We're looking into Password managers and want to get more detail for our research. Whom may we speak with as we have both sales and technical questions.
- View 4 other comments
Jun 28, 2021 at 13:58 UTC
LastPass - Looking into it, but it seems to lack a feature my boss is currently looking for
1Password - Looking into and is close, but may still lack a feature my boss is looking for
#BitWarden - Looking into and may actually have what we're looking for
We're evaluating all our options but wanted to know what ESET had to offer since we already utilize them. We wanted to see the pros/cons of adding this service to what we have in our business environment already and get a cost analysis as well since they would have a record of our purchase as of right now.
Jun 28, 2021 at 22:11 UTC
Hi Derrick! So happy to hear about your interest in a password manager. It's definitely a helpful and much-needed tool. Here's a blog post that gives a small look into our tool.
I would recommend contacting your ESET sales rep to discuss this tool or if you would like me to assist, feel free to DM me your information. I'm happy to help!
I've been trying to contact ESET for months to try out the Protect Advanced business solution. Is it possible to get in touch with someone to help me with this?
May 18, 2021 at 23:57 UTC
I found a listing of phone numbers on ESET's web site at https://www.eset.com/int/about/contact/.
Perhaps just calling the closest office to your region and asking to speak to a salesperson would work?
May 19, 2021 at 09:01 UTC
Taryn was brilliantly helpful for me
UK based reseller - I'm locked out of my account due to a password issue which I cannot self-resolve. I've emailed my sales rep, no reply. I've emailed customer services, no reply.
Who do I contact to be removed as a reseller, because if a company can't support its partners, I'd rather not resell its products.
Really poor partner service. I'm going elsewhere, as are my personal licenses when renewal comes round.
- View 5 other comments
Apr 14, 2021 at 22:39 UTC Hi Tim, we sincerely apologize for your experience and I've been informed that our team in the UK will be reaching out to you to discuss this matter. Thank you.
Apr 18, 2021 at 00:39 UTC
If by "reaching out" you mean closing my account more quickly than a quick thing, then yes, they 'reached out'.
I can't deal with the representative I was dealing with, and if she is my only option, then another vendor it is.
How she still has a job is puzzling.
I love the product, but I can't possibly partner with poor service.
My company already purchased 3 licenses for ESET File Security for Microsoft Windows Server. I installed it onto a Windows 2016 Server VM and the install seemed to go without any issues. Upon reboot, AV protection is not non-functional. HIPS is disabled. On the second VM, the same file I used to install on the first VM, did not install and said it was an incompatible operating system.
I hope I have not purchased the wrong product and wasted 3 licenses and the cost associated with them.
What are my options?
Jan 8, 2021 at 09:33 UTC
the servers are normally Eset File security sorry image wouldn't paste Current version is 7.3xxx
Tagged Tayn as she has been super helpful in the past.
i have that on VM's from 2012 -2019 Standard.
It sounds like you may not have entered the licence key or there is a connectivity issue. Though a connectivity is normally seen by live grid not available so I would check the licence first.
If you can open the file security go to tools and support and change licence and insert your licence there if not correct.
If I get one that installs but has a hard time I find it is either waiting for a restart or a repair. I would reach out to the support, which IME are generally very good and ask the to check it out .ESET Support page
You can also try the ESET KB
I have had them help with all sorts of random stuff.
Another thing worth checking is to go to Setup - network -Troubleshooting Wizard set to one hour top right
This will have a list of any blocked systems etc. sorry for clipped tone really busy morning as I just forced an update to ESET 8 endpooint to all the folks that won't restart their devices willingly :)
ESET is looking for web usability testing participants! You'll be asked to do several short tasks using our website, then share your experience and perceptions. Participants will be compensated.
Interested? For details, contact firstname.lastname@example.org.
• IT admins, IT consultants or small business owners
• Involved in the decision-making process to purchase endpoint security solutions for a small or home business
• Not currently using ESET solutions
• Willing to spend approximately one hour via online video call with screen sharing.
Oct 29, 2020 at 23:02 UTC
Email sent :)
I want to know your guys' thoughts on cyber insurance - great topic brought up my by colleague Jake Moore in this blog.
When you work in IT and you’re at a dinner party and somebody asks, “What do you do?” you can usually see the blood run from their face as they’re like, “Oh my God, why me? My one night out this week! Why did I ask?!” However, recently, I was invited to a dinner party with place names (A little over the top? Or strategic?) and I was placed next to an insurer. Naturally, the host knew that people in IT and insurance would get along like a house on fire. Or was it to keep the nerds down one end of the room? I’m not entirely sure.
