Introducing G2.ai, the future of software buying.Try now

Compare ESET PROTECT and GitHub

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
ESET PROTECT
ESET PROTECT
Star Rating
(914)4.6 out of 5
Market Segments
Small-Business (45.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 5 pricing plans
GitHub
GitHub
Star Rating
(2,273)4.7 out of 5
Market Segments
Small-Business (45.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$0.00 1 users
Browse all 3 pricing plans

ESET PROTECT vs GitHub

When assessing the two solutions, reviewers found ESET PROTECT easier to use. However, reviewers preferred the ease of set up for GitHub along with administration. Reviewers agreed that both vendors make it equally easy to do business overall.

  • Reviewers felt that GitHub meets the needs of their business better than ESET PROTECT.
  • When comparing quality of ongoing product support, reviewers felt that ESET PROTECT is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of GitHub over ESET PROTECT.
Pricing
Entry-Level Pricing
ESET PROTECT
ESET PROTECT Advanced
Contact Us
Browse all 5 pricing plans
GitHub
Free for Individuals and Organizations
$0.00
1 users
Browse all 3 pricing plans
Free Trial
ESET PROTECT
Free Trial is available
GitHub
Free Trial is available
Ratings
Meets Requirements
9.2
783
9.3
1,968
Ease of Use
8.9
785
8.7
1,984
Ease of Setup
8.7
523
9.0
595
Ease of Admin
8.5
413
8.7
451
Quality of Support
8.9
723
8.7
1,575
Has the product been a good partner in doing business?
8.9
404
8.9
387
Product Direction (% positive)
8.7
776
8.9
1,920
Features by Category
Application Release OrchestrationHide 11 FeaturesShow 11 Features
Not enough data
8.7
159
Administration
Not enough data
8.9
143
Not enough data
9.1
149
Not enough data
8.7
146
Functionality
Not enough data
8.9
146
Not enough data
8.6
135
Not enough data
8.9
138
Not enough data
9.0
149
Not enough data
8.3
134
Processes
Not enough data
9.0
148
Not enough data
8.8
145
Not enough data
8.7
143
Static Application Security Testing (SAST)Hide 14 FeaturesShow 14 Features
Not enough data
8.6
54
Administration
Not enough data
9.2
49
Not enough data
9.0
47
Analysis
Not enough data
8.7
47
Not enough data
8.9
51
Not enough data
8.9
48
Not enough data
9.0
50
Testing
Not enough data
9.3
50
Not enough data
8.6
44
Not enough data
8.7
45
Not enough data
8.9
43
Not enough data
8.7
42
Not enough data
9.0
43
Not enough data
8.5
42
Agentic AI - Static Application Security Testing (SAST)
Not enough data
10.0
14
Cloud Infrastructure AutomationHide 11 FeaturesShow 11 Features
Not enough data
8.8
110
Administration
Not enough data
9.1
98
Not enough data
9.0
98
Not enough data
8.8
99
Not enough data
9.2
100
Automation
Not enough data
8.9
98
Not enough data
8.7
91
Not enough data
8.8
97
Not enough data
8.9
91
IT Management
Not enough data
9.0
100
Not enough data
9.0
91
Not enough data
8.9
89
Not enough data
8.7
261
Functionality
Not enough data
9.1
239
Not enough data
9.1
243
Not enough data
8.8
239
Management
Not enough data
9.0
238
Not enough data
8.4
234
Not enough data
9.0
240
Agentic AI - Continuous Delivery
Not enough data
9.2
30
Not enough data
9.1
30
Not enough data
9.0
30
Not enough data
9.1
31
Not enough data
9.1
30
Not enough data
8.7
212
Bug Reporting
Not enough data
8.9
192
Not enough data
8.9
189
Not enough data
9.0
194
Bug Monitoring
Not enough data
8.5
187
Not enough data
8.9
197
Not enough data
9.0
185
Agentic AI - Bug Tracking
Not enough data
9.3
27
Not enough data
9.3
27
Not enough data
9.1
27
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
9.2
235
Not enough data
Administration
9.2
191
Not enough data
9.1
198
Not enough data
9.0
200
Not enough data
8.8
192
Not enough data
9.0
196
Not enough data
Functionality
9.0
200
Not enough data
9.1
200
Not enough data
9.2
203
Not enough data
9.3
201
Not enough data
Analysis
9.0
196
Not enough data
9.1
194
Not enough data
Feature Not Available
Not enough data
Software Composition AnalysisHide 6 FeaturesShow 6 Features
Not enough data
8.8
86
Functionality - Software Composition Analysis
Not enough data
9.0
75
Not enough data
9.1
80
Not enough data
9.2
79
Effectiveness - Software Composition Analysis
Not enough data
8.9
76
Not enough data
9.1
78
Not enough data
8.9
76
Malware Analysis ToolsHide 11 FeaturesShow 11 Features
9.4
93
Not enough data
Detection
9.5
75
Not enough data
Feature Not Available
