ESET Protect Customisable Digital Business Security
Buy Eset Protect Entry, Eset Protect Advanced and Eset Protect Complete at discounted rates, and fully protect all of your business devices.
ESET's Protect Platform offers a range of customisable options to protect your endpoints, business data and users. Continuous innovation and years of experience have led to an easily managed system accessible from a cloud or on-premises console. Choose the ESET Protect level that suits your organisation, and buy at discounted rates.
ESET Protect Entry
Modern multilayered endpoint protection featuring strong machine learning and easy-to-use management.
ESET Protect Advanced
Best-in-class endpoint protection against ransomware & zero-day threats, backed by powerful data security.
ESET Protect Complete
Complete, multilayered protection for endpoints, cloud applications and email, the number one threat vector.
We can provide quotes for any license requirements not shown here. Please just ask.
Powerful Features For Ultimate Protection & Easy Deployment
Every business needs online protection. Here's why you should buy ESET Protect.
ESET have over 30 years of experience, giving them the tools to create class-leading innovations and to provide the most advanced antivirus and security solutions on the market. Machine learning, cloud computing and unique multilayered security technologies combined with the world's best threat intelligence and research put ESET products at the forefront of prevention, detection and response capabilities. It's no wonder over 1 billion internet users trust ESET for maximum protection online. If Eset Protect exceeds your requirements, Eset Home Security has everything to keep all your devices safe at home.
ESET Protect Console
Provides real-time visibility for all your endpoints
The Cloud-based console provides real-time visibility of all endpoints: desktops, servers, virtual machines and even managed mobile devices. Control endpoint prevention, detection & response layers across all platforms anytime via your web browser.
- Completely Multitenant:
- Easily manage a large team - create user and permission groups with different privileges within the Eset Protect console.
- Automation Framework:
- Sort computers based on current device status or defined inclusion criteria with dynamic groups.
- Dynamic and custom reporting:
- In addition to over 170 built-in reports, you can create custom reports from over 1000 data points.
- Fully automated VDI support:
- VDI support which requires no manual interaction and is fully automated. Eset Protect uses a comprehensive hardware detection algorithm to determine the identity of the machine based on its hardware. This allows automated re-imaging and cloning of non-persistent hardware environments.
- Advanced RBAC:
- Starting with MFA-protected access, the console is equipped with an advanced Role-Based Access Control (RBAC) system.
- Support for XDR:
- ESET PROTECT works together with ESET Inspect, the XDR-enabling component of the ESET PROTECT platform, to further improve situational awareness and provide visibility across your network,
- Cloud MDM:
- Ready-to-use and integrated with the Eset cloud management console. It's easy for organisations of any size to get started, as there are no prerequisites such as certificates or additional components. Cloud MDM covers Android and Apple devices.
- Advanced Threat Defence:
- Improves detection of zero-day threats such as ransomware by quickly analysing suspicious files in ESET's powerful cloud sandbox.
- The Latest Version:
- Eset Console updates in the background automatically. You'll always be on the latest version with the latest components.
- Granular Policy Control:
- Set up multiple policies for the same computer or group and nest policies for inherited permissions. Policy settings can be user-configurable, so you can lock down any number of settings from your end users.
- SIEM and SOC support:
- ESET PROTECT fully supports SIEM tools and can output all log information in the widely accepted JSON or LEEF format, allowing for integration with Security Operations Centers (SOC).
- Full Disk Encryption (FDE):
- Full Disk Encryption is native to ESET PROTECT, managing encryption of data on both Windows and Mac (FileVault) endpoints. This improves data security and helps organisations solve the problem of data regulation compliance.
- Hardware/Software Inventory:
- ESET PROTECT reports on all installed software applications across an organisation as well as installed hardware.
The fastest internet security solutions available
ESET products are designed to have minimal impact on your system's performance, setting them far ahead of the competition. You'll get real-time protection without the slow-down, regardless of which plan you choose.
ESET Protect Supported Operating Systems
Each ESET Protect Level supports a range of operating systems and setups - just choose the one that's right for you.
