This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

Webroot Business Endpoint Protection vs ESET Endpoint Security Comparison

Add to Compare

Compare similar apps

Splunk Enterprise logo

Splunk Enterprise

4.6

NinjaOne logo

NinjaOne

4.9

N-central logo

N-central

3.9

WebTitan logo

WebTitan

4.5

GoodAccess logo

GoodAccess

4.8

NordLayer logo

NordLayer

4.5

Good recommendations?

Overview

Category Leaders

Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack.

Category Leaders

ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Video & Screenshots

Pricing

Starting from

$

30

/yryear
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based

Starting from

£

339.60

/yryear
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based

User reviews

5

4

3

2

1

139

38

12

3

5

  • Value for money
  • Ease of use
  • Features
  • Customer support
93%
would recommend this app

5

4

3

2

1

597

174

31

7

2

  • Value for money
  • Ease of use
  • Features
  • Customer support
98%
would recommend this app

Pros

Overall very good experience and i completely recommend it to anyone looking for Endpoint protection solution.

AR

Anonymous Reviewer

I like that it is keeping my systems secure and detecting any problems. It is affordable and easy to use.

PH

Peggy H.

Almost everyone I suggested Webroot to bought & installed it, they were quite impressed at how much better their computers & other devices ran so much smoother.

CR

Carl R.

Pros

This is most important - they are continually improving their SW to be best on market and help their customer. They do their business very well - so we may do our safe and protected.

DT

Darina T.

The antivirus solution from ESET is currently the best on the market. It is more expensive, but you get perfect protection for your money.

AR

Anonymous Reviewer

I feel better knowing it's running. Has great features as well to make me more protected and backed up.

MD

Michael D.

Cons

Our experience with Webroot has been one of the worst that I have ever experienced. Their customer service is absolutely terrible.

JS

Janae S.

It is hard for me to find something wrong with this software.

GD

Gordon D.

Worst Customer Service I have ever encountered.

JS

Janae S.

Cons

It didn't seem to help us against modern threats and anomously and machine learning threats. Deep dive into process trees was missing.

AR

Anonymous Reviewer

Occasionally we will have a problem with security updates in Outlook. This can cause the Outlook plugin to not start.

CF

Craig F.

The licensed to purchase this software is a bit troubling. It does give your license keys.

TS

Trevor S.

  • Vendor responds to reviews
  • Last review18 days ago
  • Vendor responds to reviews
  • Last review5 days ago

Key features

  • Total features23
  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Backup Log
  • Backup Scheduling
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Cloud Backup
  • Compliance Tracking
  • Compression
  • Continuous Backup
  • Continuous Monitoring
  • Data Security
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Tracking
  • Firewalls
  • Fraud Detection
  • IOC Verification
  • IT Asset Management
  • Incident Management
  • Intrusion Detection System
  • Local Server Options
  • Monitoring
  • Network Monitoring
  • Network Security
  • Policy Management
  • Prioritization
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Server Options
  • Remote Support
  • Reporting/Analytics
  • Root Cause Analysis
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting
  • Total features66
  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Backup Log
  • Backup Scheduling
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Cloud Backup
  • Compliance Tracking
  • Compression
  • Continuous Backup
  • Continuous Monitoring
  • Data Security
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Tracking
  • Firewalls
  • Fraud Detection
  • IOC Verification
  • IT Asset Management
  • Incident Management
  • Intrusion Detection System
  • Local Server Options
  • Monitoring
  • Network Monitoring
  • Network Security
  • Policy Management
  • Prioritization
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Server Options
  • Remote Support
  • Reporting/Analytics
  • Root Cause Analysis
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting

Integrations

  • Total integrations15
  • Azure Active Directory
  • Box
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft Teams
  • Okta
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Wordpress
  • Zendesk
  • Total integrations11
  • Azure Active Directory
  • Box
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft Teams
  • Okta
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Wordpress
  • Zendesk