{"id":5907,"date":"2020-02-10T13:07:00","date_gmt":"2020-02-10T05:07:00","guid":{"rendered":"https:\/\/version-2.com\/?p=5907"},"modified":"2020-11-04T13:23:12","modified_gmt":"2020-11-04T05:23:12","slug":"eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/","title":{"rendered":"ESET Named a Strong Performer in Endpoint Security Suites 2019 Report by Independent Research Firm"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"5907\" class=\"elementor elementor-5907\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-75bf4890 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"75bf4890\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;e11495f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3704f7cd\" data-id=\"3704f7cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c35e136 elementor-widget elementor-widget-text-editor\" data-id=\"c35e136\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><b>BRATISLAVA, February 7, 2020<\/b>, ESET \u2013 a global leader in information security software \u2013 has been recognized as a \u201cstrong performer\u201d in&nbsp;<a href=\"https:\/\/reprints.forrester.com\/#\/assets\/2\/1419\/RES146636\/reports\" target=\"_blank\" rel=\"noreferrer noopener\">The Forrester Wave\u2122: Endpoint Security Suites Q3 2019 report<\/a>. The prestigious report assessed the top 15 security suites in the market, including their ability to prevent, detect, and remediate endpoint threats, with ESET emerging as a strong performer.<br><br>In reviewing the overall market, the report stated that \u201cendpoint security suite buyers prioritize automatic threat protection.\u201d The report highlights that endpoint security suites are now increasingly \u201ctasked with protecting against targeted-style threats\u201d and that therefore, customers should look for providers that \u201ctightly integrate threat prevention, detection, and response,\u201d \u201cextend visibility and control over a broad endpoint ecosystem,\u201d and \u201coffer flexibility in a variety of environments and risk tolerances.\u201d<br><br>The report recognized ESET\u2019s full portfolio of enterprise offerings since ESET has widened our focus to cater to increased enterprise market demands. ESET received the highest score possible in the corporate vision and focus criterion and was noted for developing several capabilities aimed at enterprise buyers, such as Endpoint Detection and Response (EDR), managed detection and response, threat intelligence services, and vulnerability management. ESET also had the highest score possible in the OS support criterion, which is defined as having broad operating systems support relative to others in the evaluation.&nbsp;<br><br>To assess the state of the endpoint security suites market and see how the vendors stack up against each other, Forrester evaluated the strengths and weaknesses of the top vendors. After examining past research, user need assessments, and vendor and expert interviews, Forrester developed a comprehensive set of 25 criteria, which they group into three categories:<br><br>\u2022&nbsp;&nbsp; &nbsp;<b>Current offering<\/b>. Each vendor\u2019s position on the vertical axis of the Forrester Wave\u2122 graphic indicates the strength of its current offering. Key criteria for this evaluation include malware and exploit prevention, behavioral detection, and product performance, which Forrester validated using customer feedback and demos\/briefings.<br><br>\u2022&nbsp;&nbsp; &nbsp;<b>Strategy<\/b>. Placement on the horizontal axis indicates the strength of the vendors\u2019 strategies. Here, Forrester evaluated corporate vision and focus, security community, and product road map.<br><br>\u2022&nbsp;&nbsp; &nbsp;<b>Market presence<\/b>. Represented by the size of the markers on the graphic, Forrester\u2019s market presence scores reflect each vendor\u2019s enterprise customer base and licensing partner ecosystem.<br><br>The Forrester Wave\u2122 report details that security professionals want an endpoint security suite that can protect the increasing number of devices brought into the workplace and handle the increasing complexity of the security landscape. For vendors, improved behavioral protection combined with risk-based security policies will lead the way in cybersecurity solutions. We believe this is reflected in ESET\u2019s success in receiving the highest score possible in the security community involvement, OS support, and corporate vision and focus criteria.<br><br>The report states in ESET\u2019s profile that \u201cESET is perfect for buyers who value a simple, straightforward UI with more advanced functions easily invoked when required,\u201d with ESET customers continually rating the company exceptionally well for its low impact to user experience.<br><br>Juraj Malcho, ESET\u2019s chief technology officer, commented, \u201cWe believe the recognition of ESET as a strong performer in Forrester\u2019s latest Endpoint Security Suite Wave is a testament to our commitment to delivering premium security to the enterprise sector. The enterprise threat landscape is constantly evolving in sophistication, and it is central to our mission that our users are protected against complex threats with the highest standard of security solutions. In our increasingly digitized world, it is imperative that enterprises and their data are safe and secure.