ESET Endpoint Encryption Overview

ESET Endpoint Encryption is the #6 ranked solution in our list of top Endpoint Encryption tools. It is most often compared to Microsoft BitLocker: ESET Endpoint Encryption vs Microsoft BitLocker

What is ESET Endpoint Encryption?

ESET Endpoint Encryption is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side requires no user interaction, increasing user compliance and the security of your company data.

Buyer's Guide

Download the Endpoint Encryption Buyer's Guide including reviews and more. Updated: June 2021

ESET Endpoint Encryption Customers

CCS Media Limited, Mercury Engineering, , Unigarant, Pinewood Healthcare

ESET Endpoint Encryption Video

Filter Archived Reviews (More than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
SB
Team Leader at a university with 201-500 employees
Real User
Instead of installing the product on each machine at each location, we just do it remotely

What is our primary use case?

It is an antivirus and firewall security solution for our environment, not just on clients, but also on servers.

Pros and Cons

  • "The Remote Administrator is the most valuable feature that ESET offers for us. Centralized management of our ESET environment is what I like about the Remote Administrator."
  • "I would like more robust reporting as part of the Remote Administrator."

What other advice do I have?

The product is versatile, and the company continues to bring out more products. Before we installed the central management console, we were not able to pull any reports of how many threats were being blocked in our environment. So, we couldn't bargain a security budget with management without those reports and data of what is being blocked, showing how much we saved. Therefore, it improved our capabilities of asking for a security budget, as we collected the data that was coming in from all the client devices. Context is louder than volume. You need the data in order to win your board.
Product Categories
Endpoint Encryption
Buyer's Guide
Download our free Endpoint Encryption Report and find out what your peers are saying about ESET, Microsoft, Broadcom, and more!