Who Uses ESET Endpoint Security?

ESET began life as a pioneer of antivirus protection, creating award-winning threat detection software. Today our security solutions protect over 110 million users in 200 countries and territories.

What Is ESET Endpoint Security?

Endpoint security software that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easy-to-use cloud-based console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption.

ESET Endpoint Security Details

ESET

http://www.eset.com

Founded 1987

ESET Endpoint Security Software - 1
ESET Endpoint Security Software - 2
ESET Endpoint Security Software - 3
ESET Endpoint Security Software - 4
ESET Endpoint Security Software - 5
ESET Endpoint Security video
Play
ESET Endpoint Security Software - 1 - thumbnail
ESET Endpoint Security Software - 2 - thumbnail
ESET Endpoint Security Software - 3 - thumbnail
ESET Endpoint Security Software - 4 - thumbnail
ESET Endpoint Security Software - 5 - thumbnail

ESET Endpoint Security pricing overview

See pricing plans

ESET Endpoint Security does not have a free version but does offer a free trial. ESET Endpoint Security paid version starts at $695.00/year.


Starting Price

$695.00/year See pricing details

Pricing Details

Contact ESET sales for full pricing information and available discounts.

Free Version

No

Free Trial

ESET Endpoint Security deployment and support

Support

  • Email/Help Desk
  • Phone Support
  • Chat

Deployment

  • Cloud, SaaS, Web-based
  • Mac (Desktop)
  • Windows (Desktop)
  • Linux (Desktop)
  • Windows (On-Premise)
  • Linux (On-Premise)
  • Android (Mobile)
  • iPhone (Mobile)
  • iPad (Mobile)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation

ESET Endpoint Security Features

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Tracking
  • Allow / Block List
  • Anti Spam
  • Anti Virus
  • Archiving & Retention
  • Audit Trail
  • Authentication
  • Backup and Recovery
  • Categorisation/Grouping
  • Compliance Management
  • Compression
  • Data Loss Prevention Software
  • Data Recovery
  • Data Retention Management
  • Data Storage Management
  • Data Synchronization
  • Data Verification
  • Disaster Recovery
  • Email Management
  • Email Routing
  • Email Tracking
  • Encryption
  • Event Tracking
  • Filtering
  • Fraud Detection
  • Greylisting
  • Inbox Management
  • Microsoft Outlook Integration
  • Monitoring
  • Phishing Protection
  • Policy Management
  • Quarantine
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Assessment
  • SSL Security
  • SURLB/URIBL Filtering
  • Search/Filter
  • Secure Data Storage
  • Security Auditing
  • Single Sign On
  • Spam Analysis
  • Spam Blocker
  • Spam Detection
  • Tagging
  • Third Party Integrations
  • Vulnerability Scanning

View full list of Anti-spam Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Archiving & Retention
  • Audit Management
  • Automated Scheduling
  • Automatic Backup
  • Backup Log
  • Backup Scheduling
  • Backup and Recovery
  • Cloud Backup
  • Compliance Management
  • Compression
  • Continuous Backup
  • Data Migration
  • Data Recovery
  • Data Replication
  • Data Storage Management
  • Data Synchronization
  • Data Visualization
  • Disaster Recovery
  • Document Storage
  • Duplicate Detection
  • Email Alerts
  • Encryption
  • File Management
  • HIPAA Compliant
  • Incremental Backup
  • Local Server Options
  • Monitoring
  • Policy Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Server Options
  • Reporting & Statistics
  • Resource Management
  • Role-Based Permissions
  • SSL Security
  • Scheduled / Automated Reports
  • Secure Data Storage
  • Self Service Portal
  • Status Tracking
  • Task Scheduling
  • Third Party Integrations
  • Two-Factor Authentication
  • Version Control
  • Web Access / Restoration

View full list of Backup Software

  • AI/Machine Learning
  • Anomaly/Malware Detection
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Dashboard
  • Event Logs
  • Fraud Detection
  • Real-time Alerts
  • Threat Intelligence
  • Vulnerability Scanning
  • Web Traffic Monitoring

View full list of Bot Detection and Mitigation Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavioral Analytics
  • Compliance Management
  • Customizable Reports
  • Data Visualization
  • Encryption
  • Endpoint Management
  • Event Logs
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Single Sign On
  • Status Tracking
  • Third Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Management
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Reporting

View full list of Cloud Security Software

  • API
  • Access Control
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Best Practices Repository
  • Compliance Management
  • Data Security
  • Data Visualization
  • Endpoint Protection Software
  • Event Logs
  • Event Tracking
  • Financial Data Protection
  • HIPAA Compliant
  • Incident Management
  • Maintenance Scheduling
  • Monitoring
  • Network Security Software
  • Password Management
  • Patch Management
  • Policy Management
  • Privileged Account Management
  • Real Time Monitoring
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Two-Factor Authentication
  • User Management
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning

