This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

ESET Endpoint Security vs SolarWinds Network Configuration Manager Comparison

Search

Add to Compare

Recommended for you

SpamTitan

4.6

SecureAnywhere

4.6

Splunk Enterprise

4.6

OneLogin

4.7

ConnectWise Automate

4.2

SecureLink

4.2

Good recommendations?

Overview

Category Leaders

ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking...

SolarWinds Network Configuration Manager is an automated network configuration management and backup solution that ensures...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Video & Screenshots

Pricing

Starting from
£

339.60

/yryear
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based
Starting from
$

1564

/yryear
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based

User reviews

5

4

3

2

1

588

168

31

7

2

  • Value for money
  • Ease of use
  • Features
  • Customer support
98%
would recommend this app

4.9

5

4

3

2

1

14

1

0

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

Pros

The antivirus solution from ESET is currently the best on the market. It is more expensive, but you get perfect protection for your money.

AR

Anonymous Reviewer

This is most important - they are continually improving their SW to be best on market and help their customer. They do their business very well - so we may do our safe and protected.

DT

Darina T.

I feel better knowing it's running. Has great features as well to make me more protected and backed up.

MD

Michael D.

Pros

With the ability to automate backups of iOS of the Cisco and other supported devices like HP and others you save time and money, it keeps a history and allows you to quickly restore a previous image.

Jeremy M.

I love that a lot of the automation can be done on routers or switches. I have it backing up our devices on a nightly basis.

Larry L.

The support is very good & helps fixing any issue i may face, and also the forums community can provide quick solution when needed.

Hossam S.

Cons

It didn't seem to help us against modern threats and anomously and machine learning threats. Deep dive into process trees was missing.

AR

Anonymous Reviewer

Occasionally we will have a problem with security updates in Outlook. This can cause the Outlook plugin to not start.

CF

Craig F.

The licensed to purchase this software is a bit troubling. It does give your license keys.

TS

Trevor S.

Cons

Sometimes you encounter simple problems despite all the improvements. An example of this is the occasional opening of the login page.

AR

Anonymous Reviewer

Really there are not many. Price is about the only complaint, its expensive.

Jeremy M.

  • Vendor responds to reviews
  • Last review16 days ago
  • Vendor responds to reviews
  • Last review2 months ago

Key features

  • Total features66
  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Backup Log
  • Backup Scheduling
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Cloud Backup
  • Compliance Tracking
  • Compression
  • Continuous Backup
  • Continuous Monitoring
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Tracking
  • Firewalls
  • Fraud Detection
  • HIPAA Compliant
  • IT Asset Management
  • Incident Management
  • Intrusion Detection System
  • Local Server Options
  • Monitoring
  • Network Monitoring
  • Policy Management
  • Prioritization
  • Real Time Data
  • Real Time Monitoring
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Server Options
  • Remote Support
  • Reporting/Analytics
  • Risk Management
  • Root Cause Analysis
  • Sarbanes-Oxley Compliance
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN
  • Version Control
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting
  • Total features11
  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Backup Log
  • Backup Scheduling
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Cloud Backup
  • Compliance Tracking
  • Compression
  • Continuous Backup
  • Continuous Monitoring
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Tracking
  • Firewalls
  • Fraud Detection
  • HIPAA Compliant
  • IT Asset Management
  • Incident Management
  • Intrusion Detection System
  • Local Server Options
  • Monitoring
  • Network Monitoring
  • Policy Management
  • Prioritization
  • Real Time Data
  • Real Time Monitoring
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Server Options
  • Remote Support
  • Reporting/Analytics
  • Risk Management
  • Root Cause Analysis
  • Sarbanes-Oxley Compliance
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN
  • Version Control
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting

Integrations

  • Total integrations11
  • Azure Active Directory
  • Box
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft Teams
  • Okta
  • PagerDuty
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk
  • Total integrations2
  • Azure Active Directory
  • Box
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft Teams
  • Okta
  • PagerDuty
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk