ESET Achieves Certification in AV-Comparatives’ First Anti-Tampering Test – Marking the Importance of These Advanced Security Features in Business Products
Márk Szabó and Thomas Uhlemann / 10 Jul 2023 Usually, when discussing endpoint security, people dismiss the underlying technology as “techno-babble,” looking more at the performance and cost rather than what makes a cybersecurity solution actually work. Those underlying technologies or toolsets are actually very important, as each layer protects the endpoint in a […]
ESET helps MSPs support their clients with new ESET Vulnerability and Patch Management functionality
Editor / 19 Jul 2023 The timely patching of applications and operating systems remains a critical activity to help prevent potentially crippling security breaches. Yet with the increasing prevalence of hybrid work and the growing adoption of cloud services, overloaded IT teams are often struggling to keep up. Because of this, businesses are increasingly turning […]
Editor / 19 Jul 2023 As any IT admin would tell you, patching vulnerabilities is one of the most time-consuming tasks they must contend with. Plus, it is getting more difficult. The increasing appetite for workers to work remotely and the growing adoption of cloud services have led to the attack surface being more diversified […]
ESET adds Vulnerability and Patch Management capability to the ESET PROTECT Platform to help businesses keep ahead of attackers.
Editor / 19 Jul 2023 Over the past few years, there has been a significant cybersecurity shift toward detection and response. Yet savvy businesses wishing to reduce their attack surface are now moving their focus back to areas of the prevention phase, such as vulnerability assessment, threat intelligence, and posture and configuration management. However, small […]
Márk Szabó / 20 Jul 2023 Most IT professionals would agree that due to the abundance of remote working possibilities, it has become harder to secure company devices and networks, with more avenues for compromise, be it because of said devices connecting to unsecure Wi-Fi networks, threats to major collaboration platforms or man-in-the-middle attacks. Added […]