Hi, how can we help you today?

ESET Endpoint Security vs Xeams
Kenmerkenvergelijking

Ontdek hoe ESET Endpoint Security en Xeams zich tot elkaar verhouden op basis van hun kenmerken

Total

101
16

AI/Machine Learning

API

Access Controls/Permissions

Access Management

Activity Dashboard

Activity Monitoring

Activity Tracking

Alerts/Notifications

Allow/Block List

Anomaly/Malware Detection

Anti Virus

Application Security

Archiving & Retention

Audit Trail

Authentication

Automatic Backup

Backup Log

Backup Scheduling

Backup and Recovery

Bare-Metal Restore

Behavioral Analytics

Cloud Backup

Cloud Encryption

Compliance Management

Compliance Tracking

Compression

Configuration Management

Continuous Backup

Continuous Monitoring

DDoS Protection

Data Import/Export

Data Recovery

Data Retention Management

Data Security

Data Visualization

Deduplication

Deployment Management

Device Management

Differential Backup

Disaster Recovery

Email Attachment Protection

Email Routing

Encryption

Endpoint Management

Endpoint Protection

Event Logs

File Encryption

Firewalls

For MSPs

Fraud Detection

Full Text Search

Hardware Integration

IOC Verification

IT Asset Management

Incident Management

Incident Reporting

Incremental Backup

Intrusion Detection System

Intrusion Prevention System

Key Management

Log Access

Log Management

Maintenance Scheduling

Mobile Access

Monitoring

Network Monitoring

Network Provisioning

Network Security

Next-Generation Firewall

Password Management

Patch Management

Penetration Testing

Policy Management

Prioritization

Real-Time Monitoring

Real-time Alerts

Remediation Management

Remote Monitoring & Management

Remote Server Options

Reporting/Analytics

Risk Analysis

Root Cause Analysis

SQL Injections

SSL Security

Secure Data Storage

Server Monitoring

Spam Blocker

Spam Detection

Spam Quarantine

Storage Management

Support Ticket Management

Task Management

Third-Party Integrations

Threat Intelligence

Threat Response

Tokenization

Two-Factor Authentication

Uptime Reporting

User Management

VM Backup

VPN

Vulnerability Protection

Vulnerability Scanning

Web Threat Management

Web-Application Security

Whitelisting/Blacklisting

eDiscovery