ESET Protect Elite Subscription License

Key Features
  • All-in-one prevention
  • All ESET PROTECT complete Feature.
  • Extended Detection and Response
  • Multi-Factor Authentication
Call for Price
Call for best price: 01709995488, 01709995485, 01709995487

Technical specifications

Operating System

Microsoft Windows 11, 10, 8.1, 8, 7, SP1
macOS 10.12 and later
Ubuntu Desktop 20.04 LTS and 18.04 LTS 64-bit
Red Hat Enterprise Linux 7, 8 64-bit with supported desktop environment installed
SUSE Linux Enterprise Desktop 15 64-bit
Android 5 (Lollipop) and later
iOS 9 and later
Microsoft Windows Server 2022, 2019, 2016, 2012, 2008, R2 SP1
Microsoft Windows Storage Server 2012, 2008R2
Microsoft Windows Small Business Server 2011
RedHat Enterprise Linux (RHEL) 7, 8
CentOS 7, 8
Ubuntu Server 16.04 LTS, 18.04 LTS, 20.04 LTS
Debian 9, 10, 11
SUSE Linux Enterprise Server (SLES) 12, 15
Oracle Linux 8
Amazon Linux 2
Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007
Microsoft Windows Server 2019, 2016, 2012, 2008
Microsoft Small Business Server 2011
IBM Domino 6.5.4 and newer
HCL Domino version 11, 12
Subscription for Microsoft 365 or Google Workspace to connect with the tenant (Exchange Online, OneDrive, SharePoint Online, Teams, Gmail, Google Drive)

License Type

Software

Number of User

1 user

Duration

1 user

Description :

ESET Protect Elite Subscription License

Get a complete prevention, detection and remediation solution with the ESET Protect Elite Subscription License. Extended endpoint visibility, threat hunting and incident response designed to mitigate any security issue in your network immediately.

Advanced Threat Defense

Prevent zero-day threats. It provides protection against ransomware and new, never-before-seen threat types that uses adaptive scanning, machine learning, cloud sandboxing and in-depth behavioral analysis.

Robust encryption and authentication

Protect business data and systems from unauthorized access. Helps comply with data regulations thanks to full disk encryption and multi-factor authentication capabilities with seamless deployment.

Eliminate email-based attacks

Prevent phishing attempts and malware from reaching users mailboxes. Protect your users and their email (the most exploited attack vector) with advanced multilayered anti-phishing, antispam and anti-malware technology.

Vulnerability and patch management

Automatically track and patch vulnerabilities. Reduce cyber risks to the lowest level. Get easy-to-use, effective support for assessing third-party software vulnerabilities with fully automated patch management, all from a single pane of glass.

Reviews (0) :

Get specific details about this product from customers who own it.

Write your review

 Bad           Good