ESET endpoint security solutions are categorized into Anti-malware protection anti-phishing, exploit blocker, data access control, antispam, host intrusion prevention systems (HIPS), advanced memory scanner, and anti-virus. ESET Endpoint Protection is a well defined endpoint security for solution that has been developed specifically for desktop, mobile devices, and mail servers. The solution offers a consolidates view of the organization's network security and also allows them to receive instant notifications as incidents occur. Two Factor Authentication is an effiecient multi-factor authentication solution designed for commonly utilized systems. The company also provides Endpoint Encryption which is powerful and offers removable media, files and email. 

USP : ESET specializes in providing anti-virus and firewall products. ESET Endpoint solutions are easy to set up, as they offers straightforward deployment, simplified navigation and effortless updates. The company's Set-and-forget protection feature secures users, systems and data and alloes professionals to focus on other business priorities. ESET endpoint protection delivers unparalleled protection across multiple platforms and processes. ESET offers Push Authentication with its solutions which provides users with a single-touch authentication via mobile devices for maximum convenience and it runs on iOS, Android and Windows 10 mobile devices.

BUYERS
VENDORS
EXPERTS
2.3
ANALYSTS
 

ESET detailed analysis

Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
0.0
0.0
0.0
Product Quality and Reliability
2.45
3.50
4.15
Product Features and Functionality
3.05
4.05
5.00
Breadth and Depth of Product Offering
4.15
5.00
4.15
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

ESET has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    8 Participants

  • Niche Quadrant

    All-Asia-Pacific

    10 Participants

  • Niche Quadrant

    All-Europe

    11 Participants

SECTORS
REGIONS
North America Middle East and Africa Latin America Europe Asia-Pacific
STRENGTHS
  • Product Maturity / Deployment Type
    Android
  • Product Maturity / Deployment Type
    Installed
  • Product Maturity / Deployment Type
    iOS
  • Product Maturity / Deployment Type
    Web-Based
  • Product Maturity / Services
    Education & Certification
  • Product Maturity / Services
    Free Downloads
  • Product Maturity / Services
    Renewals & Registration
  • Product Maturity / Services
    Technical Support
  • Product Maturity / Services
    Virus & Threat Help
  • Product Maturity / Licensing
    Business
  • Product Maturity / Licensing
    Enterprise
  • Product Maturity / Costs & Units
    $ per license
  • Product Maturity / Costs & Units
    $ per Month/Yearly
  • Product Maturity / Respond
    Block targeted attacks
  • Product Maturity / Respond
    Root Cause Analysis
  • Product Maturity / Data Security
    Encryption of Data
  • Product Maturity / Detection
    Disk and Boot Record Protection (WipeGuard)
  • Product Maturity / Prevention
    Anti-Malware File Scanning
  • Product Maturity / Prevention
    Application Control
  • Product Maturity / Prevention
    Client Firewal
WEAKNESSES
  • Product Maturity / Deployment Model
    Cloud
  • Product Maturity / Deployment Model
    Hybrid
  • Product Maturity / Deployment Model
    On-Premises
  • Product Maturity / Services
    Free Clean-up Tools
  • Product Maturity / Respond
    Automated Malware Removal
  • Product Maturity / Respond
    Synchronized Security Heartbeat
  • Product Maturity / Data Security
    Control File Integrity
  • Product Maturity / Data Security
    Monitor the Data access
  • Product Maturity / Data Security
    Prevent Data Loss
  • Product Maturity / Data Security
    Segregation of Network
  • Product Maturity / Detection
    Active Adversary Mitigations
  • Product Maturity / Detection
    Malicious Traffic Detection (MTD)
  • Product Maturity / Detection
    Man-in-the-Browser Protection (Safe Browsing)
  • Product Maturity / Detection
    Ransomware File Protection (CryptoGuard)
  • Product Maturity / Detection
    Runtime Behavior Analysis (HIPS)
  • Product Maturity / Prevention
    Deep Learning malware detection
  • Product Maturity / Prevention
    Live Protection
See More

Have you EVER used ESET Products?

Share your experience with potential buyers.

TOP USECASES
TOP FEATURES
  • Product Features and Functionality
    Prevention
  • Product Features and Functionality
    Costs & Units
  • Product Features and Functionality
    Respond
  • Product Features and Functionality
    Licensing
  • Data Security
    Encryption of Data
  • Prevention
    Anti-Malware File Scanning
  • Services
    Virus & Threat Help
  • Deployment Type
    Web-Based
  • Prevention
    Prevent data breaches
  • Services
    Renewals & Registration

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS


...

Marie Stelle

Engagement Partner - 360Quadrants.com