Likelihood to Recommend Comprehensive threat prevention against a variety of threats, such as viruses, ransomware, and spyware is effectively provided by ESET PROTECT. The cross platform compatibility of this software is advantageous for business with diverse IT environments such as those combination of Windows, macOS, and Linux systems. Some industries, such highly regulated sectors with specific compliance needs, may find it more cost-effective, however it is less suitable for small enterprises with limited IT resources and for organizations with severe budgetary limits.
Read full review I think Kaspersky is well suited for large and small companies. Larger companies can take advantage of the KSC (Kaspersky Security Center) servers to help manage a large network. The KSC has many good features to help monitor the health of the organization. It does a good job with updating and deploying remotely. It has inventory features, and can even deploy non-Kaspersky software packages uploaded to the center. KSC can become a source of good information about [your] network that can be seen at a glance. IT departments are normally smaller than they need to be. KSC helps with larger and smaller companies because of this. A small company would appreciate the amount of information and management that can be done through KSC without needing extra help. If the company is small enough that they don't have servers on-site, there is a cloud version. I have not used that to know how it differs from the local KSC.
Read full review Pros ESET provides comprehensive, transparent protection for my MacOS devices without interfering with the efficiency of my operating system. It's easy to install, configure (default settings are great for just about everyone), and update. ESET's customer communications, including a very detailed knowledge base online, make it clear I've chosen the right antivirus solution! Read full review The Security Center is laid out very well and makes it easy to install and manage the client endpoint protection on servers and workstations. The way security policies are defined and managed is very easy to understand. The client programs seem to be lighter and smaller on the client systems than others I have used in the past. Using fewer resources is always an advantage. Read full review Cons If the system administrator has functions such as pop-up notification and alert mail transmission, I believe that countermeasures can be taken faster It often gets in the way of the network system. Communication between PCs under the same network may be hindered, which may be an obstacle to verification. Read full review The PC imaging tools are difficult to set up and use Device Encryption tools are getting better, but are difficult to manage. The policies are powerful, but could be broken up. More help can be provided in what the policy element does within the policy setup Read full review Likelihood to Renew I'm giving it a 10, because I would totally have no reservations about staying on with eSet for another 3 years once our contract comes up for renewal. We are looking to transfer to a different product in January, however. This is due to a special pricing contract with the state of Ohio that made a normally much more expensive product very affordable and was cheaper than our coming eSet renewal cost. This is a very special case only available to government and educational organizations, but had that not been offered, we would have gladly stayed with eSet.
Read full review The product is stable and accurate in detecting security threats. There are very few or no false positives in detecting security threats or unusual behavior and has very sharp heuristics. The product does the job very well including saving us money in getting 3rd party patch management tools as the business is already using Microsoft System Center Configuration Manager which is Microsoft product specific and the product patches these third party products e.g Adobe Flash Player
Read full review Usability We had issues initially getting all of the policies implemented and working since it can be hard to figure out what setting is coming from what policy. Once you get your stack of policies setup and working, the product works great. The installers just work and knowing that they can remove other AV software when you install it can save you a lot of time and headaches.
Read full review The integration with a known solution is not good (Cisco ISE), product (10.x) does not automate remediation, however security is great and detects security threats with accuracy including heuristics, very few or no false positives
Read full review Reliability and Availability I've used the on-premise server. I've only experienced one time that we couldn't open the console, and that was a server issue. It seems to be a dependable solution. It's there, and it's stable.
Read full review Performance Users don't notice any slowdown with the antivirus running on their systems. There have been issues when the systems have missed a scheduled scan, and it was checked to run at [a] first available time, they will start a full scan at startup. This has caused some lag. Normally there are also some issues with the workstation, but it is something to note.
Read full review Support Rating Excellent support from ESET and when we had questions regarding the initial deployment they were there. The questions we put forth were answered immediately with great detail. Any of the items we put forth, scenarios, were given a good solution from ESET to fit our needs. This company stands by their product and are happy to step up when needed.
Read full review I give the maximum grade because we have no complaints; we never had any failure, serious error, and serious threat to the company. All of its features work very well. The great advantage of having a product supported by an industry-leading security company is that regularly updated security protocols will protect the system against all emerging threats.
Read full review Implementation Rating Do the full scan at the beginning and be prepared to wait until it is done. It will find things you did not know were there. You can leave on the Apple firewall as well as the ESET firewall. There have been no conflicts. Remember to remove emails from being backed up, so you do not have spam on your backup! This was the mistake I made.
Read full review Make sure to provide awareness campaigns on changes that will be implemented and WHY the business is doing it and the benefits reaped. Benefits reaped is very important for the justification of why things have to change and emphasizing the importance of security. This will reduce user disgruntlement and total bitterness on use of their workstation or laptop
Read full review Alternatives Considered We really like the lightness of ESET, this really is a differential in your favor, the way it operates quietly in the background even running a scan was something that interested us, nothing worse than an antivirus locking everything like a scan and still end up issuing scandalous false detections, in the end the choice was made by ESET much because of this differential.
Read full review Kaspersky is a leader in endpoint protection, but its ties to potential adversaries are unsettling. Kaspersky has a great threat research team and quickly identifies malicious software and its signature. Its web-based protection is also top notch. This is a great product but as with everything has its place.
Read full review Scalability You can create groups and create different policies for each group. You can customize many parts of the software before it is deployed. You can create different tasks and schedules based on the groups. It is customizable.
Read full review Return on Investment Stopped several malware outbreaks that would have had considerable downtime on endpoints. Stopped several ransomware attacks that would have potentially costs large sums of money and downtime. Allowed us to utilize Eset itself in lieu of a patchwork of platforms to accomplish the same tasks. Saving us several thousand per year. Read full review It reduced the incidents of infections and so reduced the efforts needed by the IT department to mitigate problems. It made it difficult to manage the security of our growing mobile user base due to infrequent contact with our on-premise management server. Read full review ScreenShots