ESET® MICRO UPDATES SERVICE

Up-to-date security for operations with limited internet access

1bn+
users worldwide

400k+
business customers

195
countries & territories

13
global R&D centers

ESET Micro Updates

Our solutions are suitable for industries with limited internet access or with strict update policies. It is important to keep security updates, and detection engine up-to-date, while balancing the cost and availability of an internet connection.


Why a Micro Updates Service?

Industries with very limited internet access

shipping or transportation
public infrastructure
banking (POS terminals) etc.

Production plants running older hardware or operating systems

manufacturing
automotive
aviation

Organizations applying very strict update policies

military
pharmaceuticals

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

Benefit from the following features

Small update size

ESET Micro Updates are very small update files of 250 to 500 kilobytes per week. If for any reason you miss two consecutive updates, thus making a standard weekly update impossible, you can still download a differential update after 4 weeks (comprising around 1 to 2 megabytes). After that, you may resume downloading regular weekly updates as usual.

Distribution and update process

Once a week, ESET generates a special differential update, which contains all the essential changes from the previous week. The latest format is compatible with all Version 3 and later ESET products. The update process is then straightforward – simply unpack the contents of the archive to a mirror directory and update all client computers from that mirror.

Minimal system footprint

ESET software is well known for its small system footprint. This has two advantages: It allows you to use the full power of your hardware, even during scanning and updates; and it makes ESET software fully compatible with older machines.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Looking for more security options?

Security Management Remote management available as cloud‑based or on‑premises deployment.

Endpoint
Protection Advanced multilayered protection for computers, smartphones and virtual machines.

File Server
Security Real-time protection for your company’s data passing through all general servers.

Full Disk
Encryption Robust encryption solution for system disks, partitions or entire devices to achieve legal compliance.

Cloud Sandbox Proactive protection against zero-day threats that analyses suspicious samples in an isolated cloud sandbox environment.

Mail Security Blocks all spam and malware at server level, before they reach users’ mailboxes.

Cloud App Protection Advanced preventive protection for your Microsoft 365 cloud email and storage. With a dedicated console.

Endpoint Detection & Response Highly customizable EDR enables identification of anomalous behavior and further investigation with subsequent response capabilities to incidents and breaches.

*manageable only via on-premises ESET PROTECT console

Starting at
XX.xx €
per seat

Starting at
XX.xx €
per seat

Starting at
XX.xx €
per seat

RECOMMENDED


Price available on request

Starting at
XX.xx €
per seat

Related business solutions

Protection category

Security management

Real-time network security visibility, reporting and management on a single screen.

Learn more

Protection category

Endpoint protection

Award-winning multilayered technology combining machine learning, big data and human expertise.

Learn more

Protection category

File server security

Provides advanced protection to all general servers, network file storage, and multi-purpose servers.

Learn more

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Spray-and-pray tactics get an upgrade. MSPs face advanced phishing

Cybercriminals leverage AceCryptor and Rescoms (RAT) to upgrade spam phishing messages difficult to recognize by both humans and machines. To defend, MSPs automate protection.

How XDR and MDR help secure your tomorrow against ransomware

XDR and MDR are both excellent choices in the fight against ransomware and related threats, as they empower companies to be on the lookout for even the most insidious threats.

See more

We Live Security blog

Protecting yourself after a medical data breach – Week in security with Tony Anscombe

What are the risks and consequences of having your health data exposed and what are the steps to take if it happens to you?

The many faces of impersonation fraud: Spot an imposter before it’s too late

What are some of the most common giveaway signs that the person behind the screen or on the other end of the line isn’t who they claim to be?