What Is ESET Endpoint Security?

Endpoint security software that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easy-to-use cloud-based console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption.

Who Uses ESET Endpoint Security?

ESET began life as a pioneer of antivirus protection, creating award-winning threat detection software. Today our security solutions protect over 110 million users in 200 countries and territories.

ESET Endpoint Security Details

ESET

Founded in 1987

ESET Endpoint Security pricing

Starting Price:

£339.60/year
  • Yes, has free trial
  • No free version

ESET Endpoint Security does not have a free version but does offer a free trial. ESET Endpoint Security paid version starts at £339.60/year.

Pricing plans get a free trial

ESET Endpoint Security Details

ESET

Founded in 1987

ESET Endpoint Security videos and images

ESET Endpoint Security video
ESET Endpoint Security Software - 1 - thumbnail
ESET Endpoint Security Software - 2 - thumbnail
ESET Endpoint Security Software - 3 - thumbnail
ESET Endpoint Security Software - 4 - thumbnail
ESET Endpoint Security Software - 5 - thumbnail

ESET Endpoint Security deployment and support

Support

  • Email/Help Desk
  • Phone Support
  • Chat

Deployment

  • Cloud, SaaS, Web-based
  • Mac (Desktop)
  • Windows (Desktop)
  • Linux (Desktop)
  • Windows (On-Premise)
  • Linux (On-Premise)
  • Android (Mobile)
  • iPhone (Mobile)
  • iPad (Mobile)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation

Features of ESET Endpoint Security

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Tracking
  • Allow / Block List
  • Anti Spam
  • Anti Virus
  • Archiving & Retention
  • Audit Trail
  • Authentication
  • Backup and Recovery
  • Categorisation/Grouping
  • Compliance Management
  • Compression
  • Data Loss Prevention Software
  • Data Recovery
  • Data Retention Management
  • Data Storage Management
  • Data Synchronisation
  • Data Verification
  • Disaster Recovery
  • Email Management
  • Email Routing
  • Email Tracking
  • Encryption
  • Event Tracking
  • Filtering
  • Fraud Detection
  • Greylisting
  • Inbox Management
  • Microsoft Outlook Integration
  • Monitoring
  • Phishing Protection
  • Policy Management
  • Quarantine
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Assessment
  • SSL Security
  • SURLB/URIBL Filtering
  • Search/Filter
  • Secure Data Storage
  • Security Auditing
  • Single Sign On
  • Spam Analysis
  • Spam Blocker
  • Spam Detection
  • Tagging
  • Third Party Integrations
  • Vulnerability Scanning

View full list of Anti-spam Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Archiving & Retention
  • Audit Management
  • Automated Scheduling
  • Automatic Backup
  • Backup Log
  • Backup Scheduling
  • Backup and Recovery
  • Cloud Backup
  • Compliance Management
  • Compression
  • Continuous Backup
  • Data Migration
  • Data Recovery
  • Data Replication
  • Data Storage Management
  • Data Synchronisation
  • Data Visualisation
  • Disaster Recovery
  • Document Storage
  • Duplicate Detection
  • Email Alerts
  • Encryption
  • File Management
  • HIPAA Compliant
  • Incremental Backup
  • Local Server Options
  • Monitoring
  • Policy Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Server Options
  • Reporting & Statistics
  • Resource Management
  • Role-Based Permissions
  • SSL Security
  • Scheduled / Automated Reports
  • Secure Data Storage
  • Self Service Portal
  • Status Tracking
  • Task Scheduling
  • Third Party Integrations
  • Two-Factor Authentication
  • Version Control
  • Web Access / Restoration

View full list of Backup Software

  • AI/Machine Learning
  • Anomaly/Malware Detection
  • Behavioural Analytics
  • Bot Detection
  • Bot Mitigation
  • Dashboard
  • Event Logs
  • Fraud Detection
  • Real-time Alerts
  • Threat Intelligence
  • Vulnerability Scanning
  • Web Traffic Monitoring

View full list of Bot Detection and Mitigation

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Alerts/Notifications
  • Anti Virus
  • Audit Management
  • Behavioural Analytics
  • Cloud Application Security
  • Cloud Encryption
  • Cloud Security Policy Management
  • Compliance Management
  • Data Visualisation
  • Encryption
  • Endpoint Management
  • Event Logs
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • Patch Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Assessment
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Security Auditing
  • Single Sign On
  • Status Tracking
  • Third Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Management
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning

