This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

All categories

GoodSync vs ESET Endpoint Security Comparison

Add to Compare
Compare Similar Apps
NinjaRMM
Kaseya VSA
Freshservice
Perch Security
GoodAccess
WebTitan

Overview

Category Leaders

GoodSync is a complete data backup and synchronization solution for businesses of any size with centralized management and...

ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Screenshots

Pricing

Starting from
$

39.95

  • Free trial available
  • No credit card required
  • Free account
  • Subscription based
Starting from
£

339.60

/yryear
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based

User reviews

4.5

5

4

3

2

1

54

26

3

2

2

  • Value for money
  • Ease of use
  • Features
  • Customer support
88%
would recommend this app

5

4

3

2

1

582

165

29

7

2

  • Value for money
  • Ease of use
  • Features
  • Customer support
98%
would recommend this app

Pros

It's nice to have some of the community support to help answer questions and muddle through a specific set up you'd like to see, but for the most part, it's pretty easy to figure out.
GoodSync customer service is great and very responsive. I was able to work out a fair price for a particular situation, specific to my case.
GoodSync has a good UI that is intuitive and the manual is excellent. Simple file syncronization tasks are easy to setup and can be easily autimated if needed.

Pros

The antivirus solution from ESET is currently the best on the market. It is more expensive, but you get perfect protection for your money.
This is most important - they are continually improving their SW to be best on market and help their customer. They do their business very well - so we may do our safe and protected.
I feel better knowing it's running. Has great features as well to make me more protected and backed up.

Cons

I reported this unbeleivably rude and poorly informed tech to the company and received a refund and a statement that they have problems getting SMB to work.
Infrequently, there are errors that I can't understand.
I asked for a supervisor to contact me by phone so we could step thru the process of what was happening but they wouldn't do do that. I can no longer run the program I paid for.

Cons

It didn't seem to help us against modern threats and anomously and machine learning threats. Deep dive into process trees was missing.
Occasionally we will have a problem with security updates in Outlook. This can cause the Outlook plugin to not start.
The licensed to purchase this software is a bit troubling. It does give your license keys.
  • Vendor responds to reviews
  • Last review3 months ago
  • Vendor responds to reviews
  • Last review8 days ago

Key features

  • Total features28
  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Audit Trail
  • Backup Log
  • Backup Scheduling
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Cloud Backup
  • Compliance Tracking
  • Compression
  • Continuous Backup
  • Continuous Monitoring
  • Data Synchronization
  • Deduplication
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Tracking
  • File Transfer
  • Firewalls
  • Fraud Detection
  • IT Asset Management
  • Incident Management
  • Incremental Backup
  • Intrusion Detection System
  • Local Server Options
  • Monitoring
  • Multiple Format Support
  • Multiple System Support
  • Network Monitoring
  • Policy Management
  • Prioritization
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Synchronization
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Server Options
  • Reporting/Analytics
  • Root Cause Analysis
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting
  • Total features63
  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Audit Trail
  • Backup Log
  • Backup Scheduling
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Cloud Backup
  • Compliance Tracking
  • Compression
  • Continuous Backup
  • Continuous Monitoring
  • Data Synchronization
  • Deduplication
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Tracking
  • File Transfer
  • Firewalls
  • Fraud Detection
  • IT Asset Management
  • Incident Management
  • Incremental Backup
  • Intrusion Detection System
  • Local Server Options
  • Monitoring
  • Multiple Format Support
  • Multiple System Support
  • Network Monitoring
  • Policy Management
  • Prioritization
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Synchronization
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Server Options
  • Reporting/Analytics
  • Root Cause Analysis
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting

Integrations

  • Total integrations2
  • Box
  • Dropbox Business
  • Facebook
  • GitHub
  • Google Drive
  • Jira
  • Mailchimp
  • Microsoft 365
  • Microsoft Azure
  • NetSuite
  • Opsgenie
  • PagerDuty
  • Salesforce Sales Cloud
  • ServiceNow
  • Shopify
  • Slack
  • Trello
  • Twitter
  • Zapier
  • Zendesk
  • Total integrations7
  • Box
  • Dropbox Business
  • Facebook
  • GitHub
  • Google Drive
  • Jira
  • Mailchimp
  • Microsoft 365
  • Microsoft Azure
  • NetSuite
  • Opsgenie
  • PagerDuty
  • Salesforce Sales Cloud
  • ServiceNow
  • Shopify
  • Slack
  • Trello
  • Twitter
  • Zapier
  • Zendesk

Security

  • Encryption of sensitive data at rest
  • HTTPS for all pages (web-based apps)
  • Reports/alerts for security breaches
  • Multifactor authentication options
  • Customer data removed upon service cancellation
  • Encryption of sensitive data at rest
  • HTTPS for all pages (web-based apps)
  • Reports/alerts for security breaches
  • Multifactor authentication options
  • Customer data removed upon service cancellation

GoodSync vs. ESET Endpoint Security

See how GoodSync and ESET Endpoint Security stack up against each other by comparing features, pricing, ratings, integrations, security & more.