ESET goes beyond endpoint security

With endpoint security now universal, SMBs and large enterprises are now keen to pursue other advanced security services

Tags: Cyber crimeESET Middle East (Adaox Ltd)United Arab Emirates
  • E-Mail
ESET goes beyond endpoint security Artificial intelligence is only as strong as the people who stand behind the system, Raekos says.
By  David Ndichu Published  June 30, 2018

Cybersecurity companies are increasingly integrating artificial intelligence (AI) into their cyber solutions. ESET is at the heart of this industry evolution, and its latest solutions are backed by machine learning technology that automates decisions and evaluates possible threats, explains Dimitris Raekos, general manager at ESET Middle East.

However, any AI technology is only as strong as the people who stand behind the system. “Human expertise is paramount in providing the most accurate threat intelligence possible as threat actors advance their own capabilities,” Raekos adds.

During the recent RSA 2018, ESET introduced its latest suite of enterprise offerings, the standouts being the ESET Enterprise Inspector, an endpoint detection and response (EDR) solution, and ESET Dynamic Threat Defence, a tool that provides off-premise cloud sandboxing leveraging machine learning and behaviour-based detection to prevent zero-day attacks.

Additionally, the upcoming version of ESET’s business products will see the company replace the ESET Remote Administrator with the ESET Security Management Centre, which offers a single pane interface for better visibility to zero-days, APTs and botnets. “All these solutions and related services will become gradually available in Middle East region from this summer and till the end of the year,” explains Raekos.

With endpoint security now universal, SMBs and large enterprises are now keen to pursue other advanced security services, with data safety and compliance seen as the main driver for this, says Raekos.

Raekos says ESET differentiation lies in its investment in R&D. The company currently employs 175 researchers with 11 global research centres around the globe. ESET’s endpoint products also contain a cloud reputation system made up of 110 million sensors that feed relevant information about the most recent threats and benign files.  “You won’t find us using the term ‘next-gen’ in any of our messaging or product names, because the reality is, since 2005 we have been doing what people are just now calling ‘next-gen’. We are focused less on hype and more on R&D, and on building solutions that work,” says Raekos.

With the vast choice of endpoint solutions businesses have at their disposal, a key factor in the purchase decision-making process is solution compatibility with other software the company has deployed, as well as smooth integration with the larger corporate IT ecosystem, says Raekos. “Thus, it is very important to select a solution that has little effect on the rest of their business and works well with the other security layers. In addition, chosen solutions need to be compatible with multiple OS and BYOD for fewer complications and avoidance of any data breaches or security holes,” he adds.

ESET’s regional strategy is to maintain its position as “vendor of choice for SMB and SME customers and become a trusted IT Security partner for larger enterprises through offering cutting edge technology, knowledge and high-quality professional services,” says Raekos. “Our team of IT security experts is expanding throughout the Middle East to facilitate the updated portfolio that covers endpoint security requirements from A to Z,” he adds.

The second pillar of that strategy is to maintain a strong partner focus. “Customers demand care; they need a team or a dedicated contact person aware of their environment and able to provide immediate assistance. However, this interaction is difficult a vendor especially due to a large number of SMB customers; partners then become key,” says Raekos.

On the enterprise side, big corporates do not see services as an add-on any more, Raekos notes.  “SLAs are usually part of the contract with an IT security provider; consequently we have developed a team to provide the full range of services, including deployment, training, direct support and other professional services like additional security services,” he concludes.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code