Multilayered Technology, Machine Learning And Human Expertise Working .

Transcription

SOLUTION OVERVIEWMultilayered technology, machine learning andhuman expertise working together in dynamicequilibrium, provided by the #1 global endpointsecurity partner from the European Union

What is anEndpointProtectionPlatform?An endpoint protection platform (EPP) isa solution deployed on endpoint devicesto prevent file-based malware attacks,detect malicious activity, and provide theinvestigation and remediation capabilitiesneeded to respond to dynamic securityincidents and alerts.ESET’s endpoint protection solutions leveragea multilayered approach that utilizes multipletechnologies working in a dynamic equilibrium,which has the ability to constantly balanceperformance, detection and false positives.

Why EndpointProtectionSolutions?RANSOMWARERansomware has been a constantconcern for industries across theworld ever since Cryptolockerin 2013. Despite ransomwarehaving existed for far longer, itwas never previously seen asa major threat by businesses.However, now a single incidenceof ransomware can easily render abusiness inoperable by encryptingimportant or essential files.When a business experiences aransomware attack, it can quicklyrealize that the backups it has arenot recent enough, thus temptingit to pay the ransom.ESET’s endpoint protectionsolutions provide multiple layersof defense to not just preventransomware but to detect itif it ever appears within anorganization. It is important toprevent and detect ransomware,as every time someone paysa ransom, it encourages thecriminals to continue to utilize thismode of attack.TARGETED ATTACKSAND DATA BREACHESToday’s cybersecurity landscapeis constantly evolving with newattack methods and never-beforeseen threats. When an attack ordata breach occurs, organizationsare typically surprised that theirdefenses were compromised orare completely unaware thatthe attack even happened. Afterthe attack is finally discovered,organizations then reactivelyimplement measures to blockany similar attack from beingrepeated. However, this doesnot protect them from the nextattack, which may use anotherbrand-new vector.ESET’s endpoint protectionsolutions use threat intelligenceinformation based on theirglobal presence to prioritize andeffectively block the newestthreats prior to their deliveryanywhere else in the world. Inaddition, our solutions featurecloud-based updating to respondquickly in the case of a misseddetection without having to waitfor a normal update.FILELESS ATTACKSNewer threats, called filelessmalware, exist exclusively incomputer memory, making itimpossible for file scanning-basedprotections to detect them.Furthermore, some fileless attackswill leverage currently installedapplications that are built intothe operating system to make iteven harder to detect a maliciouspayload. For example, the use ofPowerShell in these attacks is verycommon.ESET endpoint protectionplatforms have mitigations inplace to detect malformed orhijacked applications to protectagainst fileless attacks. ESET hasalso created dedicated scannersto constantly check memoryfor anything that is suspicious.By utilizing this multilayeredapproach, we make sure wealways stay one step ahead of thenewest malware.

ESET’s endpoint protection solutions provide multiple layers ofdefense to not just prevent malware but to detect it if it everappears within an organization.Newer threats, calledWhen an attack or datafileless malware,breach occurs, organizationsexist exclusively inare typically surprisedcomputer memory,that their defenses weremaking it impossiblecompromised or arefor file scanning-basedcompletely unaware that theprotections to detectattack even happened.them.“ESET has been our reliable security solution for years. It does what it hasto do; you do not have to worry. In short, ESET stands for: reliability, qualityand service.”—Jos Savelkoul, Team Leader ICT-Department; Zuyderland Hospital, Netherlands;10,000 seats

ESET’s endpoint protection solutionsESET Endpoint Security for Windows/macOS/AndroidESET Endpoint Antivirus for Windows/macOS/LinuxESET Server Security for Windows Server/Linux/AzureESET MDM for iOS and iPadOS

