ESET Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
ESET

Overview: ESET is a global provider of security software. The ESET NOD32® Antivirus and ESET Smart Security products are consistently recognized among the most comprehensive and effective security solutions available today.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by ESET.
Research offered by ESET

2010: Cybercrime Coming of Age by ESET. January 01, 2010 - In this paper you'll read that cybercrime is on the rise, not only in terms of the number of perpetrators and the volume of crimes committed, but also in terms of the range of techniques employed to carry them out.

  View 2010: Cybercrime Coming of Age research abstract

Antivirus Testing and AMTSO Has anything changed? by ESET. September 08, 2010 - This paper looks at testing as it was, as it is, and as Anti-Malware Testing Standards Organization (AMTSO) would like it to be. Is testing really so difficult? Is it appropriate for the vendors who make the products under test to be so involved in the process of defining good practice?

  View Antivirus Testing and AMTSO Has anything changed? research abstract

Buyer's Guide to Antimalware by ESET. March 16, 2011 - Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

  View Buyer's Guide to Antimalware research abstract

Case Study: GoldenTree Asset Management by ESET. October 22, 2010 - In this case study you’ll learn how one London finance company did the following: found malware other AV products weren’t finding; secured the environment; witnessing virus protection doing what it is designed to do. Read on to learn so much more.

  View Case Study: GoldenTree Asset Management research abstract

Case Study: San Diego Gastroenterology Medical Associates by ESET. August 06, 2010 - Read this case to learn about one company's battle with virus protection and what they did to overcome it.

  View Case Study: San Diego Gastroenterology Medical Associates research abstract

E-guide-- Endpoint security suites: What to consider before renewal by ESET. January 13, 2010 - In this expert e-guide, get tips on what you should consider before choosing, keeping, or upgrading your endpoint security software. Review endpoint security suite management issues, as well as how to negotiate with vendors.

  View E-guide-- Endpoint security suites: What to consider before renewal research abstract

E-Guide: Why attackers exploit multiple zero-day attacks and how to respond by ESET. March 16, 2011 - The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.

  View E-Guide: Why attackers exploit multiple zero-day attacks and how to respond research abstract

ESET File Security for Linux/BSD/Solaris by ESET. August 03, 2010 - Increasing volumes of malicious software are launched daily to steal passwords or sensitive corporate and customer information. ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats.

  View ESET File Security for Linux/BSD/Solaris research abstract

ESET Mail Security for Microsoft Exchange Server by ESET. August 03, 2010 - Read this paper to learn how ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed — so slowdowns will be a thing of the past.

  View ESET Mail Security for Microsoft Exchange Server research abstract

ESET Online Scanner by ESET. November 18, 2011 - ESET Online Scanner is designed only to detect and remove threats via on-demand scan and is not a permanent proactive antivirus solution. To receive complete proactive protection, get a free custom business trial and find out why IT pros worldwide recommend ESET for server-to-endpoint security.

  View ESET Online Scanner research abstract

ESET: Threat Center by ESET. September 02, 2010 - IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.

  View ESET: Threat Center research abstract

Excerpts from Virus Bulletin Comparative Reviews August-December 2010 by ESET. March 16, 2011 - The basic requirements for a product to achieve VB100 certification status are that a product detects, both on demand and on access, in its default settings, all malware known to be ‘In the Wild’ at the time of the review, and generates no false positives when scanning a set of clean files.

  View Excerpts from Virus Bulletin Comparative Reviews August-December 2010 research abstract

Fast and Effective Endpoint Security for Business by ESET. November 10, 2011 - This white paper demonstrates how, by combining powerful management tools, ease of use for end users, impressive performance and state-of-the-art proactive threat detection, ESET NOD32 Antivirus is the most effective way to protect your business’ valuable data assets while ensuring regulatory compliance.

  View Fast and Effective Endpoint Security for Business research abstract

File Security for Linux/BSD/Solaris: Antivirus Protection for your servers by ESET. March 25, 2011 - ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats.

  View File Security for Linux/BSD/Solaris: Antivirus Protection for your servers research abstract

Global Threat Report - September 2011 Backup strategy for your home users by ESET. November 10, 2011 - This white paper underlines the importance of backing up your data, whether at home or within the enterprise. In addition, discover today's top ten security threats to look out for.

