Eset launches Cloud Workload Protection for virtual machines in the public cloud and simultaneously rolls out AI features within the Protect platform.
At RSAC 2026, Eset is announcing a series of innovations for the Eset Protect platform, including the new Cloud Workload Protection module. The solution is aimed at companies looking to better secure their cloud environments without extra complexity or costs. Cloud Workload Protection is offered as an integrated solution to existing Protect customers, with the exception of Protect Entry users.
Cloud Workload Protection was developed to protect virtual machines in public cloud environments such as AWS, Azure, and Google Cloud against cyber threats. The module imports VM data directly into the Eset Protect XDR platform, giving organizations a complete overview of endpoints and cloud workloads within a single central dashboard.
Cloud Workload Protection
According to Eset, approximately 80% of organizations rely heavily on public cloud services for their digital strategies. The new module helps limit the attack surface by applying AI-driven automation and extending security to virtual machines. This is significant given the average cost of $5.17 million per cloud data breach, the highest of all IT environments.
read also
Eset introduces Cloud Workload Protection for virtual machines
Cloud Workload Protection is included as standard for Eset Protect customers. With the new module, IT managers can validate controls and easily generate audit evidence for frameworks such as NIST, CIS, HIPAA, and PCI DSS.
AI Innovations
Additional updates include new AI reporting within Eset LiveGuard Advanced. Security specialists now receive behavioral reports with detailed insights into incidents, supplemented by autonomous remediation actions and AI-generated summaries. This makes complex analyses more accessible and accelerates incident management.
read also
First AI-generated Ransomware Discovered by ESET
Furthermore, incident graphs and investigation options for EDR and XDR customers have been improved. Incidents now show visual timelines, identity information, and contextual details, allowing security teams to more quickly recognize the causes and progression of attacks. Extensive search functions provide flexible investigation based on security indicators and events from various environments.
