Introducing G2.ai, the future of software buying.Try now

Compare ESET PROTECT and NinjaOne

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
ESET PROTECT
ESET PROTECT
Star Rating
(918)4.6 out of 5
Market Segments
Small-Business (45.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 5 pricing plans
NinjaOne
NinjaOne
Star Rating
(3,203)4.7 out of 5
Market Segments
Mid-Market (49.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about NinjaOne
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that NinjaOne excels in overall user satisfaction, boasting a significantly higher G2 Score compared to ESET PROTECT. Users appreciate its versatility, noting that it effectively manages devices, applications, and more, making it a comprehensive solution for IT management.
  • According to verified reviews, NinjaOne's ease of use and setup are standout features, with users highlighting its intuitive interface and quick deployment process. In contrast, while ESET PROTECT is praised for its integration with operating systems, some users mention that it can take longer to configure effectively.
  • Reviewers mention that NinjaOne's continuous updates and AI-driven patch management simplify the maintenance process, enhancing reliability. ESET PROTECT, while effective in risk assessment and cybersecurity, has received feedback indicating that its patch management could be more user-friendly.
  • Users say that ESET PROTECT offers a robust suite of cybersecurity tools, which many find beneficial for comprehensive risk management. However, some users feel that the learning curve for its advanced features, like the kusto query language scripting, can be steep compared to NinjaOne's more straightforward approach.
  • G2 reviewers highlight the quality of support provided by NinjaOne, with many users expressing satisfaction with the responsiveness and helpfulness of the support team. ESET PROTECT also receives positive remarks for its support, but NinjaOne's higher ratings in this area suggest a more consistent experience for users seeking assistance.
  • According to recent user feedback, both products have their strengths, but NinjaOne's higher volume of reviews indicates a broader user base and more consistent performance. ESET PROTECT is noted for its high-quality security features, yet the sheer number of positive experiences with NinjaOne suggests it may be the more reliable choice for everyday IT management needs.
Pricing
Entry-Level Pricing
ESET PROTECT
ESET PROTECT Advanced
Contact Us
Browse all 5 pricing plans
NinjaOne
No pricing available
Free Trial
ESET PROTECT
Free Trial is available
NinjaOne
Free Trial is available
Ratings
Meets Requirements
9.2
786
9.1
3,033
Ease of Use
8.9
788
9.1
3,067
Ease of Setup
8.7
526
9.2
2,864
Ease of Admin
8.5
414
9.2
2,742
Quality of Support
8.9
726
9.2
2,908
Has the product been a good partner in doing business?
8.9
404
9.5
2,678
Product Direction (% positive)
8.7
779
9.7
3,017
Features by Category
IT Service Management (ITSM) ToolsHide 22 FeaturesShow 22 Features
Not enough data
7.9
706
Administration
Not enough data
8.2
645
Not enough data
8.7
663
Not enough data
8.2
665
Service Desk
Not enough data
8.0
656
Not enough data
7.8
645
Not enough data
7.7
623
Management
Not enough data
8.3
608
Not enough data
9.0
615
Not enough data
8.7
593
Not enough data
8.8
590
Not enough data
8.4
572
Functionality
Not enough data
7.5
595
Not enough data
8.5
603
Not enough data
8.8
623
Not enough data
8.9
623
Agentic AI - IT Service Management (ITSM) Tools
Not enough data
7.0
169
Not enough data
6.8
167
Not enough data
6.9
166
Not enough data
6.8
166
Not enough data
6.7
165
Not enough data
6.7
163
Not enough data
6.8
162
Not enough data
8.1
326
Compatibility
Not enough data
8.8
308
Not enough data
8.1
284
Not enough data
8.3
287
Not enough data
8.2
274
Management
