ESET Security Management Center - Cdn1.esetstatic

Transcription

SOLUTION OVERVIEWEnterprise-grade security management solution providingvisibility, management and reporting across all OSes

What is anendpointsecuritymanagementconsole?ESET Security Management Centerutilizes a web console to provide real-timevisibility for on-premise and off-premiseendpoints as well as full reporting andsecurity management for all OSes.It is a single pane of glass over all ESETsecurity solutions deployed in the networkand controls endpoint prevention, detection &response layers across all platforms – coveringdesktops, servers, agentless virtual machinesand even managed mobile devices.

Why ORTINGZero-days, advanced persistentthreats, targeted attacks andbotnets are all concerns forindustries across the world.Having visibility into these threatsin real time is extremely importantto allow IT staff to respondpromptly and mitigate any riskthat may have developed. Due to acontinued emphasis of companiesto add a mobile workforce,visibility is not just needed onpremise but off-premise as well.Today’s cybersecurity landscapeis constantly evolving with newattack methods and never-beforeseen threats. When an attack ordata breach occurs, organizationsare typically surprised that theirdefenses were compromised orare completely unaware that theattack even happened. After theattack is discovered, organizationsmay then want to executespecific tasks across devices suchas scans. In addition, this maylead organizations to completelychange their configuration policiesto better protect against a futureattack.Most organizations nowadays,if they do not need to meetany compliance, have internalrequirements related to reporting.No matter the organization, therewill be reports that need to begenerated at scheduled intervalsand provided to relevant parties,or stored for a future date.ESET Security Management Centerprovides up-to-date informationto provide IT staff with the statusof all computers whether they areon-premise or off-premise. It alsoprovides visibility into all OSes thata company might have, not justa limited few. In most instances,visibility is also enhanced to showdevice-level information such ashardware or software inventories.ESET Security Management Centerallows organizations to adjustthe policies or configurations ofendpoint security products at anypoint in time. In addition, taskscan be executed remotely andautomatically on devices to saveIT admins the time from manuallyhaving to execute tasks on eachindividual computer.ESET Security ManagementCenter allows organizations toset up reports to be generated atscheduled intervals and saved tospecific folders, or emailed directlyto someone who requested it.Reports can be customized toprovide the requestor the reportsexactly how they might wantthem. This process is paramountto saving IT admins time in thebusy work associated with ongoing reporting.“The major advantage of ESET is that you have allusers from one console and can manage and properlyreview their security status.”— Jos Savelkoul, Team Leader ICT-Department;Zuyderland Hospital, Netherlands; 10.000 seats

Reports can be customized to provide therequestor the reports exactly how they want them.Having visibility intosecurity incidents inreal time is extremelyimportant to allowIT staff to respondpromptly andmitigate any risk thatmay have developed.No matter theorganization, therewill be reports thatneed to be generatedon scheduledintervals andprovided to relevantparties, or stored fora future date.

The ESET SecurityManagement Centerprovides over 170 built-inreports and allows you tocreate custom reports fromover 1000 data points.Dynamic groups can sortand filter computers basedon current device status,which changes over time.

The ESETdifferencePREVENTION TORESPONSEESET combines the managementof our Endpoint products with ourEndpoint Detection and Responsesolution, ESET Enterprise Inspectorand our sophisticated onlinesandbox ESET Dynamic ThreatDefense into a single easy-to-usemanagement console.SINGLE-CLICKINCIDENTREMEDIATIONSFrom the threats tab, an ITadmin can create an exclusion,submit files for further analysis orinitiate a scan from a single click.Exclusions can be made by threatname, URL, hash or combination.FULLY CUSTOMIZABLENOTIFICATION SYSTEMThe notification system features afull “what you see is what you get”editor, where you will be able tofully configure notifications to bealerted on the exact informationyou want to be notified about.DYNAMIC ANDCUSTOM REPORTINGThe ESET Security ManagementCenter provides over 170built-in reports and allows youto create custom reports fromover 1000 data points. This allowsorganizations to create reportsto look and feel exactly as theymight want. Once created, reportscan be set up to be generated andemailed at scheduled intervals.AUTOMATIONFRAMEWORKDynamic groups can sortcomputers based on currentdevice status or defined inclusioncriteria. Tasks can then be setup to trigger actions such asscans, policy changes or softwareinstalls/uninstalls based offdynamic group membershipchanges.FULLY AUTOMATEDVDI SUPPORTA comprehensive hardwaredetection algorithm is used todetermine the identity of themachine based on its hardware.This allows automated re-imagingand cloning of non-persistenthardware environments.Therefore, ESET’s VDI supportrequires no manual interactionand is fully automated.PROVEN AND TRUSTEDESET has been in the securityindustry for over 30 years, and wecontinue to evolve our technologyto stay one step ahead of thenewest threats. This has led usto be trusted by over 110 millionusers worldwide. Our technologyis constantly scrutinized andvalidated by third-party testerswho show how effective ourapproach is at stopping the latestthreats.“Outstanding company, superb technical support,provides strong threat protection and centralmanagement.”— Dave, Manager of IT; Deer Valley Unified School District, USA;15.500 seats

