ESET Declared a Leader and Top IT Security Vendor in Central and Eastern Europe

ESET, the leading IT security company based in the European Union, is the top endpoint security vendor in Central and Eastern Europe (CEE), taking the most sizeable portion of the annual market share. According to the IDC Endpoint security software market shares 2017 report, ESET’s market share in the CEE region accounts for 37.5 percent, outpacing all of its competition[1]. IDC has estimated ESET generates around 90 million USD from the IT security revenues recorded in the region in 2017 following 13.5 percent year-on-year growth. ESET is also included among IDC’s “established leaders“, which are large organizations with extensive R&D teams, robust security suites and strong investments in innovation.

“ESET’s technology comes from Central Europe, with our first software being developed in Slovakia more than 30 years ago, which makes us even more proud to keep the CEE region as our stronghold. We are proud to be the leading ’made in the European Union’ IT security solution and pleased that we are expanding our reach further in Europe including our fast growing Western European markets,“ says Miroslav Mikus, ESET Sales and Marketing Director for the EMEA region. 

ESET is headquartered in Central Europe and accounts for 37.5 percent CEE market share based on this recently released IDC market report. ESET ranks 6th globally according to the analyst firm.

IDC highlights ESET Encryption and two-factor authentication in its report, both crucial elements in the already active GDPR legislation. “Both multi-factor authentication and encryption are available to midmarket customers of ESET at an acceptable price and level of complexity along with ease of use… An offering that promises significant data security improvements for ESET’s customers,” writes Mark Child, IDC’s CEE Security Practice Lead, author of this report.

[1] Mark Child, Research Manager, Software, Central and Eastern Europe Endpoint Security Software Market Shares, 2017 (market data for 2017) Available on IDC website

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Android用戶:請注意Google Play是行銷還是詐騙的伎倆?!

ESET資安專家發現Google Play又多了另一種新的詐騙手法,使其假冒的應用程式更易被使用者所信賴 – 至少,乍看上去。

而新手法的巧思為,一般Android用戶在Google Play瀏覽行動程式時,除了看到程式圖示與名稱之外,另一個就是開發者名稱,於是有些開發人員直接把開發者名稱設為大量的下載次數,以吸引或誘導使用者下載。

我們發現,高達數百款應用程式正在利用這一手法,或類似伎倆欺騙用戶。此類應用程式經分析後發現,這些程式有的功能很少,有的甚至毫無功能,但多數都有大量的廣告。

圖1 – 上傳至Google Play的應用程式,開發者名稱為“已下載10億(1,000,000,000) – 50億(5,000,000,000)人次”

圖2 -上傳至Google Play的應用程式,開發者名稱為“已安裝1億人次”(100 Million Downloads)

由於開發者名稱可隨意設定為任何數量,故就有某一家遊戲開發者試圖想讓用戶相信,其所開發的遊戲下載量竟然高達50億人次。(但事實上,在Google Play上要跨過10億下載門檻並不容易,統計顯示只有不到30款程式擁有超過10億的下載數量,它們多是使用者耳熟能詳的程式,像是Google Play、Gmail、Maps、YouTube、Facebook、WhatApp、Messenger、Instagram或Skype等,而諸如Dropbox或Line等熱門程式的下載量則還不到10億。)

圖3 -上傳至Google Play的應用程式,開發者名稱為“已安裝超過50億(5,000,000,000+)人次”

我們還發現有一名開發人員偶爾會切換自己的名稱,一下使用真正的名稱,一下使用下載數量的名稱,看似只是採用暫時的行銷手法來拉抬程式下載量。

圖4 –開發者名稱原為“已安裝10億(1,000,000,000)人次”,後更換為“pID APPS”

另有些開發人員會在名稱上使用「TM」(商標)或「✓」(打勾)符號來顯示自己的合法性,然而Google Play並沒有任何驗證開發者帳號的功能,純粹是開發人員仿照社交平台的作法而創造出來的,ESET資安專家認為,這反而讓這些程式看起來更可疑。

圖5 – 開發者使用假冒認證標識,證明自身合法性

雖然這樣的手法很簡單,但特別是對於那些經常選擇熱門程式來下載的Android用戶來說,我們認為它應該還是有效的。故ESET資安專家提供以下建議:

