Skip to content

Juggling security: How many passwords does the average person have in 2024?

For nearly four years, the magic number in every cybersecurity expert’s mind was 100 – the average number of passwords a person handles. During the pandemic and following a boost in hybrid work and digital communication, our usage of digital spaces has only expanded. It’s time to look at the newest numbers: How many passwords does the average person have in 2024?

A survey conducted by NordPass in 2024 revealed a rapid growth in password usage for personal purposes, with an increase of nearly 70% in just over three years. According to the latest data, the number is now 168. For the first time, the survey also recorded the average number of passwords used for business-related accounts: 87. Let’s take a closer look at the research and learn what this increased number of passwords means for our online safety.

The upward-pointing trend

NordPass has been tracking password usage statistics since 2020. The first survey was conducted in February of that year, just a month before the start of the COVID-19 pandemic. It was reported that an average user handled around 80 passwords at that time.

The follow-up survey was conducted in October of the same year. Eight months into the pandemic, the uptick in password handling was already evident. The average number of passwords handled by a person went up 25% to the number cited since – 100.

As stated by Tomas Smalakys, CTO at NordPass, COVID was perceived as the main cause at the time, as people were staying indoors and handling all processes – from shopping to medical appointments – online.

However, a lot has changed in four years, and the rapid increase in digital accounts we handle now goes beyond the life rhythm of lockdowns. According to Smalakys, “the amount of accounts that people hold gets higher every year. Multiple factors come into play – new services get launched, new shops are opened.”

As the scope of digital services increases, so does the number of accounts users handle. Naturally, the latest password statistics reflect this. It’s important to note that the numbers don’t just consider active or frequently used accounts. In fact, many accounts remain dormant as users forget about them and don’t delete them even if the accounts are no longer needed.

First insights into business password handling

For the first time, the 2024 NordPass password survey also researched work-related password usage. It was revealed that the average number of passwords per person in the workplace is 87.

While this is a new index for the NordPass survey, we can assume that the number of accounts required for work has seen a similar upward trend in recent years as remote and hybrid work opportunities have become increasingly popular.

Adding the number of personal and business passwords together brings the total to 255. Juggling that many passwords can be problematic in terms of both security and convenience.

Methodology: The new quantitative research by NordPass was conducted on March 4-15, 2024, and surveyed 1,509 NordPass users.

What happens when you have too many passwords to remember?

The problem with handling so many accounts on average is that they aren’t equally important to a person. In fact, many accounts are abandoned or forgotten after a handful of visits. This can pose a serious security risk, as users may overlook data breaches and not realize their accounts have been compromised.

Managing hundreds of accounts can be a tedious job that not all users are willing or able to do. The trend points toward people hoarding their online accounts and forgetting to review and close accounts they don’t use as frequently or no longer require. In many cases, breaches are overlooked, as the users simply forget they have accounts on breached platforms.

Another issue concerns the reuse of passwords. With nearly 200 accounts to manage, creating and then remembering a unique password for each one can seem impossible. This leads to people reusing the same or similar passwords for different accounts to simplify logging in. For example, they may reuse the same word or phrase, adding a single number, capital letter, or special symbol if required for security purposes.

This opens up multiple accounts to vulnerabilities. For example, if one account is breached, all accounts using the same password and owned by that user are at risk. Abandoned accounts on rarely visited platforms with weaker security measures can become the prime target for cybercriminals.

The threat increases if people reuse the same credentials for both personal and work accounts. A breach of a personal account could potentially affect the company’s security as well. According to the 2023 Data Breach Investigations Report, stolen credentials were among the top three main methods of accessing an organization, followed by phishing and vulnerability exploitation. Password mismanagement and vulnerabilities pose risks ranging from loss of access to financial damages or identity theft.

What can you do to handle passwords easier?

You might be thinking about how many accounts you currently have and how many may use insecure passwords. To make your credentials management less overwhelming, here are some best practices you can follow to reduce the number of passwords used in your daily life:

  • Deactivate unused accounts. Considering how many passwords the average person has, tracking down every unused account you’ve created may be difficult. However, if you know for certain that you no longer need an account, deactivate it to reduce your password load.

