2011
Included products
- ESET File Security for Microsoft Windows Server
- ESET File Security for Linux
- ESET File Security for Microsoft Azure
Requirements for ESET File Security for Linux
- RedHat Enterprise Linux (RHEL) 7 64-bit
- CentOS 7 64-bit
- Ubuntu Server 16.04 LTS 64-bit, 18.04 LTS 64-bit
- Debian 9 64-bit
- SUSE Linux Enterprise Server (SLES) 12 64-bit, 15 64-bit
- Glibc Library 2.12 or higher
- Linux Kernel 2.6.32 or higher
Committed to the highest industry standards
Respected by industry analysts
Awarded in independent tests
Appreciated by customers worldwide
Purchase your file server security solution today
ESET's file server security is available in the following solutions
Future ready cybersecurity for powerful enterprise protection.
Price available on request
Leave us your contact details to receive an offer tailored for your company's needs.
File security
All included components:
- Cloud-based console
- Endpoint Protection
- File Server Security
- Full Disk Encryption
- Cloud Sandbox
- Mail Security
- Cloud App Protection
- Endpoint Detection & Response
Advanced protection for SharePoint servers against malicious uploads and unwanted files.
Sharepoint security
- Protection against ransomware
- Data breaches prevention
- Zero-day threats detection
- File-less attacks prevention