A big part of the Triton Networking Technologys philosophy is to provide top-quality products and support. Because of this, we only endorse the products that we believe are the industry’s best. For antivirus, we recommend ESET Endpoint Protection – here’s why.

A Leading Antivirus Solution

ESET is unmatched in its record of stopping in-the-wild viruses in VB100 tests. It has the lowest impact on memory usage and system performance compared to other leading antivirus solutions. This means that unlike other antivirus products, your computer won’t lag whilst a scan is being performed. Endpoint Security runs smoothly on older hardware as well.

Antivirus and Antispyware

ESET’s antivirus and antispyware eliminates all types of threats including rootkits, viruses, spyware and worms to keep you protected whether you’re online or off. ESET has a reputation database meaning they live scan objects to find out if they’re known to be malicious. The optional Cloud-powered scanning functionality utilises ESET’s reputation database for minimal false positives and quicker scanning speeds.

Host-based Intrusion Prevention System (HIPS)

HIPS provides tampering protection and also protects processes, system registry, files and applications from unauthorised modification. You’re able to customise the system behaviour to a granular level and even detect unknown threats based purely on suspicious behaviour.

Device Control

This allows you to block unauthorised devices and media based on preset parameters or rules. You can set permissions (block, read, read/write) for individual devices, media, groups of users and individual users.

Auto-scan Removeable Media

Automatically scan CDs, DVDs, and USBs for threats when they’re inserted into your machine to eliminate autorun and other removeable risks. You can choose from the following scanning options: do not scan / notify (prompt user) / start automatically.

Protection Across Platforms

Confidently exchange email attachments between Windows, Linux and Mac machines with automatic detection and elimination of malware.

Multiple Log Formats

A log is accessible showing everything the software has done and monitored. You can save logs in multiple different formats including CSV, Windows event log or just plain text. This allows for immediate analysis.

If you’d like to learn more about ESET Endpoint Security then please get in touch.

Lets Talk!

Like the update, See more at our link Tech News TNT are providers of home and business IT Network Services.

Share This