View full list of Computer Security Software

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavior Tracking
  • Behavioral Analytics
  • Collaboration Tools
  • Compliance Management
  • DDoS Protection
  • Data Security
  • Data Visualization
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Firewalls
  • HIPAA Compliant
  • IOC Verification
  • Incident Management
  • Monitoring
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Prioritization
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Tokenization
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Cybersecurity Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Audit Trail
  • Automatic Backup
  • Backup and Recovery
  • Compliance Management
  • Compliance Tracking
  • Compression
  • Configurable Workflow
  • Configuration Management
  • Data Recovery
  • Data Replication
  • Data Storage Management
  • Data Synchronization
  • Disaster Recovery
  • File Management
  • File Transfer
  • HIPAA Compliant
  • Incident Management
  • Issue Management
  • Monitoring
  • Multiple Data Sources
  • Policy Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Notifications
  • Remote Access/Control
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Scheduling
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Sensitive Data Identification
  • Status Tracking
  • Task Scheduling
  • Third Party Integrations
  • User Management
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Data Loss Prevention Software

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Customizable Reports
  • Data Import/Export
  • Data Retention Management
  • Data Storage Management
  • Data Synchronization
  • Data Verification
  • Digital Signature
  • Email Attachment Protection
  • Email Management
  • Email Tracking
  • Encryption
  • Event Logs
  • Filtering
  • Fraud Detection
  • HIPAA Compliant
  • Microsoft Outlook Integration
  • Monitoring
  • Password Management
  • Policy Management
  • Quarantine
  • Real Time Monitoring
  • Real Time Notifications
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • SSL Security
  • Scheduled / Automated Reports
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Single Sign On
  • Spam Analysis
  • Spam Blocker
  • Third Party Integrations
  • Two-Factor Authentication
  • Vulnerability Scanning
  • Whitelisting/Blacklisting

View full list of Email Security Software

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Application Encryption
  • Audit Trail
  • Authentication
  • Backup and Recovery
  • Cloud Encryption
  • Compliance Management
  • Credential Management
  • Customizable Reports
  • Data Storage Management
  • Data Visualization
  • Disk Encryption
  • Encryption
  • Event Logs
  • Event Tracking
  • File Encryption
  • HIPAA Compliant
  • Incident Management
  • Issue Tracking
  • Key Management
  • Monitoring
  • P2P Encryption
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Reporting
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Status Tracking
  • Summary Reports
  • Third Party Integrations
  • Threat Response
  • Tokenization
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning

View full list of Encryption Software

  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Behavioral Analytics
  • Continuous Monitoring
  • Endpoint Management
  • Event Analysis
  • Prioritization
  • Remediation Management
  • Root Cause Analysis
  • Whitelisting/Blacklisting

View full list of Endpoint Detection and Response Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Virus
  • Application Management
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavior Tracking
  • Behavioral Analytics
  • Compliance Management
  • Customizable Reports
  • Data Visualization
  • Device Management
  • Encryption
  • Event Logs
  • Event Tracking
  • HIPAA Compliant
  • Incident Management
  • Monitoring
  • Patch Management
  • Policy Management
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Signature Matching
  • Summary Reports
  • Third Party Integrations
  • Two-Factor Authentication
  • Uptime Reporting
  • User Management
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting

View full list of Endpoint Protection Software

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Behavior Tracking
  • Compliance Management
  • Content Filtering
  • Customizable Reports
  • Dashboard Creation
  • Event Logs
  • Filtering
  • Hardware Integration
  • IP Filtering
  • Incident Management
  • Intrusion Detection System
  • Intrusion Prevention System
  • Log Access
  • Monitoring
  • Multi-Location
  • Network Monitoring
  • Next-Generation Firewall
  • Policy Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Role-Based Permissions
  • SSL Security
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Summary Reports
  • Two-Factor Authentication
  • Uptime Reporting
  • VPN Software
  • Visual Analytics
  • Vulnerability Scanning
  • Web Traffic Reporting

View full list of Firewall Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Data Visualization
  • Email Alerts
  • Event Logs
  • Event Tracking
  • Filtering
  • Firewalls
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritization
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • VPN Software
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Workflow Management

