Introducing G2.ai, the future of software buying.Try now

Compare ESET PROTECT and IBM MaaS360

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
ESET PROTECT
ESET PROTECT
Star Rating
(920)4.6 out of 5
Market Segments
Small-Business (45.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 5 pricing plans
IBM MaaS360
IBM MaaS360
Star Rating
(200)4.2 out of 5
Market Segments
Mid-Market (43.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$5.00 per device $10.00 per user
Free Trial is available
Browse all 4 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that ESET PROTECT excels in user satisfaction, reflected in its higher overall ratings and a larger volume of recent reviews. Users appreciate its seamless integration with operating systems and the comprehensive suite of cybersecurity solutions, making it a robust choice for businesses looking for effective risk assessment tools.
  • Users say that IBM MaaS360 offers excellent control over device management, particularly for organizations managing diverse operating systems. The unified dashboard and strong security features, such as the Secure Container for data separation, are frequently highlighted as standout aspects that enhance usability.
  • Reviewers mention that ESET PROTECT's ease of deployment is a significant advantage, with many noting that it comes pre-installed with the OS, saving time during setup. This contrasts with some users of IBM MaaS360 who have reported challenges during the initial configuration process.
  • According to verified reviews, IBM MaaS360 is praised for its straightforward onboarding process, which helps users quickly get devices up and running. However, some users feel that it could improve in meeting specific workflow needs, indicating potential areas for enhancement.
  • Reviewers highlight that ESET PROTECT provides a high-quality experience throughout the risk assessment process, with features that enable informed decision-making. This comprehensive approach is often contrasted with IBM MaaS360, which, while effective, may not offer the same depth in risk management capabilities.
  • Users express that both products have strong support systems, but ESET PROTECT tends to receive higher marks for quality of support. Many users appreciate the responsive assistance and resources available, which can be crucial for businesses needing timely help with their cybersecurity solutions.
Pricing
Entry-Level Pricing
ESET PROTECT
ESET PROTECT Advanced
Contact Us
Browse all 5 pricing plans
IBM MaaS360
Deluxe Edition
$5.00 per device
$10.00 per user
Browse all 4 pricing plans
Free Trial
ESET PROTECT
Free Trial is available
IBM MaaS360
Free Trial is available
Ratings
Meets Requirements
9.2
788
8.3
157
Ease of Use
8.9
790
8.2
159
Ease of Setup
8.7
528
7.8
122
Ease of Admin
8.5
414
8.0
99
Quality of Support
8.9
728
8.1
153
Has the product been a good partner in doing business?
8.9
404
8.0
98
Product Direction (% positive)
8.7
781
8.4
161
Features by Category
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
Not enough data
8.2
43
Scope
Not enough data
8.3
33
Not enough data
8.2
34
Security
Not enough data
8.8
33
Not enough data
8.2
35
Not enough data
8.8
34
Management
Not enough data
8.5
37
Not enough data
8.5
35
Not enough data
8.3
36
Not enough data
8.3
33
Not enough data
7.9
33
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
7.9
14
Not enough data
7.7
13
Not enough data
7.7
14
Not enough data
7.9
14
Not enough data
7.9
14
Not enough data
7.9
15
Not enough data
7.8
15
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
9.2
240
Not enough data
Administration
9.2
193
Not enough data
9.1
201
Not enough data
9.0
202
Not enough data
8.8
194
Not enough data
9.0
198
Not enough data
Functionality
9.0
202
Not enough data
9.1
204
Not enough data
9.2
205
Not enough data
9.3
206
Not enough data
Analysis
9.0
198
Not enough data
9.1
197
Not enough data
Feature Not Available
Not enough data
Malware Analysis ToolsHide 11 FeaturesShow 11 Features
9.4
94
Not enough data
Detection
9.5
76
Not enough data
Feature Not Available
Not enough data
9.3
74
Not enough data
Analysis
9.5
76
Not enough data
9.0
74
Not enough data
9.4
74
Not enough data
9.4
75
Not enough data
Response
9.2
75
Not enough data
9.5
76
Not enough data
9.4
75
Not enough data
Generative AI
Feature Not Available
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
9.6
19
Not enough data
Detection & Response
9.6
14
Not enough data
9.8
14
Not enough data
9.8
14
Not enough data
9.9
14
Not enough data
Management
9.5
13
Not enough data
9.8
14
Not enough data
9.2
13
Not enough data
Analytics
9.4
15
Not enough data
9.0
14
Not enough data
9.3
14
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
9.4
9
Not enough data
9.8
8
Not enough data
9.7
10
Not enough data
