height="0" width="0" style="display:none;visibility:hidden">
Try our
new research platform
with insights from 80,000+ expert users
My Research
Categories
Categories
Cybersecurity
IT Management
Cloud Computing
Data Management
Application Development Software
Enterprise Communications and Networking
Data Protection and Storage
Enterprise Architecture and Integration
Enterprise Applications
Emerging Technologies
Customer Care
Wireless and Mobile Technology
Featured categories
All categories
Cybersecurity categories
Cybersecurity categories
Endpoint Detection and Response (EDR)
Cloud Security Posture Management (CSPM)
Extended Detection and Response (XDR)
Endpoint Protection Platform (EPP)
Security Information and Event Management (SIEM)
Vulnerability Management
Firewalls
Container Security
Cloud-Native Application Protection Platforms (CNAPP)
Advanced Threat Protection (ATP)
Cloud Workload Protection Platforms (CWPP)
Identity Management (IM)
Threat Intelligence Platforms
Anti-Malware Tools
Attack Surface Management (ASM)
Identity Threat Detection and Response (ITDR)
Ransomware Protection
ZTNA as a Service
Data Security Posture Management (DSPM)
Secure Access Service Edge (SASE)
IT Management categories
IT Management categories
Log Management
IT Infrastructure Monitoring
Remote Access
Server Virtualization Software
Configuration Management
Server Monitoring
Container Monitoring
Managed DNS
Operating Systems (OS) for Business
Virtual Desktop Infrastructure (VDI)
Virtualization Management Tools
IT Asset Management
Workload Automation
IT Service Management (ITSM)
Managed File Transfer (MFT)
Container Management
User Provisioning Software
IT Alerting and Incident Management
Container Registry
Configuration Management Databases
Cloud Computing categories
Cloud Computing categories
Microsoft Security Suite
Cloud Monitoring Software
Cloud Backup
Cisco Security Portfolio
PaaS Clouds
Infrastructure as a Service Clouds (IaaS)
Cloud Management
Cloud Migration
Hybrid Cloud Computing Platforms
Cloud Storage
MSP Backup
AWS Marketplace
Public Cloud Storage Services
Cloud Cost Management
Software Defined Data Center (SDDC)
Cloud Analytics
OpenStack
Compute Service
Cloud Storage Gateways
Hadoop
Data Management categories
Data Management categories
Data Integration
Compliance Management
Cloud Data Integration
Data Governance
Data Warehouse
Relational Databases Tools
Cloud Data Warehouse
Open Source Databases
Vector Databases
Deduplication Software
Metadata Management
Data Quality
Data Masking
Cloud Master Data Management (MDM) Solutions
Data Observability
Product Information Management (PIM)
Database Development and Management
Embedded Database
NoSQL Databases
Data Virtualization
Application Development Software categories
Application Development Software categories
Application Security Tools
Application Performance Monitoring (APM) and Observability
Static Application Security Testing (SAST)
Rapid Application Development Software
DevSecOps
Software Development Analytics
IT Operations Analytics
API Testing Tools
Test Automation Tools
Functional Testing Tools
Application Lifecycle Management (ALM) Suites
Enterprise Agile Planning Tools
Release Automation
Mobile APM
Regression Testing Tools
Build Automation
Software Supply Chain Security
Patch Management
Application Security Posture Management (ASPM)
Mobile App Testing Tools
Enterprise Communications and Networking categories
Enterprise Communications and Networking categories
Network Monitoring Software
WAN Edge
Software Defined WAN (SD-WAN) Solutions
AIOps
