Buying the best Antivirus protection isn’t just insurance, it’s an investment.
Endpoint Antivirus has been designed for businesses of all sizes seamlessly keeping your company’s network protected while maintaining the performance you demand from your desktop and network infrastructure.
Our goal at Tamite is to help you keep your business productive, we are aware that even a few hours lost production due to an infection on a machine can seriously disrupt your business. The reality is that even one infection can have dire consequences to your business, this is why we respect the levels of service we get from Eset. Eset have a track record of consistently providing solutions that are effective and light on the resources they demand from your machines, the net result is that if your memory and processing aren’t being tied up by your Antivirus software then you will have a quicker more responsive PC .
At the same time the constantly changing landscape of threats, whether from the internet or those that can be carried in on USB memory storage devices, tablets, mobile phones and the myriad of other devices we connect to our networks it is essential we deploy the most robust approach to IT security and that is where Tamite IT and Eset excel.
Superior Endpoint Protection
Designed to support networks large and small, ESET Endpoint Antivirus with ESET Remote Administrator lets you focus on running your business, not your antivirus software. The solution delivers state-of-the-art proactive malware defence without the slowdowns, false positives, and other issues that impact end users and tie up your IT staff.
Very little impact on endpoint machines
Low traffic overhead
Flexible and granular policy, client and role management
PassMark Software, Comparative Analysis, August 2012
ESET has been the leader in developing proactive computer security solutions for more than 25 years. ESET’s award-winning detection technology protects over 100 million users worldwide.
Antivirus and Antispyware Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your network protected online and off. Optional cloud powered scanning utilises our reputation database for increased scanning speed and minimal false positives.
Host based Intrusion Prevention System HIPS Provides tampering protection and protects the system registry, processes, applications and files from unauthorised modification. You can customise the behaviour of the system down to every last detail and detect even unknown threats based on suspicious behaviour.
Device Control Lets you block unauthorised media and devices based on preset rules and parameters. Set access permissions read/write, read, block. for individual media, devices, users and groups.
Auto Scan of Removable Media Automatically scans USBs, CDs, and DVDs for threats upon insertion to eliminate auto run and other removable risks. Choose from these scanning options: start automatically/notify/prompt user/do not scan.
Cross platform Protection Exchange files and email attachments among Windows, Mac and Linux endpoints with confidence that malware targeting any of these platforms will be automatically detected and eliminated.
Prevent Macs turning into carriers of malware in the company network.
Low System Demands Leaves more system resources for programs you use daily. Our software also runs smoothly on older hardware, saving your time and costs of having to upgrade your endpoints.
Multiple Log Formats Save logs in common formats . CSV, plain text, or Windows event log for immediate analysis or harvesting.
Take advantage of data being readable by third party SIEM tools; RSA enVision is supported directly via a plug-in.
Update Rollback Revert virus signature and module updates to a known good state in case of encountering system incompatibilities.
Opt to freeze updates temporarily or until manually changed.