Average Ratings 5 Ratings
Average Ratings 0 Ratings
Description
This EDR solution will help you uncover the hidden potential in your network. This tool uses ESET's multilayered Endpoint Protection Platform to detect and respond to endpoints. All layers send relevant information to ESET Enterprise Inspector which analyzes large amounts of real-time data from endpoints. It can quickly identify and fix any security problem in the network. ESET Enterprise Inspector offers a unique reputation-based detection system that is transparent to security teams. To allow fine-tuning, all rules can be easily edited via XML. You can create new rules to meet the specific needs of your enterprise environment, including SIEM integrations. ESET's endpoint response and detection tool makes it easy to suppress false alarms. You can adjust the sensitivity of detection rules according to different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
Description
Transparent Data Encryption for all Editions (Express to Enterprise) of SQL Server. No programming required. Developer friendly: can be easily bundled with SQL Server-based applications. An economical alternative to upgrading from SQL Server Enterprise. Assists in compliance with various regulations. Protects intellectual property and data.
API Access
Has API
API Access
Has API
Integrations
ActivePlatform
Autotask PSA
Axonius
Blumira
CYREBRO
ConnectWise Automate
ConnectWise PSA
Datto Workplace
GoSecure
Liongard
Integrations
ActivePlatform
Autotask PSA
Axonius
Blumira
CYREBRO
ConnectWise Automate
ConnectWise PSA
Datto Workplace
GoSecure
Liongard
Pricing Details
$38 per user per year
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
ESET
Founded
1992
Country
Slovakia
Website
www.eset.com/int/business/download/endpoint-security-windows/
Vendor Details
Company Name
NetLib Security
Founded
1997
Country
United States
Website
netlibsecurity.com
Product Features
Backup
Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
Endpoint Detection and Response (EDR)
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Server Backup
Backup Scheduling
Bare-Metal Restore
Compression
Continuous Backup
Differential Backup
Disaster Recovery
Encryption
Incremental Backup
VM Backup
Product Features
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
GDPR Compliance
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
HIPAA Compliance
Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management
NoSQL Database
Auto-sharding
Automatic Database Replication
Data Model Flexibility
Deployment Flexibility
Dynamic Schemas
Integrated Caching
Multi-Model
Performance Management
Security Management
PCI Compliance
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management
SQL Server
CPU Monitoring
Credential Management
Database Servers
Deployment Testing
Docker Compatible Containers
Event Logs
History Tracking
Patch Management
Scheduling
Supports Database Clones
User Activity Monitoring
Virtual Machine Monitoring