ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks,...

Platforms Supported

  • Web Based
  • iPhone App
  • Android App
  • Windows App

Support Options

  • Email/Help Desk
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Incapsula is a cloud-based web application security platform to optimize, protect and enhance website performance. It allows website traffic to route through Incapsula’s global network of high-powered servers that accelerate outgoing traffic and optimize it for faster load times.
Incapsula is a cloud-based web application security platform to optimize, protect and enhance website performance. It allows website traffic to route...

Platforms Supported

  • Web Based
  • iPhone App
  • Android App
  • Windows App

Support Options

  • Email/Help Desk
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

£339,60/year

  • Free
  • Subscription

Starting from

  • Free
  • Subscription

Overall rating

4,7 /5
(762)
Ease of Use
4,5/5
Features & Functionality
4,6/5
Customer Service
4,4/5
Value for Money
4,5/5

Overall rating

4,6 /5
(47)
Ease of Use
4,5/5
Features & Functionality
4,2/5
Customer Service
4,4/5
Value for Money
4/5

Total features 61

  • AI/Machine Learning
  • Access Control
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Backup Log
  • Backup Scheduling
  • Backup and Recovery
  • Behavioral Analytics
  • Cloud Backup
  • Commenting/Notes
  • Compliance Tracking
  • Compression
  • Content Caching
  • Content Routing
  • Continuous Backup
  • Continuous Monitoring
  • Data Compression
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Tracking
  • Event Triggered Actions
  • Firewalls
  • Health Monitoring
  • IT Asset Management
  • Incident Management
  • Intrusion Detection System
  • Local Server Options
  • Monitoring
  • Network Monitoring
  • Policy Management
  • Prioritization
  • Real Time Monitoring
  • Redundancy Checking
  • Remediation Management
  • Remote Access/Control
  • Remote Server Options
  • Reporting/Analytics
  • Reverse Proxy
  • Root Cause Analysis
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN Software
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting

Total features 8

  • AI/Machine Learning
  • Access Control
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Backup Log
  • Backup Scheduling
  • Backup and Recovery
  • Behavioral Analytics
  • Cloud Backup
  • Commenting/Notes
  • Compliance Tracking
  • Compression
  • Content Caching
  • Content Routing
  • Continuous Backup
  • Continuous Monitoring
  • Data Compression
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Tracking
  • Event Triggered Actions
  • Firewalls
  • Health Monitoring
  • IT Asset Management
  • Incident Management
  • Intrusion Detection System
  • Local Server Options
  • Monitoring
  • Network Monitoring
  • Policy Management
  • Prioritization
  • Real Time Monitoring
  • Redundancy Checking
  • Remediation Management
  • Remote Access/Control
  • Remote Server Options
  • Reporting/Analytics
  • Reverse Proxy
  • Root Cause Analysis
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN Software
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access / Restoration
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Autotask PSA
  • ConnectWise Automate
  • ConnectWise Manage
  • Salesforce Sales Cloud
  • Tigerpaw Software
  • Autotask PSA
  • ConnectWise Automate
  • ConnectWise Manage
  • Salesforce Sales Cloud
  • Tigerpaw Software