ESET Endpoint Security vs Falcon
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks,...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base Software
- Phone Support
- 24/7 (Live rep)
- Chat
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base Software
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
A$396.00/year
- Free Version
- Free Trial
- Subscription
Starting from
$8.99/month
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.5/5Features
4.6/5Customer Service
4.4/5Value for Money
4.4/5Ease of Use
4.3/5Features
4.6/5Customer Service
4.1/5Value for Money
4.1/5Features
Total features 69
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- Anti Spam
- Anti Virus
- Application Security
- Audit Trail
- Backup Log
- Backup and Recovery
- Bandwidth Monitoring
- Behavioral Analytics
- Bot Detection
- Bot Mitigation
- Cloud Application Security
- Cloud Backup
- Compliance Management
- Compliance Tracking
- Container Scanning
- Continuous Backup
- Continuous Integration Software
- Continuous Monitoring
- Credential Management
- Dashboard Software
- Data Security
- Data Visualization Software
- Device Management
- Differential Backup
- Disaster Recovery Software
- Encryption Software
- Endpoint Management
- Endpoint Protection Software
- Event Analysis
- Event Logs
- Event Tracking
- Firewalls
- For MSPs
- Fraud Detection
- IOC Verification
- IP Filtering
- IT Asset Management Software
- IT Incident Management
- IT, Server & Network Monitoring Software
- Incident Management Software
- Incident Reporting
- Intrusion Detection System
- Investigation Management Software
- Local Server Options
- Monitoring
- Network Monitoring Software
- Network Provisioning
- Network Resource Management
- Network Security Software
- Performance Monitoring
- Policy Management Software
- Prioritization
- Real-Time Data
- Real-Time Monitoring
- Real-Time Updates
- Remediation Management
- Remote Access/Control
- Remote Monitoring & Management
- Remote Server Options
- Remote Support Software
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Root Cause Analysis
- Runtime Container Security
- Secure Data Storage
- Sensitive Data Identification
- Status Tracking
- Task Management Software
- Third-Party Integrations
- Threat Intelligence Platform
- Threat Protection
- Threat Response
- Two-Factor Authentication
- Uptime Reporting
- VM Backup
- VPN Software
- Virus Definition Update
- Vulnerability Assessment
- Vulnerability Protection
- Vulnerability Scanning
- Web Access/Restoration
- Web Threat Management
- Web Traffic Monitoring
- Web Traffic Reporting
- Web-Application Security
- Whitelisting/Blacklisting
Total features 68
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- Anti Spam
- Anti Virus
- Application Security
- Audit Trail
- Backup Log
- Backup and Recovery
- Bandwidth Monitoring
- Behavioral Analytics
- Bot Detection
- Bot Mitigation
- Cloud Application Security
- Cloud Backup
- Compliance Management
- Compliance Tracking
- Container Scanning
- Continuous Backup
- Continuous Integration Software
- Continuous Monitoring
- Credential Management
- Dashboard Software
- Data Security
- Data Visualization Software
- Device Management
- Differential Backup
- Disaster Recovery Software
- Encryption Software
- Endpoint Management
- Endpoint Protection Software
- Event Analysis
- Event Logs
- Event Tracking
- Firewalls
- For MSPs
- Fraud Detection
- IOC Verification
- IP Filtering
- IT Asset Management Software
- IT Incident Management
- IT, Server & Network Monitoring Software
- Incident Management Software
- Incident Reporting
- Intrusion Detection System
- Investigation Management Software
- Local Server Options
- Monitoring
- Network Monitoring Software
- Network Provisioning
- Network Resource Management
- Network Security Software
- Performance Monitoring
- Policy Management Software
- Prioritization
- Real-Time Data
- Real-Time Monitoring
- Real-Time Updates
- Remediation Management
- Remote Access/Control
- Remote Monitoring & Management
- Remote Server Options
- Remote Support Software
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Root Cause Analysis
- Runtime Container Security
- Secure Data Storage
- Sensitive Data Identification
- Status Tracking
- Task Management Software
- Third-Party Integrations
- Threat Intelligence Platform
- Threat Protection
- Threat Response
- Two-Factor Authentication
- Uptime Reporting
- VM Backup
- VPN Software
- Virus Definition Update
- Vulnerability Assessment
- Vulnerability Protection
- Vulnerability Scanning
- Web Access/Restoration
- Web Threat Management
- Web Traffic Monitoring
- Web Traffic Reporting
- Web-Application Security
- Whitelisting/Blacklisting
Integrations
- ActivePlatform
- Autotask PSA
- Axonius
- Blumira
- CYREBRO
- Cloudflare
- ConnectWise Automate
- ConnectWise PSA
- Datto Workplace
- Liongard
- Netskope Active Platform
- Okta
- Salesforce Sales Cloud
- Siemplify
- ActivePlatform
- Autotask PSA
- Axonius
- Blumira
- CYREBRO
- Cloudflare
- ConnectWise Automate
- ConnectWise PSA
- Datto Workplace
- Liongard
- Netskope Active Platform
- Okta
- Salesforce Sales Cloud
- Siemplify