Related Products
  | 
            
            ||||||
                
            
            
            About
            As a vital piece of your IT security strategy, Clearswift Endpoint Data Loss Protection (DLP) solution allows organizations to detect, inspect and secure critical data on endpoints. In one solution, it provides context-aware Data in Use (DIU) policies to control which devices can connect to a corporate network and what information can be transferred. It also executes scheduled Data at Rest (DAR) scans on file systems to audit and manage critical data residing on the network or in the cloud. A lightweight agent, Clearswift Endpoint DLP works behind the scenes to enforce your security and compliance policies and provides continuity even when users are not connected to the network. Flexible and context-aware DIU policies allow organizations to apply rules that either prevent documents containing critical data from being copied to removable media, shared on the network or uploaded to the cloud, or automatically encrypt them before they are transferred.
             
            
        
         | 
        
        
                
            
            
            About
            Uncover the unknown in your network with this EDR solution. This endpoint detection and response tool leverages ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real-time endpoint data.  Provides quick analysis and remediation of any security issue in the network. ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning. New rules can be created to match the needs of specific enterprise environments, including SIEM integrations. Utilize ESET’s endpoint detection and response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
             
            
        
         | 
        |||||
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        
        
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        |||||
                
            
        
        Audience
        IT security teams in search of a solution to improve all their network operations and increase security
         
        
    
         | 
        
        
                
            
        
        Audience
        Organizations that need advanced threat detection software
         
        
    
         | 
        |||||
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        
        
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        |||||
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        
        
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        |||||
                
            
        
        Screenshots and Videos | 
        
        
                
            
        
        Screenshots and Videos | 
        |||||
                
            
        
        Pricing
        No information available.
        
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        
        
                
            
        
        Pricing
        $38 per user per year
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        |||||
                
            
        
    
        
Reviews/
         | 
        
        
                
            
        
    
        
Reviews/
        
    
    
         | 
        |||||
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        
        
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        |||||
                
            
        
        Company InformationFortra 
    
    Founded: 1982 
    
    United States 
    www.clearswift.com/solutions/endpoint-protection 
         | 
        
        
                
            
        
        Company InformationESET 
    
    Founded: 1992 
    
    Slovakia 
    www.eset.com/int/business/download/endpoint-security-windows/ 
         | 
        |||||
                
            
            
    
        
        
        
            Alternatives | 
        
        
                
            
            
    
        
        
        
            Alternatives | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        
                
            
            
    
        
        
        
        
             | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        
                
            
            
    
        
        
        
        
             | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        
                
            
            
    
        
        
        
        
             | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        
                
            
            
    
        
        
        
        
             | 
        |||||
                
            
        
    
        Categories | 
        
        
                
            
        
    
        Categories | 
        |||||
                
            
        
    
        
            
            
        
            
            
                
                Endpoint Protection Features
            
                Activity Log
            
            
         
        
    
        
        
            
                Antivirus
            
            
         
        
    
        
        
            
                Application Security
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Device Management
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Signature Matching
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                     | 
        
        
                
            
        
    
        
            
            
                
                Data Loss Prevention Features
            
                Compliance Reporting
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                Policy Management
            
            
         
        
    
        
        
            
                Sensitive Data Identification
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    Endpoint Protection Features
            
                Activity Log
            
            
         
        
    
        
        
            
                Antivirus
            
            
         
        
    
        
        
            
                Application Security
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Device Management
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Signature Matching
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    Backup Features
            
                Backup Log
            
            
         
        
    
        
        
            
                Backup Scheduling
            
            
         
        
    
        
        
            
                Cloud Backup
            
            
         
        
    
        
        
            
                Compression
            
            
         
        
    
        
        
            
                Continuous Backup
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Incremental Backup
            
            
         
        
    
        
        
            
                Local Server Options
            
            
         
        
    
        
        
            
                Remote Server Options
            
            
         
        
    
        
        
            
                Secure Data Storage
            
            
         
        
    
        
        
            
                Web Access / Restoration
            
            
         
        
    
                    Cloud Security Features
            
                Antivirus
            
            
         
        
    
        
        
            
                Application Security
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                Threat Intelligence
            
            
         
        
    
        
        
            
                Two-Factor Authentication
            
            
         
        
    
        
        
            
                Vulnerability Management
            
            
         
        
    
