Skip to content

Why AV-Comparatives named ESET HOME Security Essential its Product of the Year and what it means for home users

 

ESET HOME Security Essential delivers not only outstanding protection of digital life, but also is recognized as the perfect blend of simplicity, advanced customization for tech-savvy users, and low impact on device performance. 

What makes software perfect? Be it an email service, a video editor, a shopping app, or even a video game… First and foremost, it should be outstanding in doing what it is designed to do, right? That’s true, but not the whole story.

On 20 February, ESET was honored with AV-Comparatives’ Product of the Year 2024 Award for ESET HOME Security Essential at AV-Comparatives’ Awards Ceremony. This award is a result of more than 30 years of ESET experience and its efforts to deliver the best cyber protection for home users.

What makes the AV-Comparatives award particularly intriguing is the reviewers’ broad focus on multiple aspects of the assessed cybersecurity solutions. Leaving no stone unturned, they checked anti-malware capabilities, performance, overall user experience, and support across a series of tests in 2024.

Let’s take a look at how ESET HOME Security protects users against both laboratory and real-life scenarios, how it affects the protected device, and why it is so user-friendly.

 

Prevention trumps apprehension

ESET HOME Security Essential excelled across several protection tests, including AV-Comparatives’ Real-World Protection Test, Malware Protection Test, and Advanced Threat Protection Test. What does this mean for users? It proves that ESET can protect them from hundreds of thousands of threats trying to compromise their devices from a variety of entry points.

See for yourself:

Real-World Protection Test – This test aims to simulate real-world conditions users experience every day while browsing the Internet. Antivirus products are tested against hundreds of malicious URLs. Testers also note any required human interactions, i.e. blocking/allowing detected samples to execute.

Malware Protection Test – While in the Real-World Protection Test the gateway to a tested device is the web, in the Malware Protection Test the vectors can be, for example, network drives or USBs – or they cover scenarios in which the malware is already on the disk.

Advanced Threat Protection (ATP) Test – Also known as the Enhanced Real-World Test, this examination uses penetration techniques that allow attackers to target specific external computer systems, and it evaluates how well security products protect against such attacks. This test also evaluates protection against targeted advanced threats such as exploits and fileless attacks.

The Advanced Threat Protection Test also acknowledges the ESET prevention-first approach, where our technology is configured to stop attacks before they happen. To that end, half of the blocked malware samples (7 of 15) were stopped in their pre-execution phase, i.e. before the threat had run and was still inactive on the system.

This protection is not theoretical. ESET detection engines have discovered and stopped many advanced threats such as Lumma Stealer. Sold on the dark web, this infostealer malware mostly targets cryptocurrency wallets, user credentials, and two-factor authentication browser extensions. It also tries to exfiltrate other data from compromised machines and can spread in multiple ways, including cracked installations of popular open-source and paid apps such as ChatGPT or Vegas Pro.

 

Great performance

The real magic behind this “product of the year” is not only making it effective, but ensuring those capabilities don’t significantly slow down the protected device or overwhelm users with false alarms.

Creating security capable of catching malware at every step of its deployment process is one thing (and there can be hundreds of those steps), but it takes a number of real experts to finetune it to effectively block malware without impacting the processes of legitimate software or triggering false alarms. To ensure that the products tested didn’t suffer from these issues, AV-Comparatives’ reviewers also checked for false positives while  products are in their default settings. “False positives can cause as much trouble as a real infection” reads the AV-Comparatives summary report.

ESET HOME Security Essential won the silver medal in the False Positives category as testers detected altogether only 15 false positives during all tests run in 2024. To compare, some other tested solutions produced around 30 false positives in a single test.

On top of that, ESET was also awarded for low system-impact while testers performed usual user procedures such as file copying, installing applications, or browsing websites.

