2017 Technical Endpoint-ERA Comparison - ESET Vs Trend Micro

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

2017 ANTIVIRUS COMPARISON

ENDPOINT FEATURES

Trend Micro
FEATURES ESET Endpoint Security 6.4
Office Scan 11

Main Features
Malware Protection ● ●
Anti-phishing ● ●
Local Anti-Spam ● ○
Virtualization Support ● ◐
Firewall ● ●
Intrusion Prevention ● ●
Application Control ○ ◐
Device Control ● ●
Web Control ● ●
Intrusion Detection/Prevention ●

Additional Features
System Rescue Disk (Sys Rescue) ● ●
System Tools (Sys Inspector) ● ○
No Endpoint Restart Necessary ● ●

Malware Protection
Malware Protection ● ●
Anti-phishing ● ●
Idle state scanner ● ◐
Auto Removable Media Scanning ● ●
Scan Secure Connections HTTPS / SSL ● ●
First scan after installation (automatic) ● ○
Pre-installed policies ● ●
Self Protection ● ●

Scanning Options
Display notifications on infected computers on/off ● ●
Customizable notifications on infected computers ○ ○
Mobile devices (notebooks) scanning optimizations ● ●
Hide scanning progress on client endpoint ● ●
Auto-trusted files cache ● ●
Cloud-based file reputation system ● ●
Multiple options for handling infected files ● ●
Scan files by extension ● ●
Scan files by real type ● ●
Scan scheduler ● ●
Granular scheduled scan settings ● ●
Customizable level of scanning ● ●
Scan duration time limit ● ●
CPU/RAM limitations for scanning ○ ●
Separately configurable malware categories actions ● ●
Infected files backup / ability to restore files ● ●
PUA detection ● ●
Email Protection
E-mail communication protection ● ●
Insert warning message into email with infected file(s) ● ○
Send warning email to sender of infected email ● ○
Send warning email to administrator ● ●

Quarantine Options
Quarantine: repair file/clean virus from file ● ●
Customizable Quarantine folder ○ ●
Manual submission of quarantined files to cloud ● ○
Automatic submission of quarantined files to cloud ● ●
Windows Action Center integration ● ●
Specialized stand-alone cleaners ● ●

Virtualization Support
Virtualization Support ● ◐
Agentless solution (vShield) ● ○
Optimization for "revert to default state" ● ◐
Shared local cache ● ◐

Firewall
Firewall ● ●
EDITABLE granular blocking rules ● ●
ALLOW connections rules ● ●
BLOCK connection rules ● ●
ASK on connections rules ● ○
Specific application(s) blocking rules ● ●
Specific computer(s)/site(s) blocking rules ● ●
Specific types of communication blocking rules ● ●
Create log on event (triggered LOGs) ● ●
Create rules out of logs ● ●
Notification if the application is blocked ● ○
Port(s) scan detection ● ●
Denial of Service attack detection ○ ●
Port(s) scan detection / blocking ● ?

Intrusion Prevention
Intrusion Prevention ● ●
Network intrusion prevention ● ●
Browser intrusion prevention ● ●
Definable exceptions ● ●

Local Anti-Spam
Local Anti-Spam ● ○
Blacklist (custom) ● ○
Whitelist (custom) ● ○
Auto-learning engine ● ○
Whiteslist (custom) ● ○

Application Control
Application Control ○ ◐
EDITABLE granular handling rules ○ ○
Soft blocking rules ○ ○
Applications categories ○ ○
Processes whitelist ○ ○
Processes blacklist ○ ○
Registry keys protection ○ ?
Device Control
Device Control ● ●
Device whitelist ● ○
Device blacklist ● ○
Handling by device TYPE ● ●
Handling by device ID ● ○

Web Control
Web Control ● ●
Websites whitelist ● ●
Websites blacklist ● ●

Product / Signatures Updates


Configurable updates server ● ●
Local updates mirror server ● ●
Updates scheduler ● ●
Allow user (endpoint) to update manually ● ●
Update Rollback ● ●
Check Windows OS Updates ● ○