  • Android用戶應仔細瀏覽Google Play上所顯示的官方下載數字,具體位置是在頁面底部的“附加資訊”一欄中顯示。
  • Google並未提供程式或開發者的認證標章,它只使用“編輯選擇”類別,由應用程式頁面右上角的編輯選擇徽章標記。
  • 請在下載任何應用程式之前,最好先檢視其它用戶的評論。
  • 對於實際下載量很小,和/或幾天前才發佈的新款應用程式,無論您多麼需要這款軟體,建議都先觀察其他用戶的反應,以及避免成為不知名新程式的白老鼠。

最最重要的一點則是【安裝ESET行動安全套裝或ESET網路安全套裝多平台版】,讓您的行動裝置獲得更多的保障。

我要購買:https://www.eset.tw/estore/zh/

原文出處:https://www.welivesecurity.com/2018/06/11/android-popularity-faking-tricks-google-play

2018 足球狂熱 – ESET VS Malware










關於Version 2 Limited

Version 2 Limited是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 Limited 提供廣被市場讚賞的產品及服務。Version 2 Limited 的銷售網絡包括中國大陸、香港、澳門、台灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET

ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布里斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。 

ESET Threat Intelligence data improves detection

A test conducted by Whalebone, a provider of DNS filtering services, showed that adding Indicators of Compromise from ESET to DNS filtering detection data significantly improves detection.

Experts from Whalebone and ESET revealed the results of a DNS filtering test in their joint presentation at the IS2 Conference, an information security event held in Prague, Czech Republic. The test was run on a sample of 100,000 internet connections, representing around half a million connected devices in two countries, the Czech Republic and Slovakia.

Before, Whalebone had utilized Indicators of Compromise (IoC) generated via methods such as sandbox simulations, analysis of network traffic or utilizing known malware patterns. „We wanted to include detection data from endpoints as a new source of IoC, hoping for improved detection capability,“ said Robert Šefr, Whalebone’s Chief Technology Officer.

The test was aimed at confirming the expectation that including IoC from ESET Threat Intelligence would lead to new, previously unavailable detections – while keeping false positives at a minimum.

The test was run in the first quarter of 2018 and involved around 55,000 unique malicious domains in the tested IoC feed. Out of those, around 1100 domains were detected. 18.5% of the devices in the test made at least one attempt to contact a malicious domain from the feed; the overall number of incidents in the test was around 1.75 million. Out of those, around  half (866,000 incidents, precisely 49.51%) were detected based solely on the IoC provided by ESET – i.e., without data from ESET, these incidents would have gone undetected. Only 0.47% of incidents were detected based on both ESET’s and original Whalebone data; the remaining 50.02% of incidents were detected independently from ESET.

Out of the 866,000 incidents detected based on the IoC by ESET, only one single domain blocking was found to be a false positive.

„The Whalebone test clearly showed that rigorous categorization of data, which is paramount for ESET, allows for both a high detection rate and keeping false positives close to zero,“ comments Peter Dekýš, ESET’s IT Security Director.

“The testing has shown that by including IoC from ESET Threat Intelligence, detections significantly increased, with false positives amounting virtually to zero. Overall, the test has proven that it is appropriate to use endpoint-sourced IoC for DNS-level protection”, concludes Whalebone’s Robert Šefr.

For more information about ESET Threat Intelligence, please visit ESET Threat Intelligence.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