Use casesRansomwareA user opens a malicious email containing a new formof ransomware.SOLUTION IT department receives a notification via email andtheir SIEM that a new threat was detected on acertain computer. A scan is initiated with a single click on the infectedCodedevelopersProgrammers who work with code on their workcomputer can tend to create false positives due tocompiling software.SOLUTION IT department receives a notification via email andits SIEM that a new threat was found.computer. The file is submitted to ESET Dynamic Threat The notification shows the threat came from adeveloper’s computer.Defense by another click. After confirming the threat has been contained,warnings in ESET Security Management Center arecleared automatically. With one click, the file is submitted to ESET DynamicThreat Defense to confirm the file is not malicious. IT department, with one click, puts an exclusion inplace to prevent future false positives from beingdisplayed on this folder.ESET Security ManagementCenter dashboard – incidentsoverview

VDIdeploymentsNon-persistent hardware environments typicallyrequire manual interaction from an IT department orcreate reporting and visibility nightmares.SOLUTION After deploying a master image to computersalready present in ESET Security ManagementCenter, computers will continue reporting to theprevious instance despite a complete re-image of thesystem. Machines that after the end of a work shift returnback to their initial state will not cause duplicatemachines and instead will be matched into onerecord. On deployment of non-persistent images, youcan create an image that includes the agent, thenwhenever a new machine is created with anotherhardware fingerprint, it automatically will createnew records in ESET Security Management Center.Hardwareand softwareinventoryOrganizations need to know what software is installedon each computer, as well as how old each computer is.SOLUTION View every installed piece of software, includingversion number, in the computer record. View every computer’s hardware details, suchas device, manufacturer, model, serial number,processor, RAM, HD space and more. Run reports to view a more holistic view of anorganization to make budgetary decisions onhardware upgrades in future years based off currentmake and models.Software remediationOrganizations need to know when an unapprovedsoftware has been installed, then are required toremediate the software afterwards.SOLUTION Set up a dynamic group within ESET SecurityManagement Center to look for a specific unwantedpiece of software. Create a notification to alert the IT departmentwhen a computer meets this criterion. Set up a software uninstall task in the ESET SecurityManagement Center to execute automatically whena computer meets the dynamic group criteria. Set up a user notification that automatically pops upon the user’s screen indicating that they committeda software installation violation by installing theabove software.

ESET SecurityManagementCenter can beinstalled onWindows, Linux ordeployed as VirtualAppliance.Multi-tenancysupport and 2FAsecured logins allowfull streamlining ofresponsibilities acrosslarge enterpriseteams.“Centrally managed security on all endpoints, serversand mobile devices was a key benefit for us.”— IT Manager; Diamantis Masoutis S.A., Greece;6.000 seats

ESET SecurityManagementCenter technicalfeaturesFLEXIBLE INSTALLHARDWARE/SOFTWARE INVENTORYESET Security Management Center can be installed onWindows, Linux or via Virtual Appliance. After install, allmanagement is done via a web-console, allowing easyaccess and management from any device or operatingsystem.Not only does ESET Security Management Centerreport on all installed software applications across anorganization, it also reports on installed hardware.This allows you to do more from a single location bydynamically grouping computers based off make,model, OS, processor, RAM, HD space and many moreitems.SINGLE PANE OF GLASSAll ESET endpoint products despite the OS can bemanaged from a single ESET Security ManagementCenter instance. In addition, ESET Security ManagementCenter supports full Mobile Device Management (MDM)of Android and iOS devices.COMPLETELY MULTI-TENANTMultiple users and permission groups can be createdto allow access to a limited portion of the ESETSecurity Management Center instance. This allows fullstreamlining of responsibilities across large enterpriseteams.GRANULAR POLICY CONTROLOrganizations can set up multiple policies for the samecomputer or group and can nest policies for inheritedpermissions. In addition, organizations can configurepolicy settings as user-configurable, so you can lockdown any number of settings from the end users.SIEM SUPPORTESET Security Management Center fully supports SIEMtools and can output all log information in the widelyaccepted JSON or LEEF format.Dashboardof ESET SecurityManagement Center

About ESETESET—a global player in informationcomprehensive protection againstsecurity—has been named as the onlyevolving cybersecurity threats forChallenger in the 2018 Gartner Magicbusinesses and consumers worldwide.Quadrant for Endpoint ProtectionPlatforms.*ESET is privately owned. With no debtsand no loans, we have the freedom to doFor more than 30 years, ESET has beenwhat needs to be done for the ultimatedeveloping industry-leading IT securityprotection of all our customers.software and services, delivering instant,ESET IN NUMBERS110m 400k usersworldwidebusinesscustomers200 countries &territoriesESET EMPLOYEES13global R&DcentersESET REVENUEin million More than a third of allESET employees work inResearch & 719871997200720170*Gartner does not endorse any vendor, product or service depicted in its research publications. Gartner research publications consistof the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties,expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

SOME OF OUR CUSTOMERSprotected by ESET since 2011protected by ESET since 2016license prolonged 3x, enlarged 2xmore than 14.000 endpointsprotected by ESET since 2016ISP security partner since 2008more than 4,000 mailboxes2 million customer baseSOME OF OUR TOP AWARDS“Given the good features for both anti-malwareand manageability, and the global reach ofcustomers and support, ESET should be on theshortlist for consideration in enterprise RFPs foranti-malware solutions.”KuppingerCole Leadership CompassEnterprise Endpoint Security: Anti-Malware Solutions, 2018

ESET Security Management Center can be installed on Windows, Linux or via Virtual Appliance. After install, all management is done via a web-console, allowing easy access and management from any device or operating system. SINGLE PANE OF GLASS All ESET endpoint products despite the OS can be managed from a single ESET Security Management