{"id":15062,"date":"2013-10-15T15:32:55","date_gmt":"2013-10-15T07:32:55","guid":{"rendered":"https:\/\/version-2.com\/?p=15062"},"modified":"2020-06-17T17:59:48","modified_gmt":"2020-06-17T09:59:48","slug":"eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/","title":{"rendered":"ESET Endpoint Security \u65bcPassMark Software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8"},"content":{"rendered":"\n<img fetchpriority=\"high\" decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/06\/PassMark-software.jpg\" width=\"388\" height=\"142\" alt=\"\">\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/www.version-2.com\/management\/fckeditor_new\/editor\/images\/spacer.gif\" alt=\"\">\u9999\u6e2f &#8211; 2013\u5e749\u670830\u65e5 &#8211; ESET\u4eca\u5929\u5ba3\u5e03\uff0c\u65d7\u4e0b\u7684\u5546\u7528\u8edf\u4ef6ESET Endpoint Security\uff0c\u65bcPassMark Software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8\uff0c\u5728\u591a\u9805\u8868\u73fe\u548c\u53ef\u7528\u6027\u6e2c\u8a66\u4e2d\u5747\u7372\u5f97\u4ee4\u4eba\u6eff\u610f\u7684\u6210\u7e3e\u3002<\/p>\n\n\n\n<p>\u53c3\u8207\u4eca\u6b21\u6e2c\u8a66\u7684\u54c1\u724c\u5305\u62ec\uff08\u6eff\u52065\u661f\uff09\uff1a<br>&#8211; ESET Endpoint Security\uff084\u661f\u534a\uff09<br>&#8211; Symantec\uff084\u661f\uff09<br>&#8211; Kaspersky\uff084\u661f\uff09<br>&#8211; Trend Micro\uff083\u661f\u534a\uff09<br>&#8211; McAfee\uff083\u661f\u534a\uff09<br>&#8211; Sophos\uff083\u661f\u534a\uff09<br>&#8211; Microsoft\uff082\u661f\uff09<\/p>\n\n\n\n<p>\u7d9c\u540819\u9805\u6027\u80fd\u6e2c\u8a66\uff0c\u4ee5\u4e0b\u70ba\u6709\u95dc\u65bcESET\u7684\u5831\u544a\u91cd\u9ede\uff1a<br>&#8211; \u5ba2\u6236\u7aef\u8a18\u61b6\u9ad4\u65bc\u7cfb\u7d71\u9592\u7f6e\u6642\u7684\u4f7f\u7528\u60c5\u6cc1\uff08ESET\uff1a118.65 MB\uff1bSophos\u5dee\u4e0d\u591a\u662f\u5176\u5169\u500d\uff0cSymantec\u5169\u500d\u4ee5\u4e0a\uff09\uff1b<br>&#8211; \u5b8c\u6574\u7cfb\u7d71\u6383\u63cf\uff08ESET\uff1a36\u5206\u9418\uff1bTrend Micro\u3001McAfee\u548cSophos\u5dee\u4e0d\u591a\u662f\u5176\u5169\u500d\uff0cMicrosoft\u4e09\u500d\u4ee5\u4e0a\uff09\uff1b<br>&#8211; \u5b8c\u6574\u7cfb\u7d71\u6383\u63cf\u6642\u7684\u8a18\u61b6\u9ad4\u4f7f\u7528\u60c5\u6cc1\uff08ESET\uff1a239.60 MB\uff1bMcAfee\u82b1\u4e86\u5c07\u8fd1\u5169\u500d\u7684\u8a18\u61b6\u9ad4\uff09\uff1b<br>&#8211; \u7db2\u7d61\u6d41\u91cf\uff08ESET\uff1a0.40 MB\uff1b\u5176\u4ed6\u7522\u54c1\u5c0d\u7db2\u7d61\u7684\u5f71\u97ff\u9ad8\u905413 &#8211; 210\u500d\uff09\uff1b<br>&#8211; \u7ba1\u7406\u4f3a\u52d9\u5668\u5b89\u88dd\u6a94\u5927\u5c0f\uff08ESET\uff1a0.35 GB\uff1b\u5176\u4ed6\u7522\u54c1\u5c0d\u786c\u789f\u53ef\u7528\u7a7a\u9593\u7684\u9700\u6c42\u9ad8\u90543 &#8211; 42\u500d\u4ee5\u4e0a\uff09\uff1b<br>&#8211; \u4f3a\u670d\u5668\u65bc\u9592\u7f6e\u6642\u7684\u8a18\u61b6\u9ad4\u4f7f\u7528\u60c5\u6cc1\uff08ESET\uff1a6.67 MB\uff0c\u5176\u4ed6\u54c1\u724c\u9700\u8981\u4f7f\u752824 &#8211; 94\u500d\u7684\u8a18\u61b6\u9ad4\uff09\uff1b<br>&#8211; \u4f3a\u670d\u5668\u65bc\u6309\u9700\u6383\u63cf\u6642\u7684\u8a18\u61b6\u9ad4\u4f7f\u7528\u60c5\u6cc1\uff08ESET\uff1a22.05 MB\uff0c\u5176\u4ed6\u54c1\u724c\u9700\u8981\u4f7f\u752814 &#8211; 32\u500d\u7684\u8a18\u61b6\u9ad4\uff09<\/p>\n\n\n\n<p>\u6709\u95dc\u5b8c\u6574\u7684PassMark