\u201d<\/p><p><br><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d4b737 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d4b737\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;b15f641&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-76b8b73\" data-id=\"76b8b73\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-98175cb elementor-widget elementor-widget-shortcode\" data-id=\"98175cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>BRATISLAVA, February 7, 2020, ESET \u2013 a global leader in [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":3289,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[131,40,61,99],"tags":[41,98,134],"class_list":["post-5907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-v2","category-eset","category-press-release","category-year2020","tag-eset","tag-98","tag-endpoint-security-suites"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ESET Named a Strong Performer in Endpoint Security Suites 2019 Report by Independent Research Firm - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/en\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESET Named a Strong Performer in Endpoint Security Suites 2019 Report by Independent Research Firm - Version 2\" \/>\n<meta property=\"og:description\" content=\"BRATISLAVA, February 7, 2020, ESET \u2013 a global leader in [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/en\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-10T05:07:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-04T05:23:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg?fit=1200%2C675&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2020\\\/02\\\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2020\\\/02\\\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"ESET Named a Strong Performer in Endpoint Security Suites 2019 Report by Independent Research Firm\",\"datePublished\":\"2020-02-10T05:07:00+00:00\",\"dateModified\":\"2020-11-04T05:23:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2020\\\/02\\\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\\\/\"},\"wordCount\":608,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2020\\\/02\\\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/eset-news.jpg\",\"keywords\":[\"ESET\",\"2020\",\"Endpoint Security Suites\"],\"articleSection\":[\"Version 2 Limited\",\"ESET\",\"Press Release\",\"2020\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2020\\\/02\\\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2020\\\/02\\\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\\\/\",\"name\":\"ESET Named a Strong Performer in Endpoint Security Suites 2019 Report by Independent Research Firm - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2020\\\/02\\\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2020\\\/02\\\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/eset-news.jpg\",\"datePublished\":\"2020-02-10T05:07:00+00:00\",\"dateModified\":\"2020-11-04T05:23:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2020\\\/02\\\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/zh\\\/2020\\\/02\\\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2020\\\/02\\\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/eset-news.jpg\",\"contentUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/eset-news.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2020\\\/02\\\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ESET Named a Strong Performer in Endpoint Security Suites 2019 Report by Independent Research Firm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ESET Named a Strong Performer in Endpoint Security Suites 2019 Report by Independent Research Firm - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/en\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/","og_locale":"en_US","og_type":"article","og_title":"ESET Named a Strong Performer in Endpoint Security Suites 2019 Report by Independent Research Firm - Version 2","og_description":"BRATISLAVA, February 7, 2020, ESET \u2013 a global leader in [&hellip;]","og_url":"https:\/\/version-2.com\/en\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/","og_site_name":"Version 2","article_published_time":"2020-02-10T05:07:00+00:00","article_modified_time":"2020-11-04T05:23:12+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg?fit=1200%2C675&ssl=1","type":"image\/jpeg"}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/zh\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"ESET Named a Strong Performer in Endpoint Security Suites 2019 Report by Independent Research Firm","datePublished":"2020-02-10T05:07:00+00:00","dateModified":"2020-11-04T05:23:12+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/"},"wordCount":608,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/zh\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","keywords":["ESET","2020","Endpoint Security Suites"],"articleSection":["Version 2 Limited","ESET","Press Release","2020"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/","url":"https:\/\/version-2.com\/zh\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/","name":"ESET Named a Strong Performer in Endpoint Security Suites 2019 Report by Independent Research Firm - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/zh\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/zh\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","datePublished":"2020-02-10T05:07:00+00:00","dateModified":"2020-11-04T05:23:12+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/zh\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/zh\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/#primaryimage","url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","contentUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/zh\/2020\/02\/eset-named-a-strong-performer-in-endpoint-security-suites-2019-report-by-independent-research-firm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"ESET Named a Strong Performer in Endpoint Security Suites 2019 Report by Independent Research Firm"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-1xh","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/5907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=5907"}],"version-history":[{"count":5,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/5907\/revisions"}],"predecessor-version":[{"id":18664,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/5907\/revisions\/18664"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media\/3289"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=5907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=5907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=5907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}