Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      The AI agent race is on - and Google wants to win it - Sundar Pichai

      The AI agent race is on – and Google wants to win it

      22 April 2026
      Eskom developing bitcoin mining plan but needs Nersa's nod - Agnes Mlambo

      Eskom developing bitcoin mining plan but needs Nersa’s nod

      22 April 2026
      Eskom to decide fate of older coal stations by September - Dan Marokane

      Eskom to decide fate of older coal stations by September

      22 April 2026
      Capitec bets big on AI - and keeps hiring

      Capitec bets big on AI – and keeps hiring

      22 April 2026
      Capitec blows up MVNO pricing with free on-net calls - Graham Lee

      Capitec blows up MVNO pricing with free on-net calls

      22 April 2026
    • World
      More organic compounds detected on Mars - Nasa Curiosity rover

      More organic compounds detected on Mars

      21 April 2026
      Adobe bets on AI agents to fend off cheaper rivals

      Adobe bets on AI agents to fend off cheaper rivals

      16 April 2026
      Google poised to lose ad crown to Meta

      Google poised to lose ad crown to Meta

      14 April 2026
      Grand Theft Data - hackers hit Rockstar Games - Grand Theft Auto

      Grand Theft Data – hackers hit Rockstar Games

      14 April 2026
      UK PM Keir Starmer declares war on doomscrolling

      UK PM Keir Starmer declares war on doomscrolling

      13 April 2026
    • In-depth
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
    • TCS

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
      TCS | Donovan Marsh on AI and the future of filmmaking

      TCS | Donovan Marsh on AI and the future of filmmaking

      7 April 2026
      TCS+ | Vodacom Business moves to crack the SME tech gap - Andrew Fulton, Sannesh Beharie

      TCS+ | Vodacom Business moves to crack the SME tech gap

      7 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » A new business offering for a new business world

    A new business offering for a new business world

    By ESET25 February 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    As the coronavirus pandemic has changed the world around us, organisations have had to adapt to a new, remote way of working, and in response, many have shifted to focus on cloud-first strategies.

    To streamline this transition, ESET has launched ESET Protect, to assist businesses in gaining centralised visibility, management and insights across the security of their endpoints. The ESET Protect platform is available either in the cloud to accommodate businesses looking for affordable and easy deployment, or on-premises for increased control.

    Save, save, save

    As some businesses find their budgets increasingly squeezed in the face of renewed lockdown restrictions, optimising the use of your money is even more necessary. It may be tempting to leave security aside but moving to the cloud can provide the much-needed savings on cost.

    ESET Protect Cloud, for example, takes away the typical cost of server provisioning required for on-premises solutions. Instead, imagine getting rid of hardware – physical servers, backup servers, failover clusters – and not worrying about software updates – server software updates, software component updates, console updates – because that’s all handled by ESET.

    ESET Protect Cloud is the result of the shifting business needs we have seen, keeping our fingers on the pulse of the cybersecurity landscape, and improving our solutions

    Continue to imagine that your business doesn’t need a team of IT administrators to set up and maintain your servers, databases, software and other on-premises infrastructure. Applications that are known to have common vulnerabilities, and which require diligent patching, are no longer your problem.

    As a simple, cloud-based product, ESET Protect Cloud needs just one IT administrator sitting at the console to quickly deploy an entire suite of advanced security solutions that can protect your business from attack.

    Says Carey van Vlaanderen, CEO of ESET South Africa: “ESET Protect Cloud is the result of the shifting business needs we have seen, keeping our fingers on the pulse of the cybersecurity landscape, and improving our solutions. Many businesses have either had to embrace going online or have had to ramp up their online presence over the last year with their teams relying on online meetings to ensure it’s business as usual for their clients. That’s why now more than ever, cybersecurity needs to be a priority, and the ESET Protect Cloud offering really excites us.”

    Seamless, convenient, flexible

    Aside from financial benefits, ESET Protect offers a wealth of other benefits. With an easy and quick setup process, administrators can log into the console and start protecting machines in a matter of minutes. ESET Protect’s live installers and wide range of deployment methods enable organisations to install endpoint protection seamlessly across all devices in even the largest corporate network.

