svg
Close

COOKIE POLICY

Share on facebook
Share on twitter
Share on linkedin
Community projects helping traditional business adapt and move forward in thie NEW WORLD

INFORMATION ABOUT OUR USE OF COOKIES

Our website uses cookies to distinguish you from other users of our website. This helps us to provide you with a good experience when you browse our website and also allows us to improve our site. A cookie is a small file of letters and numbers that we store on your browser or the hard drive of your computer if you agree. Cookies contain information that is transferred to your computer’s hard drive.

We use the following cookies:

  • Strictly necessary cookies. These are cookies that are required for the operation of our website. They include, for example, cookies that enable you to log into secure areas of our website, use a shopping cart or make use of e-billing services.
  • Analytical/performance cookies. They allow us to recognise and count the number of visitors and to see how visitors move around our website when they are using it. This helps us to improve the way our website works, for example, by ensuring that users are finding what they are looking for easily.
  • Functionality cookies. These are used to recognise you when you return to our website. This enables us to personalise our content for you, greet you by name and remember your preferences (for example, your choice of language or region).
  • Targeting cookies. These cookies record your visit to our website, the pages you have visited and the links you have followed. We will use this information to make our website and the advertising displayed on it more relevant to your interests. We may also share this information with third parties for this purpose.

The table below explains the cookies we use and why.

[table id=1 /]

Please note that third parties (including, for example, advertising networks and providers of external services like web traffic analysis services) may also use cookies, over which we have no control and we cannot accept any liability for the third party’s compliance with its legal obligations. These cookies are likely to be analytical/performance cookies or targeting cookies:


You block cookies by activating the setting on your browser that allows you to refuse the setting of all or some cookies. However, if you use your browser settings to block all cookies (including essential cookies) you may not be able to access all or parts of our site.


Except for essential cookies, all cookies will expire after 24 hours.

 

admin

admin

Leave a Replay

About Me

Steve Hughes IT Manager. A mixture of commercial and educational backgrounds. Having lectured at FE Colleges and Universities in the northwest of the UK. I now run my own successful IT company. I thrive on new challenges and project managment.

 

Recent Posts

Follow Us

Weekly Tutorial

Sign up for our Newsletter

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit

Over 25 years of AV industry innovation gives your company multi-layered protection with ESET.

With ESET, you will never have to choose between security and performance.

Over 25 years of AV industry innovation gives your company multi-layered protection with ESET.

Every workstation and endpoint needs protection, with ESET Endpoint Antivirus and ESET Remote Administrator you can easily implement and maintain a powerful anti-malware solution.

 

Antivirus and Antispyware combats all threats, including viruses, rootkits, worms and spyware. Optional cloud-powered scanning allows whitelisting of safe files based on a file reputation database in the cloud, ensuring better detection and faster scanning. Protect your company against threats both known and emerging with advanced heuristics and comprehensive scanning options, including idle-state scanning which initiates a scan once the computer is not in use.

 

ESET’s signature low system footprint ensures that your hardware runs faster for longer. A small update package keeps you protected against the latest threats without consuming all of your bandwidth. Prevent threats being brought into the company physically with Device Control, allowing you to block unauthorised CDs/DVDs and USBs.

 

The Anti-Phishing module protects against fake websites which attempt to harvest sensitive information from end-users, such as passwords, usernames and banking or credit card information. ESET’s Host-Based Intrusion Prevention System (HIPS) protects against malware tampering with the registry of your endpoints and detects threats based on system behaviour.

 

Edit GUI visibility for the end-user, reducing the system resources required even further if hidden completely. ESET security solutions protect against Mac based malware even on a Windows platform and vice-versa, ensuring that your network is secure regardless of the systems attached to it. Detect and uninstall other security software as ESET installs with RIP & Replace: transferring to ESET has never been easier.

FEATURES

Antivirus and Antispyware eliminates all threats, including viruses, rootkits, worms, spyware.

 

Host-Based Intrusion Prevention System (HIPS) give your IT staff extensive control over your entire network.

 

Exploit Blocker strengthens the security of common applications such as web browsers, PDF readers, email clients and MS office components.

 

Cross-Platform Protection prevents malware moving from one OS to another.

 

Anti-Phishing defends end-users against fake websites looking to harvest sensitive information, such as passwords, usernames or bank/credit card details.

Device Control allows you to block unauthorised devices (CDs/DVDs and USBs) from being connected to your systems.

 

Idle-State Scanning performs a scan on your systems whilst they aren’t being used, avoiding interruption during the working day.

 

RIP & Replace removes other security software during installation, making transferring from an under-performing antivirus even easier.

 

Customisable GUI Visibility allows you to customise how much of the GUI end-users can see, can be set to Full, Minimal, Manual or Silent.

 

Low System Demands fully protect your system or network with minimal system resources.

Complete protection and award winning security for company endpoints

© 1992 – 2017 ESET, spol. s r.o. – All rights reserved. Trademarks used therein are trademarks or registered trademarks of ESET, spol. s r.o. or ESET North America. All other names and brands are registered trademarks of their respective companies.