Graphical User Interface


Dashboard with security overview ● ●
Dashboard with endpoints status overview ● ●
Interactive dashboard ● ●
Dashboard views filter ● ●
Realtime monitoring ● ●
Policies overview for machines/groups ● ○
Licensing portal ● ○
License manager ● ●

Endpoints Deployment and Administration


Competitors solutions uninstaller ● ○
Manageable groups ● ●
Installation packages manager ● ○
Installation package OPTIONS editor (feature set) ● ○
Deployment wizard ● ●
Mail with link to package ◐ ●
Remote push ● ●
Individual package deployment (save package as exe/msi) ● ○
Active directory synchronization ● ●
LDAP synchronization ● ●
Resume failed downloads ● ?

Reporting
Scheduled reports ● ◐
Report by type ● ○
Pre-defined reports ● ●
Editable reports filters ● ●
Definable report time range ● ●
Editable friendly reports (file formats) ● ●
Send report by email ● ●
Installation and Basic Information
Web browser console ● ●
Application console ○ ○
Requires database to be pre-installed ○ ○
Installs database along with the product ● ●
Doesn't require the database ○ ○
SSL connection ● ●
Self-signed certificate ● ●

Platforms Supported
Windows ● ●
Linux ● ○
Mac ● ◐
Mobile (Android, iOS) ● ◐
Windows Server ○ ○

System Requirement
Minimum Processor Intel or AMD X86-X64 Intel or AMD X86-X64
Processor 1 Ghz Processor 1 Ghz
Available Hardisk Space 320 MB 350 MB
System Memory RAM
32 Bit Operating System 512 MB 1 GB
64 Bit Operating System 1 GB 1.5 GB

●- Feature included in product


○- Feature not included in product
◐- Feature partially included in the product
?- Feature can't be determined
2017 ANTIVIRUS COMPARISON
ERA FEATURES
Trend Micro Control
ERA Features ESET Administrator 6.4
Manager

Interface and Management


Dynamic Group Support ● ○
XML-based policies for easy editing/scripting ● ○
Windows Executable Management Console ● ○
Role Based Access Control ● ●
License Management ● ●
Web Based Reporting Console ● ●
Centralized management of quarantine ● ●
Parent-Child Policies ● ○
Scan, Update, Reporting Scheduling ● ●
Exportable/Importable Policies ● ●
Client Discovery and Rogue Machine Detection ● ●
Overview Dashboard ● ●
Scheduled Synchronization with AD ● ●
DB backup and maintenance tool ● ●
Managing multiple servers from one console ● ●
Webmin interfaces ● ○

Deployment Methods
Email Package for Installation ● ●
Push Installation ● ●
SCCM for AD Group Policy Installation ● ●
MSI for AD Group Policy Installation ● ●
Login-Script Installation ● ●
Local Installation ● ●

Reporting and Logs


Actionable Logs ● ○
Ad-hoc reporting and live updates by Widgets ● ○
SIEM Tools Integration ● ○
Web-Based Reporting ● ●
SNMP Traps ● ●
Live configurable dashboards ● ●
Generate statistical reports ● ●

Redundancy and Reliability


Granular HIPS black and whitelist ● ○
Ability to install in Windows Server Cluster ● ?
Advanced Port/Device Management ● ●
IPv6 Support ● ●
Virus Database Rollback ● ●
Server runs independently of DB ● ●
Automatic Failover ● ●
Databases
Oracle 9i ○ ○
MySQL ● ○
Microsoft SQL Server Express ● ○
Microsoft SQL Server ● ●

Platform supported
XP SP2 & SP3 ○ ○
Windows Vista, 7,8 ○ ○
Windows Server 2003, 2008, 2008 R2 ● ●
Linux ● ○
Mac ○ ○

System Requirement
Minimum Processor Intel Dual Core 2.0 Ghz Intel Core i5
Available Hardisk Space 20 GB 20 GB
System Memory RAM 2 GB 4 GB

●- Feature included in product


○- Feature not included in product
◐- Feature partially included in the product
?- Feature can't be determined

You might also like