惡意的PDF樣本同時開採Adobe Reader與Windows漏洞

2018年3月下旬,ESET研究人員發現了一款不同尋常的PDF惡意樣本。經過專業分析後發現,其利用Adobe Reader的記憶體重覆釋放漏洞,以及舊版Windows權限擴張漏洞,結合兩個漏洞,駭客能以最高權限執行任意程式,而且只要求很少的使用者互動。
同時開採這兩個漏洞讓該攻擊程式的威力非常強大,將允許駭客於電腦以最高權限執行任意程式,而且只要求很少的使用者互動。APT駭客團隊常利用多個漏洞進行攻擊,例如去年Sednit發起的攻擊便是如此。
ESET在發現的同時間,即通知Adobe與微軟,他們也分別在5月修補了位於Adobe Reader中的CVE-2018-4990漏洞及Windows中的CVE-2018-8120漏洞,後者僅影響舊版Windows,包括Windows 7 SP1與Windows Server 2008 SP1/SP2。
受此影響的產品版本如下:
Acrobat DC(2018.011.20038及以下版本)
Acrobat Reader DC(2018.011.20038及以下版本)
Acrobat 2017(011.30079及以下版本)
Acrobat Reader DC 2017(2017.011.30079及以下版本)
Acrobat DC(2015經典版)(2015.006.30417及以下版本)
Acrobat Reader DC(2015經典版)(2015.006.30417及以下版本)
Windows 7 32位SP1
Windows 7 64位SP1
Windows Server 2008 32位SP2
Windows Server 2008安騰處理器版SP2
Windows Server 2008 64位SP2
Windows Server 2008 R2安騰處理器版SP1
Windows Server 2008 R2 64位SP1
以下為惡意樣本的技術細節及其所利用的漏洞。
PDF(可攜式文件格式)是一種電子檔格式。與其他常見文件格式相似,它可被攻擊者用來向受害者的電腦投遞惡意程式。但在執行自編惡意程式碼之前,攻擊者須首先找出並利用PDF閱讀器軟體中所蘊含的漏洞。PDF閱讀器有很多產品,其中使用較廣泛的一款就是Adobe Reader。
駭客若要利用PDF檔案展開攻擊,必須於PDF讀取軟體中找到可開採的安全漏洞,而在該樣本中,駭客發現了Adobe Reader中的記憶體重複釋放漏洞,並藉由嵌入式的JavaScript程式碼展開攻擊,取得記憶體的讀寫權限,並執行惡意程式。由於Adobe Reader具備沙箱功能,就算可執行惡意程式,駭客也必須繞過沙箱保護才能危害執行Adobe Reader的電腦
此次攻擊者成功找到安全性漏洞,並針對Adobe Reader軟體和作業系統編寫漏洞攻擊程式,是極其罕見的一起案例。
CVE-2018-4990 – Adobe Reader遠端控制設備安全性漏洞
該惡意PDF樣本中內含JavaScript程式碼,便於掌控整個漏洞攻擊過程。當PDF檔打開時,JavaScript程式碼便得以執行。
漏洞攻擊初期,JavaScript程式碼開始操控Button1物件。該物件中含有一張專門編制的JPEG2000圖片,利用後者觸發Adobe Reader之中的雙重釋放安全性漏洞。
圖1:操控Button1物件的JavaScript程式碼
該JavaScript利用heap-spray techniques,損壞內部資料架構。在實施所有上述操控步驟後,攻擊者便實現了其主要目標:掌控自編JavaScript程式碼的記憶體讀寫權。
圖2:用於實現記憶體讀寫的JavaScript程式碼
運用這兩項基本步驟,攻擊者便可找到EScript.api外掛程式的記憶體位置,即Adobe JavaScript引擎所在地址。然後再利用該模組的彙編指令(返回導向程式設計工具,即ROP外掛程式),使惡意JavaScript設置返回導向程式設計鏈,從而達到執行native shellcode的目的。
圖3:產生返回導向程式設計鏈的惡意JavaScript
最後一步,shellcode會初始化PDF文檔中已嵌入的一個可移植執行體(PE)檔,並向其傳達執行指令。
CVE-2018-8120 – Microsoft Windows系統許可權提升漏洞
利用Adobe Reader之中的安全性漏洞後,攻擊者還需要攻陷沙箱。這正是接下來要探討的第二步漏洞攻擊的用意所在。
這一先前未知漏洞之所以存在的根源在於,Windows內核組件Win32k之中的NtUserSetImeInfoEx函數。具體來說,SetImeInfoEx subroutine of NtUserSetImeInfoEx不驗證資料指標,從而允許引用NULL pointer dereference。
圖4:分解後的SetImeInfoEx routine
從圖4可明顯看出,SetImeInfoEx函數中的第一個參數原本期待,指標指向視窗工作站物件。如攻擊者新建視窗工作站物件,並在使用者模式下將其分配給當前進程,則spklList可等於零。故而,通過NULL page並將指標設置為偏移量0×2C,攻擊者便可利用該漏洞,在核空間中寫入任意位址。需注意的是,Windows 8及以上系統中,已不允許使用者進程NULL page。
由於攻擊者擁有寫入任意代碼的基本許可權,便可運用各類技術實施攻擊。本例中,攻擊者選擇使用由Ivanlef0u和Mateusz “j00ru” Jurczyk及Gynvael Coldwin已描述過的一項技術,通過重寫通用描述元表(GDT)的方式,將調用門設置為Ring 0。具體操作是,攻擊者運用保存通用描述元表(SGDT)的彙編指令,獲取GDT原始位址,建立自編描述符表,然後再利用上述漏洞,重新寫入原表。
然後該漏洞攻擊法使用CALL FAR指令,執行相互特權級調用。
圖5:分解後的CALL FAR指令
當核心模式執行代碼後,攻擊者會將當前the token更換為the system token。
結論
ESET研究人員表示雖然該樣本並未完成,但足已顯示駭客發現漏洞與撰寫攻擊程式的技術高超。
全球資安大廠ESET一直致力開發主動偵測、多層級的安全技術,並結合自動化的機器學習和人類知識,基於30 年的研究經驗,為各種規模的企業和端點平台,提供主動和智慧的防護產品或解決方案。連年榮獲Virus Bulletin 100獎項肯定, 優異的成績持續保持業界領先地位。全球擁有超過1億的用戶,代理機構遍及全球超過180個國家,支援多種語系,並提供在地化的服務協助、是個人及企業值得信賴的資安領導品牌。若有任何資安需求,歡迎洽詢ESET資安專業團隊,服務電話:(02)7722-6899,或上官網查詢:https://www.eset.tw/

