ESET Inspect Cloud
ESET Inspect Cloud combines all the powerful capabilities of its on-premises version with the ease of deployment, and virtually no maintenance requirements, of a cloud-delivered service. It is a culmination of ESET Endpoint detection technologies and know-how.
At its core, it has a fully transparent and customizable Rule Engine with close to 1,000 rules, written by ESET's world-class malware researchers to detect threats and behavioral anomalies cross-referenced with the MITRE ATT&CK framework.
For response and remediation, ESET Inspect Cloud provides security professionals with a variety of features:
•Block executables
•Kill processes
•Isolate endpoints from the network
•Terminal remote shell
All response actions can be triggered manually or automatically with pre-defined response scenarios.
Incidents are handled easily via its Incident Management system, and threat hunting is a breeze thanks to the powerful Indicator of Compromise (IoC) search and filtering.
ESET Inspect Cloud includes all of the key features and capabilities of the on-premises version of ESET Inspect but were slightly adjusted to fit the needs of cloud-based management.
•Multiplatform support Windows, macOS, and Linux allows virtually any endpoint to be monitored, completely protecting an organization regardless of its platform type.
•ESET Business products version 6 and later are supported.
•License management is done entirely in ESET Business Account. Create a new ESET PROTECT Cloud and ESET Inspect Cloud instance. A single instance supports up to 25,000 endpoints.
•The dashboard does not contain Server status and Events load tabs (no maintenance is required).
•The Settings section contains fewer configuration options than the ESET Inspect Cloud on-premises version, as there is no need for ESET Inspect Database maintenance.
•The Settings section offers search engine integration, Rule learning mode and an option to specify a ESET Inspect Cloud instance name.
•Data collection is configured to store the most important data. All data related to processes are stored, but the collection of low-level events is limited to suspicious ones.