Software Alternatives, Accelerators & Startups

Box KeySafe VS ESET Endpoint Security

Compare Box KeySafe VS ESET Endpoint Security and see what are their differences

Box KeySafe logo Box KeySafe

With Box KeySafe, customers control their encryption keys through a partnership with AWS KMS (Key Management Services) and AWS CloudHSM.

ESET Endpoint Security logo ESET Endpoint Security

ESET internet security solutions deliver proactive, multi-layered protection, including antivirus, anti-phishing, exploit blocker and more, to protect the business from all known and emerging malware and threats.
  • Box KeySafe Landing page
    Landing page //
    2023-08-21
  • ESET Endpoint Security Landing page
    Landing page //
    2023-09-22

Category Popularity

0-100% (relative to Box KeySafe and ESET Endpoint Security)
Security Tools
100 100%
0% 0
Monitoring Tools
0 0%
100% 100
Security & Privacy
14 14%
86% 86
Office & Productivity
0 0%
100% 100

User comments

Share your experience with using Box KeySafe and ESET Endpoint Security. For example, how are they different and which one is better?
Log in or Post with

What are some alternatives?

When comparing Box KeySafe and ESET Endpoint Security, you can also consider the following products

Microsoft BitLocker - BitLocker is a full disk encryption feature included with Windows Vista and later.

Symantec Endpoint Encryption - Symantec Endpoint Encryption protects the sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.

VeraCrypt - VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.

LogMeIn Central - LogMeIn Central is a comprehensive endpoint management software that easily helps IT professionals manage and monitor their organization’s endpoint infrastructure.

FileVault - FileVault is a method of using encryption with volumes on Mac computers.

McAfee Endpoint Security - McAfee Endpoint Security speeds threat de-tection and remediation with antimalware, fast scanning, instant threat detection and updates, and maximized CPU performance.