Keep your important information safe & stay productive with peace of mind. NOD32 offers fast, comprehensive protection against a wide range of malware threats ? without the burden of a bloated internet security suite. So easy to use: simply set it up and forget it .
Running separate applications for viruses, hackers, adware, and spyware can slow your PC, be difficult to manage, and provide questionable protection. Beware of large, bloated internet security suites that consume hundreds of megabytes on your PC. These typically exist because vendors have acquired products and 'bundled' them together. In contrast, ESET NOD32 was designed from the core as a single, highly-optimized engine that works as a unified Anti-Threat system to protect against a broad spectrum of malware. Viruses, worms, spyware, and other malicious attacks, which are constantly evolving. ESET NOD32 utilizes patent-pending ThreatSense« Technology to detect tomorrow's threats in real-time, by analyzing code execution for malicious intent - keeping you ahead of the malware-writers.
Minimal Performance Impact
NOD32 conserves resources in memory and on disk, leaving more for your critical applications. The installer is just 11 MB and the application consumes an average 23 MB in memory (this fluctuates with changes to the detection technology). ThreatSense updates, which include heuristics logic and signatures, are usually between 20 kB and 50 kB. Switch to NOD32 and be more productive.
Great protection doesn't have to slow down your computer. Written largely in assembly language, NOD32 continually wins awards for the fastest performance of any antivirus application, on average 3 to 34 times faster than the competition (source: Virus Bulletin). Switch to NOD32 and upgrade your computer's performance.
Easy to Manage
Program and database updates are automatically performed behind the scenes. If you're an individual or home office user you can just 'install it and forget it.' Businesses and organizations with large distributed networks can use the powerful Remote Administrator to centrally deploy, install, monitor and manage thousands of NOD32 workstations and servers. Get the best protection with the smallest footprint and fastest performance. NOD32 offers multiple layers of protection for your organization, at the desktop, file server and mail gateway. Find out which solution is best for you.
Proactive Real-Time Detection
The best security is proactive. Malware protection must be real-time at the point of impact. Every minute one waits for a virus signature update creates a window of vulnerability that could have devastating consequences. ESET NOD32's ThreatSense« Technology closes the window of vulnerability left open by other reactive , signature-based responses. NOD32 analyzes application execution in real-time for malicious intent to detect and block over 90% of new malware threats proactively, without the need for signature updates in most cases. Most other vendors release signatures hours after their customers have been victimized and submitted samples.
Protection against threats from multiple input vectors is provided by the following modules:
Antivirus MONitor (AMON)
An on-access (memory-resident) scanner, which automatically scans files before they're accessed.
An on-demand scanner, which can be run manually on specific files or disk segments. It can also be scheduled to run during off-peak times.
Internet MONitor (IMON)
A memory-resident scanner that runs on the Winsock level to prevent infected files from reaching the computer's disks. Its scans internet web browsing traffic (HTTP) and incoming e-mail via the POP3 protocol.
E-mail MONitor (EMON)
An auxiliary module for scanning incoming/outgoing e-mails via the MAPI interface, such as Microsoft Outlook Microsoft Exchange.
Document MONitor (DMON)
Utilizes the proprietary Microsoft API for scanning Microsoft Office documents (including Internet Explorer).
ESET's NOD32 Key Features:
? ThreatSense? technology ? a single optimized anti-threat engine for analyzing code to identify malicious behavior,
such as viruses, spyware, adware, phishing and more
? Unprecedented heuristic analysis capable of discovering new malware threats as they emerge
? Powerful virtual PC emulation technology enables unpacking and decryption of all types of archives and run-time packing
? Able to clean active malware running in memory
? Protects at multiple infiltration points, including HTTP, POP3, SMTP and all local and removable media
? Removes infections from files that are locked for writing (e.g., loaded DLL file)
? Prevents infected files from being opened and executed, and warns on creation of infected files
? Automatic execution on system startup
? Supports multiple Terminal Server environments
? Supports scanning of mapped network disks