  • Set up a password manager. As you work to reduce the number of accounts you own, you will encounter many that remain necessary. NordPass helps individuals and businesses manage their passwords with ease and security in mind. Its built-in features support generating unique and secure passwords, simplifying logging in with autofill, and accessing all sensitive data on desktop and mobile devices as well as major browsers.

  • Regularly update your credentials. The longer you use a password, the higher the chances of it being breached. If you regularly change your passwords, you keep your accounts safer. Password Health lets you see which of your login credentials are weak, old, or reused.

  • Make sure all passwords are strong. We recommend passwords be at least 20 characters long and contain a combination of letters, numbers, and special symbols. A password generator helps quickly create passwords that meet this criteria. For more tips on creating strong passwords, visit our dedicated blog post.

  • Stay ahead of breaches. Use the Data Breach Scanner to get real-time alerts if your passwords, email addresses, or credit card details have appeared on the dark web.

  • Enable multi-factor authentication (MFA). Add an extra layer of protection to your accounts and ensure that even if your password is compromised, cybercriminals cannot access the affected account.

  • Switch to a passwordless solution where possible. Passkeys are a new, more secure way of logging in to your accounts. They use a combination of biometric verification with cryptographic keys, offering a safer and more convenient alternative to passwords. NordPass lets you easily store and manage passkeys on different devices.

Whether you have 18 or 168 passwords, NordPass makes password management simple and convenient. Your passwords, passkeys, credit card details, and other sensitive information are protected in the xChaCha20-encrypted vault, which only you can access.

NordPass offers a range of features tailored for personal and business use, including Email Masking, passkey support, secure item sharing, centralized policies for companies, and an Activity Log. You can try NordPass Free and Premium for your personal use or sign up for one of the Business plans based on your organization’s needs.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Understanding the difference between observability and monitoring

Knowing your network helps ensure availability, protect data, and fix technical issues. But what techniques should companies use to understand network performance? This blog will look at two popular solutions: observability and monitoring.

Observability and monitoring have similar goals. Both solutions capture network data and help diagnose problems. However, they use different techniques to achieve this goal. And while comprehensive observability platforms may suit some businesses, they will be too complex for others.

Read on to learn how observability and monitoring work, their strengths and weaknesses, and how to choose the best network analysis tools.

Key takeaways

  • Observability vs. monitoring: they are both network visibility solutions that capture network data and diagnose issues. Observability platforms offer comprehensive insights into the internal state of systems. Monitoring tools are less complex, using predefined metrics and thresholds to assess network health.

  • When to use each: Observability systems enable flexible, interactive analysis, and monitoring tools are more rigid and rely on predetermined metrics. Observability tools provide deep insights into network behavior, while monitoring offers less detailed feedback. However, monitoring delivers instant insights and alerts. Observability tools take a slower, more analytical approach.

  • The criteria for choosing observability and monitoring: companies must assess specific needs and budget constraints. Observability platforms offer in-depth insights into complex technical challenges. They are ideal for distributed systems. Monitoring solutions provide real-time updates and alerts to enhance security and meet compliance goals.

  • Telemetry and Application Monitoring (APM) are closely related visibility concepts. Telemetry uses distributed protocols to track network activity and performance. APM monitors specific applications, using dedicated dashboards, metrics, and logs to present alerts and reports.

What is monitoring?

Monitoring involves collecting and analyzing information to understand the progress of a project or performance within an IT environment. We use monitoring to assess whether projects are meeting core objectives. Monitoring tools inform the decisions of managers. They enable teams to stay on track and adapt to changing circumstances.

Monitoring uses metrics to capture information. These metrics are quantitative data measurements representing IT infrastructure or program performance. For example, monitoring metrics may include data collection about server request response rates. Metrics might also capture Central Processing Unit (CPU) and network load levels.

Components of monitoring systems usually include:

  • Storage: Logging metrics in inaccessible and standardized formats.

  • Aggregation: collecting data in relevant clusters or databases.