  View Global Threat Report - September 2011 Backup strategy for your home users research abstract

Global Threat Report December 2011 by ESET. January 26, 2012 - Stay informed about the most important cybersecurity issues facing the IT community today. Review this 2011 Global Threat report to help you protect your business in 2012 and beyond. Explore key topics including threat trends and security gains, monthly malware reports and the essential Top Ten Threats lists.

  View Global Threat Report December 2011 research abstract

Global Threat Report January 2012: Where are the 419s of Yesteryear? by ESET. February 13, 2012 - This January 2012 Global Threat report offers information and articles on today's threat environment including the lastest list of the top 10 threats. View now to gain key insight from security researchers and experts exploring 419s, the need for need anti-virus, anti-malware or anti-spam, 2012 trends, PUAs and more.

  View Global Threat Report January 2012: Where are the 419s of Yesteryear? research abstract

Global Threat Report: July 2010 by ESET. August 13, 2010 - Read this paper to get a full analysis of ESET’s ThreatSense.Net®, a sophisticated malware reporting and tracking system, which shows that the highest number of detections this month with almost 12.47% of the total was scored by the Win32/Conficker class of threat.

  View Global Threat Report: July 2010 research abstract

Global Threat Trends - December 2009 by ESET. September 02, 2009 - Review this report to see what threats had the highest number of detections in the past month according to the results of a sophisticated analysis provided by ESET's ThreatSense.Net.

  View Global Threat Trends - December 2009 research abstract

Global Threat Trends- February 2010 by ESET. January 25, 2010 - Review this report to see what threats had the highest number of detections in the past month according to the results of a sophisticated analysis provided by ESET's ThreatSense.Net®.

  View Global Threat Trends- February 2010 research abstract

Global Threat Trends- Year-End Report 2009 by ESET. January 21, 2010 - In this paper you'll learn the most prevalent threats, including their percentage values relative to all the threats detected by ThreatSense.Net®.

  View Global Threat Trends- Year-End Report 2009 research abstract

Global Threat Trends: October 2010 by ESET. November 10, 2010 - Read this month's Global Threat Trends to learn about the top 10 security threats in October. Discover what’s new on the cyber front and get an inside look at this year's eCity Symposium, and more!

  View Global Threat Trends: October 2010 research abstract

Global Threat Trends - March 2010 by ESET. April 16, 2010 - Read this analysis of ESET’s ThreatSense.Net®, a sophisticated malware reporting and tracking system, which shows that the highest number of detections this month, with almost 10.32% of the total, was scored by the Win32/Conficker class of threat.

  View Global Threat Trends - March 2010 research abstract

Global Threats Report Dec 2011 by ESET. January 26, 2012 - The Global Threat Report offers a monthly overview of the most important cybersecurity issues facing the IT community today, offering informative articles, security tips, viral online resources, expert advice and opinions from ESET researchers, and the essential Top Ten Threats lists. Access now to learn how you can stay informed.

  View Global Threats Report Dec 2011 research abstract

Heuristic Analysis- Detecting Unknown Viruses by ESET. February 03, 2010 - The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.

  View Heuristic Analysis- Detecting Unknown Viruses research abstract

IT Decision Checklist: Antimalware by ESET. October 27, 2011 - Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today.

  View IT Decision Checklist: Antimalware research abstract

IT Decision Checklist: Antimalware by ESET. June 14, 2010 - Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

  View IT Decision Checklist: Antimalware research abstract

Mail Security for Microsoft Exchange Server by ESET. March 25, 2011 - ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past

  View Mail Security for Microsoft Exchange Server research abstract

Presentation Transcript: PCI DSS v1.2: Best Practices and Useful Tips by ESET. January 15, 2010 - While there are multiple regulatory compliance standards, the Payment Card Industry Data Security Standard (PCI DSS) addresses a sector with the greatest number of data breaches. Check out this Presentation Transcript to discover key differences between PCI DSS version 1.1 and 1.2, best practices for ensuring compliance, and tips.

  View Presentation Transcript: PCI DSS v1.2: Best Practices and Useful Tips research abstract

Presentation Transcript: The Changing Nature Of Cyber Crime, Attackers, Counter Measures and New Models For Defense In Depth by ESET. December 03, 2009 - The threat environment has changed drastically in recent years. Threats are more complicated and attackers are part of organized groups seeking profit rather than fame. In this Presentation Transcript, Charles Kolodgy of IDC highlights some attackers' successes, countermeasures in risk reduction, and a new model for defense-in-depth.

