Select Page

Cyber ​​Security Pro for ESET Macintosh and a new version of Cyber ​​Security are now being tested

ESET last week announced a beta version of its next-generation products, ESET Cyber ​​Security, and a brand new product in its portfolio, ESET Cyber ​​Security Pro.

Imagesetmac

Both enhancements provide complete protection against threats lurking on the Mac OS X platform, as well as attacks against Windows or Linux-based systems on mixed-type networks. More than a dozen new or enhanced features have been added to the two products, with the Pro product offering personal firewall service in addition to ESET Cyber ​​Security beta and parental controls. - we learned from Péter Béres, an expert of Sicontact Kft., Which distributes ESET products in Hungary. Béres added that the beta versions are currently available for free download from ESET so any Mac user can join the public test. 

Screenshot 1[+]

ESET's enhanced ThreatSense search engine, which has full-featured detection, not only protects devices from known malware, but also neutralizes emerging threats such as the Flashback Trojan, which the company has recently researched more than it infected five hundred thousand Macs. Protection is further enhanced by ESET's cloud-based recognition system, ESET Live Grid, a next-generation version of ThreatSense.Net.

More and more people are buying Macintosh products, the Mac platform is becoming more popular, the number of machines is increasing, and cyber criminals are quickly adapting to the new situation. Often, non-Mac users are the targets of the attack, but their systems can easily become "virus carriers" if they are not properly protected, and infections can later infiltrate other platforms. Says Mario Turner, Product Manager for ESET for Mac.

 

ESET Cyber ​​Security adds a new layer to Apple's protection interface, which has a built-in Internet security feature and can detect and prevent attacks against your computer. ESET Cyber ​​Security products focus on detecting as yet unknown viruses efficiently, while conserving resources and requiring little memory to operate. 

 

Source: ESET 

About the Author