دعنا نساعدك في اختيار الحل الأمني
الذي يناسب احتياجات عملك
من خلال الإجابة على بعض الأسئلة، سوف نقوم ببناء الحل الأمني المثالي الخاص بك في أقل من 50 ثانية!
الخطوة 1 من 4
ما هو دورك الحالي؟
اختر ما ينطبق:
مسؤول تكنولوجيا المعلومات أو الأمن
Business owner or decision maker
Other
STEP 2 OF 4
How many devices are you looking to protect?
Choose preferred range (precisely configurable later):
How do you plan to manage your endpoints?
Choose one that applies:
Centrally manage and install via a console
Managed
Manage the security of your endpoints from the cloud or via on-premise console.
Install and manage endpoints individually
unManaged
Manually install ESET on each computer/device without a real-time security dashboard.
STEP 3 OF 4
What are your company’s biggest security concerns? You can choose more options.
It is most important that ESET can help protect us against:
Malware Viruses, worms, Trojan horse programs, spyware and botnet software can all compromise your computer.
Viruses, worms, Trojan horse programs, spyware and others.
Ransomware Primarily used for extortion, ransomware blocks the screen or encrypts data stored on the disk and demands a ransom to regain access.
Threat of extortion, blocking the screen or encrypts your data.
Data breaches Data breaches occur when attackers compromise a business’s privacy and obtaining confidential information that can be used to exploit its employees or customers.
Potential theft of your business data and confidential information.
Phishing / Spam Social engineering attack, in which a criminal impersonates a trustworthy entity while requesting sensitive information of the victim.
Social engineering attacks for requesting sensitive information.
Unauthorized access Online criminals can infiltrate business networks for profit by stealing personal identities and information such as bank account numbers.
Infiltration to your business networks for stealing personal identities.