ESET Endpoint Security logo

ESET Endpoint Security Verified Profile

Modern Endpoint Protection

Why SoftwareWorld Chooses ESET Endpoint Security:

“SoftwareWorld likely chose ESET Endpoint Security based on user reviews highlighting its robust protection against malware, user-friendly interface, and efficient system performance. Users appreciate its comprehensive security features, including advanced threat detection and minimal impact on system resources. The software's reliability and strong customer support also contribute to its positive reputation, making it a preferred choice for endpoint security.”

Highly Recommended

ESET Endpoint Security Overview

ESET Endpoint Security is a robust solution for businesses seeking to fortify their cyber defenses. It stands out with its multi-layered security approach, combining traditional antivirus with advanced techniques like machine learning. This mix ensures effective defense against viruses, malware, and emerging threats. Unique to ESET is its low system footprint, ensuring security without compromising performance. The software includes a powerful firewall and network attack protection, safeguarding against intrusion. It also features a user-friendly remote management tool, enabling administrators to monitor and control security across the organization easily. Additionally, ESET's data encryption and anti-phishing tools enhance data safety and user privacy. These features make ESET Endpoint Security a comprehensive, efficient, and reliable cybersecurity choice for businesses.

Read More

ESET Endpoint Security Screenshot & Video

Contact Details

  • Vendor Name ESET
  • Founded 1998
  • Location Slovakia
  • Employees 1000+

Support

  • Email Email
  • Phone Phone
  • Chat Chat

Training

  • In-person In-person
  • Webinar Webinar
  • Documentation Documentation

Licensing & Deployment

  • Proprietary Proprietary
  • Cloud Hosted Cloud Hosted
  • Web-Based Web-Based
  • iPhone iPhone
  • Android Android
  • Windows Windows
  • Mac Mac
  • Linux Linux

Typical Customers

  • Self-Employed Self-Employed
  • Small-Business Small-Business
  • Midsize-Business Midsize-Business
  • Large-Enterprise-Business Large-Enterprise-Business

Languages Supported

Arabic, Bulgarian, Chinese, Croatian, Czech, English, Estonian, French, German, Greek, Hebrew, Hungarian, Indonesian, Italian, Japanese, Kazakh, Korean, Latvian, Norwegian, Portuguese, Russian, Spanish, Swedish, Turkish, Ukrainian, Vietnamese


