Try our new research platform with insights from 80,000+ expert users

ESET EDR/XDR vs Threat Detection, Investigation & Response (TDIR) Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ESET EDR/XDR
Ranking in Extended Detection and Response (XDR)
36th
Average Rating
8.6
Reviews Sentiment
4.7
Number of Reviews
4
Ranking in other categories
Authentication Systems (53rd), Endpoint Detection and Response (EDR) (58th)
Threat Detection, Investiga...
Ranking in Extended Detection and Response (XDR)
57th
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Identity Threat Detection and Response (ITDR) (33rd)
 

Mindshare comparison

As of October 2025, in the Extended Detection and Response (XDR) category, the mindshare of ESET EDR/XDR is 1.5%, up from 0.6% compared to the previous year. The mindshare of Threat Detection, Investigation & Response (TDIR) Platform is 0.1%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Extended Detection and Response (XDR) Market Share Distribution
ProductMarket Share (%)
ESET EDR/XDR1.5%
Threat Detection, Investigation & Response (TDIR) Platform0.1%
Other98.4%
Extended Detection and Response (XDR)
 

Featured Reviews

GirdharMishra - PeerSpot reviewer
Centralized monitoring has improved threat visibility and reduced incident response time
In terms of valuable features in ESET EDR/XDR, we focus on endpoint device management as well as for the firewall team, including our log analysis and monitoring the firewall, which are three significant functions for us. ESET EDR/XDR has automated threat detection that gives us real-time incident alerts, and it helps us proactively receive and work on incidents that could have an impact. Regarding the usefulness of ESET EDR/XDR's behavior-based analysis in detecting potential breaches, we have identified some files or configuration files that should remain static, and if any changes occur without proper change management, we are able to identify those changes, including detecting zero-day attacks. The integration of threat intelligence feeds has helped our response strategies, as we are using Oracle OCA-based data analysis, and we have integrated it so that logs are forwarded to our SIEM, allowing us to analyze the data effectively. I evaluate the impact of centralized management on our security operations as very useful because it eliminates the need to log into individual systems to find sources, allowing us to identify all types of risks and vulnerabilities from a single desk.
Use Threat Detection, Investigation & Response (TDIR) Platform?
Share your opinion
report
Use our free recommendation engine to learn which Extended Detection and Response (XDR) solutions are best for your needs.
872,706 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
17%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
10%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What needs improvement with ESET EDR/XDR?
I just deploy and forget it, so I don't get into much detail about improvements. The major setback we face with ESET EDR_XDR is related to costing limitations.
Ask a question
Earn 20 points
 

Also Known As

ESET Secure Authentication
ClearSkies NG Endpoint Detection and Response, ClearSkies NG EDR
 

Overview

 

Sample Customers

Mitsubishi Motors, Canon
Information Not Available
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Extended Detection and Response (XDR). Updated: September 2025.
872,706 professionals have used our research since 2012.