ESET Protect Complete
ESET's combination of spam filtering, anti malware scanning, anti phishing and cloud sandboxing helps protect your organization against infections and targeted attacks, as well as blocking new, never-before-seen types of threats, especially ransomware.
Features
- Advanced multilayered protection
- Proactive protection against zero-day threats
- Single pane of glass remote management
- Robust encryption solution
- Advanced protection for MS365 apps
- Spam filtering
- Anti malware scanning
- Anti phishing
- Ransomware protection
- Multilayered protection for the file server system
Benefits
- Automated security management and threat remediation
- Block targeted attacks
- Network attack protection improves server resilience
- Achieve regulatory compliance
- Powerful cloud sandbox analysis, backed by machine learning techniques
- Robust quarantine management
- Enhanced anti-spam, anti-malware, anti-phishing and cloud sandboxing technology
- Encrypt system disks, partitions or entire drives
- Granular reports with detailed information about samples and their behavior
- Full security management - from prevention to response
Pricing
£18 to £44.82 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 0 0 3 9 3 7 7 7 2 3 3 1 1 2
Contact
ADAPTIVE COMMUNICATION SOLUTIONS LTD
Katie Murray
Telephone: 01704540547
Email: katiemurray@adaptivecomms.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
-
- Microsoft Windows 10, 8.1, 8, 7, Vista
- MacOS 10.9 and later
- Android 5 (Lollipop) and later
- IOS 8 and later
- Microsoft Windows Server 2019, 2016, 2012, 2008
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
AdaptiveComms operates M-F Business Hours response SLA's are 60 minutes (30 minutes for critical faults). Emergency (chargeable) support is available outside of these hours with a 4-hour response SLA. These times are a maximum limit not our aim, we always aim to deliver fixes as quickly as possible. Our SLAs are the maximum wait time you should expect to receive in 95% of cases.Further details can be found here: https://adaptivecomms.co.uk/service-level-agreement/
ESET aim to respond within 2 hours to enquiries - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Email, phone, virtual connect, onsite connect, paid and free services, health check, professional installation services.
For those with in-house IT Support teams, AdaptiveComms provides second-line assistance with this product. Many of our customers also employ us as their IT support (separate service) but we will assist in set-up of the product to the extent that our client feels comfortable with. We provide each customer with a named account manager, backed up by a customer service team, helpdesk engineers for second-line and field based engineers for site support as required (site support is chargeable but it's requirement would be highly unlikely in this instance). - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Full training and installation operations
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- N/A
- End-of-contract process
- The product is uninstalled and the data deleted
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- They are distinct, independently designed products
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- The ESET PROTECT ServerApi (ServerApi.dll) is an application programming interface; a set of functions and tools for building custom software applications to meet your needs and specifics. Using the ServerApi, your application can provide a custom interface, functionality and operations you would normally perform via ESET PROTECT Web Console, such as managing ESET PROTECT, generating and receiving reports, etc.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- ESET use distributed and managed servers
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- ESET
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- N/A
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Using encryption
Availability and resilience
- Guaranteed availability
-
ESET aim to provide 99.5% service availability. Theireffort and well-defined processes drive this endeavor. In the event of an ESET PROTECT Cloud service outage, endpoints remain secure and unaffected.
AdaptiveComms support SLA is as follows: M-F Business Hours response SLA's are 60 minutes (30 minutes for critical faults). Emergency (chargeable) support is available outside of these hours with a 4-hour response SLA. These times are a maximum limit not our aim, we always aim to deliver fixes as quickly as possible. Our SLAs are the maximum wait time you should expect to receive in 95% of cases. Further details can be found here: https://adaptivecomms.co.uk/service-level-agreement/ . - Approach to resilience
- ESET have multiple server instances with redundancy and resilience built in. They also have a managed disaster recovery plan.
