Try our new research platform with insights from 80,000+ expert users

ESET EDR/XDR vs Thales Authenticators comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ESET EDR/XDR
Ranking in Authentication Systems
18th
Average Rating
8.6
Reviews Sentiment
4.7
Number of Reviews
4
Ranking in other categories
Endpoint Detection and Response (EDR) (27th), Extended Detection and Response (XDR) (23rd)
Thales Authenticators
Ranking in Authentication Systems
11th
Average Rating
8.0
Reviews Sentiment
7.6
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Authentication Systems category, the mindshare of ESET EDR/XDR is 0.4%, up from 0.2% compared to the previous year. The mindshare of Thales Authenticators is 2.3%, up from 2.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Authentication Systems Market Share Distribution
ProductMarket Share (%)
Thales Authenticators2.3%
ESET EDR/XDR0.4%
Other97.3%
Authentication Systems
 

Featured Reviews

GirdharMishra - PeerSpot reviewer
Program Manager at iONE IT Solutions
Centralized monitoring has improved threat visibility and reduced incident response time
In terms of valuable features in ESET EDR/XDR, we focus on endpoint device management as well as for the firewall team, including our log analysis and monitoring the firewall, which are three significant functions for us. ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact. Regarding the usefulness of ESET EDR/XDR's behavior-based analysis in detecting potential breaches, we have identified some files or configuration files that should remain static, and if any changes occur without proper change management, we are able to identify those changes, including detecting zero-day attacks. The integration of threat intelligence feeds has helped our response strategies, as we are using Oracle OCA-based data analysis, and we have integrated it so that logs are forwarded to our SIEM, allowing us to analyze the data effectively. I evaluate the impact of centralized management on our security operations as very useful because it eliminates the need to log into individual systems to find sources, allowing us to identify all types of risks and vulnerabilities from a single desk.
Gustavo Merighi - PeerSpot reviewer
Automation and Telecommunications Analyst at Grupo Energisa
Has an easy-to-use management interface and a straightforward initial setup process
Our primary use cases include multifactor authentication for VPN connections and access to security tools like jump servers and firewalls. We also use it to enhance security measures in an enterprise environment The most valuable feature is the YAML 2.0 integration. It has an easy-to-use…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The initial setup of ESET EDR_XDR is very simple, easy to deploy, and manage."
"The solution is easy to use."
"It is pretty easy to install without any hassles, and ESET EDR_XDR has its own cloud portal where everything is available."
"ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact."
"ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact."
"We use this solution to log into virtual machines like VMware and VMware Horizon."
"I like how the solution allows me to support different types of hardware tokens and integrate with OTP."
"Scalable and stable."
"The technical support services are good."
"The most valuable feature of SafeNet Authentication Manager is authentication."
 

Cons

"The memory and CPU footprint can affect performance. It sometimes slows down the CPU performance."
"ESET EDR_XDR needs to conduct more research and development and innovations in early detection of attacks."
"The solution could improve how it scours each website."
"The product could be improved by adding more features for sending tokens via SMS or phone calls."
"The stability could improve."
"The solution should allow for support of multi-tenant architecture."
"The problem with SafeNet is that it's not integrated with Microsoft 365."
"Lacks integration with other platforms."
 

Pricing and Cost Advice

"I rate the solution’s pricing a six or seven out of ten.."
"Thales is more expensive than its competitors."
"There is an annual licensing fee."
report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
17%
Financial Services Firm
12%
Computer Software Company
8%
Manufacturing Company
8%
Financial Services Firm
14%
Government
10%
Manufacturing Company
9%
Performing Arts
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for ESET EDR/XDR?
I find the price of ESET EDR/XDR to be competitive to the market, which is a reasonable aspect for us.
What needs improvement with ESET EDR/XDR?
I just deploy and forget it, so I don't get into much detail about improvements. The major setback we face with ESET EDR_XDR is related to costing limitations.
What advice do you have for others considering ESET EDR/XDR?
We might get good pricing one year, and then the next year there could be significant pricing issues. Integration with ESET EDR_XDR is easy, though we don't integrate it with many products. It is p...
What needs improvement with Thales Authenticators?
Currently, the solution fulfills our requirements. We are very satisfied with its features, and do not have any specific ideas for improvement right now. Perhaps, in the future, three-factor authen...
What is your primary use case for Thales Authenticators?
Our employees, whether working on-site or remotely, use Thales Authenticators for two-factor authentication to log in to their laptops or PCs. This is our primary use case.
What advice do you have for others considering Thales Authenticators?
From our past years of experience, the solution is very smooth, and we have had a good experience with it. We would definitely recommend Thales to others for its reliability and features. I'd rate ...
 

Also Known As

ESET Secure Authentication
Gemalto Ezio, Ezio, Gemalto Authenticators, SafeNet Authentication Manager
 

Overview

 

Sample Customers

Mitsubishi Motors, Canon
Standard Chartered Bank (SCB)
Find out what your peers are saying about ESET EDR/XDR vs. Thales Authenticators and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.