-
Antivirus & Antispyware: real-time detection and removal of known threats (viruses, worms, trojans, rootkits) plus heuristic/behavioral detection of unknown/new threats.
-
Web access protection & anti-phishing: monitors browser traffic (including SSL/HTTPS) to block malicious sites and phishing attempts.
-
Email protection: protection for email clients via POP3(S), IMAP(S) etc. to scan incoming/outgoing email traffic.
-
Network attack protection / firewall / intrusion prevention: monitors traffic entering/exiting the device; blocks attacks exploiting unpatched vulnerabilities. Advanced memory scanner: to detect malware that hides or decrypts itself only in memory, or that uses obfuscation to avoid detection.
-
Exploit blocker: protects applications that are frequently targeted (browsers, document readers, etc.) by exploiting vulnerabilities.
-
Ransomware Shield / Ransomware Remediation: behavioural checking for ransomware-type behavior; sometimes includes rollback or restoration capabilities from secure backups.
-
Device control: control access to removable media and external devices (USBs, DVDs etc.) to prevent malware via external storage.
-
Sandboxing / in-product sandbox: executing suspicious code in an isolated environment to detect malicious behavior without risking the system.
-
LiveGrid / Cloud-powered reputation system: cloud database which helps with detecting files/processes by comparing with reputation data, helping with speed & zero-day detection.
-
Remote / centralized management: using ESET PROTECT or similar console to deploy, configure, monitor endpoints; enforce policies; manage many devices from a single pane.
-
Regular updates: frequent updates of virus signature/databases, program modules.