What are the differences between ESET Endpoint Antivirus and ESET Endpoint Security?
ESET Endpoint Security |
ESET Endpoint Antivirus |
ESET Endpoint Security |
|
---|---|---|---|
Detection & Protection Features |
|||
Secure Browser | ![]() |
||
UEFI Scanner | ![]() |
![]() |
![]() |
DNA Detections | ![]() |
![]() |
![]() |
Ransomware Shield | ![]() |
![]() |
![]() |
Machine Learning | ![]() |
![]() |
|
Cloud Malware Protection System | ![]() |
![]() |
![]() |
Reputation & Cache | ![]() |
![]() |
![]() |
In-product Sandbox | ![]() |
![]() |
![]() |
Network Attack Protection | ![]() |
![]() |
![]() |
Antivirus | ![]() |
![]() |
![]() |
Antispyware | ![]() |
![]() |
![]() |
Anti-Stealth Protection | ![]() |
![]() |
![]() |
Real-time file System Protection | ![]() |
![]() |
![]() |
Document Protection | ![]() |
![]() |
![]() |
Computer Scan | ![]() |
![]() |
![]() |
System Startup Scan | ![]() |
![]() |
![]() |
Initial Scan | ![]() |
![]() |
![]() |
Removable Media Automatic Scan | ![]() |
![]() |
![]() |
Behavioral Detection and Blocking–HIPS | ![]() |
![]() |
|
Vulnerability Shield | ![]() |
![]() |
![]() |
Advanced Memory Scanner | ![]() |
![]() |
![]() |
Exploit Blocker | ![]() |
![]() |
|
Device Control | ![]() |
![]() |
![]() |
Native 64-bit Scanning Core | ![]() |
![]() |
![]() |
AMSI Support | ![]() |
![]() |
![]() |
Protected Service | ![]() |
![]() |
![]() |
DLL Modules | ![]() |
![]() |
![]() |
Advanced Scanning of Browser Scripts | ![]() |
![]() |
![]() |
System-Wide Process Exclusions | ![]() |
![]() |
![]() |
System-Wide Object Exclusions based on Hash Values | ![]() |
![]() |
![]() |
Device Control |
|||
Date/Time-based scheduling | ![]() |
![]() |
![]() |
Two-way Firewall |
|||
Two-way Firewall | ![]() |
![]() |
|
Troubleshooting Wizard | ![]() |
![]() |
|
Simple approach to rule evaluation | ![]() |
![]() |
|
Create Firewall rule directly from log | ![]() |
![]() |
|
Botnet Protection | ![]() |
![]() |
![]() |
Email Protection |
|||
Email Protection | ![]() |
![]() |
![]() |
Client Antispam | ![]() |
||
Web Protection |
|||
Web Access Protection | ![]() |
![]() |
![]() |
Anti-Phishing | ![]() |
![]() |
![]() |
Web Control | ![]() |
||
Update |
|||
Option for smaller product modules updates | ![]() |
![]() |
![]() |
User Interface |
|||
Hide GUI completely | ![]() |
![]() |
![]() |
Support for locally managed lists | ![]() |
![]() |
![]() |
Installation |
|||
Multi-language installer | ![]() |
![]() |
![]() |
Automatic Product Updates | ![]() |
![]() |
![]() |
Component-based installation | ![]() |
![]() |
|
ESET Inspect Support | ![]() |
![]() |
![]() |
ESET LiveGuard Support | ![]() |
![]() |
![]() |
Native Command Line Interface for RMM Integration | ![]() |
![]() |
![]() |
Compatible with ESET Security Management Center | ![]() |
![]() |
![]() |
Compatible with version 6.x ESET Remote Administrator | ![]() |
![]() |
![]() |