ESET Enterprise Inspector
2.00

Problems that solves

Malware infection via Internet, email, storage devices

Values

Reduce Costs

Enhance Staff Productivity

ESET Enterprise Inspector

Uncover the unknown in your network with our EDR solution - ESET Enterprise Inspector.

Description

An Endpoint Detection & Response tool designed to leverage ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analysis and remediation of any security issue in the network enabling organizations to take immediate action to:
  • Detect advanced persistent threats
  • Stop file less attacks
  • Block zero-day threats
  • Protect against ransomware
  • Neutralize state-sponsored attacks
Open architecture & integrations ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning or easily created to match the needs of specific enterprise environments, including SIEM integrations. Adjustable sensitivity Utilize ESET’s Endpoint Detection and Response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name / path / hash / command line / signer to fine-tune the trigger conditions. Historic Threat Hunting Easily adjust behavior rules with ESET Enterprise Inspector, then "re-scan" the entire events database. This allows you to then identify any new alerts triggered by the adjusted detection rules. No longer are you searching for a static IOC, but for dynamic behavior with multiple parameters. Synchronized response ESET’s Endpoint Detection and Response tool is built on top of existing ESET endpoint security solutions, creating a consistent ecosystem that allows cross-linking of all relevant objects and synchronized remediation of incidents.

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

Internet access is available for employees

IT Security Department in company