ESET PROTECT Enterprise and Wazuh are both contenders in the comprehensive security management solutions market. ESET PROTECT Enterprise appears to have an advantage in terms of user support and pricing satisfaction, whereas Wazuh is favored for its feature value.
Features: ESET PROTECT Enterprise is noted for its powerful threat monitoring, effective reporting capabilities, and seamless integration with other security tools, which enhances operational efficiency. Wazuh is valued for its open-source flexibility, allowing customization to meet varied organizational needs. It provides enhanced threat detection from diverse sources, and its adaptability offers a strong contrast to ESET's built-in solutions.
Room for Improvement: ESET needs to improve scalability, offer more dashboard customization, and provide better expansion capabilities. Wazuh users call for improved documentation, a simplified setup process, and enhancements for ease of use.
Ease of Deployment and Customer Service: ESET PROTECT Enterprise is known for straightforward installation and effective customer support, which helps in quick problem resolution. Wazuh's deployment can be complex, requiring technical expertise, though it benefits from a robust community for support.
Pricing and ROI: ESET PROTECT Enterprise typically provides competitive initial costs with a predictable pricing model, leading to a satisfactory ROI. Wazuh is cost-effective due to its open-source nature, yet ROI depends on the organization's technical capacity to optimize its use.
The return on investment is excellent due to its functionality and ease of installation.
There was money saving from using ESET PROTECT Enterprise, which is why I switched from CrowdStrike to ESET.
I have seen value in security cost savings with Wazuh, as using proprietary EDR versions could save us substantial money.
The tech support from ESET is amazing, and I would rate it as ten out of ten.
They are very responsive and help in solving issues quickly.
Even if support is addressing my problem, if the two issues I mentioned are not resolved, then the support process is not complete.
They responded quickly, which was crucial as I was on a time constraint.
We use the open-source version of Wazuh, which does not provide paid support.
The documentation is good and provides clear instructions, though it's targeted at those with technical backgrounds.
It can efficiently scale up to thousands of devices in an organization without issues.
I have used many products before, and this solution is definitely scalable.
It is better suited for workstations rather than server environments.
It can accommodate thousands of endpoints on one instance, and multiple instances can run for different clients.
Currently, I don't see any limitations in terms of scalability as Wazuh can still connect many endpoints.
Scalability depends on the configuration and the infrastructure resources like compute and memory we allocate.
When it performs an update, ESET PROTECT Enterprise should request permission for restarting because otherwise, users lose their work.
The solution is stable, and I have not encountered any glitches.
The solution is very, very stable.
The stability of Wazuh is strong, with no issues stemming from the solution itself.
The stability of Wazuh is largely dependent on maintenance.
The indexer frequently times out, requiring system restarts.
Sometimes, agents lose connection with the management console, and the administration team needs to reinstall the agents on the computers.
They need to reduce the number of notifications on the endpoints.
It takes a lot of processing power when the machine is initially booted.
The integration modules are insufficiently developed, necessitating the creation of custom integration solutions using tools like Logstash and PubSub.
I think Wazuh should improve by introducing AI functionalities, as it would be beneficial to see AI incorporated in the threat hunting and detection functionalities.
Wazuh could improve by creating videos on YouTube covering installation, use cases, and integration of third-party APIs for different scenarios that other SAAS services provide.
I pay 40 dollars per agent annually, which is cheaper than 60 dollars per agent for Check Point.
We recently paid fourteen dollars and thirty-six cents per unit for 20 users, which is reasonable.
Comparing it to other solutions in the market, it was slightly higher.
Wazuh is completely free of charge.
Totaling around two lakh Indian rupees per month.
Wazuh is free to use, but there are licensing fees for third parties.
It allows simple whitelisting and has a learning mode for new installations, which reduces false positives by adapting to typical user habits.
Its web component prevents infections from malicious websites, which enhances its anti-malware capabilities.
One of the strong features of ESET PROTECT Enterprise is its ability to work well on old computers.
Wazuh is a SIEM tool that is highly customizable and versatile.
The system allows us to monitor endpoints effectively and collect security data that can be utilized across other platforms such as SOAR.
With this open source tool, organizations can establish their own customized setup.
ESET PROTECT Enterprise ensures real-time visibility for all endpoints as well as full reporting and security management for all OSes
Wazuh is an enterprise-ready platform used for security monitoring. It is a free and open-source platform that is used for threat detection, incident response and compliance, and integrity monitoring. Wazuh is capable of protecting workloads across virtualized, on-premises, containerized, and cloud-based environments.
It consists of an endpoint security agent and a management server. Additionally, Wazuh is fully integrated with the Elastic Stack, allowing users the ability to navigate through security alerts via a data visualization tool.
Wazuh Capabilities
Some of Wazuh’s most notable capabilities include:
Wazuh Benefits
Some of the most valued benefits of Wazuh include:
Wazuh Offers
Reviews From Real Users
"It's very easy to integrate Wazuh with other environments, cloud applications, and on-prem applications. So, the advantage is that it's easy to implement and integrate with other solutions." - Robert C., IT Security Consultant at Microlan Kenya Limited
“The MITRE ATT&CK correlation is most valuable.” - Chief Information Security Officer at a financial services firm
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.