Software\u6e2c\u8a66\u5831\u544a\uff0c\u8acb\u700f\u89bd\uff1a<br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.passmark.com\/B2Breport12\" target=\"_blank\">http:\/\/www.passmark.com\/B2Breport12<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>\u95dc\u65bcVersion 2 Limited<\/strong><br>Version 2 Limited\u662f\u4e9e\u6d32\u6700\u6709\u6d3b\u529b\u7684IT\u516c\u53f8\u4e4b\u4e00\uff0c\u516c\u53f8\u767c\u5c55\u53ca\u4ee3\u7406\u5404\u7a2e\u4e0d\u540c\u7684\u4e92\u806f\u7db2\u3001\u8cc7\u8a0a\u79d1\u6280\u3001\u591a\u5a92\u9ad4\u7522\u54c1\uff0c\u5176\u4e2d\u5305\u62ec\u901a\u8a0a\u7cfb\u7d71\u3001\u5b89\u5168\u3001\u7db2\u7d61\u3001\u591a\u5a92\u9ad4\u53ca\u6d88\u8cbb\u5e02\u5834\u7522\u54c1\u3002\u900f\u904e\u516c\u53f8\u9f90\u5927\u7684\u7db2\u7d61\u3001\u92b7\u552e\u9ede\u3001\u5206\u92b7\u5546\u53ca\u5408\u4f5c\u5925\u4f34\uff0cVersion 2 Limited \u63d0\u4f9b\u5ee3\u88ab\u5e02\u5834\u8b9a\u8cde\u7684\u7522\u54c1\u53ca\u670d\u52d9\u3002Version 2 Limited \u7684\u92b7\u552e\u7db2\u7d61\u5305\u62ec\u4e2d\u570b\u5927\u9678\u3001\u9999\u6e2f\u3001\u6fb3\u9580\u3001\u53f0\u7063\u3001\u65b0\u52a0\u5761\u7b49\u5730\u5340\uff0c\u5ba2\u6236\u4f86\u81ea\u5404\u884c\u5404\u696d\uff0c\u5305\u62ec\u5168\u74031000\u5927\u8de8\u570b\u4f01\u696d\u3001\u4e0a\u5e02\u516c\u53f8\u3001\u516c\u7528\u6a5f\u69cb\u3001\u653f\u5e9c\u90e8\u9580\u3001\u7121\u6578\u6210\u529f\u7684\u4e2d\u5c0f\u4f01\u53ca\u4f86\u81ea\u4e9e\u6d32\u5404\u57ce\u5e02\u7684\u6d88\u8cbb\u5e02\u5834\u5ba2\u6236\u3002<\/p>\n\n\n\n<p><strong>\u95dc\u65bcESET<\/strong><br>ESET\u6210\u7acb\u65bc1992\u5e74\uff0c\u662f\u4e00\u5bb6\u9762\u5411\u4f01\u696d\u8207\u500b\u4eba\u7528\u6236\u7684\u5168\u7403\u6027\u7684\u96fb\u8166\u5b89\u5168\u8edf\u4ef6\u63d0\u4f9b\u5546\uff0c\u5176\u7372\u734e\u7522\u54c1 \u2014 NOD32\u9632\u75c5\u6bd2\u8edf\u4ef6\u7cfb\u7d71\uff0c\u80fd\u5920\u91dd\u5c0d\u5404\u7a2e\u5df2\u77e5\u6216\u672a\u77e5\u75c5\u6bd2\u3001\u9593\u8adc\u8edf\u4ef6 \uff08spyware\uff09\u3001rootkits\u548c\u5176\u4ed6\u60e1\u610f\u8edf\u4ef6\u70ba\u96fb\u8166\u7cfb\u7d71\u63d0\u4f9b\u5be6\u6642\u4fdd\u8b77\u3002ESET NOD32\u4f54\u7528 \u7cfb\u7d71\u8cc7\u6e90\u6700\u5c11\uff0c\u5075\u6e2c\u901f\u5ea6\u6700\u5feb\uff0c\u53ef\u4ee5\u63d0\u4f9b\u6700\u6709\u6548\u7684\u4fdd\u8b77\uff0c\u4e26\u4e14\u6bd4\u5176\u4ed6\u4efb\u4f55\u9632\u75c5\u6bd2\u7522\u54c1\u7372\u5f97\u4e86\u66f4\u591a\u7684Virus Bulletin 100\u734e\u9805\u3002ESET\u9023\u7e8c\u4e94\u5e74\u88ab\u8a55\u70ba\u201c\u5fb7\u52e4\u9ad8\u79d1\u6280\u5feb\u901f\u6210\u9577500 \u5f37\u201d\uff08Deloitte\u2019s Technology Fast 500\uff09\u516c\u53f8\uff0c\u64c1\u6709\u5ee3\u6cdb\u7684\u5408\u4f5c\u5925\u4f34\u7db2\u7d61\uff0c\u5305\u62ec\u4f73\u80fd\u3001\u6234\u723e\u3001\u5fae\u8edf\u7b49\u570b\u969b\u77e5\u540d\u516c\u53f8\uff0c\u5728\u5e03\u62c9\u8fea\u65af\u62c9\u767c\uff08\u65af\u6d1b\u4f10\u514b\uff09\u3001\u5e03\u91cc\u65af\u6258\u723e\uff08\u82f1\u570b \uff09\u3001\u5e03\u5b9c\u8afe\u65af\u827e\u5229\u65af\uff08\u963f\u6839\u5ef7\uff09\u3001\u5e03\u62c9\u683c\uff08\u6377\u514b\uff09\u3001\u8056\u5730\u4e9e\u54e5\uff08\u7f8e\u570b\uff09\u7b49\u5730\u5747\u8a2d\u6709\u8fa6\u4e8b\u8655\uff0c\u4ee3\u7406\u6a5f\u69cb\u8986\u84cb\u5168\u7403\u8d85\u904e100\u500b\u570b\u5bb6\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u9999\u6e2f &#8211; 2013\u5e749\u670830\u65e5 &#8211; ESET\u4eca\u5929\u5ba3\u5e03\uff0c\u65d7\u4e0b\u7684\u5546\u7528\u8edf\u4ef6ESET Endp [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[40,61,203],"tags":[341,41,64,201],"class_list":["post-15062","post","type-post","status-publish","format-standard","hentry","category-eset","category-press-release","category-year2013","tag-passmark-software","tag-eset","tag-eset-endpoint-security","tag-201"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ESET Endpoint Security \u65bcPassMark Software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8 - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-\u65bcpassmark-software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESET Endpoint Security \u65bcPassMark Software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8 - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u9999\u6e2f &#8211; 2013\u5e749\u670830\u65e5 &#8211; ESET\u4eca\u5929\u5ba3\u5e03\uff0c\u65d7\u4e0b\u7684\u5546\u7528\u8edf\u4ef6ESET Endp [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-\u65bcpassmark-software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-15T07:32:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-17T09:59:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/06\/PassMark-software.jpg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2013\\\/10\\\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2013\\\/10\\\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"ESET Endpoint Security \u65bcPassMark Software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8\",\"datePublished\":\"2013-10-15T07:32:55+00:00\",\"dateModified\":\"2020-06-17T09:59:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2013\\\/10\\\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\\\/\"},\"wordCount\":94,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2013\\\/10\\\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.version-2.com\\\/management\\\/fckeditor_new\\\/editor\\\/images\\\/spacer.gif\",\"keywords\":[\"PassMark Software\",\"ESET\",\"ESET Endpoint Security\",\"2013\"],\"articleSection\":[\"ESET\",\"Press Release\",\"2013\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2013\\\/10\\\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2013\\\/10\\\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\\\/\",\"name\":\"ESET Endpoint Security \u65bcPassMark Software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8 - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2013\\\/10\\\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2013\\\/10\\\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.version-2.com\\\/management\\\/fckeditor_new\\\/editor\\\/images\\\/spacer.gif\",\"datePublished\":\"2013-10-15T07:32:55+00:00\",\"dateModified\":\"2020-06-17T09:59:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2013\\\/10\\\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/zh\\\/2013\\\/10\\\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2013\\\/10\\\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.version-2.com\\\/management\\\/fckeditor_new\\\/editor\\\/images\\\/spacer.gif\",\"contentUrl\":\"https:\\\/\\\/www.version-2.com\\\/management\\\/fckeditor_new\\\/editor\\\/images\\\/spacer.gif\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2013\\\/10\\\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ESET