                    Computer Security Features
            
                Anti Spam
            
            
         
        
    
        
        
            
                Antivirus
            
            
         
        
    
        
        
            
                Audit Trail
            
            
         
        
    
        
        
            
                Compliance Management
            
            
         
        
    
        
        
            
                Database Security Audit
            
            
         
        
    
        
        
            
                File Access Control
            
            
         
        
    
        
        
            
                Financial Data Protection
            
            
         
        
    
        
        
            
                Maintenance Scheduling
            
            
         
        
    
        
        
            
                Real Time Monitoring
            
            
         
        
    
        
        
            
                Security Event Log
            
            
         
        
    
        
        
            
                Virus Definition Update
            
            
         
        
    
        
        
            
                Vulnerability Protection
            
            
         
        
    
                    Cybersecurity Features
            
                AI / Machine Learning
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                IOC Verification
            
            
         
        
    
        
        
            
                Tokenization
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    Encryption Features
            
                Central Policy Enforcement
            
            
         
        
    
        
        
            
                Drag & Drop UI
            
            
         
        
    
        
        
            
                Email Encryption
            
            
         
        
    
        
        
            
                Encryption Key Management
            
            
         
        
    
        
        
            
                Endpoint Encryption
            
            
         
        
    
        
        
            
                File Compression
            
            
         
        
    
        
        
            
                File Encryption
            
            
         
        
    
        
        
            
                Full Disk Encryption
            
            
         
        
    
        
        
            
                Public Key Cryptography
            
            
         
        
    
        
        
            
                Tokenization / Data Masking
            
            
         
        
    
                    Endpoint Detection and Response (EDR) Features
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Blacklisting/Whitelisting
            
            
         
        
    
        
        
            
                Continuous Monitoring
            
            
         
        
    
        
        
            
                Malware/Anomaly Detection
            
            
         
        
    
        
        
            
                Prioritization
            
            
         
        
    
        
        
            
                Remediation Management
            
            
         
        
    
        
        
            
                Root Cause Analysis
            
            
         
        
    
                    Network Security Features
            
                Access Control
            
            
         
        
    
        
        
            
                Analytics / Reporting
            
            
         
        
    
        
        
            
                Compliance Reporting
            
            
         
        
    
        
        
            
                Firewalls
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                Threat Response
            
            
         
        
    
        
        
            
                VPN
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
                    Server Backup Features
            
                Backup Scheduling
            
            
         
        
    
        
        
            
                Bare-Metal Restore
            
            
         
        
    
        
        
            
                Compression
            
            
         
        
    
        
        
            
                Continuous Backup
            
            
         
        
    
        
        
            
                Differential Backup
            
            
         
        
    
        
        
            
                Disaster Recovery
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Incremental Backup
            
            
         
        
    
        
        
            
                VM Backup
            
            
         
        
    
                     | 
        |||||
                
            
        
    
        Integrations
            
                
    ActivePlatform
            
            
         
        
    
        
        
            
                
    Autotask PSA
            
            
         
        
    
        
        
            
                
    Axonius
            
            
         
        
    
        
        
            
                
    Blumira
            
            
         
        
    
        
        
            
                
    CYREBRO
            
            
         
        
    
        
        
            
                
    ConnectWise Automate
            
            
         
        
    
        
        
            
                
    ConnectWise PSA
            
            
         
        
    
        
        
            
                
    Datto Workplace
            
            
         
        
    
        
        
            
                
    GoSecure
            
            
         
        
    
        
        
            
                
    Liongard
            
            
         
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
                
             | 
        
        
                
            
        
    
        Integrations
            
                
    ActivePlatform
            
            
         
        
    
        
        
            
                
    Autotask PSA
            
            
         
        
    
        
        
            
                
    Axonius
            
            
         
        
    
        
        
            
                
    Blumira
            
            
         
        
    
        
        
            
                
    CYREBRO
            
            
         
        
    
        
        
            
                
    ConnectWise Automate
            
            
         
        
    
        
        
            
                
    ConnectWise PSA
            
            
         
        
    
        
        
            
                
    Datto Workplace
            
            
         
        
    
        
        
            
                
    GoSecure
            
            
         
        
    
        
        
            
                
    Liongard
            
            
         
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
                
             | 
        |||||
| 
                
            
        
    
     | 
        
        
                
            
        
    
     |