Endpoint Protection Software Resources
Articles and Discussions to expand your knowledge on Endpoint Protection Software
Resource pages are designed to give you a cross-section of information we have on specific categories. You'll find articles from our experts and discussions from users like you.
Endpoint Protection Software Articles
Best Practices for SIEM Implementation — What You Should Know
Cybersecurity systems involve many technologies and can be built with various options, but large companies should implement a security information and event management (SIEM) solution to increase overall system security.
by Aaron Walker
Endpoint Protection Software Discussions
0
Question on: ESET PROTECT
What is ESET protect?
What is ESET protect?
Show More
Show Less
Computer security software
Show More
Show Less
0
Question on: Absolute Secure Endpoint
Group Wiping of Devices
I would like to be able to group devices by a defining factor IE service tag and be able to mass wipe devices allowing only 1 Wipe report to be produced with results
Show More
Show Less
Thank you posting your question and I apologize for the delayed response. We are glad you are utilizing our Wipe feature, as it is a powerful tool to remotely remove all sensitive data on devices. With regards to performing a mass wipe on a group of devices, we recommend first uploading a list of devices into a Device Group, then performing a Wipe on all devices in that group. You can export the results of those Wipes through History > Actions and access the summary under the list of requests. The log files generated for each device can be downloaded individually. We suggest reaching out to our Technical Support team who can walk you through the steps in detail should you have any questions.
Show More
Show Less
0
Question on: ESET PROTECT
How can I backup the encryption key?
If I lost it how can I get it back
Show More
Show Less
It's critical to have backups of encryption keys. If the lone copy of a key is lost, data encrypted with that key cannot be accessed. When you initially turn up ESET Endpoint Encryption, you'll be requested to back up your Key-File. It's a good idea to back up your Key-File to an external storage device such a USB flash drive, hard drive, or network share.
It's also a good idea to back up your Key-File to other external devices or network drives in case one fails.
The backup process makes a complete copy of the Key-File, including all of its encryption keys. The Key-File backup process is automatically started if the ESET Endpoint Encryption Key-File is changed, keys are added, destroyed, or the password is changed.
Show More
Show Less
Hi Mahmoud - here's some information from ESET's online help that can hopefully walk you through the backup process: https://help.eset.com/eee_client/5/en-US/backing_up_encryption_keys.html Best of luck. -Merry at G2
Show More
Show Less