AV-Comparatives’ awards for ESET HOME Security Essential

• Product of the Year 2024, having received the highest Advanced+ Award in all seven tests this year

• Gold Award for the Advanced Threat Protection Test

• Silver Award for Low False Positives

• Bronze Award for the Real-World Protection Test

• Bronze Award for Performance Test

User experience

When considering what the best software should look like, the critical part is user experience. And what did AV-Comparatives have to say about ESET HOME Security Essential?

“Reviewers were impressed by the clean, intuitive user interface designed for non-expert users, as well as extensive customization and scan options available for power users.”

They describe ESET HOME Security Essential as a well-designed and easy-to-use security product providing safe default settings and a clean, intuitive interface for non-expert users, where essential features like “help” and access-control are easily accessible. For power users, the settings dialog has plenty of advanced options, including excellent access-control.

In this way, ESET HOME Security Essential can perfectly serve both average Joes and tech-savvy home admins.

Learn more about ESET HOME Security solutions here.

The Product of the Year

So, what makes a software perfect? Perfect software seamlessly combines functionality, usability, and reliability. It addresses user needs effectively, providing intuitive and user-friendly interfaces that enhance the overall experience.

Having a cyber security solution with all these attributes is especially important when we are talking about protecting your data, identity, and finances. ESET HOME Security Essential is all-in-one protection for your digital life, and ESET is proud to say that it has triumphed as AV-Comparatives´ 2024 Product of the Year.

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET HOME Security Essential 榮獲 AV-Comparatives 年度產品殊榮:箇中原因及對家庭用戶的意義

ESET HOME Security Essential 不僅為您的數碼生活提供卓越保護,更巧妙融合了操作簡便性、為進階用戶而設的豐富自訂選項,同時確保對裝置效能的影響微乎其微,備受肯定。

怎樣才稱得上完美的軟件?無論是電郵服務、影片編輯器、購物應用程式還是電子遊戲 ⋯⋯ 首要條件是它必須能出色地完成其本職工作,對嗎?這當然沒錯,但完善的定義不止於此。

今年 2 月 20 日,在 AV-Comparatives 的年度頒獎典禮上,ESET 憑藉其 ESET HOME Security Essential 產品,榮獲備受矚目的 2024 年度產品大獎。這項殊榮不僅肯定了 ESET 超過 30 年的深厚經驗,也彰顯了我們持續為家庭用戶提供頂尖網絡安全防護的努力與承諾。

AV-Comparatives 的評測之所以備受推崇,關鍵在於其全面性。評審團隊鉅細靡遺,針對受評測的網絡安全方案進行了多面向的嚴謹考核,涵蓋了 2024 年一系列測試中的反惡意軟件能力、系統效能、整體使用者體驗以及技術支援水平。

接下來,讓我們深入了解 ESET HOME Security 如何在模擬測試及真實網絡環境中保護用戶免受威脅,它對受保護裝置的效能影響如何,以及其使用者友善的設計奧秘。

 

防患於未然,遠勝亡羊補牢

ESET HOME Security Essential 在多項關鍵防護測試中均表現卓越,包括 AV-Comparatives 的「真實世界防護測試」、「惡意軟件防護測試」及「進階威脅防護測試」。這充分證明 ESET 能夠有效抵禦來自各種途徑、成千上萬種企圖入侵用戶裝置的網絡威脅。

詳細說明如下:

真實世界防護測試(Real-World Protection Test)– 此測試模擬用戶日常瀏覽網際網絡時所面對的真實環境,針對數百個惡意 URL 進行嚴格測試。測試人員亦會記錄過程中是否需要用戶介入處理,例如決定封鎖或允許被偵測到的可疑檔案執行。

惡意軟件防護測試(Malware Protection Test)– 不同於真實世界測試主要經由網絡發動攻擊,此測試的威脅媒介則可能來自網絡磁碟機、USB 隨身碟等,甚至涵蓋惡意軟件已潛伏於本機磁碟的狀況。

