TrustRadius: an HG Insights company

ESET PROTECT

Score9.2 out of 10

193 Reviews and Ratings

What is ESET PROTECT?

ESET provides Endpoint Protection Platform (EPP) capabilities via the ESET PROTECT Platform, covering Windows, Mac, Linux, and both Android and iOS operating systems, providing Mobile Device Management functionality. It comes with multi-tenant management, ensuring real-time visibility for both on-premises and off-premises endpoints as well as full reporting for ESET enterprise-grade solutions. ESET PROTECT management platform can be deployed on-premise or in-cloud. For organizations looking to purchase EPP, ESET recommends ESET PROTECT Advanced – a cross-platform solution with cloud or on-premise management, file server security, Advanced Threat Defense with cloud sandbox, and full disk encryption.

Media

ESET PROTECT Dashboard.
Unified cybersecurity platform interface providing network visibility and control. Available as cloud or on-prem deployment.

Ensures real-time visibility for all endpoints as well as full reporting and security management for all OSes.
ESET Endpoint Security.

Advanced multilayered protection for computers and smartphones powered by ESET LiveSense technology.
ESET Server Security.
Provides real-time protection for the company’s data passing through all general servers, network file storage including OneDrive, and multi-purpose servers to ensure business continuity.
ESET PROTECT - Reports. 
Meets reporting requirements and saves time with scheduled reporting and dozens of customizable templates.
ESET Full Disk Encryption. 
An encryption managed natively by ESET remote management console. It increases the  organization's data security that meets compliance regulations.
ESET LiveGuard Advanced. 
A cloud-based technology that uses scanning, machine learning, cloud sandboxing, and in-depth behavioral analysis to prevent targeted attacks as well as new or unknown threats, especially ransomware.

1 / 6

Top Performing Features

  • Vulnerability Management

    Vulnerability prioritization for fixes.

    Category average: 8.3

  • Endpoint Detection and Response (EDR)

    Continuous monitoring and response to advanced internet threats by endpoint agents.

    Category average: 9.1

  • Infection Remediation

    Capability to quarantine infected endpoint and terminate malicious processes.

    Category average: 8.8

Areas for Improvement

  • Anti-Exploit Technology

    In-memory and application layer attack blocking (e.g. ransomeware)

    Category average: 8.6

  • Centralized Management

    Centralized management supporting multi-factor authentication, customized views, and role-based access control.

    Category average: 8.5

  • Hybrid Deployment Support

    Administrators should be able to choose endpoint security on-premise, cloud, or hybrid.

    Category average: 8.3