1bn+
users worldwide
400k+
business customers
ESET Enterprise Inspector
An Endpoint Detection & Response tool designed to exploit ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analyzes and remediation of any security issue in the network enabling organizations to take immediate action to:
Detect advanced persistent threats
Stop file less attacks
Block zero-day threats
Protect against ransomware
Neutralize state-sponsored attacks
Open architecture & integrations
ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning or easily created to match the needs of specific enterprise environments, including SIEM integrations.
Adjustable sensitivity
Utilize ESET’s Endpoint Detection and Response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name / path / hash / command line / signer to fine-tune the trigger conditions.
Historic Threat Hunting
Easily adjust behavior rules with ESET Enterprise Inspector, then "re-scan" the entire events database. This allows you to then identify any new alerts triggered by the adjusted detection rules. No longer are you searching for a static IOC, but for dynamic behavior with multiple parameters.
Use cases
PROBLEM
Threat Hunting & Blocking
Your early warning system or Security Operation Center (SOC) delivers a new threat warning. What are your next steps?
SOLUTION
- Leverage early warning system to retrieve data on upcoming or new threats.
- Search all computers for existence of new threat.
- Search all computers for indicators of compromise that threat existed prior to warning.
- Block threat from being able to infiltrate network or execute within organization.
protected by ESET since 2017
more than 9,000 endpoints
protected by ESET since 2016
more than 32,000 endpoints
The ESET difference
Threat Hunting
Apply filters to sort data based on file popularity, reputation, digital signature, behavior or contextual information. Setting up multiple filters enables automated, easy threat hunting, including for APTs and targeted attacks, which can be customized to each company’s environment.
Investigation and Remediation
Use a built-in set of rules or create your own rules to respond to detected incidents. Each triggered alarm features a proposed next step to be performed for remediation. This quick response functionality helps to ensure that any single incident will not fall through the cracks.
Incident Detection (Root cause analysis)
Quickly and easily view all security incidents in the alarms section. With a few clicks security teams can see a full root cause analysis that includes: what was affected, where and when the executable, script, or action was performed.
In cloud or on-premise
Taking advantage of ESET’S flexible and secure architecture, ESET Enterprise Inspector allows on-premise as well as cloud deployment for better scalability based on the company size and needs.
Anomaly and behavior detection
Check actions that were carried out by an executable and utilize ESET’s LiveGrid® Reputation system to quickly assess if executed processes are safe or suspicious. Grouping of computers by user, department or other criteria allows security teams to quickly identify if the user is entitled to perform a specific action or if an action is out of the ordinary.
Company Policy Violation
Block malicious modules from being executed on any computer in your organization’s network. ESET Enterprise Inspector’s open architecture offers the flexibility to detect violations of policies about using specific software like torrent applications, cloud storages, tor browsing or other unwanted software.
Explore our customized solutions
Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.
Discover additional services complementing ESET Enterprise Inspector
ESET Deployment & Upgrade
ESET professionals install and configure ESET products in your environment and train your organization to ensure a successful deployment/upgrade.
ESET Threat Monitoring
ESET experts constantly monitor your network and endpoint security, alerting you in real time when something suspicious needs your attention.
ESET Threat Hunting
ESET experts help customers investigate data, events and alarms generated by ESET Enterprise Inspector including root cause analyses, forensic investigation and actionable mitigation advice.
Looking for the complete security of your network?
Related enterprise-grade solutions
ESET Targeted Attack Protection
- Security Management Center
- Endpoint Protection Platform
- Cloud Sandbox Analysis
- Endpoint Detection & Response
ESET Dynamic Mail Protection
- Security Management Center
- Mail Security
- Cloud Sandbox Analysis
Related SMB solutions
- ESET Endpoint Security
Award-winning multilayered technology combining machine learning, big data and human expertise. - ESET Dynamic Threat Defense
Cloud-based sandboxing technology detects never before seen or zero-day threats. - ESET Deployment & Upgrade
Fast, seamless customer support for all new deployments or upgrades.
Stay on top of cybersecurity news
Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.