View full list of Cloud Security Software

  • API
  • Access Control
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Best Practices Repository
  • Compliance Management
  • Data Security
  • Data Visualisation
  • Endpoint Protection Software
  • Event Logs
  • Event Tracking
  • Financial Data Protection
  • HIPAA Compliant
  • Incident Management
  • Maintenance Scheduling
  • Monitoring
  • Network Security Software
  • Password Management
  • Patch Management
  • Policy Management
  • Privileged Account Management
  • Real Time Monitoring
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Two-Factor Authentication
  • User Management
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning

View full list of Computer Security Software

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Behaviour Tracking
  • Behavioural Analytics
  • Collaboration Tools
  • Compliance Management
  • DDoS Protection
  • Data Security
  • Data Visualisation
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Firewalls
  • HIPAA Compliant
  • IOC Verification
  • Incident Management
  • Monitoring
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Tokenization
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Cybersecurity Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Audit Trail
  • Automatic Backup
  • Backup and Recovery
  • Compliance Management
  • Compliance Tracking
  • Compression
  • Configurable Workflow
  • Configuration Management
  • Data Recovery
  • Data Replication
  • Data Storage Management
  • Data Synchronisation
  • Disaster Recovery
  • File Management
  • File Transfer
  • HIPAA Compliant
  • Incident Management
  • Issue Management
  • Monitoring
  • Multiple Data Sources
  • Policy Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Notifications
  • Remote Access/Control
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Scheduling
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Sensitive Data Identification
  • Status Tracking
  • Task Scheduling
  • Third Party Integrations
  • User Management
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Data Loss Prevention Software

  • AI/Machine Learning
  • API
  • Activity Dashboard
  • Alerts / Escalation
  • Anomaly/Malware Detection
  • Audit Trail
  • Data Leak Prevention
  • Domain Check
  • Email Attachment Protection
  • Email Filtering
  • Email Management
  • Encryption
  • For MSPs
  • Fraud Detection
  • Phishing Protection
  • Policy Management
  • Quarantine
  • Real Time Monitoring
  • Reporting/Analytics
  • SURLB/URIBL Filtering
  • Scheduled / Automated Reports
  • Security Auditing
  • Spam Analysis
  • Spam Blocker
  • Third Party Integrations
  • Threat Protection
  • Threat Response
  • Two-Factor Authentication
  • Vulnerability Scanning
  • Whitelisting/Blacklisting

View full list of Email Security Software

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Application Encryption
  • Audit Trail
  • Authentication
  • Backup and Recovery
  • Cloud Encryption
  • Compliance Management
  • Credential Management
  • Data Security
  • Disk Encryption
  • Event Logs
  • File Encryption
  • HIPAA Compliant
  • Incident Management
  • Key Management
  • P2P Encryption
  • PCI Compliance
  • Password Management
  • Policy Management
  • Real Time Monitoring
  • Remote Access/Control
  • Reporting/Analytics
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Tokenization
  • Two-Factor Authentication
  • User Management

View full list of Encryption Software

  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Behavioural Analytics
  • Continuous Monitoring
  • Endpoint Management
  • Event Analysis
  • Prioritisation
  • Remediation Management
  • Root Cause Analysis
  • Whitelisting/Blacklisting

View full list of Endpoint Detection and Response Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Behavioural Analytics
  • Compliance Management
  • Customisable Reports
  • Data Visualisation
  • Device Management
  • Encryption
  • Event Logs
  • HIPAA Compliant
  • Incident Management
  • Monitoring
  • Patch Management
  • Policy Management
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting/Analytics
  • Risk Analytics
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Summary Reports
  • Third Party Integrations
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting

View full list of Endpoint Protection Software

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Behaviour Tracking
  • Compliance Management
  • Content Filtering
  • Customisable Reports
  • Dashboard Creation
  • Event Logs
  • Filtering
  • Hardware Integration
  • IP Filtering
  • Incident Management
  • Intrusion Detection System
  • Intrusion Prevention System
  • Log Access
  • Monitoring
  • Multi-Location
  • Network Monitoring
  • Next-Generation Firewall
  • Policy Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Role-Based Permissions
  • SSL Security
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Summary Reports
  • Two-Factor Authentication
  • Uptime Reporting
  • VPN
  • Visual Analytics
  • Vulnerability Scanning
  • Web Traffic Reporting

View full list of Firewall Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Data Visualisation
  • Email Alerts
  • Event Logs
  • Event Tracking
  • Filtering
  • Firewalls
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • VPN
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Workflow Management