ESET Endpoint Security Features

  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Data Migration
  • Arrow Icon Document Storage
  • Arrow Icon Backup Log
  • Arrow Icon Archiving & Retention
  • Arrow Icon Email Alerts
  • Arrow Icon Cloud Backup
  • Arrow Icon Data Recovery
  • Arrow Icon File Management
  • Arrow Icon Data Replication
  • Arrow Icon Remote Server Options
  • Arrow Icon Local Server Options
  • Arrow Icon Incremental Backup
  • Arrow Icon SSL Security
  • Arrow Icon Data Synchronization
  • Arrow Icon Policy Management
  • Arrow Icon Duplicate Detection
  • Arrow Icon Backup Scheduling
  • Arrow Icon Backup and Recovery
  • Arrow Icon Web Access/Restoration
  • Arrow Icon Encryption
  • Arrow Icon Disaster Recovery
  • Arrow Icon Continuous Backup
  • Arrow Icon Automatic Backup
  • Arrow Icon Version Control
  • Arrow Icon Role-Based Permissions
  • Arrow Icon Endpoint Protection
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Security Auditing
  • Arrow Icon Real Time Monitoring
  • Arrow Icon Data Security
  • Arrow Icon Secure Data Storage
  • Arrow Icon Application Security
  • Arrow Icon Password Management
  • Arrow Icon Alerts/Escalation
  • Arrow Icon Anti Virus
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Network Security
  • Arrow Icon SSL Security
  • Arrow Icon Incident Management
  • Arrow Icon Server Monitoring
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Financial Data Protection
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Anti Spam
  • Arrow Icon Audit Trail
  • Arrow Icon Maintenance Scheduling
  • Arrow Icon Patch Management
  • Arrow Icon Threat Intelligence
  • Arrow Icon Threat Response
  • Arrow Icon VPN
  • Arrow Icon Encryption
  • Arrow Icon Firewalls
  • Arrow Icon Whitelisting/Blacklisting
  • Arrow Icon Compliance Management
  • Arrow Icon Policy Management
  • Arrow Icon Audit Trail
  • Arrow Icon Real Time Reporting
  • Arrow Icon Single Sign On
  • Arrow Icon Secure Data Storage
  • Arrow Icon Behavior Tracking
  • Arrow Icon Incident Management
  • Arrow Icon Activity Tracking
  • Arrow Icon SSL Security
  • Arrow Icon Patch Management
  • Arrow Icon Endpoint Protection
  • Arrow Icon Risk Alerts
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Security Auditing
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Event Logs
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Server Monitoring
  • Arrow Icon Anti Virus
  • Arrow Icon Authentication
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Two-Factor Authentication
  • Arrow Icon Threat Response
  • Arrow Icon Data Security
  • Arrow Icon Firewalls
  • Arrow Icon Application Security
  • Arrow Icon Alerts/Escalation
  • Arrow Icon Real Time Reporting
  • Arrow Icon Behavioral Analytics
  • Arrow Icon Incident Management
  • Arrow Icon Secure Data Storage
  • Arrow Icon Compliance Management
  • Arrow Icon Patch Management
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Risk Analysis
  • Arrow Icon Policy Management
  • Arrow Icon User Management
  • Arrow Icon Encryption
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Server Monitoring
  • Arrow Icon Event Logs
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Device Management
  • Arrow Icon Web Threat Management
  • Arrow Icon Security Auditing
  • Arrow Icon Monitoring
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Anomaly/Malware Detection
  • Arrow Icon Threat Response
  • Arrow Icon Spam Detection
  • Arrow Icon Spam Blocker
  • Arrow Icon Allow/Block List
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Spam Quarantine
  • Arrow Icon Archiving & Retention
  • Arrow Icon Email Routing
  • Arrow Icon Encryption
  • Arrow Icon Threat Intelligence
  • Arrow Icon Dashboard
  • Arrow Icon Behavioral Analytics
  • Arrow Icon Fraud Detection
  • Arrow Icon AI/Machine Learning
  • Arrow Icon Anomaly/Malware Detection
  • Arrow Icon Event Logs
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Real-time Alerts
  • Arrow Icon Threat Intelligence
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Vulnerability Protection
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Compliance Management
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Real-Time Monitoring
  • Arrow Icon Incident Management
  • Arrow Icon Behavioral Analytics
  • Arrow Icon Endpoint Management
  • Arrow Icon Cloud Encryption
  • Arrow Icon Policy Management
  • Arrow Icon Sensitive Data Identification
  • Arrow Icon Web Threat Management
  • Arrow Icon Incident Management
