Introducing G2.ai, the future of software buying.Try now

Compare AuditBoard and ESET PROTECT

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
AuditBoard
AuditBoard
Star Rating
(1,576)4.6 out of 5
Market Segments
Enterprise (59.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about AuditBoard
ESET PROTECT
ESET PROTECT
Star Rating
(918)4.6 out of 5
Market Segments
Small-Business (45.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 5 pricing plans

AuditBoard vs ESET PROTECT

When assessing the two solutions, reviewers found ESET PROTECT easier to use, set up, and administer. However, reviewers preferred doing business with AuditBoard overall.

  • Reviewers felt that ESET PROTECT meets the needs of their business better than AuditBoard.
  • When comparing quality of ongoing product support, reviewers felt that ESET PROTECT is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of AuditBoard over ESET PROTECT.
Pricing
Entry-Level Pricing
AuditBoard
No pricing available
ESET PROTECT
ESET PROTECT Advanced
Contact Us
Browse all 5 pricing plans
Free Trial
AuditBoard
No trial information available
ESET PROTECT
Free Trial is available
Ratings
Meets Requirements
8.7
1,319
9.2
786
Ease of Use
8.8
1,359
8.9
788
Ease of Setup
8.1
973
8.7
526
Ease of Admin
8.4
745
8.5
414
Quality of Support
8.6
1,284
8.9
726
Has the product been a good partner in doing business?
9.0
753
8.9
404
Product Direction (% positive)
9.6
1,324
8.7
779
Features by Category
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
9.2
238
Administration
Not enough data
9.2
192
Not enough data
9.1
200
Not enough data
9.0
201
Not enough data
8.8
193
Not enough data
9.0
197
Functionality
Not enough data
9.0
201
Not enough data
9.1
203
Not enough data
9.2
204
Not enough data
9.3
204
Analysis
Not enough data
9.0
197
Not enough data
9.1
196
Not enough data
Feature Not Available
Enterprise Risk Management (ERM)Hide 36 FeaturesShow 36 Features
7.8
398
Not enough data
Audit Management
8.3
352
Not enough data
7.9
338
|
Verified
Not enough data
8.2
355
|
Verified
Not enough data
8.0
336
Not enough data
8.8
345
|
Verified
Not enough data
Regulatory Change Management
7.9
319
|
Verified
Not enough data
8.2
323
|
Verified
Not enough data
8.2
323
|
Verified
Not enough data
8.3
320
|
Verified
Not enough data
8.3
322
|
Verified
Not enough data
7.8
302
|
Verified
Not enough data
Risk Management
8.1
326
|
Verified
Not enough data
8.2
324
|
Verified
Not enough data
8.1
323
|
Verified
Not enough data
7.8
300
|
Verified
Not enough data
Third Party & Supplier Risk Management
7.4
249
|
Verified
Not enough data
7.3
247
|
Verified
Not enough data
7.4
240
|
Verified
Not enough data
7.2
230
|
Verified
Not enough data
Business Continuity Management
7.4
227
|
Verified
Not enough data
7.7
246
|
Verified
Not enough data
7.2
219
|
Verified
Not enough data
Ethics and Compliance Learning
7.6
251
|
Verified
Not enough data
7.8
251
|
Verified
Not enough data
7.2
227
|
Verified
Not enough data
7.4
240
|
Verified
Not enough data
Generative AI
7.0
156
Not enough data
7.0
156
Not enough data
Platform
7.7
271
|
Verified
Not enough data
8.3
286
|
Verified
Not enough data
6.9
258
|
Verified
Not enough data
8.2
293
|
Verified
Not enough data
Services
7.9
302
|
Verified
Not enough data
8.3
307
|
Verified
Not enough data
8.4
305
|
Verified
Not enough data
8.1
285
|
Verified
Not enough data
Malware Analysis ToolsHide 11 FeaturesShow 11 Features
Not enough data
9.4
94
Detection
Not enough data
9.5
76
Not enough data
Feature Not Available
Not enough data
9.3
74
Analysis
Not enough data
9.5
76
Not enough data
9.0
74
Not enough data
9.4
74
Not enough data
9.4
75
Response
Not enough data
9.2
75
Not enough data
9.5
76
Not enough data
9.4
75
Generative AI
Not enough data
Feature Not Available
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
9.6
19
Detection & Response
Not enough data
9.6
14
Not enough data
9.8
14
Not enough data
9.8
14
Not enough data
9.9
14
Management
Not enough data
9.5
13
Not enough data
9.8
14
Not enough data
9.2
13
Analytics
Not enough data
9.4
15
Not enough data
9.0
14
Not enough data
9.3
14
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
9.4
9
Not enough data
9.8
8
Not enough data
9.7
10
Services - Extended Detection and Response (XDR)
Not enough data
9.7
6
Environmental, Social, and Governance (ESG) ReportingHide 20 FeaturesShow 20 Features
7.6
29
Not enough data
Data Collection
7.7
28
Not enough data
7.6
29
Not enough data
7.0
28
Not enough data
Reporting
7.9
27
Not enough data
7.7
27
Not enough data
7.7
26
Not enough data
Integration
8.5
28
Not enough data
7.9
28
Not enough data
7.8
26
Not enough data
Risk Management - Environmental, Social, and Governance (ESG) Reporting
7.6
19
Not enough data
7.6
19
Not enough data