- Outage reporting
- ESET report any outage lasting more than 15 minutes via their EBA announcement channel, iKB alert process and delivered direct into the EP Console itself.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Independent user rights and access can be assigned.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Centre for Assessment Limited;
- ISO/IEC 27001 accreditation date
- 14/08/23
- What the ISO/IEC 27001 doesn’t cover
- We (AdaptiveComms) do not have any controls pertaining to source code, software development or associated testing as we do not undertake any software systems development as a company
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- ESET comply with ISO 27001 standards; AdaptiveComms are working towards accreditation and expect to have this within the next 6 months
- Information security policies and processes
- All AdaptiveComms staff are required to read and adhere to staff policies which includes the Data Protection Policy and the Communications, Email and Internet Policy. AD is used to control access permissions with ultimate control residing solely with the CEO and the Head of IT. Staff are only able to interface with customer data as necessary and only as required by their role
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
ESET have internal teams that identify requirements for change including user requests, these are structered and managed internally, any changes are tested internally, then externally to select parties then released in batches, full rollback options are included in our endpoint products.
We (AdaptiveComms) employ a ticket system in house with a comprehensive history to show interactions and use an integrated CRM system. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
- ESET's vulnerability management is undisclosed, AdaptiveComms uses a series of measures including MFA, encryption, anti-malware and zero-day ransomware detection to detect and control threats (including but not limited to ESET).
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- ESET's protective monitoring is undisclosed. We (AdaptiveComms) respond to compromises and threats as soon as we are aware of them
- Incident management type
- Undisclosed
- Incident management approach
- ESET's incident management approach is undisclosed. Incidents are logged through our ticket system and allocated priority according to the level and scale of impact on the client/business. This is audited and has a full history log.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
ESET Protect Complete can contribute to fighting climate change by enabling remote work and reducing the need for physical infrastructure. By securing cloud-based communication and collaboration platforms, such a solution allows employees to work from anywhere, minimizing the carbon footprint associated with commuting and office energy consumption. Additionally, by preventing data breaches and cyberattacks, it helps avoid the environmental impact of recovering from security incidents, such as server downtime and data recovery processes.
As a supplier AdaptiveComms are taking the following steps to meet our environmental responsibilities:
We pledge to be carbon neutral by 2030 guided by official carbon assessments;
We plan to replace our entire vehicle fleet to electric by 2030; We have switched all our office lighting to efficient LEDs;
We have reduced paper use by 90% by moving to online systems and energy-efficient electronic devices;
We have switched to a renewable electricity energy supplier;
We are committed to investing in carbon offset to reach our net-zero goal.Covid-19 recovery
In the context of COVID-19 recovery, a comprehensive threat protection solution plays a crucial role in ensuring business continuity and safeguarding sensitive information. By protecting against cyber threats such as phishing scams and malware attacks, it helps businesses maintain operational resilience in the face of evolving cybersecurity challenges. This, in turn, supports the recovery efforts by preventing disruptions to remote work and enabling secure communication and collaboration among employees.Tackling economic inequality
By safeguarding businesses of all sizes from cyber threats, ESET Protect Complete contributes to tackling economic inequality. By offering scalable security features and affordable subscription models, it ensures that even small businesses can access robust cybersecurity measures previously available only to larger enterprises. This helps level the playing field, empowering small businesses to compete effectively in the digital landscape without being unfairly hindered by the threat of cyberattacks.
Although we are not obligated to due to our size and revenue, we voluntarily offer a Modern Slavery and Human Trafficking statement pledging our commitment to prevent modern slavery and human trafficking in our business practices and supply chain, undertaking due diligence and seeking similar commitments when taking on new suppliers.
We have been involved in community projects to help people into employment including apprentice schemes, business forums, and educational outreach.Equal opportunity
By providing advanced threat protection capabilities, ESET Protect Complete promotes equal opportunity by safeguarding the integrity of digital communication and collaboration platforms. This ensures that all users, regardless of their background or circumstances, can access these platforms securely and participate in remote work and virtual collaboration without fear of cyber threats compromising their privacy or productivity. In doing so, it fosters inclusivity and equal access to digital opportunities for individuals from diverse backgrounds.Wellbeing
By preventing data breaches and protecting sensitive information, this solution helps create a secure work environment where employees can focus on their tasks without worrying about the potential consequences of cyber threats. This promotes peace of mind, job satisfaction, and overall wellbeing among employees, supporting a healthy and productive work culture.
At AdaptiveComms we have a culture built on hard work, respect, positivity and dedication and ensure that those tenets are reciprocated back to our staff through:
Equality;
Day off for birthday;
Enhanced sick leave & maternity;
Health top-up service;
Food & drink provided in office;
Enhanced holidays for length of service;
Work-life balance;
Employee-led think tanks.
Pricing
- Price
- £18 to £44.82 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full versions