Secure Web Gateways (SWG)
CDN
Ethernet Switches
Wireless LAN
Network Traffic Analysis (NTA)
Network Automation
Network Management Applications
Application Delivery Controllers (ADC)
Network Troubleshooting
LAN Switching
Virtual Routers
AV Over IP Switching
Routers
Network Virtualization
Software Defined Networking (SDN)
WAN Optimization
Data Protection and Storage categories
Data Protection and Storage categories
Backup and Recovery
Disaster Recovery (DR) Software
All-Flash Storage
Software Defined Storage (SDS)
HCI
File and Object Storage
NVMe All-Flash Storage Arrays
NAS
SaaS Backup
Rack Servers
Enterprise SAN
File Archiving
Modular SAN (Storage Area Network)
Blade Servers
Disk Based Backup Systems
Container Backup Software
Converged Infrastructure
Data Replication
Application Server
File System Software
Enterprise Architecture and Integration categories
Enterprise Architecture and Integration categories
API Management
Streaming Analytics
Integration Platform as a Service (iPaaS)
Business-to-Business Middleware
Application Infrastructure
Event Monitoring
Message Queue (MQ) Software
Enterprise Service Bus (ESB)
Data Migration Appliances
Message Oriented Middleware (MOM)
SOA Application Gateways
General Purpose HSM
Migration Tools
SOA Governance
Payment HSM
Web Access Management
CEP
Code Signing Management
Enterprise Applications categories
Enterprise Applications categories
AI-Powered Cybersecurity Platforms
Email Security
Business Process Management (BPM)
Process Automation
BI (Business Intelligence) Tools
Business Process Design
Data Science Platforms
Low-Code Development Platforms
Reporting
Robotic Process Automation (RPA)
Data Visualization
Process Mining
ERP
No-Code Development Platforms
Project Management Software
AI Development Platforms
Embedded BI
Talent Management
Secure Email Gateway (SEG)
Benefits Administration
Emerging Technologies categories
Emerging Technologies categories
Emerging Solutions
Customer Care categories
Customer Care categories
Help Desk Software
CRM
AI-Powered Chatbots
Data Management Platforms (DMP)
Customer Experience Management
Digital Experience Monitoring (DEM)
CRM Customer Engagement Centers
Field Service Management
Contact Center as a Service (CCaaS)
Digital Experience Platforms (DXP)
Contact Center Platforms
Workforce Engagement Management
Social CRM
Social Media Management Solutions
Customer Communications Management (CCM)
Contact Center Infrastructure
IVR Systems
Partner Relationship Management (PRM)
Customer Data Analysis
IT Support Services
Wireless and Mobile Technology categories
Wireless and Mobile Technology categories
Mobile Development Platforms
Mobile Device Management (MDM)
Mobile App Platforms
Mobile Marketing and Advertising
Mobile Application Management
Mobile Measurement Partner (MMP)
Instant Communications Security and Compliance
Mobile Communication Gateways
Managed Mobility Services
Text Messaging
Mobile Platforms
Mobile Video Optimization
Comparisons
Comparisons
Top comparisons
Most compared vendors
Amazon Web Services (AWS)
Cisco
Dell Technologies
Fortinet
Hewlett Packard Enterprise
IBM
Microsoft
Oracle
SAP
VMware
More comparisons
Top Amazon Web Services (AWS) solutions comparisons
Top Amazon Web Services (AWS) solutions comparisons
Amazon API Gateway vs. Microsoft Azure API Management
AWS Secrets Manager vs. Azure Key Vault
Akamai Connected Cloud (Linode) vs. Amazon AWS
Amazon QuickSight vs. Microsoft Power BI
Amazon Route 53 vs. Azure DNS
Amazon EFS (Elastic File System) vs. Microsoft Azure File Storage
