This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

ESET Endpoint Security vs Bitdefender GravityZone Comparison

Search

Add to Compare

Recommended for you

Perch Security

SecureAnywhere

Splunk Enterprise

OneLogin

NinjaRMM

N-central

Good recommendations?

Overview

Category Leaders

ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking...

Category Leaders

Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect,...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Video & Screenshots

Pricing

Starting from
£

339.60

/yryear
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based
Starting from

110.99

/yryear
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based

User reviews

5

4

3

2

1

587

166

29

7

2

  • Value for money
  • Ease of use
  • Features
  • Customer support
98%
would recommend this app

5

4

3

2

1

109

36

6

1

1

  • Value for money
  • Ease of use
  • Features
  • Customer support
97%
would recommend this app

Pros

The antivirus solution from ESET is currently the best on the market. It is more expensive, but you get perfect protection for your money.

AR

Anonymous Reviewer

This is most important - they are continually improving their SW to be best on market and help their customer. They do their business very well - so we may do our safe and protected.

DT

Darina T.

I feel better knowing it's running. Has great features as well to make me more protected and backed up.

MD

Michael D.

Pros

It's the best way to immunize your computer against all sorts of attacking viruses, malwares etc. It keep your files secured even from internet malwares and has offered me the best security so far.

MD

Mgcineleni D.

The password wallet is awesome you have all sorts of options in it to access your accounts with ease and security. You get 3 computers coverage with one payment or you can also use it on your phone.

David I.

It is so easy and customer friendly. Anti-ransomware, and customizable solutions for how big business is.

Mohamed A.

Cons

It didn't seem to help us against modern threats and anomously and machine learning threats. Deep dive into process trees was missing.

AR

Anonymous Reviewer

Occasionally we will have a problem with security updates in Outlook. This can cause the Outlook plugin to not start.

CF

Craig F.

The licensed to purchase this software is a bit troubling. It does give your license keys.

TS

Trevor S.

Cons

This is frustrating when you have more than one admin and each one has to customize and set up their own reports, dashboards, etc. It's also confusing that each admin only sees their own tasks.

JL

James L.

About 1 and half years ago, one of my team members made the mistake of opening a fake attachment in an email.

SM

Stacy M.

The charge was on a old, closed account. I could not access it and to prove I had been overcharged I had to contact the bank and go through an entire process which was very frustrating.

Jennifer A.

  • Vendor responds to reviews
  • Last review8 days ago
  • Vendor responds to reviews
  • Last review4 days ago

Key features

  • Total features66
  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Audit Trail
  • Backup Log
  • Backup Scheduling
  • Behavioral Analytics
  • Best Practices Repository
  • Bot Detection
  • Bot Mitigation
  • Cloud Backup
  • Compliance Management
  • Compliance Tracking
  • Compression
  • Continuous Backup
  • Continuous Monitoring
  • Data Security
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Disk Encryption
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Tracking
  • Financial Data Protection
  • Firewalls
  • Fraud Detection
  • IT Asset Management
  • Incident Management
  • Intrusion Detection System
  • Key Management
  • Local Server Options
  • Maintenance Scheduling
  • Monitoring
  • Network Monitoring
  • Network Security
  • Password Management
  • Policy Management
  • Prioritization
  • Privileged Account Management
  • Real Time Data
  • Real Time Monitoring
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Server Options
  • Remote Support
  • Reporting/Analytics
  • Root Cause Analysis
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting
  • Total features20
  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Audit Trail
  • Backup Log
  • Backup Scheduling
  • Behavioral Analytics
  • Best Practices Repository
  • Bot Detection
  • Bot Mitigation
  • Cloud Backup
  • Compliance Management
  • Compliance Tracking
  • Compression
  • Continuous Backup
  • Continuous Monitoring
  • Data Security
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Disk Encryption
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Tracking
  • Financial Data Protection
  • Firewalls
  • Fraud Detection
  • IT Asset Management
  • Incident Management
  • Intrusion Detection System
  • Key Management
  • Local Server Options
  • Maintenance Scheduling
  • Monitoring
  • Network Monitoring
  • Network Security
  • Password Management
  • Policy Management
  • Prioritization
  • Privileged Account Management
  • Real Time Data
  • Real Time Monitoring
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Server Options
  • Remote Support
  • Reporting/Analytics
  • Root Cause Analysis
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting

Integrations

  • Total integrations11
  • Axonius
  • Azure Active Directory
  • Box
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft Teams
  • Okta
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk
  • Total integrations7
  • Axonius
  • Azure Active Directory
  • Box
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft Teams
  • Okta
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk