ESET PROTECT vs. IBM Security QRadar EDR

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
ESET PROTECT
Score 9.1 out of 10
N/A
ESET provides Endpoint Protection Platform (EPP) capabilities via the ESET PROTECT Platform, covering Windows, Mac, Linux, and both Android and iOS operating systems, providing Mobile Device Management functionality. It comes with multi-tenant management, ensuring real-time visibility for both on-premises and off-premises endpoints as well as full reporting for ESET enterprise-grade solutions. ESET PROTECT management platform can be deployed on-premise or in-cloud. For organizations looking to…N/A
IBM Security QRadar EDR
Score 8.0 out of 10
N/A
IBM Security QRadar EDR (formerly ReaQta) combines automation and dashboards to minimize analyst workloads, detect anomalous endpoint behavior and remediate threats in near real time. With visibility across endpoints, it combines expected features, like MITRE ATT&CK mapping and attack visualizations, with dual-engine AI and automation. For teams that need extended support, managed detection and response (MDR) services offers 24/7 monitoring and response to help keep users…N/A
Pricing
ESET PROTECTIBM Security QRadar EDR
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
ESET PROTECTIBM Security QRadar EDR
Free Trial
YesYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeOptionalOptional
Additional DetailsESET offers are tailored to each customer’s needs. ESET takes pride in working with customers and partners to find the perfect solution for their security challenges at the right price. Contacting an ESET partner or sales representative ensures each solution is made-to-measure and precisely fits the size, complexity of IT environment and level of protection to match the customer’s business requirements.
More Pricing Information
Features
ESET PROTECTIBM Security QRadar EDR
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
ESET PROTECT
9.2
16 Ratings
8% above category average
IBM Security QRadar EDR
8.1
9 Ratings
5% below category average
Anti-Exploit Technology9.016 Ratings8.08 Ratings
Endpoint Detection and Response (EDR)9.315 Ratings8.49 Ratings
Centralized Management9.115 Ratings8.29 Ratings
Hybrid Deployment Support8.512 Ratings7.78 Ratings
Infection Remediation9.216 Ratings7.99 Ratings
Vulnerability Management9.615 Ratings00 Ratings
Malware Detection9.616 Ratings8.19 Ratings
Best Alternatives
ESET PROTECTIBM Security QRadar EDR
Small Businesses
ThreatLocker
ThreatLocker
Score 9.1 out of 10
ESET PROTECT
ESET PROTECT
Score 9.1 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.2 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.2 out of 10
Enterprises
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 9.6 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 9.6 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
ESET PROTECTIBM Security QRadar EDR
Likelihood to Recommend
9.6
(48 ratings)
8.1
(9 ratings)
Likelihood to Renew
10.0
(4 ratings)
-
(0 ratings)
Usability
8.0
(2 ratings)
-
(0 ratings)
Support Rating
9.5
(5 ratings)
-
(0 ratings)
Implementation Rating
10.0
(1 ratings)
-
(0 ratings)
User Testimonials
ESET PROTECTIBM Security QRadar EDR
Likelihood to Recommend
ESET
Comprehensive threat prevention against a variety of threats, such as viruses, ransomware, and spyware is effectively provided by ESET PROTECT. The cross platform compatibility of this software is advantageous for business with diverse IT environments such as those combination of Windows, macOS, and Linux systems. Some industries, such highly regulated sectors with specific compliance needs, may find it more cost-effective, however it is less suitable for small enterprises with limited IT resources and for organizations with severe budgetary limits.
Read full review
IBM
IBM Security QRadaar EDR provides all the security features at one place with a reasonable price. Though for smaller organizations, the price may be quite high. Plus since it can detect threats and malwares in real time, every business should try them out.
Read full review
Pros
ESET
  • ESET provides comprehensive, transparent protection for my MacOS devices without interfering with the efficiency of my operating system.
  • It's easy to install, configure (default settings are great for just about everyone), and update.
  • ESET's customer communications, including a very detailed knowledge base online, make it clear I've chosen the right antivirus solution!
Read full review
IBM
  • Detect known and unknown endpoint security threats
  • Remediate these threats near real time
  • Automation in threat detection
  • Threat attack attack visualization storyboards
  • Alert management authomation
Read full review
Cons
ESET
  • If the system administrator has functions such as pop-up notification and alert mail transmission, I believe that countermeasures can be taken faster
  • It often gets in the way of the network system.
  • Communication between PCs under the same network may be hindered, which may be an obstacle to verification.
Read full review
IBM
  • use AI to review previous false negatives that contributed wrongly in the AI suggestion on the follow alerts
  • easily run a script based on values from an hash, ips, path inside the boxes on the behavioral tree
  • apply the remediation to a range of endpoint instead to only the endpoint of the current alert
  • use ajax for example to update the alert page automatically while actions are happening
  • for api have profiles that allow only get actions, or just post on some actions
  • create users in bulk
Read full review
Likelihood to Renew
ESET
I'm giving it a 10, because I would totally have no reservations about staying on with eSet for another 3 years once our contract comes up for renewal. We are looking to transfer to a different product in January, however. This is due to a special pricing contract with the state of Ohio that made a normally much more expensive product very affordable and was cheaper than our coming eSet renewal cost. This is a very special case only available to government and educational organizations, but had that not been offered, we would have gladly stayed with eSet.
Read full review
IBM
No answers on this topic
Usability
ESET
We had issues initially getting all of the policies implemented and working since it can be hard to figure out what setting is coming from what policy. Once you get your stack of policies setup and working, the product works great. The installers just work and knowing that they can remove other AV software when you install it can save you a lot of time and headaches.
Read full review
IBM
No answers on this topic
Support Rating
ESET
Excellent support from ESET and when we had questions regarding the initial deployment they were there. The questions we put forth were answered immediately with great detail. Any of the items we put forth, scenarios, were given a good solution from ESET to fit our needs. This company stands by their product and are happy to step up when needed.
Read full review
IBM
No answers on this topic
Implementation Rating
ESET
Do the full scan at the beginning and be prepared to wait until it is done. It will find things you did not know were there. You can leave on the Apple firewall as well as the ESET firewall. There have been no conflicts. Remember to remove emails from being backed up, so you do not have spam on your backup! This was the mistake I made.
Read full review
IBM
No answers on this topic
Alternatives Considered
ESET
We really like the lightness of ESET, this really is a differential in your favor, the way it operates quietly in the background even running a scan was something that interested us, nothing worse than an antivirus locking everything like a scan and still end up issuing scandalous false detections, in the end the choice was made by ESET much because of this differential.
Read full review
IBM
Bitdefender GravityZone combines multiple security services into a single platform to reduce the cost of building a trusted environment for endpoints. bit the IBM provides a vast support and always there to guide when in need With the majority of our users working in hybrid mode we needed a strong security control that could provide top-class protection with the minimum amount of False Positives (and, of course, of True Positives).
Read full review
Return on Investment
ESET
  • Stopped several malware outbreaks that would have had considerable downtime on endpoints.
  • Stopped several ransomware attacks that would have potentially costs large sums of money and downtime.
  • Allowed us to utilize Eset itself in lieu of a patchwork of platforms to accomplish the same tasks. Saving us several thousand per year.
Read full review
IBM
  • Positive impact is customizable detection strategy.
  • Other positive impact is pin processes in the tree investigation.
  • Negative impact is little bit expense.
Read full review
ScreenShots