View full list of Network Security Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Anti Virus
  • Asset Lifecycle Management
  • Audit Management
  • Audit Trail
  • Automatic Backup
  • Compliance Management
  • Configuration Management
  • Customisable Branding
  • Customizable Reports
  • Deployment Management
  • Event Logs
  • For MSPs
  • IT Asset Management
  • IT Asset Tracking
  • Inventory Management
  • Maintenance Scheduling
  • Mobile Access
  • Monitoring
  • Multiple User Accounts
  • Network Monitoring
  • Patch Management
  • Policy Management
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Alerts
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Role-Based Permissions
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Summary Reports
  • Support Ticket Management
  • Task Management
  • Task Scheduling
  • Third Party Integrations
  • Uptime Reporting
  • Usage Tracking/Analytics
  • User Management
  • Vulnerability Scanning
  • Workflow Management

View full list of RMM Software

  • @mentions
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Assignment Management
  • Calendar Management
  • Chat/Messaging
  • Collaboration Tools
  • Commenting/Notes
  • Communication Management
  • Customisable Branding
  • Customizable Templates
  • Data Import/Export
  • Document Management
  • Document Storage
  • Drag & Drop
  • Electronic Signature
  • Email Management
  • Employee Activity Monitoring
  • File Management
  • File Transfer
  • Live Chat
  • Meeting Management
  • Monitoring
  • Prioritization
  • Progress Tracking
  • Project Time Tracking
  • Projections
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real-time Updates
  • Remote Access/Control
  • Remote Support Software
  • Reporting & Statistics
  • SSL Security
  • Single Sign On
  • Softphone Software
  • Tagging
  • Task Management
  • Task Progress Tracking
  • Task Scheduling
  • Third Party Integrations
  • Time Zone Tracking
  • Two-Way Audio & Video
  • Video Chat
  • Video Conferencing
  • Workflow Management

View full list of Remote Work Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Alerts / Escalation
  • Archiving & Retention
  • Automated Scheduling
  • Automatic Backup
  • Backup Log
  • Backup Scheduling
  • Backup and Recovery
  • Bare-Metal Restore
  • Compression
  • Continuous Backup
  • Data Capture and Transfer
  • Data Migration
  • Data Recovery
  • Data Replication
  • Data Storage Management
  • Data Synchronization
  • Data Visualization
  • Deduplication
  • Differential Backup
  • Disaster Recovery
  • Drag & Drop
  • Duplicate Detection
  • Encryption
  • File Management
  • File Transfer
  • Incremental Backup
  • Monitoring
  • Multi-OS
  • Multiple Format Support
  • Policy Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Resource Management
  • SSL Security
  • Scheduling
  • Search/Filter
  • Secure Data Storage
  • Server Monitoring
  • Task Scheduling
  • Third Party Integrations
  • Two-Factor Authentication
  • VM Backup
  • Version Control
  • Workflow Management

View full list of Server Backup Software

  • API
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Behavior Analytics
  • Cloud Backup
  • Customizable Reports
  • Data Visualization
  • Event Analysis
  • Event Logs
  • IT Reporting
  • Incident Reporting
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Scanning
  • Prioritization
  • Profiling
  • Real Time Analytics
  • Real Time Data
  • Real Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Server Monitoring
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning
  • Web-Application Security

View full list of Threat Intelligence Software

  • API
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • DDoS Protection
  • Endpoint Protection Software
  • Firewalls
  • Load Balancing Tools
  • Log Management
  • SQL Injections
  • Threat Response
  • Vulnerability Scanning
  • Web-Application Security

View full list of Website Security Software

ESET Endpoint Security Alternatives

More ESET Endpoint Security alternatives

ESET Endpoint Security Reviews

Read all 796 reviews

Average score

Overall
4.7
Ease of Use
4.5
Customer Service
4.4
Features
4.6
Value for Money
4.5

Reviews by company size (employees)

  • <50
  • 51-200
  • 201-1,000
  • >10,001
Robert M.
Robert M.
IT Engineer
Computer & Network Security, 2-10 Employees
Used the Software for: 2+ years
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 20/04/2021

"Removes infections others do not."

Comments: Have found ESET support to be responsive and knowledage. We have met the UK head of sales a few times at various events and it has always been a pleasure.

Pros: We are partnered with ESET as their product range has a very virus detection rate combined with a low system impact. Quite often we have customers bring in computers running other AV software and we use ESET to remove infections.

Cons: The ERA console is very flexable but can be overly complex for most use cases. Would be nice to see a better implementation of the user interface, perhaps a wizzard system. This does not affect end users though.

Alternatives Considered: Panda Adaptive Defense 360

Reasons for Choosing ESET Endpoint Security: Trends virus detection rate at the time was not so good.

Switched From: Trend Micro Smart Protection Complete Suite

Reasons for Switching to ESET Endpoint Security: Price and previous good histroy with ESET.

