ESET Support at a computer software company with 11-50 employees
Reseller
Top 5
2023-05-25T17:19:00Z
May 25, 2023
With every type of ESET product installed, we use ESET Protect to manage endpoint protection, including servers, workstations, laptops, and mobile phones. ESET Protect is a web-based console where you monitor ESET protection in the network. On-premises solutions are still prevalent, but customers are slowly transitioning to the ESET Protect cloud.
Senior Manager Systems and Application at Reliance Aviation Tech Services
Real User
Top 10
2022-12-19T19:28:48Z
Dec 19, 2022
We use ESET Protect for antivirus protection and we deploy it on-premises. We have computers in the network for our client and an on-premises server installed for them.
ESET PROTECT Enterprise ensures real-time visibility for all endpoints as well as full reporting and security management for all OSes
Cloud-based console with the possibility of an on-premises deployment
Provides real-time visibility of all endpoints: desktops, servers, virtual machines and even managed mobile devices
Enables full reporting for ESET security solutions
Controls endpoint prevention, detection & response layers across all platforms
Connect anytime, anywhere from your...
We use the solution to protect our clients' servers and endpoint devices.
Our primary use case involves approximately 180 workstations, 180 laptops, and office protection in our environment.
With every type of ESET product installed, we use ESET Protect to manage endpoint protection, including servers, workstations, laptops, and mobile phones. ESET Protect is a web-based console where you monitor ESET protection in the network. On-premises solutions are still prevalent, but customers are slowly transitioning to the ESET Protect cloud.
We use ESET Protect for antivirus protection and we deploy it on-premises. We have computers in the network for our client and an on-premises server installed for them.
We are mainly using ESET Protect for web filtering.
ESET File Security is used to provide access to files remotely and securely.
We primarily use this solution for the server.
We primarily use the solution for security purposes.