Hi, how can we help you today?

ESET Endpoint Security vs Zoho Mail
Confronto delle caratteristiche

Scopri come ESET Endpoint Security e Zoho Mail si confrontano tra loro in base alle loro caratteristiche

Total

101
13

AI/Machine Learning

API

Access Controls/Permissions

Access Management

Activity Dashboard

Activity Monitoring

Activity Tracking

Alerts/Notifications

Allow/Block List

Anomaly/Malware Detection

Anti Virus

Application Security

Archiving & Retention

Audit Trail

Authentication

Automatic Backup

Backup Log

Backup Scheduling

Backup and Recovery

Bare-Metal Restore

Behavioral Analytics

Cloud Backup

Cloud Encryption

Compliance Management

Compliance Tracking

Compression

Configuration Management

Continuous Backup

Continuous Monitoring

DDoS Protection

Data Recovery

Data Security

Data Visualization

Deduplication

Deployment Management

Device Management

Differential Backup

Disaster Recovery

Email Attachment Protection

Email Filtering

Email Monitoring

Email Routing

Encryption

Endpoint Management

Endpoint Protection

Event Logs

File Encryption

Firewalls

For MSPs

Fraud Detection

Hardware Integration

IOC Verification

IT Asset Management

Incident Management

Incident Reporting

Incremental Backup

Intrusion Detection System

Intrusion Prevention System

Key Management

Log Access

Log Management

Maintenance Scheduling

Mobile Access

Monitoring

Network Monitoring

Network Provisioning

Network Security

Next-Generation Firewall

Password Management

Patch Management

Penetration Testing

Phishing Protection

Policy Management

Prioritization

Real-Time Monitoring

Real-time Alerts

Remediation Management

Remote Monitoring & Management

Remote Server Options

Reporting/Analytics

Risk Analysis

Root Cause Analysis

SQL Injections

SSL Security

SURLB/URIBL Filtering

Secure Data Storage

Server Monitoring

Spam Blocker

Spam Detection

Spam Quarantine

Support Ticket Management

Task Management

Third-Party Integrations

Threat Intelligence

Threat Response

Tokenization

Two-Factor Authentication

Uptime Reporting

User Management

VM Backup

VPN

Vulnerability Protection

Vulnerability Scanning

Web Threat Management

Web-Application Security

Whitelisting/Blacklisting


Ciao, di cosa hai bisogno?

Abbiamo bisogno di un software di gestione progetti affidabile per 50 a meno di 10$ per utente...

Piattaforma di audit con apprendimento integrato e gestione inventario...

Ho bisogno di un software per clinica dentistica per gestire prenotazioni e pagamenti...

Consigliami un chatbot facile e veloce da implementare per il nostro supporto...

Il nostro algoritmo avanzato troverà la soluzione migliore per le tue esigenze e filtrerà tutte le assurdità e il passaparola del marketing per te