Endpoint Security \u65bcPassMark Software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ESET Endpoint Security \u65bcPassMark Software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8 - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-\u65bcpassmark-software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8\/","og_locale":"zh_HK","og_type":"article","og_title":"ESET Endpoint Security \u65bcPassMark Software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8 - Version 2","og_description":"\u9999\u6e2f &#8211; 2013\u5e749\u670830\u65e5 &#8211; ESET\u4eca\u5929\u5ba3\u5e03\uff0c\u65d7\u4e0b\u7684\u5546\u7528\u8edf\u4ef6ESET Endp [&hellip;]","og_url":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-\u65bcpassmark-software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8\/","og_site_name":"Version 2","article_published_time":"2013-10-15T07:32:55+00:00","article_modified_time":"2020-06-17T09:59:48+00:00","og_image":[{"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/06\/PassMark-software.jpg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"ESET Endpoint Security \u65bcPassMark Software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8","datePublished":"2013-10-15T07:32:55+00:00","dateModified":"2020-06-17T09:59:48+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/"},"wordCount":94,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/#primaryimage"},"thumbnailUrl":"https:\/\/www.version-2.com\/management\/fckeditor_new\/editor\/images\/spacer.gif","keywords":["PassMark Software","ESET","ESET Endpoint Security","2013"],"articleSection":["ESET","Press Release","2013"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/","url":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/","name":"ESET Endpoint Security \u65bcPassMark Software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8 - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/#primaryimage"},"thumbnailUrl":"https:\/\/www.version-2.com\/management\/fckeditor_new\/editor\/images\/spacer.gif","datePublished":"2013-10-15T07:32:55+00:00","dateModified":"2020-06-17T09:59:48+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/#primaryimage","url":"https:\/\/www.version-2.com\/management\/fckeditor_new\/editor\/images\/spacer.gif","contentUrl":"https:\/\/www.version-2.com\/management\/fckeditor_new\/editor\/images\/spacer.gif"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/zh\/2013\/10\/eset-endpoint-security-%e6%96%bcpassmark-software%e6%b8%ac%e8%a9%a6%e4%b8%ad%e5%be%97%e5%88%86%e6%9c%80%e9%ab%98\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"ESET Endpoint Security \u65bcPassMark Software\u6e2c\u8a66\u4e2d\u5f97\u5206\u6700\u9ad8"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-3UW","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/15062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=15062"}],"version-history":[{"count":2,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/15062\/revisions"}],"predecessor-version":[{"id":15066,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/15062\/revisions\/15066"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=15062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=15062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=15062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}