進階威脅防護(ATP)測試 (Advanced Threat Protection(ATP)Test)– 此測試亦稱為「增強型真實世界測試」(Enhanced Real-World Test),採用模擬黑客的滲透技術,針對特定外部系統發動攻擊,藉此評估安全產品抵禦此類精密攻擊的成效。同時,測試亦會評估產品防禦針對性進階威脅(例如漏洞攻擊和無檔案式攻擊)的能力。

進階威脅防護測試的結果,亦印證了 ESET 「防患於未然」的策略:我們的技術能在攻擊實際執行前將其攔截。測試中,有多達一半(15 個中的 7 個)被成功攔截的惡意軟件樣本,都是在其執行前的潛伏階段就被阻斷,也就是說,在威脅尚未啟動、仍處於靜止狀態時已被清除。

這種強大的保護能力絕非紙上談兵。ESET 的偵測引擎已成功偵測並攔截眾多進階威脅,Lumma Stealer 便是其中一例。這種在暗網流通的資訊竊取惡意軟件,主要目標是盜取加密貨幣錢包、用戶登入憑證以及瀏覽器的雙重驗證擴充功能。此外,它還會試圖從受感染的電腦中竊取更多敏感數據,並透過多種途徑散播,例如偽裝成熱門開源軟件或付費應用程式(如 ChatGPT 或 Vegas Pro)的破解版安裝檔。

 

卓越效能,輕巧流暢

這款「年度產品」的真正價值,不僅在於其強大的防護效能,更在於確保這些保護機制在運作時,既不會明顯拖慢受保護裝置的運作速度,也不會頻繁發出誤報干擾使用者。

要建立一套能在惡意軟件部署的每個階段(可能多達數百個步驟)都有效攔截的安全機制已屬不易,更需要頂尖專家團隊的精密調校,才能在高效封鎖惡意軟件的同時,避免影響合法軟件的正常運作或產生誤報。為了評估產品在這方面的表現,AV-Comparatives 的評審也特別檢視了各產品在預設配置下的誤報率。正如 AV-Comparatives 總結報告所言:「誤報所帶來的麻煩,有時不亞於真正的病毒感染。」

在這方面,ESET HOME Security Essential 贏得了「低誤報」項目的銀牌肯定。在 2024 年度的所有測試中,評審總共只錄得 15 次誤報。相較之下,部分其他受測產品在單一測試中就可能出現約 30 次誤報。

不僅如此,ESET 在效能測試中同樣獲得肯定。即使在執行檔案複製、安裝應用程式、瀏覽網頁等日常電腦操作時,ESET 對系統資源的佔用率極低,影響輕微,因此也贏得了獎項。

 

ESET HOME Security Essential 在 AV-Comparatives 評測中榮獲以下獎項:

  • 2024 年度產品獎 (Product of the Year 2024),在全部七項測試中均取得最高級別的 Advanced+ 評價
  • 進階威脅防護測試金獎 (Gold Award for the Advanced Threat Protection Test)
  • 低誤報銀獎 (Silver Award for Low False Positives)
  • 真實世界防護測試銅獎 (Bronze Award for the Real-World Protection Test)
  • 效能測試銅獎 (Bronze Award for Performance Test)

 

絕佳使用者體驗

評估一款軟件的優劣,使用者體驗是不可或缺的關鍵環節。那麼,AV-Comparatives 如何評價 ESET HOME Security Essential 的使用體驗呢?