Anyway, after he introduced his role and company to me, it was my turn to divulge what area of IT I was in. I mentioned the word cyber and before I could say security, he was telling me that there is cyber insurance that will “cover everything”. Everything?! This was a bold claim and suddenly our end of the table became the noisy end. I instantly questioned his statement as to what level people are covered and he claimed as a cyber insurancebroker that they pay out for all ransomware attacks – whatever value the ransom is. I was astonished! For all my time at the police I had it ingrained in my mind that crime doesn’t pay and by fuelling cybercrime you are funding the bigger picture of international organised criminal gangs, which will just increase the more they receive.
“We have become accustomed to the fact that the cybercriminals are winning and with law enforcement struggling to contain it”
So this took me to Google not just to research this claim but also to question his ethics as this was now starting to sound illegal. My research suggested that “Due diligence is required to ensure ransoms are not paid to ‘terrorist’ cyber attackers”. Pointing this out made him even more smug yet there was nothing I could do to suggest that they will never know the origin of the cyberattacker. So how can insurers pay a ransom when it could be going to a terrorist? His defence angle was vice versa suggesting that there is nothing to prove they are!
Ethically this is against everything I know but who’s in the wrong here? The cyber insurers or the governing rules? What on earth are companies thinking when they are sold cyber insurance? Are they of the mindset that if the worst case scenario occurs, that their broker will just pay the ransom and get them out of the hole they are in? Well yes – that seems to be exactly what is happening. We have become accustomed to the fact that the cybercriminals are winning and with law enforcement struggling to contain it.
“It seems very few people believe that prevention is the best option because people will always seek the easiest way out”
Cyber insurance is currently booming and many insurers are offering varying levels of protection to customers who (personally) seem in the dark about a lot when it comes to cybersecurity. We all know that scaring tactics aren’t the best way to go about selling a product yet increasing hacking stories in the media are certainly making CEOs a bit twitchy. Rightly so that C suite staff should be raising their heads above their monitors when it comes to their infrastructure security but is insurance better than prevention? Do they think insurance is prevention? Even forgetting ethics for a moment, paying a criminal to receive your data back could be just as catastrophic should malware be transmitted along with the back up – along with your premium increasing in the next year with your insurer.
By simply reducing the risk beforehand is a far better way to keep this threat from exploding within a company? This is easily achievable by training, anti malware software and setting privilege rights correctly.
So back to my new acquaintance at the dinner party, which I was now in a full on debate even with interjections from other professions around the table giving their two cents worth. It seems very few people believe that prevention is the best option because people will always seek the easiest way out. Unless we force people to include prevention methods from the outset, people will inevitably fall back on reactive measures which we have seen do not always work.
Nov 10, 2018 at 00:51 UTC
I've seen 'cyber insurance' like this before. When you look into the fine print in the coverage contract, some insurers have prerequisites to qualify for that type of payout, and those requirements would make you think your network is housing national security data.
The analytics behind cyber insurance is also such that they will target markets and customers at a certain ratio so that they can demonstrate they actually do pay out for victims, but the percentage of clients they have to pay out for will be as low as possible. A lot of these target customer areas also tend to be tangentially related to major industries that are common targets for ransomware and data breaches. They use that association for implied risk to the potential customer without coverage, and then use the history of victims as 'proof of coverage'.
Jan 20, 2019 at 21:59 UTC
My view is tgat by the time you get to this stage you already have bigger problems
First you dont have safe backuos
Second. Your data is already gone out somewhere for a walkabout
Third you will have all sorts of regulatory issues
Fourthly you dont have an effective DR or BXP
Fifth in the absence of the above the insurer will find an excuse not to pay out
This week at RSA 2018, we've ushered in a new generation of enterprise security products and services. The standouts include the all-new ESET Enterprise Inspector, an Endpoint Detection and Response (EDR) solution with features and granularity that surpass anything on the market; and ESET Dynamic Threat Defense, a tool that provides off-premise cloud sandboxing, which leverages machine learning and behavior-based detection to prevent zero-day attacks. There's also a new Anti-Malware Software Development Kit.
If you'd like to know more about this new suite of solutions for your enterprise, don't miss our upcoming webinar, happening next Wednesday (April 25) at 10am PT. You can sign up for that here. The presentation will last about 35 minutes and we'll then open it up for any questions you might have.
As you know, keeping up to date with the latest state, federal, private and even international regulations can be a royal pain at best and near impossible at worst. How do you know which ones affect you? Is compliance really necessary and if so, how are you expected to meet and maintain compliance?
Two days from now, we’re hosting a webinar where we’ll cover the main types of compliance, what’s required to meet compliance rules, and why satisfying the requirements can improve your overall security. We’ll help you get started on compliance initiatives and explain how encryption and two-factor authentication can be important tools in meeting security requirements. A brief Q&A will be included at the end, so you can answer any question you may still have.