ESET PROTECT Screenshots

Screenshot of ESET PROTECT Dashboard.
Unified cybersecurity platform interface providing network visibility and control. Available as cloud or on-prem deployment.

Ensures real-time visibility for all endpoints as well as full reporting and security management for all OSes.Screenshot of ESET Endpoint Security.

Advanced multilayered protection for computers and smartphones powered by ESET LiveSense technology.Screenshot of ESET Server Security.
Provides real-time protection for the company’s data passing through all general servers, network file storage including OneDrive, and multi-purpose servers to ensure business continuity.Screenshot of ESET PROTECT - Reports. 
Meets reporting requirements and saves time with scheduled reporting and dozens of customizable templates.Screenshot of ESET Full Disk Encryption. 
An encryption managed natively by ESET remote management console. It increases the  organization's data security that meets compliance regulations.Screenshot of ESET LiveGuard Advanced. 
A cloud-based technology that uses scanning, machine learning, cloud sandboxing, and in-depth behavioral analysis to prevent targeted attacks as well as new or unknown threats, especially ransomware.

IBM Security QRadar EDR Screenshots

Screenshot of Behavioral tree: 
A behavioral tree provides full alert and attack visibility.Screenshot of Behavioral tree storyline: 
A visual storyline is automatically created as an attack unfolds, including mapping to MITRE ATT&CK, for full visibility.Screenshot of Cyber Assistant alerts: 
The Cyber Assistant, an AI-powered alert management system, can autonomously handle alerts, reducing analysts’ workloads.Screenshot of Cyber Assistant recommends:
The Cyber Assistant learns from analyst decisions, then retains the intellectual capital and learned behaviors to make recommendations and help reduce false positives.Screenshot of Custom detection strategies: 
Detection Strategy (DeStra) scripting allows users to build custom detection strategies — beyond preconfigured models — to address compliance or company-specific requirements without the need to reboot the endpoint.