ESET PROTECT Advanced provides best-in-class endpoint protection against ransomware & zero-day threats, backed by powerful data security.
Options for ESET Endpoint Security include yearly, two-year, and thirty-six-month licenses. Customers generally find the pricing to be fair, reasonable, and affordable. Some users mention getting discounts through promotions or negotiating with the company. The cost of the license varies depending on the number of devices and desired features, however, it is generally considered reasonable and within market pricing.
Some users have witnessed a high ROI, as the product helps prevent attacks and saves money by avoiding recovery costs. Others have not seen any ROI or find it difficult to measure, as they cannot quantify the attacks prevented.
The primary use case of ESET Endpoint Security is to protect Microsoft 365 and manage endpoint security. It is used for scanning servers and endpoints, device protection from malware and ransomware, security for the network, system protection, monitoring devices for security threats, antivirus protection, endpoint protection for end-users and small companies, and monitoring activity in the network.
It is also used for data protection, software protection, internet security, detecting malware, protecting computers from viruses and ransomware, controlling endpoints, and automating tasks.
It is deployed across multiple locations and is used for endpoint protection and system security. It helps protect against bugs and is used for basic protection purposes.
The most valuable features of ESET Endpoint Security include great detection capabilities, easy setup and plug-and-play functionality, remote PC control from the cloud, effective ransomware protection, low false positives, low impact on server and computing power, excellent simplicity and scalability, antivirus feature and detection, user-friendly interface, low system resource usage, and seamless updates.
Users appreciate the reasonable pricing, integration with Elasticsearch, reliable security with multiple layers of technology, invisible operation until problem detection, strong defense against viruses, customization options, isolation of infected computers, a game mode for restricting notifications, background operation without consuming system resources, a useful dashboard for management, and impressive advanced protection.
Some users mentioned the need for better security options for iOS and Mac devices, as well as the lack of scalability and console management compared to other products like Sophos. Users also expressed a desire for automated deployment, all-stack protection for Linux, Windows, and Mac, and improved basic technical support.
There were suggestions for creating a central management solution and focusing on developing an XDR solution. Users also reported false positives, slow responses from technical support, and the need for more user-friendly interfaces and features.
Other areas for improvement mentioned include better offline market focus, improved EDR integration, and enhanced protection against crypto attacks and ransomware.
The initial setup for ESET Endpoint Security varies in complexity depending on the customer's environment and specific requirements. For the standard configuration, the setup process is straightforward and can be completed in a day. However, for more advanced configurations and security policies, the setup may take additional time, typically around two to three days.
The deployment process is generally quick and can be completed in about an hour, although the time may vary depending on the size of the customer. On-prem deployment may be more complex compared to cloud deployment.
There were some comments about certain complexities related to customization and manipulating the software.
The scalability of ESET Endpoint Security is generally seen as positive. Users mention that it is easy to change the license model and expand coverage as needed. Most users experienced no issues with scalability and have confidence in its ability to handle larger setups. However, there are also a few users who express concerns about scalability, particularly for very large networks.
Feedback for customer service and support is mixed. Some users have praised the responsiveness and efficiency of the support team, noting that they receive timely responses within a few hours and find the technical support to be helpful and responsive. Others, however, have not had the need to use customer support or have faced difficulties in reaching the right person for assistance. In some regions, such as Hong Kong and China, obtaining support can be challenging, with a non-functional phone number and limited options for upgrading to premium service.
The stability of the solution of ESET Endpoint Security is consistently praised by the reviewers. They describe it as reliable, and excellent. Many reviewers also mention that there are no bugs or glitches, and it doesn't crash or freeze.
However, a few reviewers mention encountering some bugs and issues, while also acknowledging that the vendors are proactive in addressing and fixing them through regular updates.
Options for ESET Endpoint Security include yearly, two-year, and thirty-six-month licenses. Customers generally find the pricing to be fair, reasonable, and affordable. Some users mention getting discounts through promotions or negotiating with the company. The cost of the license varies depending on the number of devices and desired features, however, it is generally considered reasonable and within market pricing.
Some users have witnessed a high ROI, as the product helps prevent attacks and saves money by avoiding recovery costs. Others have not seen any ROI or find it difficult to measure, as they cannot quantify the attacks prevented.
