After winning the competitive bidding, Datastream became the provider of the ESET Endpoint Security solution with a license to continue its use for the protection of 17,095 workplaces, as well as for the protection of an additional 4,925 workplaces (the right to use this software without the right to transfer the software itself and/or authorization for its use by third parties) within 12 months.
As part of the implementation of this project, for the National Police of Ukraine were also supplied the ESET Endpoint Protection Standard antivirus solution with a license to continue its use for the protection of file servers for 100 objects (the right to use this software without the right to transfer the software itself and/or authorization for its use by third parties) within 12 months.
It should be noted that the software products have been supplied as part of the procurement meet the requirements of the current state standards and have positive expert opinions of The State Service of Special Communications and Information Protection of Ukraine (SSSCIP)
Datastream technicians regularly undergo annual certification and pass exams to confirm the status of a partner. The theoretical knowledge gained in the learning process and, most importantly, practical skills, our specialists are confidently used in working with real projects, professionally controlling all stages in the course of their implementation. Datastream specialists testify to the qualification and high level of awareness of ESET decision -making.
ESET Endpoint Security – proactive protection of computers and laptops with multi-level detection of malicious programs. Thanks to the built-in modules — Antivirus, Antispyware, Firewall and Web control — the solution provides comprehensive protection against known and previously unknown types of viruses, Trojans and spyware, rootkits and many other types of Internet threats.
ESET Endpoint Protection Standard is a comprehensive solution, a package of ESET programs for ensuring the security of the corporate network and protecting computers, laptops, smartphones, and file servers from various types of threats and theft of confidential information.