Try our new research platform with insights from 80,000+ expert users

ESET EDR/XDR vs Keyless comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ESET EDR/XDR
Ranking in Authentication Systems
16th
Average Rating
8.6
Reviews Sentiment
4.7
Number of Reviews
4
Ranking in other categories
Endpoint Detection and Response (EDR) (31st), Extended Detection and Response (XDR) (23rd)
Keyless
Ranking in Authentication Systems
79th
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of November 2025, in the Authentication Systems category, the mindshare of ESET EDR/XDR is 0.3%, up from 0.2% compared to the previous year. The mindshare of Keyless is 0.2%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Market Share Distribution
ProductMarket Share (%)
ESET EDR/XDR0.3%
Keyless0.2%
Other99.5%
Authentication Systems
 

Featured Reviews

GirdharMishra - PeerSpot reviewer
Centralized monitoring has improved threat visibility and reduced incident response time
In terms of valuable features in ESET EDR/XDR, we focus on endpoint device management as well as for the firewall team, including our log analysis and monitoring the firewall, which are three significant functions for us. ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact. Regarding the usefulness of ESET EDR/XDR's behavior-based analysis in detecting potential breaches, we have identified some files or configuration files that should remain static, and if any changes occur without proper change management, we are able to identify those changes, including detecting zero-day attacks. The integration of threat intelligence feeds has helped our response strategies, as we are using Oracle OCA-based data analysis, and we have integrated it so that logs are forwarded to our SIEM, allowing us to analyze the data effectively. I evaluate the impact of centralized management on our security operations as very useful because it eliminates the need to log into individual systems to find sources, allowing us to identify all types of risks and vulnerabilities from a single desk.
Use Keyless?
Share your opinion
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
872,869 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
18%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
10%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What needs improvement with ESET EDR/XDR?
I just deploy and forget it, so I don't get into much detail about improvements. The major setback we face with ESET EDR_XDR is related to costing limitations.
Ask a question
Earn 20 points
 

Also Known As

ESET Secure Authentication
No data available
 

Overview

 

Sample Customers

Mitsubishi Motors, Canon
1. Airbnb 2. Amazon 3. Apple 4. BMW 5. Cisco 6. Coca-Cola 7. Dell 8. Equinox 9. FedEx 10. Google 11. Hewlett Packard Enterprise 12. Home Depot 13. IBM 14. Intel 15. Johnson & Johnson 16. JPMorgan Chase 17. Kroger 18. Lockheed Martin 19. McDonalds 20. Merck 21. Microsoft 22. Nike 23. Oracle 24. PepsiCo 25. Procter & Gamble 26. PwC 27. SAP 28. Siemens 29. Tesla 30. Toyota 31. Visa 32. Walmart
Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: November 2025.
872,869 professionals have used our research since 2012.