Author: David Gadnyx

ESET 2-Click Update Opt-Out We understand the 2-Click update may not be desirable to all resellers. We kindly ask you please opt-out by filling in the form below. The 2 Click-Upgrade Campaign enables your customers to experience security features from the tier above their current subscription for the remainder of their expiry, entirely free for up to 2 months! It requires no uninstall/reinstall and automatically updates. For example, if the user is currently using ESET NOD32, they will be prompted with a message in-product for a free upgrade to ESET Home Security Essentials, this will give them access to ESET Banking…

Read More

This spring, we’re coming to a city near you to catch up in person! We’ll have the latest from ESET, share the features of Safetica and introduce you to our newest vendor, the red hot WatchGuard! We’ll be touching on consumer and deep diving into business products, with live demo’s, product tips and keeping things Kiwi, we’re also going to let you in on the latest Threat Intelligence from ESET. We’ll be taking a detailed look at how New Zealand threats compare to global attack behavior and also look at recent breach trends suffered on New Zealand shores over the last…

Read More

Customer POC Information Requerements Please enable JavaScript in your browser to complete this form.Please enable JavaScript in your browser to complete this form. This is only available within business hours – 7 am-7 pm, Monday to Friday Max 30-day trial – Must start at the beginning of the month – no onboarding mid-month Up to 250 seats without needing TSM approval Minimum seat count – 25 Note: if the site has 100 seats, 100 machines will be onboarded into MDR. CLIENT INFO & LICENSING REQUIRMENTS Client Name * Are you a current ESET customer? * Yes No What ESET products…

Read More

In today’s rapidly evolving digital landscape, enterprises face increasing challenges in maintaining robust security while ensuring seamless user experience. This workshop is designed to equip IT professionals and security administrators with the knowledge and skills needed to implement effective password reduction solutions, enhance post-authentication security controls and deploy secure enterprise browsers.

Read More