  • Arrow Icon Whitelisting/Blacklisting
  • Arrow Icon Compliance Tracking
  • Arrow Icon Spam Quarantine
  • Arrow Icon Fraud Detection
  • Arrow Icon Encryption
  • Arrow Icon Whitelisting/Blacklisting
  • Arrow Icon Spam Blocker
  • Arrow Icon Email Attachment Protection
  • Arrow Icon Policy Management
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Event Logs
  • Arrow Icon Compliance Management
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Audit Trail
  • Arrow Icon Policy Management
  • Arrow Icon Password Management
  • Arrow Icon Real-Time Monitoring
  • Arrow Icon File Encryption
  • Arrow Icon Cloud Encryption
  • Arrow Icon Key Management
  • Arrow Icon Backup and Recovery
  • Arrow Icon Anomaly/Malware Detection
  • Arrow Icon Root Cause Analysis
  • Arrow Icon Remediation Management
  • Arrow Icon Prioritization
  • Arrow Icon Behavioral Analytics
  • Arrow Icon Continuous Monitoring
  • Arrow Icon Whitelisting/Blacklisting
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Network Monitoring
  • Arrow Icon Hardware Integration
  • Arrow Icon Intrusion Prevention System
  • Arrow Icon VPN
  • Arrow Icon Policy Management
  • Arrow Icon Log Access
  • Arrow Icon Access Management
  • Arrow Icon Next-Generation Firewall
  • Arrow Icon AI/Machine Learning
  • Arrow Icon Content Filtering
  • Arrow Icon Intrusion Detection System
  • Arrow Icon Policy Management
  • Arrow Icon Threat Response
  • Arrow Icon Event Logs
  • Arrow Icon VPN
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Activity Monitoring
  • Arrow Icon Audit Trail
  • Arrow Icon Patch Management
  • Arrow Icon Compliance Management
  • Arrow Icon Firewalls
  • Arrow Icon Real-Time Monitoring
  • Arrow Icon Risk Alerts
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Intrusion Detection System
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Anti Virus
  • Arrow Icon Configuration Management
  • Arrow Icon Task Management
  • Arrow Icon IT Asset Management
  • Arrow Icon Remediation Management
  • Arrow Icon User Management
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Real-time Alerts
  • Arrow Icon For MSPs
  • Arrow Icon Policy Management
  • Arrow Icon Maintenance Scheduling
  • Arrow Icon Network Monitoring
  • Arrow Icon Real-Time Monitoring
  • Arrow Icon Audit Trail
  • Arrow Icon Patch Management
  • Arrow Icon Mobile Access
  • Arrow Icon Uptime Reporting
  • Arrow Icon Support Ticket Management
  • Arrow Icon Deployment Management
  • Arrow Icon Compliance Management
  • Arrow Icon Softphone
  • Arrow Icon Video Conferencing
  • Arrow Icon Meeting Management
  • Arrow Icon Remote Support
  • Arrow Icon Communication Management
  • Arrow Icon Time Zone Tracking
  • Arrow Icon Third-Party Integrations
  • Arrow Icon Electronic Signature
  • Arrow Icon Live Chat
  • Arrow Icon Video Chat
  • Arrow Icon Task Management
  • Arrow Icon Workflow Management
  • Arrow Icon Collaboration Tools
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Progress Tracking
  • Arrow Icon Employee Activity Monitoring
  • Arrow Icon Reporting & Statistics
  • Arrow Icon Document Management
  • Arrow Icon Continuous Backup
  • Arrow Icon Automatic Backup
  • Arrow Icon Third-Party Integrations
  • Arrow Icon Policy Management
  • Arrow Icon Disaster Recovery
  • Arrow Icon Differential Backup
  • Arrow Icon Deduplication
  • Arrow Icon Data Recovery
  • Arrow Icon Real-Time Monitoring
  • Arrow Icon Encryption
  • Arrow Icon SSL Security
  • Arrow Icon Bare-Metal Restore
  • Arrow Icon VM Backup
  • Arrow Icon Backup Log
  • Arrow Icon Compression
  • Arrow Icon Backup Scheduling
  • Arrow Icon Incremental Backup
  • Arrow Icon Two-Factor Authentication
  • Arrow Icon Network Provisioning
  • Arrow Icon Threat Response
  • Arrow Icon Prioritization
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Network Monitoring
  • Arrow Icon Server Monitoring
  • Arrow Icon Activity Dashboard
  • Arrow Icon Web-Application Security
  • Arrow Icon Incident Reporting
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Application Security
  • Arrow Icon Data Visualization
  • Arrow Icon Monitoring
  • Arrow Icon Real-Time Data
  • Arrow Icon Threat Response
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Web-Application Security
  • Arrow Icon Firewalls
  • Arrow Icon Log Management
  • Arrow Icon Endpoint Protection
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Anomaly/Malware Detection
  • Arrow Icon DDoS Protection
  • Arrow Icon API
  • Arrow Icon Load Balancing
  • Arrow Icon SQL Injections

