This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

ESET Endpoint Security vs SafeDNS Comparison

Search

Add to Compare

Recommended for you

Perch Security

SecureAnywhere

Splunk Enterprise

OneLogin

NinjaRMM

N-central

Good recommendations?

Overview

Category Leaders

ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking...

Category Leaders

SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions,...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Video & Screenshots

Pricing

Starting from
£

339.60

/yryear
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based
Starting from
$

80

/yryear
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based

User reviews

5

4

3

2

1

587

166

29

7

2

  • Value for money
  • Ease of use
  • Features
  • Customer support
98%
would recommend this app

4.7

5

4

3

2

1

26

6

0

0

1

  • Value for money
  • Ease of use
  • Features
  • Customer support
97%
would recommend this app

Pros

The antivirus solution from ESET is currently the best on the market. It is more expensive, but you get perfect protection for your money.

AR

Anonymous Reviewer

This is most important - they are continually improving their SW to be best on market and help their customer. They do their business very well - so we may do our safe and protected.

DT

Darina T.

I feel better knowing it's running. Has great features as well to make me more protected and backed up.

MD

Michael D.

Pros

We have been using this software for years and are very happy with the results. School and Parents are grateful for the safety this software brings to us.

RP

Ruth P.

The product is easy to use. It is installed on public computers and is very successful in keeping the children at the library safe while using a computer.

MJ

Mary Jo P.

Im happy with it, the more I know how it works the better use I can get from it.

JA

Jorge A.

Cons

It didn't seem to help us against modern threats and anomously and machine learning threats. Deep dive into process trees was missing.

AR

Anonymous Reviewer

Occasionally we will have a problem with security updates in Outlook. This can cause the Outlook plugin to not start.

CF

Craig F.

The licensed to purchase this software is a bit troubling. It does give your license keys.

TS

Trevor S.

Cons

End user does not know what is wrong or if something is being blocked; and yes, there is a blocked page warning configured.

SL

SHERMAN L.

Generally, we use this to prevent accidents. An accident might be someone opening a site that is inappropriate for the workplace, and expose the client to workplace harassment claims.

DS

David S.

Even the scanners have limited access to the wan, our personnel found a way to navigate to not work-related webpages.

LC

Leonides C.

  • Vendor responds to reviews
  • Last review7 days ago
  • Vendor responds to reviews
  • Last review2 days ago

Key features

  • Total features66
  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Backup Log
  • Backup Scheduling
  • Behavioral Analytics
  • Billing & Invoicing
  • Bot Detection
  • Bot Mitigation
  • Categorization/Grouping
  • Cloud Backup
  • Compliance Tracking
  • Compression
  • Continuous Backup
  • Continuous Monitoring
  • Dashboard
  • Database Support
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Tracking
  • Filtering
  • Firewalls
  • Fraud Detection
  • IT Asset Management
  • Incident Management
  • Intrusion Detection System
  • Live Chat
  • Local Server Options
  • Monitoring
  • Network Monitoring
  • Policy Management
  • Prioritization
  • Real Time Data
  • Real Time Monitoring
  • Real Time Reporting
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Server Options
  • Remote Support
  • Reporting & Statistics
  • Reporting/Analytics
  • Root Cause Analysis
  • Scheduling
  • Search/Filter
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Signature Matching
  • Task Scheduling
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting
  • Total features33
  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Backup Log
  • Backup Scheduling
  • Behavioral Analytics
  • Billing & Invoicing
  • Bot Detection
  • Bot Mitigation
  • Categorization/Grouping
  • Cloud Backup
  • Compliance Tracking
  • Compression
  • Continuous Backup
  • Continuous Monitoring
  • Dashboard
  • Database Support
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Tracking
  • Filtering
  • Firewalls
  • Fraud Detection
  • IT Asset Management
  • Incident Management
  • Intrusion Detection System
  • Live Chat
  • Local Server Options
  • Monitoring
  • Network Monitoring
  • Policy Management
  • Prioritization
  • Real Time Data
  • Real Time Monitoring
  • Real Time Reporting
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Server Options
  • Remote Support
  • Reporting & Statistics
  • Reporting/Analytics
  • Root Cause Analysis
  • Scheduling
  • Search/Filter
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Signature Matching
  • Task Scheduling
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting

Integrations

  • Total integrations11
  • Axonius
  • Azure Active Directory
  • Box
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft Teams
  • Okta
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk
  • Total integrationsN/A
  • Axonius
  • Azure Active Directory
  • Box
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft Teams
  • Okta
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk