ESET PROTECT Hub introduction
The main goal of ESET PROTECT Hub is to move closer to a unified view within the ESET business ecosystem. It provides centralized identity, subscription and user management for all ESET platforms and users. ESET PROTECT Hub aggregates functionality from multiple solutions in one place, serving different roles within the distribution hierarchy.
The key principles of ESET PROTECT Hub are:
•Easy navigation—Using a single sign-on, you can seamlessly navigate the ecosystem and access any cloud console.
•Enablement—Manage the users, licenses and ESET security subscriptions.
•Business insights—Dashboards and graphs give resellers access to business insights to help drive their business.
Product portfolio
The ESET PROTECT Hub offers security solutions designed to address various aspects of cybersecurity.
•ESET PROTECT—ESET PROTECT enables you to manage ESET products on workstations and servers in a networked environment with up to 50,000 devices from one central location.
•ESET Inspect—ESET Inspect identifies anomalous behavior and breaches with Extended Detection and Response (XDR). It provides advanced threat hunting, risk assessment, incident response, investigation and remediation capabilities.
•ESET Cloud Office Security—ESET Cloud Office Security is a standalone solution that handles security in your Microsoft 365 or Google Workspace cloud environments, mailboxes or cloud storage.
•ESET Secure Authentication—ESET Secure Authentication is a cloud-based solution offering Two-Factor Authentication (2FA) for various applications. It delivers the second factor through multiple methods, including mobile phone applications, hard tokens and FIDO keys, enhancing and securing the standard user authentication process.
•ESET Threat Intelligence—A service that delivers detailed, up-to-date information on global cyber threats. ESET Threat Intelligence services warn you about malicious software or activity that might threaten your organization or its customers.
•ESET Connect Service user—Acts as a reverse proxy to accept all application programming interface (API) calls, aggregate the services required to fulfill them and return the appropriate result.