7.7
18
Not enough data
7.5
18
Not enough data
Reporting - Environmental, Social, and Governance (ESG) Reporting
7.3
18
Not enough data
7.5
18
Not enough data
7.5
17
Not enough data
7.1
17
Not enough data
7.4
14
Not enough data
Agentic AI - Environmental, Social, and Governance (ESG) Reporting
Not enough data
Not enough data
Not enough data
Not enough data
Third Party & Supplier Risk ManagementHide 13 FeaturesShow 13 Features
7.9
63
Not enough data
Risk Assessment
8.3
51
Not enough data
Feature Not Available
Not enough data
Risk Control
8.4
58
Not enough data
8.5
54
Not enough data
8.9
61
Not enough data
Monitoring
8.3
53
Not enough data
8.3
59
Not enough data
8.5
56
Not enough data
Reporting
8.5
59
Not enough data
8.7
58
Not enough data
8.0
51
Not enough data
Agentic AI - Third Party & Supplier Risk Management
5.9
9
Not enough data
5.4
8
Not enough data
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.9
16
Platform Features
Not enough data
8.3
14
Not enough data
9.4
13
Not enough data
9.2
13
Not enough data
9.4
14
Not enough data
9.1
13
Not enough data
9.5
14
Not enough data
8.5
8
Automation Capabilities
Not enough data
9.6
13
Not enough data
9.0
13
Not enough data
6.7
8
Not enough data
Not enough data
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
7.1
83
Not enough data
Generative AI
7.4
81
Not enough data
Monitoring - IT Risk Management
6.9
27
Not enough data
Agentic AI - IT Risk Management
6.7
26
Not enough data
7.3
26
Not enough data
7.9
681
Not enough data
Generative AI
7.5
449
Not enough data
7.5
450
Not enough data
Workflows - Audit Management
8.5
420
Not enough data
8.2
410
Not enough data
8.2
408
Not enough data
7.4
397
Not enough data
7.6
399
Not enough data
Documentation - Audit Management
Feature Not Available
Not enough data
8.0
407
Not enough data
Reporting & Analytics - Audit Management
7.9
409
Not enough data
8.3
404
Not enough data
Feature Not Available
Not enough data
Regulatory Change ManagementHide 7 FeaturesShow 7 Features
7.0
25
Not enough data
Generative AI
8.0
25
Not enough data
7.8
24
Not enough data
Agentic AI - Regulatory Change Management
6.2
7
Not enough data
6.9
7
Not enough data
6.7
7
Not enough data
7.6
7
Not enough data
5.6
6
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.7
19
Services - Endpoint Detection & Response (EDR)
Not enough data
9.7
10
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Security Compliance
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Reviews
Reviewers' Company Size
AuditBoard
AuditBoard
Small-Business(50 or fewer emp.)
19.7%
Mid-Market(51-1000 emp.)
20.4%
Enterprise(> 1000 emp.)
59.8%
ESET PROTECT
ESET PROTECT
Small-Business(50 or fewer emp.)
45.4%
Mid-Market(51-1000 emp.)
44.3%
Enterprise(> 1000 emp.)
10.3%
Reviewers' Industry
AuditBoard
AuditBoard
Financial Services
11.2%
Accounting
6.6%
Information Technology and Services
6.1%
Insurance
6.0%
Banking
5.4%
Other
64.6%
ESET PROTECT
ESET PROTECT
Information Technology and Services
12.4%
Computer Software
5.3%
Computer & Network Security
3.9%
Construction
3.8%
Internet
3.3%
Other
71.2%
Alternatives
AuditBoard
AuditBoard Alternatives
Archer
Archer
Add Archer
LogicGate Risk Cloud
LogicGate Risk Cloud
Add LogicGate Risk Cloud
SAI360
SAI360
Add SAI360
Hyperproof
Hyperproof
Add Hyperproof
ESET PROTECT
ESET PROTECT Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatDown
ThreatDown
Add ThreatDown
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Add Check Point Harmony Endpoint
Discussions
AuditBoard
AuditBoard Discussions
Is there any possibility of reviewing the work papers within tool rather than downloading them.
2 Comments
Kathy K.
KK
You need install the SyncApp - once you do that, you can open the document in the Excel, Word, Adobe, etc.Read more
What is Soxhub?
1 Comment
Kim F.
KF
Tool for internal controls documentation and Sarbanes Oxley required testing of controlsRead more
What is audit management software?
1 Comment
RM
Software to help organize your workpapers for audits and projects along with surveying and follow-up tools with your clients. It also can help you with your...Read more
ESET PROTECT
ESET PROTECT Discussions
How can I backup the encryption key?
2 Comments
GABI C.
GC
It's critical to have backups of encryption keys. If the lone copy of a key is lost, data encrypted with that key cannot be accessed. When you initially turn...Read more
Does ESET nod32 protect against malware?
2 Comments
DM
Not allRead more
How to acquire paid licenses more quickly?
1 Comment
MV
Hi Brayan, the fastest way to acquire new license up to 100 seats is to purchase online. To purchase more than 100 seats, please contact local...Read more
AuditBoard
AuditBoard
Optimized for quick response
ESET PROTECT
ESET PROTECT
Optimized for quick response