Services - Extended Detection and Response (XDR)
9.7
6
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
9.0
10
Monitoring
Not enough data
9.0
10
Not enough data
9.2
10
Not enough data
8.5
10
Not enough data
8.8
10
Not enough data
9.0
10
Remediation
Not enough data
9.3
10
Not enough data
9.5
10
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
8.9
16
Not enough data
Platform Features
8.3
14
Not enough data
9.4
13
Not enough data
9.2
13
Not enough data
9.4
14
Not enough data
9.1
13
Not enough data
9.5
14
Not enough data
8.5
8
Not enough data
Automation Capabilities
9.6
13
Not enough data
9.0
13
Not enough data
6.7
8
Not enough data
Not enough data
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
8.6
24
Generative AI
Not enough data
8.6
23
Mobile Application ManagementHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Agentic AI - Mobile Application Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Autonomous Endpoint Management (AEM)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Generative AI - Autonomous Endpoint Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Management - Autonomous Endpoint Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
9.7
19
Not enough data
Services - Endpoint Detection & Response (EDR)
9.7
10
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
Not enough data
8.6
82
Platform - Mobile Device Management (MDM)
Not enough data
8.7
65
Operating System
Not enough data
8.7
64
Not enough data
8.3
62
Not enough data
8.5
64
Management
Not enough data
8.5
69
Not enough data
8.7
61
Not enough data
8.5
61
Not enough data
8.8
56
Not enough data
8.0
63
Security
Not enough data
8.9
67
Not enough data
9.0
66
Agentic AI - Mobile Device Management (MDM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enterprise Mobility ManagementHide 21 FeaturesShow 21 Features
Not enough data
9.0
45
Platform
Not enough data
9.0
32
Not enough data
8.9
34
Not enough data
8.9
34
Operating System
Not enough data
8.7
31
Not enough data
8.9
29
Not enough data
9.3
31
Security
Not enough data
9.3
35
Not enough data
9.1
29
Not enough data
9.1
34
Management
Not enough data
9.0
35
Not enough data
9.1
33
Not enough data
9.2
34
Not enough data
9.2
32
Not enough data
8.4
33
Agentic AI - Enterprise Mobility Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
ESET PROTECT
ESET PROTECT
Small-Business(50 or fewer emp.)
45.3%
Mid-Market(51-1000 emp.)
44.4%
Enterprise(> 1000 emp.)
10.2%
IBM MaaS360
IBM MaaS360
Small-Business(50 or fewer emp.)
23.3%
Mid-Market(51-1000 emp.)
43.9%
Enterprise(> 1000 emp.)
32.8%
Reviewers' Industry
ESET PROTECT
ESET PROTECT
Information Technology and Services
12.4%
Computer Software
5.3%
Computer & Network Security
3.9%
Construction
3.8%
Internet
3.3%
Other
71.3%
IBM MaaS360
IBM MaaS360
Information Technology and Services
20.6%
Computer Software
6.7%
Banking
6.7%
Computer & Network Security
5.0%
Hospital & Health Care
4.4%
Other
56.7%
Alternatives
ESET PROTECT
ESET PROTECT Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatDown
ThreatDown
Add ThreatDown
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Add Check Point Harmony Endpoint
IBM MaaS360
IBM MaaS360 Alternatives
Jamf
Jamf
Add Jamf
Hexnode
Hexnode
Add Hexnode
ManageEngine Mobile Device Manager Plus
ManageEngine Mobile Device Manager Plus
Add ManageEngine Mobile Device Manager Plus
Scalefusion
Scalefusion
Add Scalefusion
Discussions
ESET PROTECT
ESET PROTECT Discussions
How can I backup the encryption key?
2 Comments
GABI C.
GC
It's critical to have backups of encryption keys. If the lone copy of a key is lost, data encrypted with that key cannot be accessed. When you initially turn...Read more
Does ESET nod32 protect against malware?
2 Comments
DM
Not allRead more
How to acquire paid licenses more quickly?
1 Comment
MV
Hi Brayan, the fastest way to acquire new license up to 100 seats is to purchase online. To purchase more than 100 seats, please contact local...Read more
IBM MaaS360
IBM MaaS360 Discussions
What is IBM MaaS360 with Watson?
2 Comments
Sindhuja G.
SG
IBM MaaS360 with Watson is a cloud-based solution that combines Unified Endpoint Management (UEM) with AI-powered insights. It helps organizations manage and...Read more
Android Enterprise
1 Comment
JH
Hi Bryn, this could be a limitation you are experiencing related to your organizations licensing agreement with IBM. I would recommend contacting your...Read more
Is there a way to ensure no registered devices can connect to an unsecured wi-fi network?
1 Comment
JH
Yes. MaaS360 has a broad assortment of policy configurations available to customers, including the ability to mandate whether or not a device can connect...Read more
ESET PROTECT
ESET PROTECT
Optimized for quick response
IBM MaaS360
IBM MaaS360
Optimized for quick response