    Adjusting to each customer’s individual needs, the solution is scalable, allowing businesses to enlarge or reduce the coverage according to the size of their workforce, whether this is in-house or remote. Convenient, customisable reports allow IT administrators to communicate effectively and can be adapted to fit the dynamically changing needs of large or small organisations. All this is achieved without the need for specialised IT personnel, extensive training or additional hardware – and ESET specialists are on hand to provide additional support whenever necessary.

    Everything you need in the same place

    Not all businesses are the same, and ESET is offering a selection of business products that ensure businesses of all sizes are equipped with the right solutions.

    ESET business products

    ESET’s business products all include an endpoint management console – either cloud-based or on-premises – along with endpoint protection by default. ESET Protect Mail Plus covers the needs of organisations looking for an advanced mail security solution.

    Providing endpoint protection against ransomware and zero-day threats, alongside data protection via full disk encryption, the ESET Protect Advanced product is perfect for small and medium businesses, and managed service providers. The solution is designed to detect suspicious encryption-like activity commonly employed by ransomware and can run machine-learning analyses on high-performance machines in the cloud to more quickly discover novel malicious software aiming to evade detection by endpoint security products.

    For large organisations, the ESET Protect Enterprise option provides comprehensive visibility right down to the techniques commonly used by advanced persistent threat groups. This is because the product offers a highly sophisticated endpoint detection and response solution with rule-based detection, threat hunting and remediation capabilities. By purchasing ESET Protect Enterprise, enterprise customers get all the benefits of ESET Protect Advanced plus endpoint detection and response.

    Says Van Vlaanderen: “We are thrilled to offer solutions for businesses of all sizes that are implementing a ‘cloud-first’ strategy for their IT security. At ESET, we are passionate about safer technology for all, and that means that businesses of all shapes and sizes must be equipped with cutting-edge, tailored solutions to keep their employees and data safe and secure.”

    To learn more about ESET Protect Cloud, click here. For other security offerings from ESET, visit our website here.

    About ESET
    For more than 30 years, ESET has been developing industry-leading IT security software and services to protect businesses, critical infrastructure and consumers worldwide from increasingly sophisticated digital threats. From endpoint and mobile security to endpoint detection and response, as well as encryption and multifactor authentication, ESET’s high-performing, easy-to-use solutions unobtrusively protect and monitor 24/7, updating defences in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company that enables the safe use of technology. This is backed by ESET’s R&D centres worldwide, working in support of our shared future. For more information, visit www.eset.com or follow us on LinkedIn, Facebook and Twitter.

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Carey van Vlaanderen ESET ESET Protect
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleInterview: DG and HP on the rapidly shifting South African IT landscape
    Next Article Smart change management helps SMEs become more sustainable

    Related Posts

    TCS+ | From gen AI to deepfakes – the latest infosec threats - Adrian Stanford ESET

    TCS+ | From gen AI to deepfakes – the latest infosec threats

    1 October 2024
    TCS+ | ESET's Adrian Stanford: how AI will transform cybersecurity - Adrian Stanford

    TCS+ | ESET’s Adrian Stanford: how AI will transform cybersecurity

    10 June 2024
    AI's double-edged sword requires a human security approach - Adrian Stanford ESET Southern Africa

    AI’s double-edged sword requires a human security approach

    4 June 2024
    Company News
    How AnyDesk is redefining remote access for African enterprises

    How AnyDesk is redefining remote access for African enterprises

    22 April 2026
    Centracom's Pindrop takes the pain out of wholesale fibre

    Centracom’s Pindrop takes the pain out of wholesale fibre

    22 April 2026
    Conversational AI is rewriting the customer service playbook - CallMiner

    Conversational AI is rewriting the customer service playbook

    22 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    The AI agent race is on - and Google wants to win it - Sundar Pichai

    The AI agent race is on – and Google wants to win it

    22 April 2026
    Eskom developing bitcoin mining plan but needs Nersa's nod - Agnes Mlambo

    Eskom developing bitcoin mining plan but needs Nersa’s nod

    22 April 2026
    Eskom to decide fate of older coal stations by September - Dan Marokane

    Eskom to decide fate of older coal stations by September

    22 April 2026
    How AnyDesk is redefining remote access for African enterprises

    How AnyDesk is redefining remote access for African enterprises

    22 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}