「評審人員對其為非專業使用者設計的簡潔、直觀的使用者介面,以及為進階使用者提供的廣泛自訂和掃描選項印象深刻。」

評審們形容 ESET HOME Security Essential 是一款設計精良、簡單易用的安全方案。它為入門用戶提供了安全的預設值、清晰直觀的操作介面,並且「說明」功能和存取權限管理等核心功能都觸手可及。而對於專業級用戶,設定選單中則提供了豐富的進階選項與強大的存取控制功能。正因如此,ESET HOME Security Essential 能同時滿足普通用戶與技術達人級家庭管理員的需求。

 

年度產品的真諦

總結來說,何謂完美的軟件?它必須無縫地融合強大功能、簡易操作與穩定可靠性。它能精準滿足用戶所需,提供直觀友善的操作介面,進而全面提升使用者的數碼體驗。

在保護個人資料、數碼身分和網上財務安全方面,選擇一款兼具上述所有優點的網絡安全方案顯得至關重要。ESET HOME Security Essential 正是這樣一款能為您的數碼生活提供全方位守護的產品。我們很榮幸地宣布,它已成功摘下 AV-Comparatives 2024 年度產品大獎的桂冠。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

關於 Version 2 Digital
Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

This real-life example shows why your Android should not connect to Wi-Fi automatically

The world of smartphones is full of automation and requires reputable Android protection.

Most smartphone users probably know that connecting to any random Wi-Fi hotspot available is not the best idea. But sometimes, an Android device can autonomously connect to a malicious Wi-Fi network without your awareness.

Imagine that you are at your favorite restaurant, your order is complete, and now you want to check your smartphone before the meal comes. However, without your knowledge, someone else is already monitoring everything you do on your device, including the websites you browse, the applications you use, and the credentials you enter.

An attack like this is possible. For example, if ESET malware researcher Lukáš Štefanko used his Cheap Yellow Display (CYD) tool running Evil M5 firmware for malicious purposes. Luckily, acting as an ethical pen tester, he just published a video showing how easy it can be to obtain Wi-Fi networks that smartphones want to reconnect to automatically. With this information, he could create a fake Wi-Fi access point, or an “evil twin” network, to gather sensitive data from a victim’s device.

Let’s dive a little deeper into these kinds of attacks, and what lessons we can learn from them.

 

Dangers of comfort zones

When creating software, developers always think about usability, user comfort, and user experience. So, it’s only natural that smartphones have an incorporated function to reconnect automatically to previously used and trusted networks.

However, cybercriminals love to exploit situations in which users feel safe and enjoy ever-present automation. The attack displayed by Lukáš Štefanko does the same — this technique preys on the fact that Android smartphones constantly and transparently tell nearby devices which Wi-Fi networks they have connected to, and want to reconnect to, automatically.

Luckily, attacks that require the malicious actor to be physically present at the location aren’t common, but that doesn’t mean that they can’t happen. For example, Australia’s Federal Police (AFP) charged one of its citizens over an alleged evil twin attack on multiple domestic flights and airports in June 2024. His seized devices allegedly contained dozens of stolen personal credentials.

Other times, it can be a state-sponsored operation such as the plot of a UK-based spy ring, as described by a prosecutor during a recent trial. The spy ring, among other things, also operated in Germany, where its members allegedly used an International Mobile Subscriber Identity Catcher or IMSI catcher to intercept mobile phone traffic from a military base where Ukrainian soldiers were training.

 

Other threats

As you can see, connecting and reconnecting to publicly available Wi-Fi networks can pose a danger. And the list of possible threats doesn’t end with rogue hotspots:

Man-In-The-Middle (MITM) attack — In such attacks, cybercriminals intercept communications between a device and the Wi-Fi network, allowing them to access sensitive unencrypted information like passwords, credit card numbers, and personal messages.

Exploitation of vulnerabilities — Cybercriminals can exploit vulnerabilities in less-secure public networks, or vulnerabilities of a targeted mobile device (especially if it doesn’t have updated software), to distribute malware to connected devices. This malware can then be used to steal data, monitor users’ activities, or even take control of users’ devices.

Packet Sniffing — Public Wi-Fi networks often lack proper encryption, making it easier for hackers to eavesdrop on users’ online activities.