Not enough data
Feature Not Available
Not enough data
8.2
285
Not enough data
8.6
288
Not enough data
8.8
302
Not enough data
9.1
303
Compliance
Not enough data
8.7
281
Not enough data
8.4
274
Not enough data
Feature Not Available
Agentic AI - Server Backup
Not enough data
7.2
61
Not enough data
7.1
61
Not enough data
7.6
62
Not enough data
7.3
62
Not enough data
7.2
62
Not enough data
7.3
62
Not enough data
8.1
382
Functionality
Not enough data
Feature Not Available
Not enough data
8.7
335
Not enough data
9.0
351
Not enough data
8.5
339
Not enough data
Feature Not Available
Compatibility
Not enough data
8.8
344
Not enough data
8.6
334
Not enough data
8.3
325
Management
Not enough data
8.2
324
Not enough data
8.8
326
Not enough data
8.7
327
Agentic AI - Online Backup
Not enough data
7.5
73
Not enough data
7.2
71
Not enough data
7.2
70
Not enough data
7.2
70
Not enough data
7.3
70
Not enough data
7.2
70
Remote Monitoring & Management (RMM)Hide 19 FeaturesShow 19 Features
Not enough data
7.9
2,002
Inventory Management - Remote Monitoring & Management (RMM)
Not enough data
9.2
1944
|
Verified
Not enough data
8.5
460
Not enough data
8.1
436
Monitoring and Management
Not enough data
9.3
1933
|
Verified
Not enough data
8.4
1818
Not enough data
8.6
1873
|
Verified
Not enough data
8.9
1927
|
Verified
Not enough data
8.3
442
IT Operations & Workflow - Remote Monitoring & Management (RMM)
Not enough data
8.4
434
Service Management
Not enough data
9.1
1852
|
Verified
Not enough data
8.0
426
Not enough data
7.2
417
Agentic AI - Remote Monitoring & Management (RMM)
Not enough data
7.2
462
Not enough data
7.0
458
Not enough data
7.1
452
Not enough data
6.9
447
Not enough data
6.8
448
Not enough data
6.9
445
Not enough data
6.9
441
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
Not enough data
7.9
433
Scope
Not enough data
8.7
406
Not enough data
8.8
416
Security
Not enough data
8.5
411
Not enough data
8.3
384
Not enough data
7.4
374
Management
Not enough data
8.8
402
Not enough data
8.6
399
Not enough data
8.7
391
Not enough data
8.7
394
Not enough data
7.8
367
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
7.2
166
Not enough data
7.0
165
Not enough data
7.2
165
Not enough data
7.1
163
Not enough data
6.9
163
Not enough data
7.1
163
Not enough data
7.1
165
Not enough data
7.5
688
Functionality
Not enough data
8.8
647
Not enough data
8.9
664
Not enough data
8.0
609
Not enough data
8.8
604
Monitoring - Network Monitoring
Not enough data
7.5
244
Not enough data
7.7
246
Not enough data
8.3
249
Management
Not enough data
8.2
565
Not enough data
8.2
574
Not enough data
7.6
531
Analytics - Network Monitoring
Not enough data
7.0
235
Not enough data
6.8
233
Security - Network Monitoring
Not enough data
7.7
238
Not enough data
7.2
234
Not enough data
7.0
235
Network Performance - Network Monitoring
Not enough data
6.9
236
Not enough data
7.4
236
AI Automation - Network Monitoring
Not enough data
6.4
226
Not enough data
6.3
225
Not enough data
6.4
224
Agentic AI - Network Monitoring
Not enough data
6.5
120
Not enough data
6.5
119
Not enough data
6.6
121
Not enough data
6.6
118
Not enough data
6.4
117
Not enough data
6.5
118
Not enough data
6.5
118
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
9.2
238
Not enough data
Administration
9.2
192
Not enough data
9.1
200
Not enough data
9.0
201
Not enough data
8.8
193
Not enough data
9.0
197
Not enough data
Functionality
9.0
201
Not enough data
9.1
203
Not enough data
9.2
204
Not enough data
9.3
204
Not enough data
Analysis
9.0
197
Not enough data
9.1
196
Not enough data
Feature Not Available
Not enough data
Not enough data
7.9
569
Monitoring
Not enough data
9.2
549
|
Verified
Not enough data
9.1
547
|
Verified
Not enough data
8.5
501
|
Verified
Not enough data
7.1
196
Management Tools
Not enough data
8.2
489
Not enough data
8.6
504
|
Verified