The primary use case of ESET Endpoint Security is to protect Microsoft 365 and manage endpoint security. It is used for scanning servers and endpoints, device protection from malware and ransomware, security for the network, system protection, monitoring devices for security threats, antivirus protection, endpoint protection for end-users and small companies, and monitoring activity in the network.
It is also used for data protection, software protection, internet security, detecting malware, protecting computers from viruses and ransomware, controlling endpoints, and automating tasks.
It is deployed across multiple locations and is used for endpoint protection and system security. It helps protect against bugs and is used for basic protection purposes.
The most valuable features of ESET Endpoint Security include great detection capabilities, easy setup and plug-and-play functionality, remote PC control from the cloud, effective ransomware protection, low false positives, low impact on server and computing power, excellent simplicity and scalability, antivirus feature and detection, user-friendly interface, low system resource usage, and seamless updates.
Users appreciate the reasonable pricing, integration with Elasticsearch, reliable security with multiple layers of technology, invisible operation until problem detection, strong defense against viruses, customization options, isolation of infected computers, a game mode for restricting notifications, background operation without consuming system resources, a useful dashboard for management, and impressive advanced protection.
Some users mentioned the need for better security options for iOS and Mac devices, as well as the lack of scalability and console management compared to other products like Sophos. Users also expressed a desire for automated deployment, all-stack protection for Linux, Windows, and Mac, and improved basic technical support.
There were suggestions for creating a central management solution and focusing on developing an XDR solution. Users also reported false positives, slow responses from technical support, and the need for more user-friendly interfaces and features.
Other areas for improvement mentioned include better offline market focus, improved EDR integration, and enhanced protection against crypto attacks and ransomware.
The initial setup for ESET Endpoint Security varies in complexity depending on the customer's environment and specific requirements. For the standard configuration, the setup process is straightforward and can be completed in a day. However, for more advanced configurations and security policies, the setup may take additional time, typically around two to three days.
The deployment process is generally quick and can be completed in about an hour, although the time may vary depending on the size of the customer. On-prem deployment may be more complex compared to cloud deployment.
There were some comments about certain complexities related to customization and manipulating the software.
The scalability of ESET Endpoint Security is generally seen as positive. Users mention that it is easy to change the license model and expand coverage as needed. Most users experienced no issues with scalability and have confidence in its ability to handle larger setups. However, there are also a few users who express concerns about scalability, particularly for very large networks.
Feedback for customer service and support is mixed. Some users have praised the responsiveness and efficiency of the support team, noting that they receive timely responses within a few hours and find the technical support to be helpful and responsive. Others, however, have not had the need to use customer support or have faced difficulties in reaching the right person for assistance. In some regions, such as Hong Kong and China, obtaining support can be challenging, with a non-functional phone number and limited options for upgrading to premium service.
The stability of the solution of ESET Endpoint Security is consistently praised by the reviewers. They describe it as reliable, and excellent. Many reviewers also mention that there are no bugs or glitches, and it doesn't crash or freeze.
However, a few reviewers mention encountering some bugs and issues, while also acknowledging that the vendors are proactive in addressing and fixing them through regular updates.
ESET PROTECT Advanced
ESET Endpoint Protection Platform was previously known as Smart Security, ESET PROTECT Advanced, ESET LiveGuard Advanced, ESET PROTECT Platform.
ESET Endpoint Protection Platform is the #3 ranked solution in top ATP (Advanced Threat Protection) tools, #3 ranked solution in top Anti-Malware Tools, and #8 ranked solution in endpoint security software. PeerSpot users give ESET Endpoint Protection Platform an average rating of 8.4 out of 10. ESET Endpoint Protection Platform is most commonly compared to Microsoft Defender for Endpoint: ESET Endpoint Protection Platform vs Microsoft Defender for Endpoint. ESET Endpoint Protection Platform is popular among the large enterprise segment, accounting for 41% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 19% of all views.ERSTE Group Bank, Miller Solutions, Wesleyan University, The Hospital Center of Luxembourg, Deer Valley USD, SPAR, Industrial Federal Credit Union, Honda, City Hall of Palmela, Hays CISD, Lester B Pearson School Board