Not enough data
9.4
73
Not enough data
Analysis
9.5
75
Not enough data
9.0
73
Not enough data
9.4
73
Not enough data
9.5
74
Not enough data
Response
9.2
74
Not enough data
9.5
75
Not enough data
9.4
74
Not enough data
Generative AI
Feature Not Available
Not enough data
Not enough data
8.8
153
Management
Not enough data
8.9
138
Not enough data
9.1
140
Not enough data
8.6
133
Functionality
Not enough data
8.8
136
Not enough data
8.9
137
Not enough data
8.7
134
Processes
Not enough data
8.9
137
Not enough data
8.8
134
Not enough data
9.1
139
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
9.6
17
Not enough data
Detection & Response
9.7
13
Not enough data
9.9
12
Not enough data
9.9
12
Not enough data
9.9
13
Not enough data
Management
9.6
12
Not enough data
9.7
13
Not enough data
9.3
12
Not enough data
Analytics
9.5
13
Not enough data
8.9
12
Not enough data
9.3
12
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
9.4
8
Not enough data
9.8
7
Not enough data
9.6
8
Not enough data
Services - Extended Detection and Response (XDR)
10.0
5
Not enough data
Continuous IntegrationHide 11 FeaturesShow 11 Features
Not enough data
8.5
238
Functionality
Not enough data
9.3
224
Not enough data
9.0
213
Not enough data
8.7
205
Management
Not enough data
8.9
218
Not enough data
8.9
215
Not enough data
8.3
209
Agentic AI - Continuous Integration
Not enough data
8.9
34
Not enough data
8.9
34
Not enough data
8.9
34
Not enough data
8.4
34
Not enough data
8.7
34
Not enough data
8.6
203
Documentation
Not enough data
8.8
186
Not enough data
8.8
180
Not enough data
8.6
171
Security
Not enough data
8.3
168
Not enough data
8.6
169
Not enough data
9.0
178
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
8.9
16
Not enough data
Platform Features
8.3
14
Not enough data
9.4
13
Not enough data
9.2
13
Not enough data
9.4
14
Not enough data
9.1
13
Not enough data
9.5
14
Not enough data
8.5
8
Not enough data
Automation Capabilities
9.6
13
Not enough data
9.0
13
Not enough data
6.7
8
Not enough data
Not enough data
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
9.8
18
Not enough data
Services - Endpoint Detection & Response (EDR)
9.8
9
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
ESET PROTECT
ESET PROTECT
Small-Business(50 or fewer emp.)
45.6%
Mid-Market(51-1000 emp.)
44.1%
Enterprise(> 1000 emp.)
10.3%
GitHub
GitHub
Small-Business(50 or fewer emp.)
45.9%
Mid-Market(51-1000 emp.)
30.0%
Enterprise(> 1000 emp.)
24.1%
Reviewers' Industry
ESET PROTECT
ESET PROTECT
Information Technology and Services
12.4%
Computer Software
5.2%
Computer & Network Security
3.9%
Construction
3.8%
Internet
3.4%
Other
71.3%
GitHub
GitHub
Computer Software
31.7%
Information Technology and Services
22.8%
Internet
6.7%
Higher Education
3.4%
Financial Services
3.2%
Other
32.2%
Alternatives
ESET PROTECT
ESET PROTECT Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatDown
ThreatDown
Add ThreatDown
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Add Check Point Harmony Endpoint
GitHub
GitHub Alternatives
GitLab
GitLab
Add GitLab
Harness Platform
Harness Platform
Add Harness Platform
Red Hat Ansible Automation Platform
Red Hat Ansible Automation Platform
Add Red Hat Ansible Automation Platform
Jenkins
Jenkins
Add Jenkins
Discussions
ESET PROTECT
ESET PROTECT Discussions
How can I backup the encryption key?
2 Comments
GABI C.
GC
It's critical to have backups of encryption keys. If the lone copy of a key is lost, data encrypted with that key cannot be accessed. When you initially turn...Read more
Does ESET nod32 protect against malware?
2 Comments
DM
Not allRead more
How to acquire paid licenses more quickly?
1 Comment
MV
Hi Brayan, the fastest way to acquire new license up to 100 seats is to purchase online. To purchase more than 100 seats, please contact local...Read more
GitHub
GitHub Discussions
What is GitHub used for?
8 Comments
MK
- store software source code - use actions to execute CI / CD and publish artefacts / create releases - lightweight software project managementRead more
What can GitHub be used for?
5 Comments
Mohanendra S.
MS
It's a platform for version controlling. Where group of people collaborate each other and work on a single project. Read more
What does GitHub mean?
2 Comments
Jagadeesh V.
JV
It is a platform for doing projects based on serveral services like website development projects etcRead more