The ESETDifferenceMULTILAYERED PROTECTIONUNPARALLELED PERFORMANCEESET combines multilayered technology, machinelearning and human expertise to provide our customerswith the best level of protection possible. Ourtechnology is constantly adjusting and changing toprovide the best balance of detection, false positivesand performance.A major concern for many organizations is theperformance impact of their endpoint protectionsolution. ESET products continue to excel in theperformance arena and win third-party tests that provehow light-weight our endpoints are on systems.CROSS PLATFORM SUPPORTWORLDWIDE PRESENCEESET endpoint protection products support all OSesincluding Windows, macOS, Linux and Android. All ourendpoint products can be fully managed from a singlepane of glass; mobile device management for iOS andAndroid is fully built in as well.ESET has offices in 22 countries worldwide, R&D labs in13 and a presence in over 200 countries and territories.This helps to provide us with data to stop malware priorto it spreading across the globe, as well as to prioritizenew technologies based on the most recent threats orpossible new vectors.ESETSymantecTrend MicroKaspersky LabMcAfee58 mb153.2 mb392.6 mbLowest network load among all tested vendors595.1 mb977.2 mb2533.2 mbSophosSource: AV-Comparatives: Network Performance Test, Business Security Software“The best testimony? The stats from our helpdesk: afterwe introduced ESET, our support guys don’t log anycalls – they don’t have to deal with any antivirus ormalware-related issues!”— Adam Hoffman, IT Infrastructure Manager; Mercury Engineering,Ireland; 1,300 seats

The TechnologyOur products and technologiesrest on 3 pillarsESET LIVEGRID MACHINE LEARNINGHUMAN EXPERTISEWhenever a zero-day threat suchas ransomware is seen, the file issent to our cloud-based malwareprotection system – LiveGrid ,where the threat is detonatedand its behavior is monitored. Theresults of this system are providedto all endpoints globally withinminutes without requiring anyupdates.Uses the combined power ofneural networks and handpickedalgorithms to correctly labelincoming samples as clean,potentially unwanted or malicious.ESET’s world-class securityresearchers share elite know-howand intelligence to ensure our usersbenefit from optimum, round-theclock threat intelligence.A single layer of defense is not enough for the constantlyevolving threat landscape. All ESET Endpoint Security productshave the ability to detect malware pre-execution, duringexecution and post-execution. Focusing on more than a specificpart of the malware lifecycle allows us to provide the highestlevel of protection possible.

MACHINE LEARNINGADVANCED MEMORY SCANNERAll ESET endpoint products have been using machinelearning in addition to our other layers of defense since1997. Specifically, machine learning is used in the formof consolidated output and neural networks. For a deepinspection of the network, admins can turn on a specialaggressive machine learning mode that works evenwithout internet connection.ESET Advanced Memory Scanner monitors the behaviorof a malicious process and scans it once it decloaks inmemory. Fileless malware operates without needingpersistent components in the file system that can bedetected conventionally. Only memory scanning cansuccessfully discover and stop such malicious attacks.RANSOMWARE SHIELDEXPLOIT BLOCKERESET Ransomware Shield is an additional layer thatprotects users from ransomware. This technologymonitors and evaluates all executed applications basedon their behavior and reputation. It is designed todetect and block processes that resemble the behaviorof ransomware.ESET Exploit Blocker monitors typically exploitableapplications (browsers, document readers, email clients,Flash, Java and more), and instead of just aiming atparticular CVE identifiers, it focuses on exploitationtechniques. When triggered, the threat is blockedimmediately on the machine.IN-PRODUCT SANDBOXBOTNET PROTECTIONToday’s malware is often heavily obfuscated and triesto evade detection as much as possible. To see throughthis and identify the real behavior hidden underneaththe surface, we use in-product sandboxing. Withthe help of this technology, ESET solutions emulatedifferent components of computer hardware andsoftware to execute a suspicious sample in an isolatedvirtualized environment.ESET Botnet Protection detects maliciouscommunication used by botnets, and at the sametime identifies the offending processes. Any detectedmalicious communication is blocked and reported tothe user.

NETWORK ATTACK PROTECTIONSECURE BROWSERThis technology improves detection of knownvulnerabilities on the network level. It constitutesanother important layer of protection against thespread of malware, network-conducted attacks, andexploitation of vulnerabilities for which a patch has notyet been released or deployed.Designed to protect organization’s assets with a speciallayer of protection that focuses on the browser, as themain tool used to access critical data inside the intranetperimeter and in the cloud. Secure Browser providesenhanced memory protection for the browser process,coupled with keyboard protection, and lets admins addURLs to be protected by it.HIPSUEFI SCANNERESET’s Host-Based Intrusion Prevention Systemmonitors system activity and uses a predefined setof rules to recognize suspicious system behavior.Moreover, the HIPS self-defense mechanism stopsthe offending process from carrying out the harmfulactivity.ESET is the first endpoint security provider to adda dedicated layer into its solution that protects theUnified Extensible Firmware Interface (UEFI). ESET UEFIScanner checks and enforces the security of the prebootenvironment and is designed to monitor the integrity ofthe firmware. If modification is detected, it notifies theuser.“The biggest thing that stands out is its strong technicaladvantage over other products in the marketplace. ESEToffers us reliable security, meaning that I can work onany project at any time knowing our computers areprotected 100%.”— Fiona Garland, Business Analyst Group IT; Mercury Engineering, Ireland;1,300 seats

ESET PROTECTAll ESET endpoint solutions are managed froma single-pane-of-glass cloud console, ESET PROTECT,ensuring the complete overview of your network.

