Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
ESET
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Technology == ESET has 13 [[Research and development|R&D]] centres globally and is an operator in the field of malicious code detection.<ref>{{Cite web |title=Technology Whitepaper |url=https://www.eset.com/fileadmin/ESET/US/docs/about/ESET-Technology-Whitepaper.pdf}}</ref> In 1995, ESET introduced [[heuristic analysis]]<ref>{{Cite web |title=Understanding Heuristics |url=https://www.welivesecurity.com/media_files/white-papers/Understanding_Heuristics.pdf}}</ref><ref>{{Cite web |title=Heuristic Analysis — Detecting Unknown Viruses |url=https://www.welivesecurity.com/wp-content/uploads/200x/white-papers/Heuristic_Analysis.pdf}}</ref> into its detection engine. ESET has been using [[machine learning]] in its products, starting with [[neural network]]s, since 1997. In 2005, ESET incorporated a machine learning-based technology called DNA Detections, which extracts selected features – called genes – from samples. These genes split samples into clean, malicious and potentially unwanted categories. In 2019, ESET released an Advanced Machine Learning detection layer that can analyze samples locally on endpoints even when offline.<ref>{{Cite web |title=ESET ADVANCED MACHINE LEARNING |url=https://www.welivesecurity.com/wp-content/uploads/2019/11/ESET_Advanced_Machine_Learning.pdf}}</ref> In 2011, ESET replaced ThreatSense.NET with ESET LiveGrid<sup>®</sup>,<ref name="help.eset.com">{{Cite web |title=ESET LiveGrid® {{!}} ESET Glossary {{!}} ESET Online Help |url=https://help.eset.com/glossary/en-US/technology_livegrid.html |access-date=2022-08-16 |website=help.eset.com}}</ref> a [[Cloud computing|cloud-based]] reputation system that evaluates unknown or suspicious samples submitted anonymously by millions of ESET-protected endpoints from around the world for machine learning analysis on servers in [[Bratislava]].<ref name="help.eset.com"/> ESET also uses additional security layers including [[Botnet]] Protection,<ref>{{Cite web |title=ESET LiveGrid® {{!}} ESET Glossary {{!}} ESET Online Help |url=https://help.eset.com/glossary/en-US/technology_livegrid.html?technology_botnet_protection.html |access-date=2022-08-16 |website=help.eset.com}}</ref> Network Attack Protection,<ref>{{Cite web |title=ESET LiveGrid® {{!}} ESET Glossary {{!}} ESET Online Help |url=https://help.eset.com/glossary/en-US/technology_livegrid.html?technology_network_attack_protection.html |access-date=2022-08-16 |website=help.eset.com}}</ref> [[Script (Unix)|Script]]-Based Attacks Protection,<ref name=":0">{{Cite web |title=ESET LiveGrid® {{!}} ESET Glossary {{!}} ESET Online Help |url=https://help.eset.com/glossary/en-US/technology_livegrid.html?technology_sbap.html |access-date=2022-08-16 |website=help.eset.com}}</ref> and [[Brute-force attack|Brute-Force]] Attack Protection.<ref name=":1">{{Cite web |date=2020-06-29 |title=Remote access at risk: Pandemic pulls more cyber‑crooks into the brute‑forcing game |url=https://www.welivesecurity.com/2020/06/29/remote-access-risk-pandemic-cybercrooks-bruteforcing-game/ |access-date=2022-08-16 |website=WeLiveSecurity |language=en-US}}</ref> In 2017, ESET became the first security company in the world to implement a [[Unified Extensible Firmware Interface|UEFI]] Scanner.<ref>{{Cite web |title=ESET LiveGrid® {{!}} ESET Glossary {{!}} ESET Online Help |url=https://help.eset.com/glossary/en-US/technology_livegrid.html?technology_uefi.html |access-date=2022-08-16 |website=help.eset.com}}</ref> UEFI is a firmware that is loaded into a computer's memory during the startup process. The scanner can identify threats while the computer is booting up, before standard detection modules start running.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)