Not enough data
8.5
485
|
Verified
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Agentic AI - Incident Management
Not enough data
7.6
93
Not enough data
7.5
93
Not enough data
7.6
92
Not enough data
7.2
92
Not enough data
7.2
92
Not enough data
7.3
91
Not enough data
7.5
90
Not enough data
7.8
1,146
Asset Inventory
Not enough data
8.9
1114
Not enough data
8.8
1105
Not enough data
7.7
1011
Not enough data
Feature Not Available
Not enough data
8.1
1038
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Agentic AI - IT Asset Management
Not enough data
7.4
223
Not enough data
7.2
220
Not enough data
7.4
218
Not enough data
7.1
215
Not enough data
7.1
214
Not enough data
7.1
216
Not enough data
7.1
214
Management
Not enough data
9.1
1068
Not enough data
8.7
1016
Not enough data
8.0
982
Not enough data
8.1
1009
Malware Analysis ToolsHide 11 FeaturesShow 11 Features
9.4
94
Not enough data
Detection
9.5
76
Not enough data
Feature Not Available
Not enough data
9.3
74
Not enough data
Analysis
9.5
76
Not enough data
9.0
74
Not enough data
9.4
74
Not enough data
9.4
75
Not enough data
Response
9.2
75
Not enough data
9.5
76
Not enough data
9.4
75
Not enough data
Generative AI
Feature Not Available
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
9.6
19
Not enough data
Detection & Response
9.6
14
Not enough data
9.8
14
Not enough data
9.8
14
Not enough data
9.9
14
Not enough data
Management
9.5
13
Not enough data
9.8
14
Not enough data
9.2
13
Not enough data
Analytics
9.4
15
Not enough data
9.0
14
Not enough data
9.3
14
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
9.4
9
Not enough data
9.8
8
Not enough data
9.7
10
Not enough data
Services - Extended Detection and Response (XDR)
9.7
6
Not enough data
Not enough data
8.4
1,611
Administration
Not enough data
9.2
1542
Not enough data
8.7
1499
Not enough data
7.8
1402
Not enough data
9.1
1539
Not enough data
8.9
1462
Not enough data
8.8
1497
Maintenance
Not enough data
9.1
1527
Not enough data
7.7
1316
Communication
Not enough data
7.9
1365
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
7.2
1289
Security
Not enough data
8.3
1331
Not enough data
8.4
1360
Device Support
Not enough data
7.6
1324
Not enough data
8.4
1396
Not enough data
8.4
1383
Performance
Not enough data
8.2
1451
Not enough data
8.0
334
Functionality
Not enough data
8.8
320
Not enough data
7.9
292
Not enough data
8.0
296
Not enough data
8.5
308
Performance
Not enough data
8.8
315
Not enough data
8.5
302
Not enough data
Feature Not Available
Not enough data
8.6
305
Agentic AI - PC Backup
Not enough data
7.2
89
Not enough data
7.1
89
Not enough data
6.9
88
Not enough data
7.0
88
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
8.9
16
Not enough data
Platform Features
8.3
14
Not enough data
9.4
13
Not enough data
9.2
13
Not enough data
9.4
14
Not enough data
9.1
13
Not enough data
9.5
14
Not enough data
8.5
8
Not enough data
Automation Capabilities
9.6
13
Not enough data
9.0
13
Not enough data
6.7
8
Not enough data
Not enough data
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Generative AI
Not enough data
Feature Not Available
Not enough data
8.4
225
Management and Discovery - IT Documentation
Not enough data
8.3
221
Not enough data
8.3
220
Not enough data
8.7
221
Operations - IT Documentation
Not enough data
8.3
218
Not enough data
8.7
219
Not enough data
8.3
221
Autonomous Endpoint Management (AEM)Hide 7 FeaturesShow 7 Features
Not enough data
7.8
75
Generative AI - Autonomous Endpoint Management
Not enough data
7.1
62
Not enough data
7.2
63
Not enough data
7.1
62
Monitoring and Management - Autonomous Endpoint Management
Not enough data
8.6
74
Not enough data
8.1
70
Not enough data
7.8
66
Not enough data
8.8
75
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
9.7
19
Not enough data
Services - Endpoint Detection & Response (EDR)
9.7
10