View full list of Network Security Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Anti Virus
  • Asset Lifecycle Management
  • Audit Management
  • Audit Trail
  • Automatic Backup
  • Compliance Management
  • Configuration Management
  • Customisable Branding
  • Customisable Reports
  • Deployment Management
  • Event Logs
  • For MSPs
  • IT Asset Management
  • IT Asset Tracking
  • Inventory Management
  • Maintenance Scheduling
  • Mobile Access
  • Monitoring
  • Multiple User Accounts
  • Network Monitoring
  • Patch Management
  • Policy Management
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Alerts
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Role-Based Permissions
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Summary Reports
  • Support Ticket Management
  • Task Management
  • Task Scheduling
  • Third Party Integrations
  • Uptime Reporting
  • Usage Tracking/Analytics
  • User Management
  • Vulnerability Scanning
  • Workflow Management

View full list of RMM Software

  • @mentions
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Assignment Management
  • Calendar Management
  • Chat/Messaging
  • Collaboration Tools
  • Commenting/Notes
  • Communication Management
  • Customisable Branding
  • Customisable Templates
  • Data Import/Export
  • Document Management
  • Document Storage
  • Drag & Drop
  • Electronic Signature
  • Email Management
  • Employee Activity Monitoring
  • File Management
  • File Transfer
  • Live Chat
  • Meeting Management
  • Monitoring
  • Prioritisation
  • Progress Tracking
  • Project Time Tracking
  • Projections
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real-time Updates
  • Remote Access/Control
  • Remote Support Software
  • Reporting & Statistics
  • SSL Security
  • Single Sign On
  • Softphone Software
  • Tagging
  • Task Management
  • Task Progress Tracking
  • Task Scheduling
  • Third Party Integrations
  • Time Zone Tracking
  • Two-Way Audio & Video
  • Video Chat
  • Video Conferencing
  • Workflow Management

View full list of Remote Work Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Alerts / Escalation
  • Archiving & Retention
  • Automated Scheduling
  • Automatic Backup
  • Backup Log
  • Backup Scheduling
  • Backup and Recovery
  • Bare-Metal Restore
  • Compression
  • Continuous Backup
  • Data Capture and Transfer
  • Data Migration
  • Data Recovery
  • Data Replication
  • Data Storage Management
  • Data Synchronisation
  • Data Visualisation
  • Deduplication
  • Differential Backup
  • Disaster Recovery
  • Drag & Drop
  • Duplicate Detection
  • Encryption
  • File Management
  • File Transfer
  • Incremental Backup
  • Monitoring
  • Multi-OS
  • Multiple Format Support
  • Policy Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Resource Management
  • SSL Security
  • Scheduling
  • Search/Filter
  • Secure Data Storage
  • Server Monitoring
  • Task Scheduling
  • Third Party Integrations
  • Two-Factor Authentication
  • VM Backup
  • Version Control
  • Workflow Management

View full list of Server Backup Software

  • API
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Behavior Analytics
  • Cloud Backup
  • Customisable Reports
  • Data Visualisation
  • Event Analysis
  • Event Logs
  • IT Reporting
  • Incident Reporting
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Scanning
  • Prioritisation
  • Profiling
  • Real Time Analytics
  • Real Time Data
  • Real Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Server Monitoring
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning
  • Web-Application Security

View full list of Threat Intelligence

  • API
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • DDoS Protection
  • Endpoint Protection Software
  • Firewalls
  • Load Balancing Tools
  • Log Management
  • SQL Injections
  • Threat Response
  • Vulnerability Scanning
  • Web-Application Security

View full list of Website Security

Alternatives to ESET Endpoint Security

More ESET Endpoint Security alternatives

Reviews of ESET Endpoint Security

Read all 801 reviews

Average score

Overall
4.7
Ease of Use
4.5
Customer Service
4.4
Features
4.6
Value for Money
4.5

Reviews by company size (employees)

  • <50
  • 51-200
  • 201-1,000
  • >1,001
Robert M.
Robert M.
IT Engineer in UK
Verified LinkedIn User
Computer & Network Security, 2-10 Employees
Used the Software for: 2+ years
Reviewer Source

Removes infections others do not.

5 8 months ago

Comments: Have found ESET support to be responsive and knowledage. We have met the UK head of sales a few times at various events and it has always been a pleasure.

Pros:

We are partnered with ESET as their product range has a very virus detection rate combined with a low system impact. Quite often we have customers bring in computers running other AV software and we use ESET to remove infections.

