Skip to content

ESET launches Cloud Workload Protection and AI enhancements for ESET PROTECT customers

  • ESET to protect cloud virtual machines (VMs) from advanced threats with its new ESET Cloud Workload Protection module.
  • While competitors often offer cloud workload protection as a stand-alone offering, ESET includes it at no additional cost for ESET PROTECT customers.
  • Other updates include advanced AI reporting for ESET’s cloud sandboxing technology with autonomous remediation, improved investigations, and expanded integration for AI Advisor into the ESET PROTECT console.

SAN FRANCISCOMarch 23, 2026 — ESET, a global leader in cybersecurity, today launched ESET Cloud Workload Protection as part of a comprehensive update for its ESET PROTECT Platform. Announced at RSAC 2026, this new module helps customers to move beyond endpoints and servers to cover cloud workloads, significantly enriching telemetry for detection and response while consolidating security management across endpoint and cloud environments inside a single pane of glass.

“Many businesses, especially those in the midmarket, as well as MSPs, have been steadily adopting cloud features such as virtual machines to enhance their productivity,” said Michal Jankech, Vice President, Enterprise & SMB/MSP at ESET. “About 80% of organizations regard the public cloud as crucial for their digital business initiatives. With ESET Cloud Workload Protection, we have reduced the attack surface for customers by extending our protection to virtual machines running in AWS, Azure, and GCP environments.”

ESET’s Cloud Workload Protection module protects virtual machines in public cloud environments, ingesting cloud VM data into the ESET PROTECT XDR Platform to gain extended visibility. While competitors often offer cloud workload protection as a stand-alone offering, ESET includes it at no additional cost for ESET PROTECT customers (except ESET PROTECT Entry).

With the average cost of a public cloud data breach amounting to a striking $5.17 million per incident—the highest among all environments, this new module cuts complexity with AI-driven automation and gives customers a richer set of tools to respond to threats at every stage of an attack. Known for being lightweight, the module helps IT managers to validate their controls and generate audit evidence for regulatory frameworks such as NIST, CIS, HIPAA, PCI DSS, and others.

Additional improvements to ESET PROTECT include:

  • New AI reporting in ESET LiveGuard Advanced, which makes the lives of security specialists easier—providing behavioral reports that detail the actions and characteristics of incidents analyzed by ESET’s cloud sandbox, and autonomous remediation. For those with XDR-enabled subscriptions, these reports are enhanced with AI-generated summaries that simplify complex findings.
  • Improved Incident Graphs and Advanced Investigations for EDR and XDR customers that provides a clear visual representation of each incident—enabling security teams to quickly understand the attack, identify the initial entry point, and track its progression over time. Incidents now include richer contextual insights, such as identity-related information, along with overall quality improvements that support faster, more effective investigation and response. Advanced Search features enable fast and flexible investigation across security indicators and related events from multiple security perimeters.
  • ESET AI Advisor has been added to the ESET PROTECT console to improve usability and to simplify access to this assistant, previously included only in a dedicated ESET Inspect Incidents section.

Launched ahead of RSAC 2026, visitors to this global cybersecurity tradeshow can visit booth N-5253 to receive a demo of ESET PROTECT and talk to ESET’s threat experts. Details on ESET’s presentation schedule, meeting requests, and booth activities can be found here.

For more information about ESET PROTECT, visit ESET’s website. To find out how these products fared in independent testing, visit MITRE and AV-Comparatives.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

策略性終端安全管理指南

執行摘要: 「辦公室」現在無處不在。現代終端管理將安全重心從物理邊界轉移到個人設備,透過集中化可見性與自動化防禦確保企業安全。
 

什麼是終端安全管理?

這是一個統一的過程,旨在識別、驗證與防禦連接到網路的每個資產。從公司配發的筆電到 BYOD 智慧型手機與 IoT 感測器,這種集中化方法確保無論使用者身在何處,都能執行一致的安全政策。

終端 (Endpoints)

工作發生且風險進入的實體資產(筆電、手機)。

終端安全 (Security)

在設備上運行的主動防禦層(EDR、惡意軟體偵測)。

終端管理 (Management)

部署修補程式、執行一致性標準的行政引擎。

 

核心功能

功能營運價值
統一可見性維護即時清冊,消除資產監控盲點。
自動化修補無需使用者介入即可在全機群封閉安全漏洞。
狀態檢查 (Posture)在登入瞬間驗證設備健康狀況(加密、系統版本)。
即時遙測分析識別異常行為,在威脅擴大前予以制止。

 

整合的價值

透過將 NordLayer(網路存取)與 CrowdStrike(終端保護)連結,您的網路將具備「設備感知」能力。如果偵測到筆電存在威脅,系統可以在幾秒鐘內自動切斷該使用者與公司閘道的連線。

戰略提示: 不要讓安全之路變得困難重重。利用 SSO 與靜默健康檢查,確保安全性不會拖累員工的生產力。

關於 NordLayer
NordLayer 是現代企業的自適應性網絡存取安全解決方案,來自世界上其中一個最值得信賴的網絡安全品牌 Nord Security。致力於幫助 CEO、CIO 和 IT 管理員輕鬆應對網絡擴展和安全挑戰。NordLayer 與零信任網絡存取(ZTNA)和安全服務邊緣(SSE)原則保持一致,是一個無需硬件的解決方案,保護公司企業免受現代網絡威脅。通過 NordLayer,各種規模的公司企業都可以在不需要深入專業技術知識的情況下保護他們的團隊和網絡,它易於部署、管理和擴展。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Research: The EDR Killer Ecosystem 2026

ESET Research has unveiled a massive shift in ransomware tactics. Attackers are increasingly using EDR Killers—specialized tools designed to blind security software—as a prerequisite for successful data encryption.

Strategic Division of Labor Affiliates pick the tools, while operators provide the encryptors. More affiliates mean more diverse and unpredictable attack methods.
The AI Influence Recent codebases, specifically from the Warlock gang, show markers of AI-assisted generation, including “trial-and-error” logic.
Driverless Neutralization BYOVD is common, but attackers now abuse legitimate anti-rootkit utilities and admin commands to suspend protection without touching the kernel.
 

The Defensive Reality

Protecting against modern ransomware requires a mindset shift. Unlike automated threats, ransomware is a human-driven operation. When a tool fails or a driver is blocked, the attacker is there in real-time to pivot to a new method.

“While preventing vulnerable drivers from loading is a crucial step, it is not a silver bullet. Defenders must aim to disrupt EDR killers before they establish a kernel-level foothold.”

For the full technical analysis, visit WeLiveSecurity.com and search for the 2026 EDR Killer Ecosystem report.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×