  • Reviewer Source 
  • Reviewed on 20/04/2021
Chanaka A.
Chanaka A.
Civil Engineer
Civil Engineering, 51-200 Employees
Used the Software for: 2+ years
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 17/08/2021

"Fast, Lightweight, efficient antivirus which is a must for any user"

Comments: ESET is the fastest and most efficient security tool among many others and I'm telling this from experience. This will work on any device even if it's got lower performance without overloading the device. Just try this and you will understand why this is one of the best in the market right now. Detection engine is capable of identifying many threats which are missed from similar tools.

Pros: I started using ESET few years back and instantly I felt an improvement from all the antivirus software I used during my time. ESET was fast and had minimal impact on overall performance on computer while detecting many threats other tools could not detect. With constant updates and user friendly UI, I feel it's the most comfortable tool I have used. Quite customizable with excluding locations, custom firewall, and specially the gaming mode where it improves overall performance of computer was splendid. As a user for many years ESET came up with many good features like email protection, banking protection, and a own blacklist to enhance users' security.

Cons: I used ESET for many years but I have rarely seen faults in ESET. But I think constant notifications reminding to update and lower downloading speed for updates even when a stable and speed internet connection is available can be stated as the areas where I think ESET need to improve.

  • Reviewer Source 
  • Reviewed on 17/08/2021
Verified Reviewer
Ingeniero de soporte
Photography, 5,001-10,000 Employees
Used the Software for: 2+ years
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    3/10
  • Reviewer Source 
  • Reviewed on 23/10/2018

"ESET Endpoint Security"

Comments: In experience, it is not a bad program, but it is very basic depending on the type of user that is addressed, for a home user it would be good but for business, something more robust would be needed.

Pros: This security system although it has many options is very easy to use, it is very friendly and for a user who has never used it you can use it easily, I could say that this type of security should be used more for people of home since For some company it is very basic, it may have different security options but it is not complete.

Cons: What I do not like is the cost, the cost of this application is too high for the options and security that it has, it can have different levels or options for security of different types for when protection is something very simple, at the company level that handles some sensitive information could cause problem, since the type of security as I mention it above is very basic, would be only for users of house, and for the price the users of house I would not accept it is very high.
They have an option for microsoft security that I do not see as a user.

  • Reviewer Source 
  • Reviewed on 23/10/2018
Suhailah S.
Suhailah S.
Administrative Assistant
Retail, 5,001-10,000 Employees
Used the Software for: 2+ years
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
    Unrated
  • Value for Money
    Unrated
  • Likelihood to Recommend
    9/10
  • Reviewer Source 
  • Reviewed on 07/07/2021

"Must have security software for any computer"

Pros: ESET Endpoint Security is the best option for a non technical user or people that do not want to deal with the security of their computer in the daily basis, as this software only need a one time setting and you practically will never have to even monitor the setting anymore. It is the best defender for any computer.

Cons: The software update will take forever to finish download, even when my internet is very fast and stable. It seem those factor did not helpful when downloading the update. The scanning process will slowing down the computer a bit, but not a real problem as i always schedule it running at midnight when i am not using my computer.

  • Reviewer Source 
  • Reviewed on 07/07/2021
Gabriella N.
Gabriella N.
Process Design Engineer and CEO
Mining & Metals, 2-10 Employees
Used the Software for: 2+ years
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    8/10
  • Reviewer Source 
  • Reviewed on 21/02/2021

"Works well whether entry-level or high performance"

Comments: Having used ESET for about seven years there are definitely more pros than cons.

Pros: I have used ESET for about 7 years back and forth and at times together with another antivirus. When I first started with ESET it did a really good job, my laptop was not performing well, I installed it and managed to remove over 20 malicious software.
I like how it works well on different computer systems, be it entry-level or high performance. I am currently running it on an i5 processor with 8 GBs of RAM and it works well. It uses low computing power and it does not slow down my computer.
I like the ESET splash screen that shows up on computer startup, it's interesting how it's changed over the years. The splash screen has a clean and premium feel to it and it makes using ESET thus much more pleasant. The splash screen simply shows up and automatically disappears, making starting up pleasant and not long especially when compared to other programs where a complete window opens up which then has to be closed.
I have also used it on an entry-level computer with a Celeron processor and 4 GBs of RAM. It worked well, and I still saw the above pros, and most importantly I was able to scan my computer and have it free of malware.

Cons: I do not have much against ESET, it works well, except that scan times are lengthy, but this is related to file sizes that I have on my machine and in any case, I found it to still be quicker than other programs.
There is a price point to ESET and even though it works well there are other anti-virus programs with a free plan that compete strongly with it.

  • Reviewer Source 
  • Reviewed on 21/02/2021