Cons:

The ERA console is very flexable but can be overly complex for most use cases. Would be nice to see a better implementation of the user interface, perhaps a wizzard system. This does not affect end users though.

Alternatives Considered: Panda Adaptive Defense 360

Reasons for Choosing ESET Endpoint Security: Trends virus detection rate at the time was not so good.

Switched From: Trend Micro Smart Protection Complete Suite

Reasons for Switching to ESET Endpoint Security: Price and previous good histroy with ESET.

Gabriella N.
Gabriella N.
Process Design Engineer and CEO in South Africa
Verified LinkedIn User
Mining & Metals, 2-10 Employees
Used the Software for: 2+ years
Reviewer Source

Works well whether entry-level or high performance

5 10 months ago

Comments: Having used ESET for about seven years there are definitely more pros than cons.

Pros:

I have used ESET for about 7 years back and forth and at times together with another antivirus. When I first started with ESET it did a really good job, my laptop was not performing well, I installed it and managed to remove over 20 malicious software. I like how it works well on different computer systems, be it entry-level or high performance. I am currently running it on an i5 processor with 8 GBs of RAM and it works well. It uses low computing power and it does not slow down my computer. I like the ESET splash screen that shows up on computer startup, it's interesting how it's changed over the years. The splash screen has a clean and premium feel to it and it makes using ESET thus much more pleasant. The splash screen simply shows up and automatically disappears, making starting up pleasant and not long especially when compared to other programs where a complete window opens up which then has to be closed. I have also used it on an entry-level computer with a Celeron processor and 4 GBs of RAM. It worked well, and I still saw the above pros, and most importantly I was able to scan my computer and have it free of malware.

Cons:

I do not have much against ESET, it works well, except that scan times are lengthy, but this is related to file sizes that I have on my machine and in any case, I found it to still be quicker than other programs. There is a price point to ESET and even though it works well there are other anti-virus programs with a free plan that compete strongly with it.

Wisani e M.
Director in South Africa
Information Technology & Services, 2-10 Employees
Used the Software for: 2+ years
Reviewer Source

True Cyber Terminator

5 2 months ago New

Comments: It started with my personal computer to business as selling partner to large organisation and the satisfaction was found amongst the clients I sold off the products.

Pros:

I have move to ESET when we were have the virus called Recycler . The success I had against that virus I started to learn more about other ESET products and later became partner with them and sell these products to large companies and I have never heared them complaining meaning it gives peace of mind.

Cons:

As like any other products they have their weakness and two identified weakness it makes computers slower and secondly some threats they cant be detected but other products detect such threats.

Jojo S.
it network and security manager in US
Nonprofit Organization Management, 501-1,000 Employees
Used the Software for: 2+ years
Reviewer Source

they have gotten worst especially the Mgmt Console Version 7.x.x

1 last year

Comments: the management console, tasks, installers and detection. it is the worst i've ever seen. i've been using this software since it came out less than 2 decades ago but that's about it. started switching to Cylance and adding Malwarebytes (cloud version is really great on this one)

Pros:

nothing since the moved to Version 7.x.x

Cons:

all of it especially the module, agent, installers and tasks. it is really a piece of garbage

Chanaka A.
Chanaka A.
Civil Engineer in Sri Lanka
Verified LinkedIn User
Civil Engineering, 51-200 Employees
Used the Software for: 2+ years
Reviewer Source

Fast, Lightweight, efficient antivirus which is a must for any user

5 4 months ago

Comments: ESET is the fastest and most efficient security tool among many others and I'm telling this from experience. This will work on any device even if it's got lower performance without overloading the device. Just try this and you will understand why this is one of the best in the market right now. Detection engine is capable of identifying many threats which are missed from similar tools.

Pros:

I started using ESET few years back and instantly I felt an improvement from all the antivirus software I used during my time. ESET was fast and had minimal impact on overall performance on computer while detecting many threats other tools could not detect. With constant updates and user friendly UI, I feel it's the most comfortable tool I have used. Quite customizable with excluding locations, custom firewall, and specially the gaming mode where it improves overall performance of computer was splendid. As a user for many years ESET came up with many good features like email protection, banking protection, and a own blacklist to enhance users' security.

Cons:

I used ESET for many years but I have rarely seen faults in ESET. But I think constant notifications reminding to update and lower downloading speed for updates even when a stable and speed internet connection is available can be stated as the areas where I think ESET need to improve.