台灣二版【2018年度經銷商認證活動】已成功圓滿落幕;最新「黃金級經銷商」名單出爐!

近年資安事件層出不窮及資安威脅日益擴大下,2018年度台灣二版同樣擴大招募全台經銷夥伴,期望對於用戶的服務範圍透過認證方式能更加完整。今年已於5月9~17日在北中部舉辦的歷年經銷商認證活動也在新舊經銷商夥伴熱烈的支持下,成功圓滿落幕!
今年除了加強全系列資安產品、工具型產品及企業資安解決方案的說明外,又新增了2個產品課程,為【智能網路流量監控分析軟體(GREYCORTEX)】及【資安威脅情報服務(ESET THREAT INTELLIGENCE)】,讓課程緊湊、豐富,也有助於經銷商提供客戶更完善的全面資安防護建議及服務,並與台灣二版更加緊密的合作。
以下為今年通過獨家代理商台灣二版認證後–最新的「黃金級經銷商」名單,企業若有資安相關需求,皆可以透過這些認證過之專業經銷商夥伴,得到最佳完整的服務。
查詢今年最新認證廠商資訊: https://www.eset.tw/purchase/shop
另外今年首度得到媒體CIO IT經理人之友情贊助,於活動期間提供資安專刊給所有的與會經銷商夥伴,讓大家於課程中除了更加熟悉ESET的系列產品外,還能同步掌握資安趨勢及知識,真的是收穫滿滿,在這裡也特別謝謝他們的支持與協助。
最後感謝所有合作夥伴對於2018年度經銷商認證活動的熱情參與,活動成功圓滿落幕,今年還有未能報名與參與的資安廠商們,每年二版都將於五月份舉辦大會,期望來年再度給予支持並與台灣二版攜手共創佳績,若有相關產品與活動快訊,也歡迎隨時電洽台灣二版總代理~
感謝媒體贊助:
CIO IT經理人: http://www.cio.com.tw/
 
 
【當日活動照片】
ESET亞太區總代理  台灣二版(Version 2)
ESET官方網站:www.eset.tw
客服電話:02-7722-6899
技術支援信箱:support@version-2.tw
 
