» » » ESET Endpoint Security Antivirus 6.1.2222.1 RePack by KpoJIuK DC 27032015



Information of news
15-04-2015, 06:15

ESET Endpoint Security Antivirus 6.1.2222.1 RePack by KpoJIuK DC 27032015

Category: Software » Software PC

ESET Endpoint Security  Antivirus 6.1.2222.1 RePack by KpoJIuK DC 27032015
ESET Endpoint Security / Antivirus 6.1.2222.1 RePack by KpoJIuK DC 27/03/2015 | 115,72 Mb

ESET Endpoint Security 6 is a comprehensive solution for security, which is the result of many efforts aimed at achieving the optimum combination of maximum protection with minimal impact on computer performance. Modern technology based on the use of artificial intelligence, able to proactively counteract infections with viruses, spyware, Trojans, adware, worms, rootkits and other Internet attacks without impacting the performance of your computer and breaks at work.



ESET Endpoint Antivirus 6 is an application for proactive protection of client computers against all types of malware. Blocks the viral applications and eliminates the possibility of leakage of personal information.

Protection of workstations

Antivirus and antispyware
Eliminates all types of threats, including viruses, rootkits, worms and spyware.
Check into the reputation service based on cloud technologies:
the possibility of whitelisting safe files based on the reputation data in the cloud;
only information about executable files and packaged software are sent to the cloud.

Management of removable media
Block removable media when unauthorized connection.
Allows you to create rules / configure options for specific media, removable devices, users, and customers.

Prevention system the intrusion (HIPS)
Allows you to set rules for system registry, processes, applications and files.
Provides protection from unauthorized interference.
Detects threats based on the behavior of the system.

Managing removable media (available in ESET Antivirus 6)
Block removable media when unauthorized connection.
Allows you to create rules / configure options for specific media, removable devices, users, and customers.
Automatic verification of removable media
Allows you to scan devices and removable media for malware.
The possibility of choosing one of the options: auto start / inform user / do not scan.

Minimal consumption of system resources
Consumes minimal system resources, which ensures smooth operation of programs and the stable operation of the system.
Provides reliable protection even on older computers.

Cross-platform protection
Detects and eliminates threats to the operating systems of Windows, Mac and Linux.
ESET SysRescue
Allows you to create bootable operating system with installed anti-virus scanner to clean an infected PC.

Control of access to information (available in ESET Security 6)

The web control
Restricts access to certain categories of websites.
Provides the ability to create policies for groups of users according to the company security policy.
Management of removable media
Block removable media when unauthorized connection.
Allows you to create rules / configure options for specific media, removable devices, users, and customers.
Authentication to the trusted zones
Provides reliable protection when a new / an unauthorized network.
Bilateral personal firewall
Prevents unauthorized access to the company network.
Provides protection from hackers and data theft.

Remote control

Centralized management
You can control all ESET products through centralized management tool.
Advanced customer management
Provides the ability to create statistical and dynamic client groups for ease of configuration and policy enforcement.
Management role-based administrator
The ability to assign privileges for different users ESET Remote Administrator:
audit users ESET Remote Administrator;
built-in password protection administrator accounts.
Remote installation
To perform a remote installation of ESET software to multiple endpoints simultaneously.
Export / import policies
Allows you to import / export / edit policies in XML.
Remote management modules
Allows you to remotely activate and deactivate the security modules, such as a personal firewall, anti-theft, protection in real-time, web filtering, antispam installed on individual client.

Reports, logs, and notifications

The web admin interface in real time
Provides full control over the corporate network and provides current information about the state of security.
Logs of different formats
Allows you to save logs in plain text, CSV, or the Windows event log with the possibility of their use by using SIEM tools.
Maintains logs on workstations for further analysis.
Event notifications
Allows you to configure the settings, logs, and reports or choose from more than 50 templates for various systems / clients.
Allows you to set a threshold for event notifications.
Records of the management of removable devices
Provides comprehensive information about the actions of removable media in the form of logs and reports.
RSA enVision support
Integration with SIEM tool RSA enVision using the plugin.
ESET SysInspector
Performs a deep analysis of the system to detect possible threats.

The speed and stability of your network

Intellectual tasks
Allows you to specify the time period for the execution of scheduled tasks to ensure security.
Minimizes the effect of antivirus solutions on the virtual workstations and reduces the consumption of network resources.
Rollback updates
The ability to revert to previous versions of the virus signatures database and module updates.
Allows you to temporarily suspend updates or install new ones manually.
Delayed updates
Allows you to download upgrades with 3 dedicated servers update: pre-release (beta users), regular output (for normal users) and delayed release (approximately 12 hours after the regular release).
Local update server
Allows you to get updates for clients from a local mirror server.
Minimizes the use of the Internet traffic.
Has mobile employees to receive updates from servers ESET online in case of staying outside the corporate network.
Increased speed of access to the database
Provides optimized and accelerated access to the database for fast retrieval of information about the state of endpoint security.
Database purging
Provides the ability to set the storage parameters of, for example, time and threshold values to store records in the database.
Support Microsoft NAP
Allows you to deploy a plug-in validation system health System Health Validator (SHV) and the agent system health System Health Agent (SHA) on the client side.