Use casesRansomwareZero-day threatsSome businesses want extra assurance that they will beprotected from ransomware attacks.Zero-day threats are a major concern for businessesbecause they have no easy way to protect againstsomething that they have never seen before.SOLUTION Network Attack Protection has the ability to preventransomware from ever infecting a system, bystopping exploits at the network level. Our multilayered defense features an in-productsandbox that has the ability to detect malware thatattempts to evade detection by using obfuscation. Leverage ESET’s cloud malware protection system toautomatically protect against new threats withoutthe need to wait for the next detection update. All products contain protection in the form ofSOLUTION ESET endpoint products leverage heuristics andmachine learning as part of our multilayeredapproach to prevent and protect against neverbefore-seen malware. Our 13 global R&D labs allow us to respond quickly tomalware upon its first incidence anywhere across theglobe. ESET’s cloud malware protection systemautomatically protects against new threats withoutthe need to wait for the next detection update.Ransomware Shield to ensure that ESET users areprotected from malicious file encryption.Fileless malwareFileless malware is a relatively new threat and, as itexists only in memory, requires a different approachcompared to traditional file-based malware.SOLUTION A unique ESET technology, Advanced MemoryScanner, protects against this type of threat bymonitoring the behavior of malicious processes andscanning them once they decloak in memory. Reduce data gathering and investigation time byuploading the threat to ESET Threat Intelligence inorder to provide information about how it functions. Multilayered technology, machine learning andhuman expertise provide our customers with the bestlevel of protection possible.“When we found ESET, weknew it was the right choice:reliable technology, robustdetection, local presence andexcellent technical support,everything that we needed.”— Ernesto Bonhoure, ITInfrastructure Manager;Hospital Alemán, Argentina,1,500 seats

About ESETFor more than 30 years, ESET has beenESET is privately owned. With no debtsdeveloping industry-leading IT securityand no loans, we have the freedom to dosoftware and services, delivering instant,what needs to be done for the ultimatecomprehensive protection againstprotection of all our customers.evolving cybersecurity threats forbusinesses and consumers worldwide.ESET IN NUMBERS110m usersworldwide400k businesscustomers200 countries &territories13global R&DcentersSOME OF OUR CUSTOMERSprotected by ESET since 2017protected by ESET since 2016more than 14,000 endpointsmore than 9.000 endpointsprotected by ESET since 2016ISP security partner since 2008more than 4,000 mailboxes2 million customer base

Whychoose ESETESET is compliant with ISO/IEC 27001:2013, an internationally recognized andapplicable security standard in implementing and managing information security.The certification is granted by the third-party accredited certification body SGSand demonstrates ESET’s full compliance with industry-leading best practices.ESET AWARDSANALYST RECOGNITIONESET was named the onlyChallenger in 2019 GartnerMagic Quadrant for EndpointProtection Platforms, for thesecond year running.ESET was rated a StrongPerformer in the ForresterWave(TM): Endpoint SecuritySuites, Q3 2019.ESET was rated ‘Top Player’in the 2019 Radicati EndpointSecurity report according totwo main criteria: functionalityand strategic vision.Gartner Inc, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Lawrence Pingree, Dionisio Zumerle, Prateek Bhajanka, Paul Webber, August20, 2019. Gartner does not endorse any vendor, product or service depicted in its research publications. Gartner research publications consist of the opinions ofGartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to thisresearch, including any warranties of merchantability or fitness for a particular purpose.Gartner Peer Insights is a free peer review and ratings platform designed for enterprise software and services decision makers. Reviews go through a strictvalidation and moderation process to ensure information is authentic. Gartner Peer Insights reviews constitute the subjective opinions of individual end users basedon their own experiences, and do not represent the views of Gartner or its affiliates.

20210414

protected from malicious file encryption. Fileless malware Fileless malware is a relatively new threat and, as it exists only in memory, requires a different approach compared to traditional file-based malware. SOLUTION A unique ESET technology, Advanced Memory Scanner, protects against this type of threat by