ESET Endpoint Security Pricing

Pricing Type

  • Pricing Type Flat Rate

Preferred Currency

  • USD ($) USD ($)

Free Trial

  • Free Trial Available

Free Version

  • NA

Payment Frequency

  • Annual Subscription Annual Subscription

Plans & Packages

ESET PROTECT Entry

$211 Per Year

ESET PROTECT ADVANCED

$275 Per Year

ESET PROTECT complete

$287 Per Year

ESET Endpoint Security FAQs

ESET Endpoint Security is a robust solution for businesses seeking to fortify their cyber defenses. It stands out with its multi-layered security approach, combining traditional antivirus with advanced techniques like machine learning. This mix ensures effective defense against viruses, malware, and emerging threats. Unique to ESET is its low system footprint, ensuring security without compromising performance. The software includes a powerful firewall and network attack protection, safeguarding against intrusion. It also features a user-friendly remote management tool, enabling administrators to monitor and control security across the organization easily. Additionally, ESET's data encryption and anti-phishing tools enhance data safety and user privacy. These features make ESET Endpoint Security a comprehensive, efficient, and reliable cybersecurity choice for businesses.

  • No, ESET Endpoint Security does not offer a free version.

  • Yes, ESET Endpoint Security offers a free trial.

  • No, Credit Card details are not required for the ESET Endpoint Security trial.

  • ESET Endpoint Security offers the following pricing plans & packages:

    ESET PROTECT Entry

    $211 Per Year

    ESET PROTECT ADVANCED

    $275 Per Year

    ESET PROTECT complete

    $287 Per Year

  • ESET Endpoint Security supports the following payment frequencies:

    • Annual Subscription

  • No, ESET Endpoint Security does not offer an API.

  • ESET Endpoint Security offers support with the following options:
    • Email , Phone , Chat

  • ESET Endpoint Security offers training with the following options:
    • In-person , Webinar , Documentation

  • ESET Endpoint Security supports the following languages:
    • Arabic , Bulgarian , Chinese , Croatian , Czech , English , Estonian , French , German , Greek , Hebrew , Hungarian , Indonesian , Italian , Japanese , Kazakh , Korean , Latvian , Norwegian , Portuguese , Russian , Spanish , Swedish , Turkish , Ukrainian , Vietnamese

  • Following are the typical users of the ESET Endpoint Security:
    • Self-Employed , Small-Business , Midsize-Business , Large-Enterprise-Business

  • ESET Endpoint Security supports the following deployment:
    • Cloud Hosted

  • ESET Endpoint Security supports the following devices and operating systems:
    • Web-Based , iPhone , Android , Windows , Mac , Linux

ESET Endpoint Security Comparisons

ESET Endpoint Security vs Cloudflare

ESET Endpoint Security vs Microsoft Defender for Business

ESET Endpoint Security vs GoDaddy Website Security

ESET Endpoint Security vs Cisco Umbrella

ESET Endpoint Security vs Cisco Secure Endpoint

ESET Endpoint Security vs Cisco AnyConnect

ESET Endpoint Security vs Jetpack

ESET Endpoint Security vs CylanceENDPOINT

ESET Endpoint Security vs Norton AntiVirus

ESET Endpoint Security vs AVG AntiVirus Business Edition

ESET Endpoint Security vs Avast Premium Business Security

ESET Endpoint Security vs Avast Ultimate Business Security

ESET Endpoint Security vs ESET Home Office Security Pack

ESET Endpoint Security vs Symantec Endpoint Security

ESET Endpoint Security vs AVG Internet Security Business Edition

ESET Endpoint Security vs Symantec Enterprise Cloud

ESET Endpoint Security vs Apex One

ESET Endpoint Security vs Avast Business CloudCare

ESET Endpoint Security vs InterScan Messaging Security

ESET Endpoint Security vs Proofpoint Email Protection