  • Visualization: presenting logging data in a usable form for analysis and decision-making.

  • Automation: scheduling automatic responses to monitoring outputs.

What is observability?

Observability is the ability to understand the internal state of systems to assess performance and make necessary changes. For example, cloud-native observability tools identify security vulnerabilities and track system performance in multi-cloud settings.

Observability is a design principle that informs IT deployments. An observable system enables monitoring and analysis. Engineers build networks with observation in mind, making it easier to maintain assets and make network changes.

At the same time, observability is an operational goal. Thanks to observability systems, managers can understand the context in which problems arise and take remedial action.

IT teams use observability tools to gain insights into the health of assets across an enterprise network. Algorithms derived from control theory enable tools to establish and understand relationships between data centers, on-premises assets, cloud deployments, and remote devices. Tools use “three pillars” to observe and report on system health:

  • Logs: text or numerical records of activity occurring within an IT system. Logs track what happened and when it happened. Logs may also cover contextual data such as user involvement.

  • Metrics: as discussed earlier, metrics are quantitative data points that track aspects of system performance.

  • Traces: records of requests made within a network environment. Traces capture network calls, microservices, and databases used by each request. This information helps diagnose choke points and other network flaws.

Key differences: observability vs. monitoring

Comparing observability vs monitoring is subtle. The two concepts are closely related but differ in critical ways.

The central difference between observability and monitoring involves how tools process information. Monitoring tools assess predetermined information. Users determine data sets in advance, narrowing their analytical frame.

By contrast, observability tools consider all information processed by IT infrastructure. They check every data flow and application to optimize security and performance. Observability tools look “inside” assets to identify the internal state of network assets.

Network observability vs Network Monitoring

Aside from that overarching distinction, differences between monitoring and observability include:

  • Flexibility: observability allows flexible and interactive interrogation of network performance. IT teams can apply multiple perspectives and tailor each analysis to find the root cause of network alerts. Monitoring is more rigid, relying on predefined metrics and visualization options to track system health.

  • Scope: observability platforms use high-level metrics, traces, and logs to generate system-wide insights. Monitoring uses aggregated data to deliver less detailed feedback about specific aspects of the IT environment.

  • Depth: an observability platform goes to the root of network problems. It works from the “inside out” to diagnose issues. Monitoring tools are more limited. They deliver alerts about IT infrastructure performance based on predetermined rules.

  • Speed: monitoring tools deliver insights in real time. They generate alerts regarding anomalies or security threats. Observability tools tend to take a slower, more analytical approach.

Similarities between observability and monitoring

There are many differences between monitoring and observability. However, it’s important to note some core similarities.

Observability and monitoring are they similar

In practice, the two network management concepts complement each other. IT teams require observability and monitoring capabilities to optimize performance. Similarities include:

  • Data analysis: both observability and monitoring solutions collect, organize, and analyze network data. They use a similar mix of logs, traces, and metrics. They also assess similar issues, including resource usage, error rates, and transaction response times.

  • Data visualization: monitoring and observability tools must make information accessible and intelligible to users. Software generally includes external outputs like dashboards to present data. Intuitive data visualization allows users to note trends and identify areas of concern.

  • Automated alerts: both concepts include an alert function. Automated analysis delivers alerts regarding security or performance issues. Alerts inform corrective actions and sharpen an organization’s security posture, highlighting issues before they lead to vulnerabilities.

  • Troubleshooting: observability and monitoring apply root cause analysis to fix network problems. Complex distributed systems rely on observation and real-time monitoring to identify flaws. Both tools feed into investigation processes. They also help meet regulatory standards for secure DevOps and network management.

Choosing between observability and monitoring

Companies often face a dilemma when designing network solutions. Both observability and monitoring tools have their place in network management. However, given the cost of sourcing specialist tools, choosing between the two technologies is usually necessary.

An observability platform suits organizations that need in-depth insights into the internal state of networks. They are ideal for dealing with complex technical challenges and ensuring optimal performance across distributed systems. Organizations can customize the use of metrics, traces, and logs – focusing their analysis where it matters most.

