Logpoint and ESET Inspect are both robust cybersecurity solutions with distinct strengths, competing in the enterprise security market. Based on user reviews and data, Logpoint seems to have the upper hand in pricing and support, while ESET Inspect has a competitive edge in advanced threat detection and overall features.
Features: Logpoint is praised for its comprehensive analytics capabilities, customizable dashboards, and intuitive alerting system. ESET Inspect receives commendation for its advanced threat detection, seamless integration with other security tools, and detailed incident analysis.
Room for Improvement: Logpoint users suggest enhancements in reporting functionalities, faster data processing, and better performance stability. ESET Inspect users request more user-friendly configuration options, better scalability for large enterprises, and reduced complexity.
Ease of Deployment and Customer Service: Logpoint users appreciate the relatively straightforward deployment process and effective customer support. ESET Inspect's deployment can be complex, requiring more time and specialized knowledge, though customer service is well-rated and assists users in navigating the setup.
Pricing and ROI: Logpoint is considered affordable with a good return on investment, reflecting its competitive pricing and satisfactory performance. ESET Inspect, although more expensive, demonstrates significant ROI due to its high-level security features and effectiveness in mitigating threats.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.4% |
| ESET Inspect | 1.1% |
| Logpoint | 1.0% |
| Other | 94.5% |



| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 21 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Large Enterprise | 2 |
| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 3 |
| Large Enterprise | 4 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
ESET Inspect provides strong EDR capabilities with user-friendly operations and multilayered security for threat detection and response, supporting efficient management across multiple devices.
ESET Inspect enables organizations to manage security effectively through its lightweight connector, handling EDR/XDR services for vulnerability and attack management. It allows tracking of potential threats, including lateral movements and anomaly detection, and employs XML-based rules for customized filtering. The interface supports exception management and a learning mode, enhancing control over false positives. Performance, stability, and flexible deployment options add value to its comprehensive security approach.
What are the key features of ESET Inspect?ESET Inspect is often deployed by administrators in industries requiring stringent security management, such as IT services and business sectors with sensitive data handling. It is used for network monitoring, antivirus protections across desktops, laptops, and servers, allowing proactive responses to threats with built-in and regularly updated rules.
Logpoint offers a robust SIEM system tailored for compliance with regulations like PCI DSS and GDPR, enhancing security monitoring and enabling efficient incident response.
Logpoint strengthens cybersecurity by offering essential tools for log collection, security monitoring, and forensic analysis. Its features include an intuitive dashboard, a powerful correlation engine, and extensive third-party integrations, making it a versatile asset for security operations centers. Despite its advantages, areas for improvement include ransomware protection, cloud-native deployment, and more flexible pricing. Improvements in features like SOAR and UEBA functionality can boost its competitiveness.
What are the most important features of Logpoint?Many organizations utilize Logpoint across industries as part of their security infrastructure. It supports standard compliance, orchestrating incident responses and security threat monitoring. Logpoint empowers businesses by integrating and correlating security data, improving cybersecurity posture in varied environments.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.