Contact Details

ESET

Located in Slovakia, Bratislavsky, Bratislava

Founded in 1992

Search

Compare product ratings to similar products Find other products with similar features to suit your business

contact us

Have you used this product before? Find other productswith similar features to suit your business

Write a review

Does this product belong to you

Alternatives to ESET ENDPOINT NETWORK SECURITY

GLASSWIRE network security

GLASSWIRE network security

No ratings yet!
Watchguard

Watchguard

No ratings yet!
Webroot

Webroot

No ratings yet!
Avast

Avast

No ratings yet!
Gfi languard

Gfi languard

No ratings yet!
Mcafee network security

Mcafee network security

No ratings yet!
Sophos

Sophos

No ratings yet!
Norton 360

Norton 360

No ratings yet!
Broadcom

Broadcom

No ratings yet!
FireEye Network security

FireEye Network security

No ratings yet!
View all alternatives

What is ESET ENDPOINT NETWORK SECURITY?

Show Less

Contact Details

ESET

Located in Slovakia, Bratislavsky, Bratislava

Founded in 1992

Top Industries Represented

Data from Grid Report for Network Security Software

View grid data

Deployment & Support

Deployment

  • Cloud, Saas, Web-based
  • Desktop-mac
  • Desktop-Windows
  • Desktop-Linux
  • Desktop-Chromebook
  • On Promise Windows
  • On Premise Linux
  • Mobile-Android
  • Mobile-Iphone
  • Mobile-Ipad

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live Recap)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos

ESET ENDPOINT NETWORK SECURITY Pricing  View vendors pricing

Check out our offers for each of our packages to get best out of the software

Protect entry

$239
5 devices per year

Modern multilayered endpoint protection featuring strong machine learning and easy-to-use management

    Protect Advanced

    $310.5
    5 devices per year

    Best-in-class endpoint protection against ransomware & zero-day threats, backed by powerful data security

      Protect complete

      $382.5
      5 devices per year

      Complete, multilayered protection for endpoints, cloud applications & email, the #1 threat vector

        Visit us on our website to know more

        Get a custom quote

        ESET ENDPOINT NETWORK SECURITY Features

        Primary Features

        Access Controls/Permissions

        Access control is a security technique that regulates who or what can view or use resources in a computing environment. It is a fundamental concept in security that minimizes risk to the business or organization.

        Activity Monitoring

        User activity monitoring is the process of actively monitoring and tracking the behavior of employees across IT resources owned by your company, such as devices and networks.

        Event Tracking

        Event tracking, or action tracking, usually refers to the monitoring of interactions on a website beyond a simple web page load. Event tracking provides data on how visitors are engaging (or not engaging) with a website

        Intrusion Detection System

        An Intrusion Detection System (IDS) is a monitoring system that detects suspicious activities and generates alerts when they are detected.

        Firewalls

        A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

        Threat Response

        Threat Response monitors activity in real time and generates alerts when potential malicious behavior is detected.

        Vulnerability Scanning

        Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes.

        Activity Tracking

        Sometimes called user activity tracking, user activity monitoring is a form of surveillance, but serves as a proactive review of end user activity to determine misuse of access privileges or data protection policies either through ignorance or malicious intent.

        Real Time Monitoring

        RTM, therefore, allows network administrators and engineers to see and respond to network events such as faults, failures, performance, health and usage, slow systems among other issues that can cause organization systems or network downtime as they occur.

        Secure Data Storage

        Secure Data Storage collectively refers to the manual and automated computing processes and technologies used to ensure stored data security and integrity.

        Reporting/Analytics

        It is an approach to cybersecurity that uses data collection, data aggregation and analysis tools for threat detection and security monitoring.

        Alerts/Notifications

        Network alerts are a crucial aspect of network performance monitoring, as they're designed to provide IT admins with quick insight into network issues, allowing for faster troubleshooting.

        Policy Management

        Network Policy Management is based on a central repository of rules, profiles and objects required for building security policies.

        Secondary Features

        • Vulnerability Protection
        • Application Security
        • Monitoring
        • Web Traffic Reporting
        • Encryption
        • Endpoint Protection
        • Compliance Tracking
        • Vpn
        • Server Monitoring

        Compare with Similar Products

        GLASSWIRE network security

        GLASSWIRE network security

        Watchguard

        Watchguard

        Webroot

        Webroot

        Avast

        Avast

        Gfi languard

        Gfi languard

        Mcafee network security

        Mcafee network security

        Sophos

        Sophos

        Norton 360

        Norton 360

        Broadcom

        Broadcom

        FireEye Network security

        FireEye Network security

        Show Comparisons

        Resources