How to stay safe

Obviously, the basic security recommendation for Wi-Fi users is to disable automatic connections to Wi-Fi networks, and not use free publicly accessible Wi-Fi networks at all. If this is not possible for any reason, here are a few more tips:

Use a Virtual Private Network (VPN) —VPN creates a secure and encrypted connection between a user’s device and the internet.

Do not share sensitive data — Avoid websites and applications requesting sensitive information such as online banking or shopping sites while on public Wi-Fi.

Stay on top of updates — Keep your software and apps updated. Regular updates often include security patches that protect against known vulnerabilities.

ESET Mobile Security

When it comes to cybersecurity, ESET goes far beyond just simple antivirus — and this also applies to smartphones and mobile devices. ESET Mobile Security is built around the ESET prevention-first approach, stopping attacks before they can do any harm. This goal can be met by securing cybercriminals’ most common points of entry to devices while keeping the security solution simple to use.

ESET Mobile Security is well-prepared for attacks coming from malicious websites, thanks to multilayered protection against phishing, smishing, and scams. For example, Anti-Phishing enhanced by Link Scanner protects users against malicious websites, and Payment Protection delivers a new layer of security for sensitive payment and financial applications.

And the best part? The premium version of ESET Mobile Security utilizing all these features and more is 50% off between March 3 and March 9, 2025!

Enjoy technology with peace of mind

Most would agree that people love comfort, and, in fact, the entire technology industry is driven by users pursuing faster, easier, and more user-friendly solutions for their daily activities. And there is nothing bad about living in the lap of technological luxury; but don’t ignore the threats out there.

Luckily, with a pinch of cybersecurity awareness and a reputable security solution installed on your Android smartphone, you should be fine. Wi-Fi network attacks are well-known, and acclaimed cybersecurity companies such as ESET taking advantage of more than 30 years of experience have you covered.

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

North Korea-aligned DeceptiveDevelopment targets freelance developers with infostealers, ESET Research discovers

  • DeceptiveDevelopment targets freelance software developers through spearphishing on job-hunting and freelancing sites, aiming to steal cryptocurrency wallets and login information from browsers and password managers.
  • This operation primarily uses two malware families – BeaverTail (infostealer, downloader) and InvisibleFerret (infostealer, Remote Access Trojan – RAT).
  • DeceptiveDevelopment’s techniques are similar to several other known North Korea-aligned operations.

PRAGUE, BRATISLAVAFebruary 20, 2025 — Since 2024, ESET researchers have observed a series of malicious North Korea-aligned activities, where the operators, posing as software development  recruiters, entice the victims with fake employment offers. Subsequently, they try to serve their targets with software projects that conceal infostealing malware. ESET Research calls this activity cluster DeceptiveDevelopment. This North Korea-aligned activity is currently not attributed by ESET to any known threat actor. It targets freelance software developers through spearphishing on job-hunting and freelancing sites, aiming to steal cryptocurrency wallets and login information from browsers and password managers.

“As part of a fake job interview process, the DeceptiveDevelopment operators ask their targets to take a coding test, such as adding a feature to an existing project, with the files necessary for the task usually hosted on private repositories on GitHub or other similar platforms. Unfortunately for the eager work candidate, these files are trojanized: Once they download and execute the project, the victim’s computer gets compromised,” explains ESET researcher Matěj Havránek, who made the discovery and analyzed DeceptiveDevelopment.

DeceptiveDevelopment’s tactics, techniques, and procedures are similar to several other known North Korea-aligned operations. Operators behind DeceptiveDevelopment target software developers on Windows, Linux, and macOS. They steal cryptocurrency primarily for financial gain, with a possible secondary objective of cyberespionage. To approach their targets, these operators use fake recruiter profiles on social media. The attackers don’t distinguish based on geographical location, instead aiming to compromise as many victims as possible to increase the likelihood of successfully extracting funds and information.