Case study

A major global company deploys an observability platform across multiple countries and hybrid cloud and on-premises environments. Distributed agents collect performance data about client databases, data security, and data flow efficiency. Data collection helps the company manage loads and ensure the visibility of every device. Technicians can diagnose bottlenecks and triage security weaknesses before data breaches occur.

Click to tweet

Monitoring solutions suit organizations that need real-time updates and instant alerts. Monitoring systems deliver a more superficial analysis. However, they make up for this by leveraging predefined metrics to flag potential security or performance problems before they become critical.

Case study

A small healthcare provider must understand and protect its network assets to comply with HIPAA regulations. The company uses a network monitoring system to track device availability and the status of protected health data. The company creates simple metrics such as tracking baselines and automating monitoring to reduce its IT workload.

Click to tweet

Observability and monitoring compared to APM and telemetry

Let’s add another dimension to the discussion by bringing in Application Performance Monitoring (APM) and telemetry. Both APM and telemetry are alternatives to standard observability tools. While they can appear similar at first glance, there are some differences to consider before choosing the right option for your network.

Observability vs. APM

APM is a specific subset of observability tools that focuses on application performance. APM tools apply metrics to network applications. Examples could include response and error rates. They also assess transaction traces to track user activity, boosting overall network security.

Observability tools take a holistic perspective across all network asset classes. APM may be part of an observability solution, but these systems typically have deeper functionality than APM alone.

Another way of looking at this is scope. Observability seeks to analyze and understand connections at a network or enterprise level. APM adopts a more modest approach, focused on how single apps interact with users and other network assets.

APM has some advantages over comprehensive observability solutions. For instance, tailored APM solutions serve CRM or accounting apps. They may also feature simplified dashboards, making life easier for inexperienced IT teams.

APM is app-specific, making it a cost-effective alternative to in-depth observability platforms. Organizations need to assess whether that is a worthwhile trade-off.

Monitoring vs. APM

APM is also a subset of network monitoring. In this case, APM tools monitor end-to-end data flows within specific applications, generally to enhance DevOps performance.

APM is used to detect flaws within applications and deliver proactive alerts when things go wrong. This could be very useful in financial environments or cloud-native customer relationship management tools. However, companies often need broader monitoring systems that track network-wide performance.

Observability vs. telemetry

Telemetry deploys automated protocols like NetFlow or sFlow to collect network and device performance data. IT teams can use telemetry protocols to execute distributed tracing and monitor dynamic cloud settings. Data collection occurs across the network, delivering real-time data flows to central dashboards.

Put like this, telemetry probably sounds similar to observability, and it is. Both telemetry and observability tools enhance the visibility of data flows and network behavior. However, they offer differing analytical depths.

Observability tools allow IT professionals to carry out deep dives into network performance. DevOps teams can use observability tools to diagnose bugs rapidly and fix flaws. Telemetry on its own is less powerful. Telemetry tools deliver granular information about network activity. However, they do not have the same level of detail and flexibility.

Monitoring vs. telemetry

Telemetry monitors network systems, including local and cloud-based assets. It generates real-time information flows that can feed into alerts and automated fixes if desired.

These functions are very similar to the network monitoring tools we’ve already discussed. However, standard monitoring systems are usually less powerful than advanced telemetry.

Standard monitoring systems rely on predefined rules and data metrics, allowing relatively little user flexibility. Some monitoring solutions operate pre-set thresholds or device polling. This degrades their accuracy. By contrast, telemetry operates constantly, measuring data flows without interruption.

Observe and monitor your network with NordLayer’s help

Monitoring and observability tools empower organizations by collecting, aggregating, and analyzing information.

Network diagnostics rely on this knowledge to isolate flaws and identify the correct solution. And when knowledge is lacking, bad things happen. Without data collection systems, technicians handle every alert or outage on a case-by-case basis. That’s hardly a recipe for efficiency or security.

Companies should take action to ensure network visibility and implement data collection solutions. NordLayer is ideally placed to help you achieve these goals.

