Try our new research platform with insights from 80,000+ expert users

ESET EDR/XDR vs Ping Identity Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ESET EDR/XDR
Ranking in Authentication Systems
39th
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
2
Ranking in other categories
Endpoint Detection and Response (EDR) (62nd), Extended Detection and Response (XDR) (38th)
Ping Identity Platform
Ranking in Authentication Systems
6th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
29
Ranking in other categories
Single Sign-On (SSO) (4th), Data Governance (8th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (6th), Access Management (4th), Customer Identity and Access Management (CIAM) (2nd), Directory Servers (1st)
 

Mindshare comparison

As of May 2025, in the Authentication Systems category, the mindshare of ESET EDR/XDR is 0.2%, up from 0.2% compared to the previous year. The mindshare of Ping Identity Platform is 3.6%, down from 4.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems
 

Featured Reviews

PB
Achieves robust data protection and reliable security with the help of advanced automation features
We promote customers to purchase our ESET EDR_XDR and Data Loss Prevention (DLP) solutions. In our office, with about one hundred and fifty people, we use ESET EDR_XDR personally to protect data from unauthorized threats and gain early awareness to protect against cyber attacks The cost and basic…
Dilip Reddy - PeerSpot reviewer
Easy to use but requires improvements in the area of stability
In my company, we have worked on authorization, and I know that there are different types of grants. We have worked on the authorization code, client credentials, and ROPC grant. There are two types of tokens, like the JWT token and internally managed reference tokens. JWT tokens are useful for finding information related to the claim requests. Internally managed reference tokens are useful for dealing with visual data and information. For the clients to fit the user information, they need to do additional work to fit all the user info into the site, which is to define and validate the token issue and provide the request for VPNs. I worked on the key differences between the authorization code and implicit grant. In the authorization code type, you will have the authorization code issued initially to the client, and the client has to exchange it with the authorization server, like using a DAC channel to get the access token. In implicit grants, tokens are issued right away if the application is a single-page application. We can either use the authorization code or an implicit grant.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is easy to use."
"The initial setup of ESET EDR_XDR is very simple, easy to deploy, and manage."
"It gets a mobility portal in place in conjunction with Office 365. It provides very good possibilities and it's much better than other technology that we have used before which was unstable and slower."
"It is a scalable solution."
"It's pretty stable as a product."
"The solution has a smooth and configurable user interface for single sign-on capabilities."
"It is a scalable solution...It is a stable solution."
"It is a very stable solution."
"The product's most valuable features include its cloud-based capabilities for handling cloud applications and providing authentication and authorization through OIDC and SAML. It also supports integrations needed for both local and internal applications, including legacy applications requiring web server access."
"What I like best about PingID is that it's very user-friendly. PingID is well-built as a developer tool and regularly upgrades and updates via patches. I also like that PingID has clear documents that will help you integrate it with other solutions."
 

Cons

"The solution could improve how it scours each website."
"ESET EDR_XDR needs to conduct more research and development and innovations in early detection of attacks."
"Some colleagues have mentioned API connectivity, data security, and privacy issues."
"There is room for improvement in the solution, particularly in security."
"Ping Identity Platform must improve its UI since its management console is complicated."
"PingID would benefit from a better user interface for integration."
"They could enhance the product's device tracking for better zero-trust security would be beneficial. Currently, it tracks IPs well but lacks detailed device information, which is crucial from a security standpoint."
"The timing of the token validity, if it could be extended, would be great. I'm not sure if there is even an option to configure these types of settings."
"PingAccess can only have one token provider, and you cannot enable two different token providers simultaneously."
"We had issues with the stability."
 

Pricing and Cost Advice

"I rate the solution’s pricing a six or seven out of ten.."
"The product is costly."
"Ping Identity Platform is not an expensive solution."
"Compared to some SaaS-based solutions, the platform is relatively cost-effective."
"The pricing is neither too expensive nor too cheap."
"PingID's pricing is pretty competitive."
"Ping Identity Platform is not very expensive."
"Ping offers flexible pricing that's not standardized."
"The tool is quite affordable."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
22%
Computer Software Company
14%
Financial Services Firm
12%
Manufacturing Company
7%
Financial Services Firm
26%
Computer Software Company
10%
Manufacturing Company
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for ESET EDR/XDR?
I rate the solution’s pricing a six or seven out of ten. Our customers have a yearly license with no additional costs.
What needs improvement with ESET EDR/XDR?
The solution could improve how it scours each website.
What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
 

Also Known As

ESET Secure Authentication
Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
 

Overview

 

Sample Customers

Mitsubishi Motors, Canon
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems. Updated: April 2025.
850,028 professionals have used our research since 2012.