The graphical user interface of ESET Endpoint Security is completely changed: the appearance was better, and the application more intuitive. Below are some improvements in ESET Endpoint Security 6.

Improved functionality and practicality
Control of access to the Internet: create one rule for multiple URLS or multiple policies for different locations on the network. New in version 6: the policy of "soft" blocking and the ability to customize page elements blocking and alerts.
Personal firewall: you can now create firewall rules directly from the log or notification IDS and assign profiles to network interfaces.
New protection from botnets: helps detect malware by analyzing schema and data exchange and protocols.
Device control: now you can define the type and serial number of the device and ask one rule to multiple devices.
New intelligent mode HIPS: located between the automatic and interactive mode and allows you to identify suspicious activity and malicious processes in the system.
Improved Updater/mirror: now you can resume interrupted downloads database of virus signatures and modules products.
A new approach to remote control computers via ESET Remote Administrator: you can now re-send the logs in case of reinstallation ERA or for testing, install the ESET security software remotely, to obtain General information about the security status of your network environment and sort a variety of data for later use.
UI improvements: now manually run the database update virus signatures and modules from the Windows taskbar with one click. Support for touch screens and high resolution screens.
Improved detection and removal of third-party solutions for security.

New features
Phishing protection: protects against attempts to obtain passwords and other sensitive information by restricting access to malicious web sites that take the form of normal websites.
Increased scanning speed: using a shared local cache in a virtualized environment.
Detection technologies and protection
Increased speed and reliability of the installation.
Additional scan engine memory: monitors the behavior of processes and scans malicious processes, when they are cloaking in memory.
Advanced blocker exploits: is designed to protect applications that are usually vulnerable to exploits, such as browsers, programs for reading PDF files, email clients and components of MS Office. Locker exploits now supports Java and helps to improve the identification associated with Java vulnerabilities and protection from them.
Improved detection and removal of rootkits.
Protection against vulnerabilities: the advanced filter settings for intrusion detection and vulnerability of different types.
The scanning engine is in an idle state: automatically scans local drives when the computer is idle.

The graphical user interface of ESET Endpoint Antivirus is completely changed: the appearance was better, and the application more intuitive. Below are some improvements in ESET Endpoint Antivirus (version 6).

Improved functionality and practicality
Device control: now you can define the type and serial number of the device and ask one rule to multiple devices.
New intelligent mode HIPS: located between the automatic and interactive mode and allows you to identify suspicious activity and malicious processes in the system.
Improved Updater/mirror: now you can resume interrupted downloads database of virus signatures and modules products.
A new approach to remote control computers via ESET Remote Administrator: you can now re-send the logs in case of reinstallation ERA or for testing, install the ESET security software remotely, to obtain General information about the security status of your network environment and sort a variety of data for later use.
UI improvements: now manually run the database update virus signatures and modules from the Windows taskbar with one click. Support for touch screens and high resolution screens.
Improved detection and removal of third-party solutions for security.
New features
Phishing protection: protects against attempts to obtain passwords and other sensitive information by restricting access to malicious web sites that take the form of normal websites.
Increased scanning speed: using a shared local cache in a virtualized environment.
Detection technologies and protection
Increased speed and reliability of the installation.
Additional scan engine memory: monitors the behavior of processes and scans malicious processes, when they are cloaking in memory.
Advanced blocker exploits: is designed to protect applications that are usually vulnerable to exploits, such as browsers, programs for reading PDF files, email clients and components of MS Office. Locker exploits now supports Java and helps to improve the identification associated with Java vulnerabilities and protection from them.
Improved detection and removal of rootkits.
The scanning engine is in an idle state: automatically scans local drives when the computer is idle.

Version features:

Type: install [x86, x64]
Languages: Russian, english
Activation: integrated [aleksdem2]

Changes in the updated version from 27.03.2015: updated the cure




Links are Interchangeable - No Password - Single Extraction

uploaded


Rapidgator.net
Site BBcode/HTML Code:
Dear visitor, you went to the site as unregistered user.
We recommend you Sign up or Login to website under your name.
Information
Would you like to leave your comment? Please Login to your account to leave comments. Don't have an account? You can create a free account now.