Introducing G2.ai, the future of software buying.Try now

Compare Absolute Secure Endpoint and ESET PROTECT

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Absolute Secure Endpoint
Absolute Secure Endpoint
Star Rating
(407)4.6 out of 5
Market Segments
Mid-Market (49.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Absolute Secure Endpoint
ESET PROTECT
ESET PROTECT
Star Rating
(914)4.6 out of 5
Market Segments
Small-Business (45.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 5 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that both Absolute Secure Endpoint and ESET PROTECT have a solid overall rating of 4.6, indicating a high level of satisfaction among users. However, ESET PROTECT has a larger number of reviews (868) compared to Absolute Secure Endpoint (321), suggesting a broader user base and potentially more diverse feedback.
  • Reviewers mention that ESET PROTECT excels in ease of use with a score of 9.0, while Absolute Secure Endpoint scores slightly lower at 8.6. Users appreciate ESET's intuitive interface, which simplifies navigation and management tasks.
  • Users on G2 highlight that Absolute Secure Endpoint shines in asset management with a score of 9.4, outperforming ESET PROTECT's 8.9. Reviewers note that Absolute's detailed asset tracking features help organizations maintain better control over their endpoints.
  • Reviewers say that ESET PROTECT offers superior malware detection capabilities, scoring 9.4 compared to Absolute Secure Endpoint's 7.6. Users emphasize the effectiveness of ESET's advanced threat detection algorithms in identifying and neutralizing malware.
  • Users report that Absolute Secure Endpoint provides excellent quality of support, scoring 9.0, while ESET PROTECT follows closely with 8.9. Reviewers appreciate the responsiveness and expertise of Absolute's support team, which enhances the overall user experience.
  • G2 users mention that ESET PROTECT outperforms Absolute Secure Endpoint in web control and application control, both scoring 9.1, while Absolute scores 8.1 and 8.2 respectively. Reviewers highlight ESET's robust filtering options and application management features as key advantages.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
ESET PROTECT
ESET PROTECT Advanced
Contact Us
Browse all 5 pricing plans
Free Trial
Absolute Secure Endpoint
No trial information available
ESET PROTECT
Free Trial is available
Ratings
Meets Requirements
9.1
323
9.2
783
Ease of Use
8.7
326
8.9
785
Ease of Setup
8.8
275
8.7
523
Ease of Admin
8.8
295
8.5
413
Quality of Support
8.9
309
8.9
723
Has the product been a good partner in doing business?
9.3
288
8.9
404
Product Direction (% positive)
9.0
317
8.7
776
Features by Category
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
9.1
26
Not enough data
Scope
9.5
22
Not enough data
8.8
24
Not enough data
Security
9.0
26
Not enough data
9.2
24
Not enough data
9.4
24
Not enough data
Management
8.9
25
Not enough data
9.0
23
Not enough data
9.5
25
Not enough data
9.5
26
Not enough data
8.6
20
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.5
54
9.2
235
Administration
8.9
48
9.2
191
8.2
35
9.1
198
8.3
38
9.0
200
9.3
50
8.8
192
9.0
47
9.0
196
Functionality
8.9
42
9.0
200
7.4
33
9.1
200
8.6
41
9.2
203
7.3
32
9.3
201
Analysis
8.2
38
9.0
196
8.9
39
9.1
194
8.4
35
Feature Not Available
Malware Analysis ToolsHide 11 FeaturesShow 11 Features
Not enough data
9.4
93
Detection
Not enough data
9.5
75
Not enough data
Feature Not Available
Not enough data
9.4
73
Analysis
Not enough data
9.5
75
Not enough data
9.0
73
Not enough data
9.4
73
Not enough data
9.5
74
Response
Not enough data
9.2
74
Not enough data
9.5
75
Not enough data
9.4
74
Generative AI
Not enough data
Feature Not Available
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
9.6
17
Detection & Response
Not enough data
9.7
13
Not enough data
9.9
12
Not enough data
9.9
12
Not enough data
9.9
13
Management
Not enough data
9.6
12
Not enough data
9.7
13
Not enough data
9.3
12
Analytics
Not enough data
9.5
13
Not enough data
8.9
12
Not enough data
9.3
12
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
9.4
8
Not enough data
9.8
7
Not enough data
9.6
8
Services - Extended Detection and Response (XDR)
Not enough data
10.0
5
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.9
16
Platform Features
Not enough data
8.3
14
Not enough data
9.4
13
Not enough data
9.2
13
Not enough data
9.4
14
Not enough data
9.1
13
Not enough data
9.5
14
Not enough data
8.5
8
Automation Capabilities
Not enough data
9.6
13
Not enough data
9.0
13
Not enough data
6.7
8
Not enough data
Not enough data
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.6
88
Not enough data
Generative AI
7.6
75
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.8
18
Services - Endpoint Detection & Response (EDR)
Not enough data
9.8
9
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Absolute Secure Endpoint
Absolute Secure Endpoint
ESET PROTECT
ESET PROTECT
Absolute Secure Endpoint and ESET PROTECT are categorized as Endpoint Protection Platforms
Reviews
Reviewers' Company Size
Absolute Secure Endpoint
Absolute Secure Endpoint
Small-Business(50 or fewer emp.)
11.6%
Mid-Market(51-1000 emp.)
49.9%
Enterprise(> 1000 emp.)
38.5%
ESET PROTECT
ESET PROTECT
Small-Business(50 or fewer emp.)
45.6%
Mid-Market(51-1000 emp.)
44.1%
Enterprise(> 1000 emp.)
10.3%
Reviewers' Industry
Absolute Secure Endpoint
Absolute Secure Endpoint
Information Technology and Services
12.8%
Hospital & Health Care
10.8%
Financial Services
8.8%
Computer & Network Security
4.3%
Primary/Secondary Education
4.0%
Other
59.2%
ESET PROTECT
ESET PROTECT
Information Technology and Services
12.4%
Computer Software
5.2%
Computer & Network Security
3.9%
Construction
3.8%
Internet
3.4%
Other
71.3%
Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Microsoft Intune Enterprise Application Management
Microsoft Intune Enterprise Application Management
Add Microsoft Intune Enterprise Application Management
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
ESET PROTECT
ESET PROTECT Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatDown
ThreatDown
Add ThreatDown
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Add Check Point Harmony Endpoint
Discussions
Absolute Secure Endpoint
Absolute Secure Endpoint Discussions
Is there a way to exclude executables from the full list?
1 Comment
Official Response from Absolute Secure Endpoint
Thanks for your comment, James. The ability to filter executables shown in application reports is part of our product roadmap and will be made available...Read more
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
ESET PROTECT
ESET PROTECT Discussions
How can I backup the encryption key?
2 Comments
GABI C.
GC
It's critical to have backups of encryption keys. If the lone copy of a key is lost, data encrypted with that key cannot be accessed. When you initially turn...Read more
Does ESET nod32 protect against malware?
2 Comments
DM
Not allRead more
How to make my team faster at startup?
1 Comment
Miguel Antonio E.
ME
Tools → Scheduled Tasks → Uncheck the Startup File Verification box.Read more