Try our new research platform with insights from 80,000+ expert users

ESET EDR/XDR vs RSA Adaptive Authentication comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ESET EDR/XDR
Ranking in Authentication Systems
18th
Average Rating
8.6
Reviews Sentiment
4.7
Number of Reviews
4
Ranking in other categories
Endpoint Detection and Response (EDR) (27th), Extended Detection and Response (XDR) (23rd)
RSA Adaptive Authentication
Ranking in Authentication Systems
27th
Average Rating
6.8
Number of Reviews
6
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Authentication Systems category, the mindshare of ESET EDR/XDR is 0.4%, up from 0.2% compared to the previous year. The mindshare of RSA Adaptive Authentication is 1.2%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Market Share Distribution
ProductMarket Share (%)
ESET EDR/XDR0.4%
RSA Adaptive Authentication1.2%
Other98.4%
Authentication Systems
 

Featured Reviews

GirdharMishra - PeerSpot reviewer
Program Manager at iONE IT Solutions
Centralized monitoring has improved threat visibility and reduced incident response time
In terms of valuable features in ESET EDR/XDR, we focus on endpoint device management as well as for the firewall team, including our log analysis and monitoring the firewall, which are three significant functions for us. ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact. Regarding the usefulness of ESET EDR/XDR's behavior-based analysis in detecting potential breaches, we have identified some files or configuration files that should remain static, and if any changes occur without proper change management, we are able to identify those changes, including detecting zero-day attacks. The integration of threat intelligence feeds has helped our response strategies, as we are using Oracle OCA-based data analysis, and we have integrated it so that logs are forwarded to our SIEM, allowing us to analyze the data effectively. I evaluate the impact of centralized management on our security operations as very useful because it eliminates the need to log into individual systems to find sources, allowing us to identify all types of risks and vulnerabilities from a single desk.
Directorc4e7 - PeerSpot reviewer
Director of Cyber Security at a financial services firm with 1,001-5,000 employees
We need better ease of use; the product is overly complicated
There are many use cases that we have defined based on our business needs Ingestion of logs and raising alert space on those logs are the most valuable features. The product is basically unusable. We need better ease of use; it's overly complicated. It has taken years to implement. We used RSA…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is easy to use."
"ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact."
"The initial setup of ESET EDR_XDR is very simple, easy to deploy, and manage."
"It is pretty easy to install without any hassles, and ESET EDR_XDR has its own cloud portal where everything is available."
"ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact."
"The most valuable feature is the stock tokens. That works the best for us."
"Risk Engine’s risk score, eFN, GeoIP, and device binding all coming together in the Policy Rules to decide when to escalate to MFA."
"Ingestion of logs and raising alert space on those logs are the most valuable features."
"The capability to manage your business policy related to security when required without vendor involvement."
"Our customer are seeing value from the product, as they experience cost reductions. They can stop fraud from their customers, then their customers can have a better experience from their services."
 

Cons

"The memory and CPU footprint can affect performance. It sometimes slows down the CPU performance."
"The solution could improve how it scours each website."
"ESET EDR_XDR needs to conduct more research and development and innovations in early detection of attacks."
"Reporting modules is one of the major areas that can be improved further."
"RSA Adaptive Authentication lacks a mechanism to verify the identity of a new user in the Enrollment event workflow."
"It has taken years to implement."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive. You can only filter by certain fields in the transaction."
"I would like to see a more adaptive type of solution, something that we could use on our web pages..."
"The product is basically unusable. We need better ease of use; it's overly complicated."
 

Pricing and Cost Advice

"I rate the solution’s pricing a six or seven out of ten.."
"You may need to opt for second best if funding is low and the number of users is huge. However, the pricing is able to be negotiated if your user figures are huge."
"Keep the proxy service layer on premises. That consumes SaaS security services on the back-end."
"The pricing is $50 per head, yearly."
"Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive infrastructure for customers because the solution costs around $100,000, and the infrastructure needed to support that solution may be even more expensive than that price."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
17%
Financial Services Firm
12%
Computer Software Company
8%
Manufacturing Company
8%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Midsize Enterprise1
Large Enterprise6
 

Questions from the Community

What is your experience regarding pricing and costs for ESET EDR/XDR?
I find the price of ESET EDR/XDR to be competitive to the market, which is a reasonable aspect for us.
What needs improvement with ESET EDR/XDR?
I just deploy and forget it, so I don't get into much detail about improvements. The major setback we face with ESET EDR_XDR is related to costing limitations.
What advice do you have for others considering ESET EDR/XDR?
We might get good pricing one year, and then the next year there could be significant pricing issues. Integration with ESET EDR_XDR is easy, though we don't integrate it with many products. It is p...
Ask a question
Earn 20 points
 

Also Known As

ESET Secure Authentication
No data available
 

Overview

 

Sample Customers

Mitsubishi Motors, Canon
ADP, Ameritas, Partners Healthcare
Find out what your peers are saying about ESET EDR/XDR vs. RSA Adaptive Authentication and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.