Console

ESET PROTECT

Ensures real-time visibility for all endpoints as well as full reporting and security management for all OSes
 

  • Cloud-based console with the possibility of an on-premises deployment
  • Provides real-time visibility of all endpoints: desktops, servers, virtual machines and even managed mobile devices
  • Enables full reporting for ESET security solutions
  • Controls endpoint prevention, detection & response layers across all platforms
  • Connect anytime, anywhere from your favorite web browser

 

Comes automatically within all bundled solutions.

Explore features

Multiple users and permission groups can be created to allow access to a limited portion of the ESET PROTECT console. This allows full streamlining of responsibilities across large enterprise teams.

Dynamic groups can sort computers based on current device status or defined inclusion criteria.

ESET PROTECT provides over 170 built-in reports and allows you to create custom reports from over 1000 data points.

A comprehensive hardware detection algorithm is used to determine the identity of the machine based on its hardware. This allows automated re-imaging and cloning of non-persistent hardware environments. Therefore, ESET’s VDI support requires no manual interaction and is fully automated.

Starting with MFA-protected access, the console is equipped with an advanced Role-Based Access Control (RBAC) system.

To further improve situational awareness and provide visibility across your network, ESET PROTECT works together with ESET Inspect, the XDR-enabling component of the ESET PROTECT platform.

A ready-to-use solution, integrated with our cloud management console. It’s easy for organizations of any size to get started, as there are no prerequisites such as certificates or additional components. Cloud MDM covers Android and Apple devices.

Support for advanced threat defense greatly improves detection of zero-day threats such as ransomware by quickly analyzing suspicious files in ESET's powerful cloud sandbox.

Leave the updating of the console up to us. We’ll do it in the background, and you’ll always be on the latest version with the latest components.

Organizations can set up multiple policies for the same computer or group and can nest policies for inherited permissions. In addition, organizations can configure policy settings as user-configurable, so you can lock down any number of settings from the end users.

ESET PROTECT fully supports SIEM tools and can output all log information in the widely accepted JSON or LEEF format, allowing for integration with Security Operations Centers (SOC).

Full Disk Encryption is native to ESET PROTECT, managing encryption of data on both Windows and Mac (FileVault) endpoints, improving data security and helping organizations solving the problem of data regulation compliance.

Not only does ESET PROTECT report on all installed software applications across an organization, it also reports on installed hardware.