NordLayer’s solutions monitor network activity so you can take dynamic action before threats materialize or systems go down. Our visibility solutions enhance operational efficiency and help you protect data—two of the most pressing challenges for today’s digital businesses.

Contact our team today and explore your network monitoring options. Understand every aspect of network activity, from suspect user connections to device posture management. And give your team the knowledge needed to respond when emergencies arise.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Imagine vacationing without a smartphone — cybercriminals can’t

With all of the fake websites and apps out there, critical cybersecurity for travelers begins at home before the trip even starts.

In the past, when travelers prepared for a long trip, they worried about getting lost, so they packed, among other things, a map, a compass, a radio, a dictionary, and a flashlight. Now it´s all more compact — all integrated into a smartphone. Thus, it is no surprise that many of us can’t imagine a trip without this little assistant.

But, just as travelers in history needed to be wary of pirates and highwaymen, so modern tourists preparing for the upcoming summer must also protect themselves from criminals operating in cyberspace.

The stakes can be quite high. Threat actors can not only abuse smartphones to steal identities or money from their owners but also make an entrance into their employers’ business systems. Let’s be honest: how many of us use personal smartphones for work or vice versa? They say don’t mix business with pleasure, but nowadays it is hard to avoid.

Cybersecurity begins at home

As of April 2024, AV-TEST, the Independent IT-Security Institute, has shown that smartphones have faced nearly 35 million instances of Android malware. The increasing greed shown by cybercriminals is also displayed in the latest ESET H2 2023 Threat Report noticing a rise of Android threats by 22%.

As cybercriminals become more creative, mobile device safety needs to be far more sophisticated than just keeping the device close and not accessing free Wi-Fi at coffee shops.

As this ESET research blog shows, the dangers begin as soon as an eager traveler begins checking visitor/tourist recommendations about a destination.

Threat actors can abuse legitimate festival, traveling, or accommodation websites to steal victims’ personal data, and money, and deliver malware or create impersonation websites to do the same. Another threat can come from abused apps such as fake translation apps or trojanized legitimate chat apps.

Moreover, some of those attacks do not truly take aim at smartphone users, but rather seek to abuse compromised mobile devices to access employers’ internal systems via hijacked corporate accounts, for example.

Staying safe

If you want to learn more about travel scams, check out this blog. Here are a few tips on how to protect yourself:

  • If possible, do not take corporate devices on vacation, and do not use your personal devices for work.
  • Update your software and back up your device data regularly.
  • Set up anti-theft tools to help you find a lost or stolen device.
  • Stop auto-connecting and think twice before connecting to any public wireless hotspot.
  • If forced to connect to a public wireless hotspot, use a VPN. Think twice before conducting sensitive operations such as online banking or online shopping.
  • Be cautious when downloading apps, especially from websites and third-party app stores.
  • Always check a developer’s background and app reviews before downloading a new app.
  • If the new app starts to behave strangely, delete it immediately.
  • Only buy tickets from an event organizer or an official and trusted third-party vendor.

Reliable cybersecurity

The last but arguably most important tip is to download reputable mobile security software emphasizing prevention. Without us going into much technical detail, be aware that there are sophisticated cybercampaigns that cannot be spotted by the human eye or caught by basic antivirus software.

This means that mobile users should have a reliable cybersecurity solution installed to protect them from these advanced threats, ideally before they execute. 

ESET Mobile Security takes a proactive approach and can detect and block threats during the download process, even before installation occurs. This means that the threat never reaches the user. EMS scans all files in download folders and can also be used to scan already existing apps to double-check that you haven’t let in the devil in disguise.

ESET Mobile Security Premium also comes with handy tools such as Anti-Phishing, Anti-Theft, Payment Protection, and App Lock. These protect travelers’ data in case they mistakenly visit a known phishing website, their mobile devices are stolen, or when someone wants to intercept their communications with a bank or an online shop.   

Enjoy your trip without looking over your shoulder

None of this should discourage you from enjoying your trip. Quite the opposite, having a vacation should be a relaxing experience!

With the right cybersecurity solution (and a bit of awareness), you can have a great time without constantly looking over your shoulder in cyberspace knowing that your device is safe and your digital progress is protected. Have a great summer!