For Computers
- Microsoft Windows 11, 10, 8.1, 8, 7, SP1
- macOS 10.12 and later
- Ubuntu Desktop 20.04 LTS and 18.04 LTS 64-bit
- Red Hat Enterprise Linux 7, 8 64-bit with supported desktop environment installed
- SUSE Linux Enterprise Desktop 15 64-bit
For Smartphones/ Tablets
- Android 5 (Lollipop) and later
- iOS 9 and later
For file servers
- Microsoft Windows Server 2022, 2019, 2016, 2012, 2008, R2 SP1
- Microsoft Windows Storage Server 2012, 2008R2
- Microsoft Windows Small Business Server 2011
- RedHat Enterprise Linux (RHEL) 7, 8
- Ubuntu Server 16.04 LTS, 18.04 LTS, 20.04 LTS
- Debian 9, 10, 11
- CentOS 7, 8
- SUSE Linux Enterprise Server (SLES) 12, 15
- Oracle Linux 8
- Amazon Linux 2
For Computers
- Microsoft Windows 11, 10, 8.1, 8, 7, SP1
- macOS 10.12 and later
- Ubuntu Desktop 20.04 LTS and 18.04 LTS 64-bit
- Red Hat Enterprise Linux 7, 8 64-bit with supported desktop environment installed
- SUSE Linux Enterprise Desktop 15 64-bit
For Smartphones/ Tablets
- Android 5 (Lollipop) and later
- iOS 9 and later
For file servers
- Microsoft Windows Server 2022, 2019, 2016, 2012, 2008, R2 SP1
- Microsoft Windows Storage Server 2012, 2008R2
- Microsoft Windows Small Business Server 2011
- RedHat Enterprise Linux (RHEL) 7, 8
- Ubuntu Server 16.04 LTS, 18.04 LTS, 20.04 LTS
- Debian 9, 10, 11
- CentOS 7, 8
- SUSE Linux Enterprise Server (SLES) 12, 15
- Oracle Linux 8
- Amazon Linux 2
For Computers
- Microsoft Windows 11, 10, 8.1, 8, 7, SP1
- macOS 10.12 and later
- Ubuntu Desktop 20.04 LTS and 18.04 LTS 64-bit
- Red Hat Enterprise Linux 7, 8 64-bit with supported desktop environment installed
- SUSE Linux Enterprise Desktop 15 64-bit
For Smartphones/ Tablets
- Android 5 (Lollipop) and later
- iOS 9 and later
For Mail Servers
- Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007
- Microsoft Windows Server 2019, 2016, 2012, 2008
- Microsoft Small Business Server 2011
- IBM Domino 6.5.4 and newer
- HCL Domino version 11, 12
For file servers
- Microsoft Windows Server 2022, 2019, 2016, 2012, 2008, R2 SP1
- Microsoft Windows Storage Server 2012, 2008R2
- Microsoft Windows Small Business Server 2011
- RedHat Enterprise Linux (RHEL) 7, 8
- Ubuntu Server 16.04 LTS, 18.04 LTS, 20.04 LTS
- Debian 9, 10, 11
- CentOS 7, 8
- SUSE Linux Enterprise Server (SLES) 12, 15
- Oracle Linux 8
- Amazon Linux 2
For Cloud Applications Protection
Subscription for Microsoft 365 to connect with the tenant (Exchange Online, OneDrive, SharePoint Online, Teams)
Trusted by Industry Leaders Worldwide
Best-in-class protection from ransomware and zero-day threats, trusted by top performers
The Cloud-based console provides real-time visibility of all endpoints: desktops, servers, virtual machines and even managed mobile devices. Control endpoint prevention, detection & response layers across all platforms anytime via your web browser. Find out more about the Eset Console
Leverages a multilayered approach that utilises multiple technologies working together to balance performance, detection and false positives, and with automated malware removal and mediation.
- Protect against ransomware
- Block targeted attacks
- Prevent data breaches
- Stop fileless attacks
- Detect advanced persistent threats
- Ensure mobile protection and MDM
Provides advanced protection for your company's data passing through all general servers, network file storage including OneDrive, and multi-purpose servers to ensure business continuity.
- Ransomware prevention
- Zero-day threats detection
- Data breaches prevention
- Botnet protection
A powerful encryption managed natively by ESET remote management console. It increases your organisation's data security that meets compliance regulations.
- Encrypt system disks, partitions or entire drives
- Manage from ESET PROTECT Console
- Deploy, activate and encrypt devices in a single action
Provides proactive cloud-based threat defence against targeted attacks and new, never-before-seen threat types, especially ransomware.
Future-proof your organisation's IT security with:
- Advanced unpacking & scanning
- Cutting-edge machine learning
- Cloud-based sandboxing
- In-depth behavioural analysis
Enabled for ESET products:
- Modern Endpoint Protection
- Server Security
- Mail Security
- Cloud App Protection
Provides advanced protection for Microsoft 365 and Google Workspace applications against malware, spam or phishing attacks with ultimate zero-day threat defence and an easy-to-use cloud management console.
Advanced protection
- Antispam
- Anti-Phishing
- Anti-Malware
- Advanced Threat defence
- Cloud-Based Console
Protected applications
- Exchange Online
- OneDrive
- Teams
- SharePoint Online
- Gmail
- Google Drive
Provides an additional layer of security to organizations who want to stop threats from ever reaching their users - thanks to:
Advanced protection
- Antispam
- Anti-Phishing
- Anti-Malware
- Optional Advanced Threat defence
- Comprehensive mail server protection
- Protection of the host server
Provides an additional layer of security to organisations that want to stop threats from out-of-date operating systems and applications, thanks to:
- Automated scanning
- Severity-based prioritisation
- Filtering options
- Exceptions for vulnerabilities
- List of affected devices
- Automatic and manual patching
- Customisable patching policies
- List of available patches
- Central management