You must be signed in to the ConnectWise University.
After signing in, we'll redirect you back here.

Sign In to Connectwise University

You must be signed in to the ConnectWise University to continue purchase.
After signing in, we'll redirect you back here.

Sign In to Connectwise University

Product Overview

This is Available to Purchase Through ConnectWise. Contact Your Account Manager for More Details.

Equipped with proactive malware defense and engineered to be light on your systems, endpoint security gives MSPs top-notch protection with fewer interruptions and false positives.

About ESET Endpoint Solutions

For over 25 years, ESET has developed solutions that deliver instant, comprehensive protection against evolving cybersecurity threats while consistently achieving the highest accolades in all types of comparative testing. With endpoint protection that is trusted by millions of users, ESET's security solutions are among the most recommended in the world. ESET Endpoint Solutions detect and disable viruses, Trojans, worms, adware, spyware, phishing, rootkits and other Internet threats so that you can focus on running your IT services business, not your security solution. 

Multi-layered, award-winning threat protection including:

  • Antimalware protection – Eliminates all types of threats, including viruses, rootkits, worms and spyware.
  • Anti-phishing – Guards against attempts to acquire passwords, banking data and other info by fake websites posing as legitimate ones.
  • Exploit blocker – protects commonly exploited systems such as web browsers, PDF headers, Java, email clients or MS Office components
  • Data Access Control – Blocks unauthorized devices (CDs/DVDs and USBs) from your system.  Enables Web filtering by over 140 categories or custom rules; applies policies for allowing removable media to access the system to reduce malware risk and data leakage.
  • Antispam – Filters out spam and scans all incoming emails from malware.  Native support for Microsoft Outlook (POP3, IMAP, MAPI)
  • Host Intrusion Prevention Systems (HIPS) – Monitors entry points into the system and specific system activities and blocks suspected intrusion attempts.
  • Advanced memory scanner – Improved detection of APTs (Advanced Persistent Threats) which use multiple layers of encryption to conceal their activity.
  • Built-in diagnostic and recover tools – Provides deep diagnostic snapshots of key system attributes, from processes to registry keys.  Enables your business to utilize bootable system recovery media in the event of system crash.


ConnectWise Manage ConnectWise Manage
ConnectWise Automate ConnectWise Automate


Only registered users can view documentation.
After signing in, we'll redirect you back here.

Login to Connectwise University


If you have purchased licenses for this product through ConnectWise. We do provide Third Party Support assistance. If you have any application issues, please email


User Reviews

There are currently no reviews.

Share your thoughts with other Partners

Only registered users can write reviews.
After signing in, we'll redirect you back here.

Sign In to Connectwise University