關於台灣二版Version 2
Version 2 是亞洲其中一間最有活力的IT公司,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,當中包括通訊系統、資安、網路、多媒體及消費市場產品。透過公司龐大的銷售點、經銷商及合作伙伴,Version 2提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括香港、中國、台灣、新加坡、澳門等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、學術機構、政府部門、無數成功的中小企業及來自亞洲各城市的消費市場客戶。
關於ESET
國際資安大廠ESET成立於1992年, 總部設立在歐洲斯洛伐克, 為全球企業與個人用戶的電腦資訊安全軟體提供商, 其主力產品《ESET NOD32 Antivirus防毒軟體》與《ESET Internet Security網路安全套裝》, 能夠防禦各種已知或未知病毒、間諜軟體、Rootkits、網路釣魚及各種網際網路型威脅。ESET企業安全解決方案(ESET Business Security Solutions)是針對企業複雜網路環境提供最高等級的全面防護規劃,舉凡公司資訊流的傳遞、內外部檔案或郵件的監控,進而到使用者登入的合法性管理等功能;ESET皆能利用集中管理系統,讓資訊人員簡易快速的掌握最新的安全狀況,並秉持著ESET三十年來的專精技術,成功的為企業打造安全防護網,更同時讓企業兼顧管理成本與系統運作效能,成為業界深受信賴的專業資安守護神。
ESET全系列防毒產品占用系統資源最少、偵測速度最快、防禦能力最強, 可提供有效的保護, 並連年榮獲Virus Bulletin 100獎項肯定, 優異的成績持續保持業界領先地位。ESET連續五年被評為”德勤高科技快速成長500強”(Deloitte’s Technology Fast 500)公司, 擁有廣泛的合作夥伴, 包括佳能、戴爾、微軟等國際知名公司, 在布拉迪斯拉發(斯洛伐克) 、布里斯托爾(英國) 、布宜諾斯艾利斯(阿根廷) 、布拉格(捷克) 、聖地亞哥(美國)等地均設有辦事處, 全球擁有超過1億的用戶,代理機構遍及全球超過180個國家,支援多種語系,並提供在地化的服務協助、是個人及企業值得信賴的防毒軟體品牌。
 

Why GDPR affects companies around the world (video)

As you all know, today, May 25, is the day that GDPR comes into force in the European Union; legislation that will affect companies and citizens around the world, not just in the EU. This is explained by Anscombe, in a video that will hopefully help clarify some of the particulars regarding the new legislation.

GDPR returns control of personal data to the user/customer. In this sense, GDPR makes it mandatory to have the user’s consent for the use of their personal data. Also, obtaining that consent by the user entails certain responsibilities for the company or organization, as it must ensure that this information is collected by the correct persons. This information may only be stored for a period of time and that these data are encrypted.

GDPR affects globally and just within the EU

Some might find the topic concerning who is affected and where they are affected confusing, but Anscombe explains exactly how it will work: “If a user is in Europe and connects to a website or service outside Europe, that service has to provide the same privileges as if operating from Europe, which must comply with the new regulations that imposes  GDPR,” he explained.

Another example mentioned is the case of the non-European citizen, who is occasionally in EU territory and who connects to a website that they usually use when they are outside Europe. In this case, the site must comply with the new legislation, since GDPR applies to everyone who is in the EU at that time – not just its citizens.

Therefore, if you provide services or if your site has visitors from the EU it is important that you consider the changes that have come into force, that you prepare a plan and that you make sure you comply with GDPR.

You may also be interested in any of the following items:

Are firms and regulators prepared for GDPR?

Last call for GDPR

GDPR: One rule to rule them all – legally

For more information on GDPR, ESET has a dedicated page to help ensure that you have all the information needed to cope with GDPR. To read more articles like this one and the ones listed above, please follow our library of related content here on WeLiveSecurity.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

【ESET 產品-107年第一次電腦軟體共同供應契約採購(1070201)】 決標公告

「107年第一次電腦軟體共同供應契約採購(1070201)」
已於107年5月3日完成品項之決標作業,
並於5月10日於政府電子採購網上架決標品項供各適用機關進行採購,
相關決標資訊詳情請參考政府電子採購網:http://web.pcc.gov.tw/pishtml/pisindex.html
 
群組 項次 品名 單套授權數 級距
 3  13  ESET Endpoint Protection Standard 端點防護標準版 (一年授權) + 黃金服務B方案  1   25-99
 3  14  ESET Endpoint Protection Standard 端點防護標準版 (一年授權) + 黃金服務B方案  1   100-199
 3  15  ESET Mail Security 郵件伺服器安全(一年授權) + 黃金服務B方案  1  100-199
 3  16  ESET Virtualization Security 虛擬化安全(一年授權) (以處理器數量計價) + 黃金服務B方案  1  1-10
 4  13  ESET School Site License 國小/國中/高中職 全校500台(一年授權)(單套授權數500U) + 黃金服務B方案  500  1-500
  
感謝各位對ESET系列產品的支持與愛護,
若有問題歡迎來電洽詢ESET業務部門(02)7722-6899,或來信至:enterprise@version-2.com.tw
 
*政府標案合作廠商: https://www.eset.tw/purchase/gov/