AWS GuardDuty vs. Microsoft Defender for Cloud
Amazon EKS vs. Red Hat OpenShift Container Platform
AWS Database Migration Service vs. AWS Glue
AWS Security Hub vs. Microsoft Sentinel
Top Cisco solutions comparisons
Top Cisco solutions comparisons
Cisco Secure Firewall vs. Fortinet FortiGate
Aruba Wireless vs. Cisco Wireless
Aruba ClearPass vs. Cisco Identity Services Engine (ISE)
Aruba Switches vs. Cisco Ethernet Switches
Cisco Umbrella vs. Zscaler Internet Access
Arista Networks Platform vs. Cisco Catalyst Switches
Cisco Meraki Wireless LAN vs. Ubiquiti Wireless
Cisco Enterprise Routers vs. MikroTik Routers and Switches
Cisco Linksys Ethernet Switches vs. NETGEAR Switches
Meraki MX vs. Palo Alto Networks NG Firewalls
Top Dell Technologies solutions comparisons
Top Dell Technologies solutions comparisons
Dell PowerEdge Rack Servers vs. HPE ProLiant DL Servers
VMware vSAN vs. VxRail
Dell PowerStore vs. Dell Unity XT
Dell PowerProtect DD (Data Domain) vs. HPE StoreOnce
Dell PowerEdge T vs. HPE Proliant ML
Dell Avamar vs. Dell PowerProtect Data Manager
Dell ECS vs. Dell PowerScale (Isilon)
Dell RecoverPoint for Virtual Machines vs. VMware Live Recovery
Cisco Catalyst Switches vs. Dell PowerConnect Switches [EOL]
Dell APEX vs. HPE GreenLake
Top Fortinet solutions comparisons
Top Fortinet solutions comparisons
Fortinet FortiGate vs. Sophos XG
Fortinet FortiClient vs. OpenVPN Access Server
Cisco Ethernet Switches vs. Fortinet FortiSwitch - Secure Access
Cisco Identity Services Engine (ISE) vs. Fortinet FortiNAC
Fortinet FortiGate Cloud vs. Fortinet FortiManager
Azure Firewall vs. Fortinet FortiGate-VM
F5 Advanced WAF vs. Fortinet FortiWeb
CrowdStrike Falcon vs. Fortinet FortiEDR
Fortinet FortiGate SWG vs. Fortinet FortiProxy
F5 BIG-IP Local Traffic Manager (LTM) vs. Fortinet FortiADC
Top Hewlett Packard Enterprise solutions comparisons
Top Hewlett Packard Enterprise solutions comparisons
Aruba Wireless vs. Cisco Wireless
Aruba ClearPass vs. Cisco Identity Services Engine (ISE)
Dell PowerEdge Rack Servers vs. HPE ProLiant DL Servers
Aruba Switches vs. Cisco Ethernet Switches
HPE SimpliVity vs. VxRail
Dell PowerProtect DD (Data Domain) vs. HPE StoreOnce
Dell PowerEdge T vs. HPE Proliant ML
HPE 3PAR StoreServ vs. HPE Primera
HPE BladeSystem vs. HPE Synergy
Cisco Catalyst Switches vs. HPE ProCurve
Top IBM solutions comparisons
Top IBM solutions comparisons
IBM Security QRadar vs. Microsoft Sentinel
IBM API Connect vs. IBM DataPower Gateway
ActiveMQ vs. IBM MQ
IBM MaaS360 vs. Microsoft Intune
Open Liberty vs. Spring Boot
IBM Db2 Database vs. SQL Server
IBM Power Systems vs. Intel Server System
Dell PowerStore vs. IBM FlashSystem
IBM Public Cloud vs. Microsoft Azure
IBM Security Guardium Data Protection vs. Imperva SecureSphere Database Security
Top Microsoft solutions comparisons
Top Microsoft solutions comparisons
Amazon API Gateway vs. Microsoft Azure API Management
Hyper-V vs. VMware vSphere
GitLab vs. Microsoft Azure DevOps
AWS Secrets Manager vs. Azure Key Vault
Jamf Pro vs. Microsoft Intune
Microsoft Power Automate vs. UiPath
Microsoft Power BI vs. Tableau
Amazon Route 53 vs. Azure DNS
Amazon EFS (Elastic File System) vs. Microsoft Azure File Storage
AWS GuardDuty vs. Microsoft Defender for Cloud
Top Oracle solutions comparisons
Top Oracle solutions comparisons
Oracle Linux vs. Ubuntu Linux
Oracle VM VirtualBox vs. Proxmox VE
Microsoft Azure vs. Oracle Cloud Infrastructure (OCI)
Firebird SQL vs. MySQL
Oracle Database vs. SAP HANA
Oracle VM vs. VMware vSphere
Microsoft Power Apps vs. Oracle Application Express (APEX)