  View Presentation Transcript: The Changing Nature Of Cyber Crime, Attackers, Counter Measures and New Models For Defense In Depth research abstract

Presentation Transcript: WWW - World Wide Weaponization by ESET. November 10, 2009 - The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.

  View Presentation Transcript: WWW - World Wide Weaponization research abstract

Problematic - Unloved - Argumentative (PUA): What is a potentially unwanted app by ESET. November 04, 2011 - In this paper, discover what is a Potentially Unwanted Application (PUA) and explore the differences between threats posed by malicious types of software such as computer viruses and worms, and those which are classified as being potentially unwanted.

  View Problematic - Unloved - Argumentative (PUA): What is a potentially unwanted app research abstract

Protecting Your Multi-Platform Network: The New Wave of Attacks by ESET. June 20, 2011 - Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.

  View Protecting Your Multi-Platform Network: The New Wave of Attacks research abstract

Simple-to-Use Endpoint Security: Proactive Solutions for Networkwide Platforms by ESET. February 06, 2009 - This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET’s solution for integrated security management that is built around its advanced heuristic technology.

  View Simple-to-Use Endpoint Security: Proactive Solutions for Networkwide Platforms research abstract

Stuxnet Under the Microscope by ESET. October 04, 2010 - This report is devoted to the analysis of the notorious Stuxnet worm (Win32/Stuxnet) that suddenly attracted the attention of virus researchers this summer. This report is primarily intended to describe targeted and semi-targeted attacks, and how they are implemented, focusing mainly on the most recent, namely Stuxnet.

  View Stuxnet Under the Microscope research abstract

Technical Guide on Malware Trends by ESET. October 24, 2011 - TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.

  View Technical Guide on Malware Trends research abstract

Ten Ways to Dodge CyberBullets by ESET. April 16, 2010 - This paper comes from a series of blogs from the beginning of 2009 and based on that material, it’s been updated here with more recent material from other members of ESET’s research teams across the globe. Read more to find out.

  View Ten Ways to Dodge CyberBullets research abstract

Ten Ways to Dodge CyberBullets: Reloaded by ESET. January 26, 2012 - In this paper, ESET research teams revisit their top ten list on what people can do to protect themselves against malicious activity, and offers key advice based on today’s changing environments, while still applying the basic principles.

  View Ten Ways to Dodge CyberBullets: Reloaded research abstract

The Malware Report: Hotel Business Center PCs Strike Again by ESET. August 20, 2009 - Matt Grant talks with Randy Abrams about security issues with hotel business center computers. These are public computers and they often have insufficient security features. In this podcast, Randy shares some interesting things he’s found in hotel computers and gives some advice on using them safely.

  View The Malware Report: Hotel Business Center PCs Strike Again research abstract

The Malware Report: Radisson Hotels Exposed by Guest Data Breach by ESET. September 23, 2009 - Matt Grant talks with Randy Abrams about a data breach at Radison Hotels. Unfortunately, an unknown number of their guests' credit card numbers were exposed to malicious hackers. In this podcast, Randy dishes out some advice on how to prevent this sort of data breach and what to do in the event that it’s already happened.

  View The Malware Report: Radisson Hotels Exposed by Guest Data Breach research abstract

The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape by ESET. December 02, 2010 - In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 

  View The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape research abstract

Virus Bulletin: Comparative Reviews August-December 2010 by ESET. December 14, 2010 - Read this paper to view the latest news and information about VB100 testing,  Windows Vista,  Windows 7, Windows Server 2003, Windows 7 Professional, and  so much more.

  View Virus Bulletin: Comparative Reviews August-December 2010 research abstract

Virus Bulletin: Comparative Reviews in 2010 by ESET. June 16, 2010 - This paper shows you the latest news about the VB100 testing, Linux Enterprise Server 11, Windows XP SP3, Windows Server 2008 R2 and so much more.

  View Virus Bulletin: Comparative Reviews in 2010 research abstract

WWW - World Wide Weaponization by ESET. October 22, 2009 - The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.

  View WWW - World Wide Weaponization research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts