{"id":422,"date":"2017-08-11T15:41:55","date_gmt":"2017-08-11T15:41:55","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/its-a-five-out-of-five-for-eset-endpoint-security\/"},"modified":"2019-05-29T11:45:24","modified_gmt":"2019-05-29T11:45:24","slug":"its-a-five-out-of-five-for-eset-endpoint-security","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/","title":{"rendered":"It\u2019s a five out of five for ESET Endpoint Security"},"content":{"rendered":"<p class=\"bodytext\">As threats continually evolve, so too must security.&nbsp; Today, businesses need solutions that can stand up to the targeted and complex methods hackers deploy, if they are to prevent the very real prospect of falling victim to a data breach.<\/p>\n<p class=\"bodytext\">Yet while many IT security companies claim they can deal with the changing threat landscape, few have consistently been developing proactive, multi-layered technologies over the past quarter century.<\/p>\n<p class=\"bodytext\">At ESET, however, we combine automation and human knowledge, based on more than 25 years of threat research experience, to consistently prevent malware-based incidents across multiple endpoint platforms. Our proactive and intelligent multi-layered technology offers businesses, of all sizes, a peace of mind \u2013 reassuring them that malware attacks are detected and prevented at a time when attacks are imminent.<\/p>\n<p class=\"bodytext\"><strong>Five star rating<\/strong><\/p>\n<p class=\"bodytext\">Industry experts have now also recognised ESET as a top class security solution provider, with&nbsp;<a href=\"https:\/\/www.eset.com\/us\/business\/endpoint-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">ESET Endpoint Security<\/a>&nbsp;recently earning five out of five stars in every category following a review by&nbsp;<a href=\"https:\/\/www.scmagazine.com\/eset-endpoint-security\/review\/9386\/\" target=\"FEopenLink\" rel=\"noopener noreferrer\">SC Magazine<\/a>.<\/p>\n<p class=\"bodytext\">Assessing everything from the product\u2019s features, performance, and documentation to its value for money and ease of use,&nbsp;<em>SC Magazine<\/em>&nbsp;praised ESET Endpoint Security\u2019s accurate detection, speed and comprehensive management tools.<\/p>\n<div id=\"content-c465106\" class=\"csc-default\">\n<div class=\"csc-textpic csc-textpic-center csc-textpic-above\">\n<div class=\"csc-textpic-text\">\n<p class=\"bodytext\"><strong>Ticking all the boxes<\/strong><\/p>\n<p class=\"bodytext\">For any business, but particularly SMBs, security has to cause minimum disruption to operations and it has to be easy to deploy and use. With ESET Endpoint Security, the reviewers said, \u201cThe admin menus are the most comprehensive we&#8217;ve seen. There is not a single aspect of user, machine, policy or other management that we found missing. You can do everything &#8211; from configuration to deployment and user management &#8211; right from a single set of menus.\u201d<\/p>\n<p class=\"bodytext\">What\u2019s more, everything the reviewers at&nbsp;<em>SC Magazine<\/em>&nbsp;threw at the solution allowed ESET Endpoint Security to demonstrate its resilience and complexity. For example, all attempts to copy a file infected with&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2016\/04\/04\/analysis-of-the-locky-infection-process\/\" target=\"_blank\" rel=\"noopener noreferrer\">Locky<\/a>&nbsp;ransomware were identified, and ESET stopped the malware before the testers had even completed the paste process.<\/p>\n<p class=\"bodytext\">As such,&nbsp;<em>SC Magazine<\/em>&nbsp;remarked on ESET Endpoint Security solution as \u201cnext generation, depending on machine learning augmented by human analysts to cover events in endpoints that are beyond the system to identify positively.\u201d<\/p>\n<p class=\"bodytext\">\u201cFor industry experts to award ESET Endpoint Security five out of five is testament to the quality products we offer businesses who need to stay one step ahead of cyber-criminals\u201d said, Michal Jankech, Business Security Product Manager. \u201cWe pride ourselves on delivering integrated, complete solutions that provide the most comprehensive set of predict, prevent, detect and respond capabilities \u2013 supporting the complete endpoint security landscape that companies now, and in the future will, have to support.\u201d<\/p>\n<p class=\"bodytext\">To read the full review in&nbsp;<em>SC Magazine<\/em>, please&nbsp;<a href=\"https:\/\/www.scmagazine.com\/eset-endpoint-security\/review\/9386\/\" target=\"_blank\" rel=\"noopener noreferrer\">click here<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>As threats continually evolve, so too must security.&nbsp; Today, businesses need solutions that can stand up to the targeted and complex methods hackers deploy, if they are to prevent the very real prospect of falling victim to a data breach. Yet while many IT security companies claim they can deal with the changing threat landscape,<\/p>\n","protected":false},"author":5,"featured_media":1830,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[162,170],"tags":[],"class_list":["post-422","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-small-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>It\u2019s a five out of five for ESET Endpoint Security - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"It\u2019s a five out of five for ESET Endpoint Security\" \/>\n<meta property=\"og:description\" content=\"As threats continually evolve, so too must security.&nbsp; Today, businesses need solutions that can stand up to the targeted and complex methods hackers deploy, if they are to prevent the very real prospect of falling victim to a data breach. Yet while many IT security companies claim they can deal with the changing threat landscape,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-11T15:41:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T11:45:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/sc.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"262\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"It\u2019s a five out of five for ESET Endpoint Security\",\"datePublished\":\"2017-08-11T15:41:55+00:00\",\"dateModified\":\"2019-05-29T11:45:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/\"},\"wordCount\":474,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/sc.jpg\",\"articleSection\":[\"news\",\"small business\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/\",\"name\":\"It\u2019s a five out of five for ESET Endpoint Security - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/sc.jpg\",\"datePublished\":\"2017-08-11T15:41:55+00:00\",\"dateModified\":\"2019-05-29T11:45:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/sc.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/sc.jpg\",\"width\":250,\"height\":262},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"It\u2019s a five out of five for ESET Endpoint Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/08\\\/11\\\/its-a-five-out-of-five-for-eset-endpoint-security\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"It\u2019s a five out of five for ESET Endpoint Security - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/","og_locale":"en_US","og_type":"article","og_title":"It\u2019s a five out of five for ESET Endpoint Security","og_description":"As threats continually evolve, so too must security.&nbsp; Today, businesses need solutions that can stand up to the targeted and complex methods hackers deploy, if they are to prevent the very real prospect of falling victim to a data breach. Yet while many IT security companies claim they can deal with the changing threat landscape,","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-08-11T15:41:55+00:00","article_modified_time":"2019-05-29T11:45:24+00:00","og_image":[{"width":250,"height":262,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/sc.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"It\u2019s a five out of five for ESET Endpoint Security","datePublished":"2017-08-11T15:41:55+00:00","dateModified":"2019-05-29T11:45:24+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/"},"wordCount":474,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/sc.jpg","articleSection":["news","small business"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/","name":"It\u2019s a five out of five for ESET Endpoint Security - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/sc.jpg","datePublished":"2017-08-11T15:41:55+00:00","dateModified":"2019-05-29T11:45:24+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/sc.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/sc.jpg","width":250,"height":262},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"It\u2019s a five out of five for ESET Endpoint Security"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/08\/11\/its-a-five-out-of-five-for-eset-endpoint-security\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=422"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/422\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1830"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}