Oracle Data Integrator (ODI) vs. Oracle Integration Cloud Service
Oracle HCM Cloud vs. SAP SuccessFactors
Oracle WebLogic Server vs. Tomcat
Top SAP solutions comparisons
Top SAP solutions comparisons
SAP ERP vs. SAP S/4HANA
Oracle Database vs. SAP HANA
Amazon AWS vs. SAP Cloud Platform
SAP HCM vs. SAP SuccessFactors
Celonis vs. SAP Signavio Process Manager
SAP Analytics Cloud vs. SAP BusinessObjects Business Intelligence Platform
Oracle WMS vs. SAP Warehouse Management
Kinaxis vs. SAP Integrated Business Planning for Supply Chain
Microsoft Dynamics CRM vs. SAP CRM
SAP PowerDesigner vs. erwin Data Modeler by Quest
Top VMware solutions comparisons
Top VMware solutions comparisons
Hyper-V vs. VMware vSphere
Jakarta EE vs. Spring Boot
VMware Fusion Pro vs. VMware Workstation
VMware vSAN vs. VxRail
Microsoft Azure vs. Pivotal Cloud Foundry
VMware Live Recovery vs. Veeam Data Platform
Rancher Labs vs. VMware Tanzu Platform
Azure Stack vs. VMware Cloud Foundation
Red Hat Ansible Automation Platform vs. VMware Aria Automation
CrowdStrike Falcon vs. VMware Carbon Black Endpoint
Top comparisons
Top comparisons
Netgate pfSense vs. OPNsense
Cloudflare vs. Quad9
Fortinet FortiGate vs. Sophos XG
Figma vs. Miro
Amazon API Gateway vs. Microsoft Azure API Management
Hyper-V vs. VMware vSphere
Checkmarx One vs. SonarQube Server (formerly SonarQube)
GitLab vs. Microsoft Azure DevOps
MinIO vs. Red Hat Ceph Storage
Aruba Wireless vs. Cisco Wireless
For Vendors
For Vendors
Learn More
Get Listed
Sign In
Home
Endpoint Encryption
ESET Endpoint Encryption
Pros & Cons
ESET Endpoint Encryption pros and cons
Vendor:
ESET
4.3
out of 5
14 reviews
100% willing to recommend
Follow
Post review
Overview
Reviews
Pros & Cons
Pricing
Alternatives
ESET Endpoint Encryption Pros review quotes
Kenneth-Lo
Senior Product Manager at version2
Jun 16, 2023
It is a very stable solution. Stability-wise, I rate the solution a ten out of ten.
Read full review
TeamLeadb7c3
Team Leader at a university with 201-500 employees
Mar 11, 2019
The Remote Administrator is the most valuable feature that ESET offers for us. Centralized management of our ESET environment is what I like about the Remote Administrator.
Read full review
reviewer1002117
Senior Information System Officer at a construction company with 51-200 employees
Aug 26, 2022
The setup is getting easier.
Read full review
Buyer's Guide
Endpoint Encryption
November 2024
Download Free Report
Find out what your peers are saying about ESET, Microsoft, Broadcom and others in Endpoint Encryption.
Updated: November 2024.
DOWNLOAD NOW
823,547 professionals have used our research since 2012.
MK
Mitja Kelenc
System Organizer at a translation and localization position with 1-10 employees
Feb 18, 2020
The most valuable feature is that everything is done on the server.
Read full review
RD
Roman Danel
Teacher at WSG Bydgoszcz
May 2, 2024
The tool does not slow down the computer.
Read full review
reviewer1002117
Senior Information System Officer at a construction company with 51-200 employees
Mar 30, 2020
This solution can be centrally managed.
Read full review
Roshan Dias
Head of Engineering at Informatics (Private) Limited
Dec 4, 2023
The most valuable feature of ESET Endpoint Encryption is its rate of capturing viruses and malware.
Read full review
MD
MarkDuncanson
General Manager at SFT
Nov 1, 2023
The product is easy to implement and configure.
Read full review
TH
TaperHarli
IT Consultant at a tech vendor with 11-50 employees
Feb 5, 2020
The usability is the most valuable feature.
