ESET ANTI-MALWARE SDK

Protect your organisationand add value to corporate solutions

1bn+
internet users protected
320k+
business customers
130
countries & territories
1
global R&D centers

ESET Anti-Malware SDK

Available for both Windows and Linux platforms, ESET Anti-Malware SDK provides multilayered, cross-platform protection for a wide range of applications and integration scenarios. Provides:

Checkmark icon

Multiple licencing
options

Checkmark icon

Cross-platform 
protection

Checkmark icon

Scalability

Checkmark icon

Comprehensive
SDK Kit


Cross-platform threat detection

While the SDK supports Windows and Linux, the scanning engine also blocks mobile malware (Android, iOS) and threats targeting macOS, providing for a fully fledged cross-platform protection.

Anti-malware SDK scheme

Add anti-malware capabilities

Whether intended for your organisations’ internal use or for your customers, the SDK easily integrates ESET's scanning engine to fend off all types of threats, including ransomware and zero-day malware.

Complete control

You have full control over the implementation process and which functionality you decide to use. The solution offers a wide range of options, supported with extensive documentation and ESET engineers ready to assist you in case you need help.

Use cases

PROBLEM

How to add value to products and services your organisation provides?

Your organisation is competing in a tough market and needs to enhance its products, services and solutions.

SOLUTION

  • Build products with excellent protection within.

Offer products with excellent-quality in-built protection. To gain a head start on your rivals, enhance your products, services and solutions with ESET anti-malware. Depending on the type of product or service your organisation provides, choose the ESET Anti-Malware SDK functionality that suits best and offers most value to your customers.

Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

Greenpeace logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon MJ Group logo

protected by ESET since 2016
more than 14,000 endpoints

T-Com logo

ISP security partner since 2008
2 million customer base

The ESET difference

DNA detections

Detection types range from very specific hashes to ESET DNA Detections, which are complex definitions of malicious behaviour and malware characteristics.

While the malicious code can be easily modified or obfuscated by attackers, the behaviour of objects cannot be changed so easily and ESET DNA Detections are designed to take advantage of this principle.

In-product sandbox

Today’s malware is often heavily obfuscated and tries to evade detection as much as possible. To see through this and identify the real behaviour hidden underneath the surface, we use in-product sandboxing.

With the help of this technology, ESET solutions emulate different components of computer hardware and software to execute a suspicious sample in an isolated virtualised environment.

Scans files and blocks of data

Analyses hundreds of different file formats (executables, installers, scripts, archives, documents and bytecodes, as well as blocks of data) in order to accurately detect embedded malicious components.

URL and IP address scanning

ESET Anti-Malware SDK also provides URL and IP address scanning to identify and block phishing sites and addresses containing dangerous payload.

Explore our customised solutions

Please leave us your contact details so we can design a personalised offer to fit your requirements.
No commitment.

Stay on top of cybersecurity news

Brought to you by awarded and recognised security researchers from ESET's 13 global R&D centers.

Corporate blog

What are the impacts of cyberattacks on smaller businesses?

Is your business at risk from cybersecurity threats? Learn how you can protect your small business without breaking the bank.

Do you need to sacrifice privacy for security?

It is a commonly held belief of many people that using software that watches what happens on their devices means giving up their privacy. However, even though privacy and security are intertwined,...

See more

We Live Security blog

Child identity theft: how do I keep my kids’ personal data safe?

Why is kids’ personal information in high demand, how do criminals steal it, and what can parents do to help prevent child identity theft?

The post Child identity theft: how do I keep my kids’...

Protect yourself from ticketing scams ahead of the Premier League Summer Series USA Tour

There is a significant secondary marketplace where tickets can sell for several times their original value, opening the opportunity for scammers and fraud

The post Protect yourself from ticketing...