On days like this, it can be a real relief knowing there’s at least something you can rely on. Am I right?
Side question: How many toys can you identify in this video?
Mar 8, 2018 at 22:58 UTC
I've had days like that. I could only make out 6 the others would be a big WAG.
Our research team has just released our much-anticipated report titled, Cybersecurity Trends 2018: The Cost of our Connected World.
We saw many high-profile attacks this year from WannaCry to Experian to Industroyer. These threats impacted millions of individual users and businesses of all sizes. The public now has a greater awareness of threats and their severity but the level of sophistication behind attacks continues to rise.
Our experts anticipate cybercriminals and cyber espionage groups will continue to find new ways to exploit machines – while still sticking to tried and true tactics. However, increased cooperation between law enforcement and private cybersecurity entities could provide some hope, with increasing arrests made and more cybercriminals deterred. Here’s a few highlights of what we see as the top trends for the coming year:
- The rise of attacks on critical infrastructure
- Data and software supply chain issues
- Increased cooperation between law enforcement and cybersecurity experts and organizations
- Democracy hack: Can electoral processes be protected?
- Our privacy in the new age of tech
Dec 16, 2017 at 04:21 UTC
I think the link to the PDF is broken. Try removing the last slash from it if it doesn't download for you.
Dec 18, 2017 at 15:40 UTC
Thanks Aryeh. Link is fixed and added a link to the WeLiveSecurity post as well.
Today, we've launched the 2018 Edition of our security products for Windows home users.
New and Improved Features
- Connected Home Monitor—Renamed from "Home Network Protection" and added a new feature to scan router-connected IoT devices (Internet of Things) to test for vulnerabilities such as weak passwords, open ports and known services.
- UEFI Scanner—Proactive scanning that runs in the background and only notifies you if a problem is detected.
- License Manager—New feature added to my.eset.com that allows you to view and manage your licenses and connected devices.
- System cleaner—New tool to help restore default settings after a malware infection.
Looking for a small business FDE solution and came across DESlock+ which I believe is a ESET product. When i followed the link to UK supplier i was redirect to ESET website but there is no information on the site about this product and I was hoping to chat to support about which version would best suit my client, and what the pricing options are. Hope you can point me in the right direction.
- View 1 other comment
Oct 13, 2017 at 07:09 UTC
Thanks for the reply Daniel, and the link to the information that I need. I will check that out later. Do you have a sales contact in the UK?
Oct 13, 2017 at 15:31 UTC
Yeah, you can reach the team there in the UK at +44 (0)1202 54 88 88 (M-F; 8:30am-5:30pm) or email@example.com
- Women in Technology
- Cybersecurity Education and/or STEM/STEAM Education
- Innovation/Start-up Economy
ESET will award $30,000 in total prize money: The first-place winner of the Nonprofit Pitch Fest will be awarded $20,000, and five runners-up will each receive $2,000. Winners will be announced on October 16, 2017, during National Cyber Security Awareness Month.
To enter, applicants will need to answer an essay question through the contest entry page by the deadline, August 15, 2017.
Questions about this contest? Send an email to info@ESET30.com.
Enter now: HERE
Watch an ESET demo before June 30th and you'll be automatically entered for a chance to win.
Yes. That's it. The grand prize? How does TWO COMIC-CON BADGES + AIRFARE AND ACCOMMODATIONS sound?
Worth 30 mins of your time? Cool. You have less than 5 days to complete your mission. Good luck!
The only limitations are: You must be a resident in the United States over the age of 18. Oh and of course, you can't be an ESET employee or the family member of an ESET employee.
Also obviously, if anything (job/family/court order) prevents you from travelling to San Diego for Comic-Con, you won't be able to claim the prize but please do enjoy the demo anyways.
is there a way to get ESET Endpoint AV 6.x to either quarantine or delete potentially unwanted/unsafe applications on detection without user interaction? A notification would be enough to inform the user what happen. I just don't want them to run these application at all, because in most cases there are "cleaner" alternative.
Jun 14, 2017 at 15:38 UTC
First, I would adjust the GUI so users only have the ability to see little or none of the settings.
Next, I would disable notifications, as notifications are things that just notify you about items, but are not critically important. Alerts on the other hand are when threats are detected.
Then I would make sure that password protection is enabled on the endpoint so that users are unable to make any changes to the product settings.
If this doesn't seem to help resolve this particular issue, let me know or reach out to our customer care team and they can walk through the settings to make sure it's set up the way you'd prefer.
Thanks for reaching out!
Jun 20, 2017 at 08:17 UTCThanks for the reply. I'll give this a try.
Customize Header Background
Customize Page CSS
This is the CSS that will be included for all tabs for this vendor page.