ESET MAIL SECURITY - FOR LINUX BSD AND SOLARIS Bedienungsanleitung Seite 6

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 8
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 5
pioneer of the antivirus industry for 25 years
Antivirus and Antispyware Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your
network protected online and o. Optional cloudpowered scanning utilizes our reputation
database for increased scanning speed and minimal false positives.
Host-based Intrusion Prevention
System (HIPS)
Provides tampering protection and protects the system registry, processes, applications and
files from unauthorized modification. You can customize the behavior of the system down to
every last detail and detect even unknown threats based on suspicious behavior.
Web Control Allows to limit access to select website categories by a way of automatic inthecloud
classification. Create detailed rules for user groups to comply with your company policies
and block sites generating high trac volume.
Trusted Network Detection Lets you define trusted networks and protect all other connections with strict mode, making
company laptops invisible in public WiFi networks in hotels, airports and at conferences.
Two-way Firewall Prevents unauthorized access to company network and protects company data from
exposure. Remote administration provides a firewall rule merge wizard that makes
aggregating firewall rules in the network a snap.
Client Antispam Protects your company communications from spam and emailborne threats. Set white
and blacklists and selflearning separately for each client or group. The antispam natively
supports Microsoft Outlook and also filters POP, IMAP, MAPI and HTTP protocols.
Device Control Lets you block unauthorized media and devices based on preset rules and parameters. Set
access permissions read/write, read, block for individual media, devices, users and groups.
Component-based Installation Install any or all of these security components: firewall, antispam, web control, device
control, Microsoft NAP support, and web access protection. Saves disk space by only
installing the modules you need. You can also remotely enable/disable installed modules.
Low System Demands Ensure proven detection while leaving more system resources for programs you use daily.
Our software also runs smoothly on older hardware, saving your time and costs of having to
upgrade your endpoints.
Multiple Log Formats Save logs in common formats  CSV, plain text, or Windows event log for immediate analysis
or harvesting. Take advantage of data being readable by rd party SIEM tools; RSA enVision is
supported directly via a plugin.
ESET Endpoint Antivirus
ESET NOD Antivirus Business Edition for Mac OS X
ESET NOD Antivirus Business Edition for Linux Desktop
ESET Endpoint Security for Android
ESET Mobile Security Business Edition
ESET File Security for Microsoft Windows Server
ESET File Security for Microsoft Windows Server Core
ESET File Security for Linux / BSD / Solaris
ESET Endpoint Security
ESET Mail Security for Microsoft Exchange Server
ESET Mail Security for IBM Lotus Domino
ESET Mail Security for Linux/BSD/Solaris
ESET NOD Antivirus Business Edition for Kerio Connect
ESET Remote Administrator
See the previous and following pages for benefits
and features of the products that are colorcoded in grey.
Product features may vary depending on operating system.
Please consult the individual product pages at www.eset.com
for specific product features.
ESET Secure Business
Seitenansicht 5
1 2 3 4 5 6 7 8

Kommentare zu diesen Handbüchern

Keine Kommentare