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET to enhance its MDR offering portfolio: Also bringing additional updates to its existing business offering

ESET enhances its ESET MDR offering portfolio with the introduction of two new subscription tiers, ESET PROTECT MDR and ESET PROTECT MDR Ultimate.
Both subscription tiers of the newly updated ESET business offering are built on top of ESET PROTECT Elite, representing a comprehensive security package.
Additionally, ESET Mobile Threat Defense will be added as a stand-alone module to extend cybersecurity protection to business mobile devices, increasing attack vector coverage to an organization’s entire mobile fleet.
Some further updates for ESET Server Security and ESET LiveGuard Advanced round out the new business offering.

BRATISLAVA, Slovakia — April 29, 2024 — ESET, a global leader in cybersecurity solutions, is proud to announce today the launch of two new Managed Detection and Response (MDR) subscription tiers: ESET PROTECT MDR for small and medium businesses (SMBs) and ESET PROTECT MDR Ultimate for enterprises. These tiers are built on the foundation of the ESET PROTECT Elite subscription tier, offering businesses of all sizes the most comprehensive, AI-powered threat detection and response capabilities, in combination with expert human analysis and comprehensive threat intelligence.

ESET’s updated MDR business offering is designed to cater to the specific needs of both SMBs and Enterprises. To that end, ESET PROTECT MDR delivers a comprehensive cybersecurity package, offering 24/7/365 superior protection that addresses the most common challenges of small and medium-sized businesses. This includes modern protection for endpoints, email, and cloud applications, vulnerability detection and patching, and managed threat monitoring, hunting, and response. It addresses the cybersecurity talent shortages and ensures compliance with cyber insurance and regulations, offering a remarkable 20-minute average time to detect and respond, a comprehensive MDR dedicated dashboard and regular reporting for complete peace of mind.

For enterprises, ESET PROTECT MDR Ultimate offers continuous proactive protection and enhanced visibility, coupled with customized threat hunting and remote digital forensic incident response assistance. This comprehensive service is designed to support overstretched SOC teams, providing them with 24/7 access to world-class cybersecurity expertise. It ensures enterprises stay one step ahead of all known and emerging threats, effectively closing the cybersecurity skills gap, and facilitating expert consultations for incident management and containment in a fully managed experience.

ESET also sets itself apart with its own telemetry and unique global coverage, leveraging its detections and ESET Research to gather unique data about attacks, a competitive edge not offered by many players in the market.

“With the update of our business offering, we want to make ESET products accessible to customers without the necessary skill set or resources to operate them, but to also empower organizations to navigate the digital landscape confidently, safeguarded by our expertise and continuous, comprehensive coverage,” stated Michal Jankech, Vice President of SMB and MSP segment at ESET.

Additional updates to the ESET business portfolio

Additionally, all ESET PROTECT subscription tiers starting from ESET PROTECT Advanced are enhanced with the new stand-alone module ESET Mobile Threat Defense (EMTD). It extends attack vector coverage to an organization’s entire mobile fleet, seamlessly integrating into the ESET PROTECT Platform for efficient management, ensuring comprehensive protection for mobile devices. EMTD also includes a Mobile Device Management (MDM) functionality, with added support for Microsoft Entra ID.

Moreover, ESET Server Security introduces a firewall specifically designed for Windows servers, and Vulnerability & Patch Management, offering manual patch management and a 60-second delay of application process kill.

Finally, ESET LiveGuard Advanced now also offers advanced behavioral reports for our detection and response customers, providing an in-depth look into how our cloud sandboxing technology analyzes suspicious files, offering better visibility and context for security operators like cybersecurity and threat analysts, security engineers, or threat responders.

“This significant launch underscores ESET’s unwavering dedication to delivering superior protection and services, effectively responding to the dynamic challenges faced by customers to stay one step ahead of threats,” added Michal Jankech, Vice President of SMB and MSP segment at ESET.

For more detailed information about ESET and its updated portfolio, please visit the dedicated offering pages for SMBs and Enterprises.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×