DeceptiveDevelopment primarily uses two malware families as part of its activities, delivered in two stages. In the first stage, BeaverTail (infostealer, downloader) acts as a simple login stealer, extracting browser databases containing saved logins, and as a downloader for the second stage, InvisibleFerret (infostealer, RAT), which includes spyware and backdoor components, and is also capable of downloading the legitimate AnyDesk remote management and monitoring software for post-compromise activities.

In order to pose as recruiters, the attackers copy profiles of existing people or even construct new personas. They then either directly approach their potential victims on job-hunting and freelancing platforms, or post fake job listings there. While some of these profiles are set up by the attackers themselves, others are potentially compromised profiles of real people on the platform, modified by the attackers.

Some of the platforms where these interactions occur are generic job-hunting ones, while others focus primarily on cryptocurrency and blockchain projects and are thus more in line with the attackers’ goals. The platforms include LinkedIn, Upwork, Freelancer.com, We Work Remotely, Moonlight, and Crypto Jobs List.

Victims receive the project files either directly via file transfer on the site, or through a link to a repository like GitHub, GitLab, or Bitbucket. They are asked to download the files, add features or fix bugs, and report back to the recruiter. Additionally, they are instructed to build and execute the project in order to test it, which is where the initial compromise happens. The attackers often use a clever trick to hide their malicious code: They place it in an otherwise benign component of the project, usually within backend code unrelated to the task given to the developer, where they append it as a single line behind a long comment. This way, it is moved off-screen and stays mostly hidden.

“The DeceptiveDevelopment cluster is an addition to an already large collection of money-making schemes employed by North Korea-aligned actors and conforms to an ongoing trend of shifting focus from traditional money to cryptocurrencies,” concludes Havránek.

For a more detailed analysis and technical breakdown of DeceptiveDevelopment, check out the latest ESET Research blogpost, “DeceptiveDevelopment targets freelance developers,” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

Heatmap of different victims of DeceptiveDevelopment

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET 榮獲 AV-Comparatives 「2024 年度產品大獎」殊榮

全球網絡安全解決方案領導品牌 ESET 宣布,其 ESET HOME Security Essential 榮膺 AV-Comparatives 「2024 年度產品大獎」。這項備受推崇的獎項,表彰了 ESET HOME Security Essential 在 Windows 平台上的卓越效能與可靠性,致力於保護消費者免受多元網絡威脅的侵害。

2024 年,AV-Comparatives 對 16 款 Windows 消費級安全產品進行了嚴苛評測,檢驗它們在抵禦真實網絡威脅、識別最新惡意軟件、防禦進階針對性攻擊,以及在不影響電腦運作速度的前提下提供保護的能力。ESET HOME Security Essential 以出色的表現脫穎而出,在全年七項測試中均榮獲最高等級的 Advanced+ 獎項,穩坐最佳產品寶座。

AV-Comparatives 2024 年總結報告指出:「評審團對其簡潔直觀、專為非專業用戶設計的介面讚譽有加,同時也肯定其為進階用戶提供的豐富自訂功能與掃描選項,令人印象深刻。」

儘管多數供應商將自動續訂設為強制條件,報告特別讚揚 ESET 是少數不強迫用戶接受自動續訂的廠商,令人稱道。報告進一步強調,ESET HOME Security Essential 是一款設計精良且操作友善的安全產品,提供安全的預設設定,並確保所有用戶都能輕鬆掌握其核心功能。

AV-Comparatives 創辦人暨行政總裁 Andreas Clementi 評論說:「ESET 在 2024 年測試中展現了一貫的優異表現,在多項評比中均獲得高分肯定。這項殊榮充分體現產品在惡意軟件防護、易用性與系統效能上的可靠性。ESET HOME Security Essential 以平衡的設計,提供高效保護同時不拖累系統效能,這無疑是許多用戶所期待的優勢。」

ESET 消費者與物聯網部門副總裁 Viktória Ivanová 表示:「能獲 AV-Comparatives 評選為 2024 年度產品,我們深感榮幸。」

 

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

關於 Version 2 Digital
Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×