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
Not enough data
8.1
477
Platform - Mobile Device Management (MDM)
Not enough data
8.5
425
Operating System
Not enough data
9.1
472
Not enough data
8.0
464
Not enough data
8.2
447
Management
Not enough data
8.5
453
Not enough data
8.2
431
Not enough data
8.2
430
Not enough data
8.1
430
Not enough data
8.3
432
Security
Not enough data
8.4
439
Not enough data
8.5
436
Agentic AI - Mobile Device Management (MDM)
Not enough data
7.7
138
Not enough data
7.5
138
Not enough data
7.7
140
Not enough data
7.6
136
Not enough data
7.6
135
Not enough data
7.5
136
Not enough data
7.6
134
Not enough data
Not enough data
Knowledge Base
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Content
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Communication
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enterprise IT ManagementHide 18 FeaturesShow 18 Features
Not enough data
7.8
740
Analysis
Not enough data
8.0
691
Platform
Not enough data
7.8
678
Not enough data
9.0
702
Not enough data
8.2
663
Not enough data
8.4
696
Not enough data
8.2
678
Security
Not enough data
8.6
694
Not enough data
9.1
709
Not enough data
7.6
654
Not enough data
8.6
677
Not enough data
8.1
657
Agentic AI - Enterprise IT Management
Not enough data
7.3
150
Not enough data
7.2
146
Not enough data
7.3
148
Not enough data
7.0
146
Not enough data
7.0
145
Not enough data
6.9
143
Not enough data
6.9
144
Reviews
Reviewers' Company Size
ESET PROTECT
ESET PROTECT
Small-Business(50 or fewer emp.)
45.4%
Mid-Market(51-1000 emp.)
44.3%
Enterprise(> 1000 emp.)
10.3%
NinjaOne
NinjaOne
Small-Business(50 or fewer emp.)
44.7%
Mid-Market(51-1000 emp.)
49.5%
Enterprise(> 1000 emp.)
5.9%
Reviewers' Industry
ESET PROTECT
ESET PROTECT
Information Technology and Services
12.4%
Computer Software
5.3%
Computer & Network Security
3.9%
Construction
3.8%
Internet
3.3%
Other
71.2%
NinjaOne
NinjaOne
Information Technology and Services
26.9%
Computer & Network Security
13.0%
Hospital & Health Care
4.3%
Manufacturing
3.9%
Construction
2.8%
Other
49.1%
Alternatives
ESET PROTECT
ESET PROTECT Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatDown
ThreatDown
Add ThreatDown
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Add Check Point Harmony Endpoint
NinjaOne
NinjaOne Alternatives
Atera
Atera
Add Atera
TeamViewer
TeamViewer
Add TeamViewer
LogMeIn Resolve
LogMeIn Resolve
Add LogMeIn Resolve
Pulseway
Pulseway
Add Pulseway
Discussions
ESET PROTECT
ESET PROTECT Discussions
How can I backup the encryption key?
2 Comments
GABI C.
GC
It's critical to have backups of encryption keys. If the lone copy of a key is lost, data encrypted with that key cannot be accessed. When you initially turn...Read more
Does ESET nod32 protect against malware?
2 Comments
DM
Not allRead more
How to make my team faster at startup?
1 Comment
Miguel Antonio E.
ME
Tools → Scheduled Tasks → Uncheck the Startup File Verification box.Read more
NinjaOne
NinjaOne Discussions
Do I need a WSUS Server to enable patch management on Windows devices?
6 Comments
Jenny T.
JT
You can use WSUS to completely manage the distribution of Microsoft Update updates to https://basketballstars2.com computers on your network. Read more
Do you provide the same level of functionality for MacOS as you do for Windows?
2 Comments
Brian A.
BA
Hey Sam, We are an all Mac firm (as we work on Macs ourselves) and I can confirm they do support Macs well. Now, because of the Apple environment, they...Read more
Does NinjaRMM hold weight against other RMM in other opinions?
2 Comments
Nathan  S.
NS
Ninja handles patching and third-party software management, along with an integrated ticketing system and full control of scripting. It also integrates...Read more
ESET PROTECT
ESET PROTECT
Optimized for quick response
NinjaOne
NinjaOne
Optimized for quick response