Try our new research platform with insights from 80,000+ expert users

ESET EDR/XDR vs OpenText Endpoint Response comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 19, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ESET EDR/XDR
Ranking in Endpoint Detection and Response (EDR)
58th
Average Rating
8.6
Reviews Sentiment
4.7
Number of Reviews
4
Ranking in other categories
Authentication Systems (53rd), Extended Detection and Response (XDR) (36th)
OpenText Endpoint Response
Ranking in Endpoint Detection and Response (EDR)
68th
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Endpoint Detection and Response (EDR) category, the mindshare of ESET EDR/XDR is 0.9%, up from 0.4% compared to the previous year. The mindshare of OpenText Endpoint Response is 0.2%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Market Share Distribution
ProductMarket Share (%)
ESET EDR/XDR0.9%
OpenText Endpoint Response0.2%
Other98.9%
Endpoint Detection and Response (EDR)
 

Featured Reviews

GirdharMishra - PeerSpot reviewer
Centralized monitoring has improved threat visibility and reduced incident response time
In terms of valuable features in ESET EDR/XDR, we focus on endpoint device management as well as for the firewall team, including our log analysis and monitoring the firewall, which are three significant functions for us. ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact. Regarding the usefulness of ESET EDR/XDR's behavior-based analysis in detecting potential breaches, we have identified some files or configuration files that should remain static, and if any changes occur without proper change management, we are able to identify those changes, including detecting zero-day attacks. The integration of threat intelligence feeds has helped our response strategies, as we are using Oracle OCA-based data analysis, and we have integrated it so that logs are forwarded to our SIEM, allowing us to analyze the data effectively. I evaluate the impact of centralized management on our security operations as very useful because it eliminates the need to log into individual systems to find sources, allowing us to identify all types of risks and vulnerabilities from a single desk.
Use OpenText Endpoint Response?
Share your opinion
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
872,706 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
17%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
10%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What needs improvement with ESET EDR/XDR?
I just deploy and forget it, so I don't get into much detail about improvements. The major setback we face with ESET EDR_XDR is related to costing limitations.
Ask a question
Earn 20 points
 

Also Known As

ESET Secure Authentication
No data available
 

Overview

 

Sample Customers

Mitsubishi Motors, Canon
The Auto Club Group (ACG), SITE Centers, Hospital system, Temperzone Australia, County of Los Angeles, Department of Human Resources
Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Detection and Response (EDR). Updated: January 2025.
872,706 professionals have used our research since 2012.