Professional Documents
Culture Documents
2017 Technical Endpoint-ERA Comparison - ESET Vs Trend Micro
2017 Technical Endpoint-ERA Comparison - ESET Vs Trend Micro
2017 Technical Endpoint-ERA Comparison - ESET Vs Trend Micro
ENDPOINT FEATURES
Trend Micro
FEATURES ESET Endpoint Security 6.4
Office Scan 11
Main Features
Malware Protection ● ●
Anti-phishing ● ●
Local Anti-Spam ● ○
Virtualization Support ● ◐
Firewall ● ●
Intrusion Prevention ● ●
Application Control ○ ◐
Device Control ● ●
Web Control ● ●
Intrusion Detection/Prevention ●
Additional Features
System Rescue Disk (Sys Rescue) ● ●
System Tools (Sys Inspector) ● ○
No Endpoint Restart Necessary ● ●
Malware Protection
Malware Protection ● ●
Anti-phishing ● ●
Idle state scanner ● ◐
Auto Removable Media Scanning ● ●
Scan Secure Connections HTTPS / SSL ● ●
First scan after installation (automatic) ● ○
Pre-installed policies ● ●
Self Protection ● ●
Scanning Options
Display notifications on infected computers on/off ● ●
Customizable notifications on infected computers ○ ○
Mobile devices (notebooks) scanning optimizations ● ●
Hide scanning progress on client endpoint ● ●
Auto-trusted files cache ● ●
Cloud-based file reputation system ● ●
Multiple options for handling infected files ● ●
Scan files by extension ● ●
Scan files by real type ● ●
Scan scheduler ● ●
Granular scheduled scan settings ● ●
Customizable level of scanning ● ●
Scan duration time limit ● ●
CPU/RAM limitations for scanning ○ ●
Separately configurable malware categories actions ● ●
Infected files backup / ability to restore files ● ●
PUA detection ● ●
Email Protection
E-mail communication protection ● ●
Insert warning message into email with infected file(s) ● ○
Send warning email to sender of infected email ● ○
Send warning email to administrator ● ●
Quarantine Options
Quarantine: repair file/clean virus from file ● ●
Customizable Quarantine folder ○ ●
Manual submission of quarantined files to cloud ● ○
Automatic submission of quarantined files to cloud ● ●
Windows Action Center integration ● ●
Specialized stand-alone cleaners ● ●
Virtualization Support
Virtualization Support ● ◐
Agentless solution (vShield) ● ○
Optimization for "revert to default state" ● ◐
Shared local cache ● ◐
Firewall
Firewall ● ●
EDITABLE granular blocking rules ● ●
ALLOW connections rules ● ●
BLOCK connection rules ● ●
ASK on connections rules ● ○
Specific application(s) blocking rules ● ●
Specific computer(s)/site(s) blocking rules ● ●
Specific types of communication blocking rules ● ●
Create log on event (triggered LOGs) ● ●
Create rules out of logs ● ●
Notification if the application is blocked ● ○
Port(s) scan detection ● ●
Denial of Service attack detection ○ ●
Port(s) scan detection / blocking ● ?
Intrusion Prevention
Intrusion Prevention ● ●
Network intrusion prevention ● ●
Browser intrusion prevention ● ●
Definable exceptions ● ●
Local Anti-Spam
Local Anti-Spam ● ○
Blacklist (custom) ● ○
Whitelist (custom) ● ○
Auto-learning engine ● ○
Whiteslist (custom) ● ○
Application Control
Application Control ○ ◐
EDITABLE granular handling rules ○ ○
Soft blocking rules ○ ○
Applications categories ○ ○
Processes whitelist ○ ○
Processes blacklist ○ ○
Registry keys protection ○ ?
Device Control
Device Control ● ●
Device whitelist ● ○
Device blacklist ● ○
Handling by device TYPE ● ●
Handling by device ID ● ○
Web Control
Web Control ● ●
Websites whitelist ● ●
Websites blacklist ● ●
Reporting
Scheduled reports ● ◐
Report by type ● ○
Pre-defined reports ● ●
Editable reports filters ● ●
Definable report time range ● ●
Editable friendly reports (file formats) ● ●
Send report by email ● ●
Installation and Basic Information
Web browser console ● ●
Application console ○ ○
Requires database to be pre-installed ○ ○
Installs database along with the product ● ●
Doesn't require the database ○ ○
SSL connection ● ●
Self-signed certificate ● ●
Platforms Supported
Windows ● ●
Linux ● ○
Mac ● ◐
Mobile (Android, iOS) ● ◐
Windows Server ○ ○
System Requirement
Minimum Processor Intel or AMD X86-X64 Intel or AMD X86-X64
Processor 1 Ghz Processor 1 Ghz
Available Hardisk Space 320 MB 350 MB
System Memory RAM
32 Bit Operating System 512 MB 1 GB
64 Bit Operating System 1 GB 1.5 GB
Deployment Methods
Email Package for Installation ● ●
Push Installation ● ●
SCCM for AD Group Policy Installation ● ●
MSI for AD Group Policy Installation ● ●
Login-Script Installation ● ●
Local Installation ● ●
Platform supported
XP SP2 & SP3 ○ ○
Windows Vista, 7,8 ○ ○
Windows Server 2003, 2008, 2008 R2 ● ●
Linux ● ○
Mac ○ ○
System Requirement
Minimum Processor Intel Dual Core 2.0 Ghz Intel Core i5
Available Hardisk Space 20 GB 20 GB
System Memory RAM 2 GB 4 GB