ESET? SECURITY FOR MICROSOFT SHAREPOINT SERVER

黑龙江11选五开奖结果:Microsoft SharePoint data protection with multilayered technology

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Security for Microsoft SharePoint Server

Advanced protection for SharePoint servers against malicious uploads and unwanted files. Guarantees stable, conflict-free server environment. Provides:

Checkmark icon

Protection against ransomware

Checkmark icon

Data breaches prevention

Checkmark icon

Zero-day threats detection

Checkmark icon

Fileless attacks prevention


Multilayered protection

All ESET products have the ability to detect malware pre-execution, during execution and post-execution. Additional layers can be implemented in the form of cloud sandbox analysis with ESET Dynamic Threat Defense and endpoint detection and response with ESET Enterprise Inspector. By focusing on the entire malware lifecycle, ESET provides the highest level of protection possible.

Unparalleled performance

ESET products continue to excel in the performance arena, with third-party test results confirming how lightweight our endpoints are on systems. ESET Security for SharePoint is built on 64-bit core and includes DLL modules to ensure more RAM saving and faster computer startup times; also enables native support for future Windows updates.

Machine learning

All ESET products currently use machine learning in conjunction with all of our other layers of defense and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks.

Use cases

PROBLEM

Businesses need to be protected from ransomware attacks and ensure their network drives and SharePoint databases cannot be encrypted.

SOLUTION

  • On upload of a file into the SharePoint Server, ESET scans files to ensure they are not malicious.
  • Network Attack Protection has the ability to prevent ransomware from ever infecting a system by stopping exploits at the network level.
  • Our multilayered defense features an in-product sandbox that has the ability to detect malware that attempts to evade detection by using obfuscation.
  • Leverage ESET’s cloud malware protection system to automatically protect against new threats without the need to wait for the next detection update.
  • All products contain post-execution protection in the form of Ransomware Shield to ensure that businesses are protected from malicious file encryption.
  • If ESET Security for Microsoft SharePoint is unsure of a potential threat, it has the ability to upload the sample to ESET’s cloud sandbox, ESET Dynamic Threat Defense, to make the highest quality decision on whether something is malicious.

Protected by ESET since 2011.

Protected by ESET since 2008.

Canon logo

Protected by ESET since 2016.

T-com logo

ESET ISP security partner since 2008.

The ESET difference

Ransomware Shield

An additional layer protecting users from ransomware. Our technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble the behavior of ransomware.

Network Attack Protection

ESET Network Attack Protection improves detection of known vulnerabilities on the network level. It constitutes another important layer of protection against spreading malware, network-conducted attacks and exploitation of vulnerabilities for which a patch has not yet been released or deployed.

Behavioral detection - HIPS

ESET's Host-based Intrusion Prevention System (HIPS) monitors system activity and uses a pre-defined set of rules to recognize and stop suspicious system behavior.

AMSI/Protected service support

ESET products leverage the Antimalware Scan Interface (AMSI) to provide enhanced malware protection for users, data, applications and workload. It utilizes the protected service interface, a new security module built into Windows, that only allows trusted, signed code to load and better protects against code injection attacks.

Database direct access

An optional method to pull files where ESET Security for SharePoint bypasses the SharePoint object model and pulls the file directly from the dedicated database server to provide even better performance.

Botnet Protection

ESET Botnet Protection detects malicious communication used by botnets, and at the same time identifies the offending processes. Any detected malicious communication is blocked and reported to the user.

Remote management

All ESET security products are managed from a single pane of glass that can be installed on Windows or Linux. In addition to installing, ESET has a virtual appliance that you can import for quick and easy setup.

Additional security layers

ESET Security for Microsoft SharePoint supports ESET’s endpoint detection and response solution, ESET Enterprise Inspector, and cloud sandbox analysis solution to detect new, never before seen type of threats, ESET Dynamic Threat Defense.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

System Requirements

  • Operating systems:
    Microsoft Windows Server 2016, 2012 R2, 2012, 2008 R2, 2008
    Microsoft Small Business Server 2011, 2008, 2003
  • Supported SharePoint versions
    Microsoft SharePoint Server 2016, 2013, 2010, Microsoft SharePoint Enterprise 2010, Microsoft Office SharePoint Server 2007
  • Compatible with ESET Security Management Center and ESET Remote Administrator 6. See more information about remote management compatibility.

Looking for additional solutions?

Related enterprise-grade solutions

ESET Targeted Attack Protection solution icon

ESET Targeted Attack Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis
  • Endpoint Detection & Response
ESET Dynamic Endpoint Protection solution icon

ESET Dynamic Endpoint Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis

Related products and services

Stay on top of cybersecurity news

Brought to you by respected security researchers from ESET's 13 global R&D centers.

Corporate blog

Malware researcher + threat analyst: Two perspectives on the MITRE ATT&CK? knowledge base

In this post, members of ESET’s malware research and malware & threat analysis teams discuss how the “ATT&CK effect” has impacted their practice. First, let’s take a brief look at how ATT&CK aids...

Two Form Authentication - 2FA

2FA for SMBs: Why you should implement two-factor authentication today

The cybersecurity marketplace offers a multitude of products designed to protect your IT systems from malware and other threats.

We Live Security blog

You’d better change your birthday – hackers may know your PIN

Are you in the 26% of people who use one of these PIN codes to unlock their phones?

Instagram tests new ways to recover hacked accounts

Locked out and out of luck? The photo-sharing platform is trialing new methods to reunite you with your lost account

Are you an existing customer?

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

Business license white icon

Renew or manage license

Log in or retrieve your password to manage your existing licenses.

Need assistance?

All ESET products include free technical support in your language.

  • 抹茶配方 抹茶斑马纹芝士 2019-06-20
  • 2017 中国母基金百人论坛 2019-06-20
  • 失眠怎么调理 五种水果助你安神养眠-美食资讯 2019-06-20
  • 经济日报评论员:持之以恒建设美丽中国 2019-06-19
  • 李睿的专栏作者中国国家地理网 2019-06-19
  • 要让大陆“摸不透”相关新闻 2019-06-19
  • 个税法迎第七次大修 起征点调至每年6万元 2019-06-18
  • 一笔“农”墨绘山川——重庆市万州区国家农业公园速写 2019-06-18
  • 金正恩在板门店韩方一侧的“和平之家”留言簿上题词 2019-06-18
  • 脸每天都洗,但你真的洗对了吗 2019-06-17
  • 6月12日傍晚一场阵雨后赛里木湖彩霞满天 2019-06-17
  • 警民接力救助受伤红隼 经过一周治疗现已放归自然 2019-06-17
  • 我省将建教师个人师德报告制度 2019-06-16
  • 王一彪:人民网将以更大的力量和热情投身公益慈善事业 2019-06-16
  • 有道数学连续5周获App Store推荐 2019-06-16
  • 178| 364| 559| 824| 805| 308| 640| 103| 53| 829|