Read full review
Luis Velázquez
IT Support Manager at Antivirus Mexico
May 22, 2023
The most valuable feature of ESET Endpoint Encryption is the high level of encryption protection.
Read full review
Show 4 more reviews (out of 14)
ESET Endpoint Encryption Cons review quotes
Kenneth-Lo
Senior Product Manager at version2
Jun 16, 2023
The overall compatibility of the device is an area where the solution lacks.
Read full review
TeamLeadb7c3
Team Leader at a university with 201-500 employees
Mar 11, 2019
I would like more robust reporting as part of the Remote Administrator.
Read full review
reviewer1002117
Senior Information System Officer at a construction company with 51-200 employees
Aug 26, 2022
If you have issues with your network, you can't get updates, which is a problem.
Read full review
Buyer's Guide
Endpoint Encryption
November 2024
Download Free Report
Find out what your peers are saying about ESET, Microsoft, Broadcom and others in Endpoint Encryption.
Updated: November 2024.
DOWNLOAD NOW
823,547 professionals have used our research since 2012.
MK
Mitja Kelenc
System Organizer at a translation and localization position with 1-10 employees
Feb 18, 2020
Sometimes the server console is very slow, so the performance could be improved.
Read full review
reviewer1002117
Senior Information System Officer at a construction company with 51-200 employees
Mar 30, 2020
I would like to see better compatibility with mobile devices.
Read full review
Roshan Dias
Head of Engineering at Informatics (Private) Limited
Dec 4, 2023
From an admin perspective, the solution's UI could be more user-friendly.
Read full review
MD
MarkDuncanson
General Manager at SFT
Nov 1, 2023
There could be an option for users to restart the system without a password.
Read full review
TH
TaperHarli
IT Consultant at a tech vendor with 11-50 employees
Feb 5, 2020
Integration with central management needs improvement.
Read full review
Luis Velázquez
IT Support Manager at Antivirus Mexico
May 22, 2023
The initial setup could be made easier.
Read full review
PM
Purushothaman Muthu
Associate Vice President - Office of Strategic ManagementVice President - Office of Strategic Management at Sakthi Finance Ltd,
Aug 25, 2023
There should be more frequent updates.
Read full review
Show 3 more reviews (out of 13)
Product Categories
Product Categories
Endpoint Encryption
Popular Comparisons
Popular Comparisons
Microsoft BitLocker
vs ESET Endpoint Encryption
Symantec Endpoint Encryption
vs ESET Endpoint Encryption
McAfee Complete Data Protection
vs ESET Endpoint Encryption
Trend Micro Endpoint Encryption
vs ESET Endpoint Encryption
Sophos SafeGuard
vs ESET Endpoint Encryption
WinMagic SecureDoc
vs ESET Endpoint Encryption
See all alternatives
Product Categories
Product Categories
Endpoint Encryption
Popular Comparisons
Popular Comparisons
Microsoft BitLocker
vs ESET Endpoint Encryption
Symantec Endpoint Encryption
vs ESET Endpoint Encryption
McAfee Complete Data Protection
vs ESET Endpoint Encryption
Trend Micro Endpoint Encryption
vs ESET Endpoint Encryption
Sophos SafeGuard
vs ESET Endpoint Encryption
WinMagic SecureDoc
vs ESET Endpoint Encryption
See all alternatives
Related questions
351
How does ESET Endpoint Encryption compare to BitLocker?
14
Which encryption solution is better: ESET Endpoint Encryption or Symantec Endpoint Encryption?
22
Which full disk encryption software should we chose?
415
What is the difference between "data protection in transit" vs "data protection at rest"?
117
What is the best email encryption software for small enterprises using Office 365?
5
When evaluating Endpoint Encryption, what aspect do you think is the most important to look for?
226
What should one take into account when replacing PGP with Microsoft BitLocker?
58
Why do organizations need endpoint encryption?
24
What are the main pros and cons of the various Endpoint Encryption solutions on the market?
4
How can I tell if there is encryption on?
Overview
Reviews
Pros & Cons
Pricing
Alternatives
© 2024 PeerSpot, All Rights Reserved.
Twitter
Facebook
LinkedIn
YouTube