ESET Endpoint Security vs Falcon

ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks,...

Deployment

  • Cloud-based
  • On-premises

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data...

Deployment

  • Cloud-based
  • On-premises

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

$396.00/year

  • Free Version
  • Free Trial
  • Subscription

Starting from

USD 8.99/month

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.7 /5
(1,159)

Ease of Use

4.5/5

Features

4.6/5

Customer Service

4.4/5

Value for Money

4.4/5

Overall rating

4.7 /5
(38)

Ease of Use

4.3/5

Features

4.6/5

Customer Service

4.1/5

Value for Money

4.1/5

Total features 69

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Audit Trail
  • Backup Log
  • Backup and Recovery
  • Bandwidth Monitoring
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Cloud Application Security
  • Cloud Backup
  • Compliance Management
  • Compliance Tracking
  • Container Scanning
  • Continuous Backup
  • Continuous Integration
  • Continuous Monitoring
  • Credential Management
  • Dashboard
  • Data Security
  • Data Visualization
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • Event Tracking
  • Firewalls
  • For MSPs
  • Fraud Detection
  • IOC Verification
  • IP Filtering
  • IT Asset Management
  • IT Incident Management
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Investigation Management
  • Local Server Options
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Resource Management
  • Network Security Software
  • Performance Monitoring
  • Policy Management
  • Prioritization
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Server Options
  • Remote Support Software
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Root Cause Analysis
  • Runtime Container Security
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Status Tracking
  • Task Management
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN Software
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access/Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting

Total features 68

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Audit Trail
  • Backup Log
  • Backup and Recovery
  • Bandwidth Monitoring
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Cloud Application Security
  • Cloud Backup
  • Compliance Management
  • Compliance Tracking
  • Container Scanning
  • Continuous Backup
  • Continuous Integration
  • Continuous Monitoring
  • Credential Management
  • Dashboard
  • Data Security
  • Data Visualization
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • Event Tracking
  • Firewalls
  • For MSPs
  • Fraud Detection
  • IOC Verification
  • IP Filtering
  • IT Asset Management
  • IT Incident Management
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Investigation Management
  • Local Server Options
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Resource Management
  • Network Security Software
  • Performance Monitoring
  • Policy Management
  • Prioritization
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Server Options
  • Remote Support Software
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Root Cause Analysis
  • Runtime Container Security
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Status Tracking
  • Task Management
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN Software
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access/Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting
  • ActivePlatform
  • Autotask PSA
  • Axonius
  • Blumira
  • CYREBRO
  • Cloudflare
  • ConnectWise Automate
  • ConnectWise PSA
  • Datto Workplace
  • Liongard
  • Netskope Active Platform
  • Okta
  • Rapid7 MDR
  • Salesforce Sales Cloud
  • Siemplify
  • Tigerpaw Software
  • ActivePlatform
  • Autotask PSA
  • Axonius
  • Blumira
  • CYREBRO
  • Cloudflare
  • ConnectWise Automate
  • ConnectWise PSA
  • Datto Workplace
  • Liongard
  • Netskope Active Platform
  • Okta
  • Rapid7 MDR
  • Salesforce Sales Cloud
  • Siemplify
  • Tigerpaw Software