ESET Inspect Valuable Features

Cees Van Den Haak - PeerSpot reviewer
ICT Manager at Bouwbedrijf de Vries en Verburg BV

The most valuable features of the solution stem from the fact that you can manage and react to vulnerabilities and attacks on all the workstations or laptops. You can put certain workstations and isolation. With ESET PROTECT, you see only one machine that is protected, but with ESET Inspect, you see all the machines that are protected in an environment.

View full review »
DD
ESET Support at a computer software company with 11-50 employees

In cybersecurity, you need to stay on top of attackers. We can track technics and tactics advisories use and potential lateral movement before damage is done. You can define any file, network, or registry operation you want to monitor to identify attack methods used.

Rules are the most valuable feature of ESET Inspect. They are created through XML language, and they track and filter events from endpoints. If the event matches the rule, the rule is triggered. Exceptions are the second most valuable feature because it gives you the power to filter false positives in large numbers. The third most valuable feature is the Learning mode that facilitates making exceptions for known processes with a good reputation.

View full review »
DD
ESET Support at a computer software company with 11-50 employees

The rules are the most useful feature. On the vendor side, rules are created and distributed to EPIC servers continuously. A rule is defined using XML-based language and they are the behavior and reputation-based descriptions that EPIC can identify from the received events and metadata which he then updates, or they update the rules to update. EPIC now has around 1,000 rules that define all sorts of behavior in the network. With custom rules, you can additionally define specific behavior and remediate, for example, exploitation of log4j vulnerability.

Also, the Learning mode in the exclusions section is extremely useful. True ML EPIC can smell reoccurring benign events and offer the creation of exclusion for such events. The administrator can check an offered exclusion, deny it or proceed with creation. 

ESET Inspect Connector, the required component on the endpoint side, takes a few percent of processor time, nothing noticeable indeed, which is not the case for most other vendors. EDR/XDR is a very demanding service, but ESET managed to make it lightweight, like in all other of their products.

View full review »
Buyer's Guide
ESET Inspect
April 2024
Learn what your peers think about ESET Inspect. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.
FK
Data Engineer at Berief Food GmbH

ESET Enterprise Inspector's most valuable feature is EDR.

View full review »
RS
Consultant at a financial services firm with 10,001+ employees

ESET Enterprise Inspector's greatest asset lies in its user-friendly interface, which allows for easy navigation and thorough analysis of incidents. 

The solution has effective detection of pre-execution tasks and the detection at the EDR level is beneficial. It helps detect malicious activity before the files are executed.

View full review »
MH
Senior ICT Specialist at a non-profit with 1,001-5,000 employees

I find the multilayered endpoint security to be the most valuable feature. It prevents malicious modules from being executed in the organization's network. ESET Enterprise Inspector's open architecture gives the flexibility to detect violations of policies about using specific software like torrent applications, cloud storages, Tor browsing or other unwanted software.

View full review »
Buyer's Guide
ESET Inspect
April 2024
Learn what your peers think about ESET Inspect. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.