Feature
|
|
|
Functionality and Security |
AES 256 encryption |

|

|
Floating endpoint licenses |

|

|
Protected mode |

|

|
Password hiding during monitoring |

|

|
Audit trail for system users |

|

|
VDI golden images |

|

|
Non-persistent VDI monitoring support |

|

|
SIEM Integration |

|

|
Detection of disconnected Clients |

|

|
Support of Hardware Security Module (HSM) |

|

|
Anonymizer |

|

|
Deployment & Maintenance |
On-premises deployment |

|

|
Remote installation/uninstallation/updating |

|

|
Updating endpoint Clients from the Application Server |

|

|
MS SQL and PostgreSQL database support |

|

|
Database cleanup |

|

|
High availability and disaster recovery |

|

|
Multi-tenant mode |

|

|
System health monitoring |

|

|
Database archiving |

|

|
Load balancer support |

|

|
Basic Functionality |
Integration with Active Directory |

|

|
Access to the Management Tool using Smart Cards |

|

|
Offline mode support for Clients |

|

|
Product customization |

|

|
Registering logs to the Windows Event log |

|

|
Ekran System API |

|

|
Activity Monitoring |
Session recording in video format |

|

|
Live session viewing |

|

|
Multi-monitor recording |

|

|
Web pages and applications |

|

|
Clipboard (copy and paste) |

|

|
Keystroke logging |

|

|
Keyword-triggered monitoring |

|

|
USB device monitoring |

|

|
Linux console commands and parameters |

|

|
The Master Panel |

|

|
Monitoring only during specified time periods (work hours) |

|

|
File monitoring |

|

|
Audio recording |

|

|
SWIFT username monitoring |

|

|
Monitoring of Linux sessions that use X Window System Protocol |

|

|
Monitoring of Linux sessions that use X Forwarding |

|

|
Filtering during Monitoring |
Application filtering |

|

|
User filtering |

|

|
IP address filtering |

|

|
Incident Response Functionality |
Proactive real-time alerts and notifications |

|

|
Out-of-the-box alert templates |

|

|
Blocking restricted USB devices |

|

|
Blocking users |

|

|
User behavior analytics & anomaly detection (UEBA) |

|

|
Password Management |
Password management to access Windows servers |

|

|
Secrets management to access Linux/Unix servers (passwords and SSH keys) |

|

|
Password management to access MS SQL |

|

|
Password management to access web applications |

|

|
RDP/PuTTY support |

|

|
Role-based access control |

|

|
Remote password rotation (Active Directory, MS SQL, Windows accounts, and SSH Keys) |

|

|
Application Credentials Broker |

|

|
Password Checkout |

|

|
Access Management |
Secondary user authentication to identify users of shared and built-in accounts |

|

|
Multi-factor authentication |

|

|
Time-based restrictions for user access |

|

|
Approval Workflow |
Request access |

|

|
Require comment |

|

|
Request access to plugged-in USB devices or mobile devices |

|

|
One-time passwords (OTP) |

|

|
Ticketing system integration |

|

|
Enhanced Auditing and Reporting |
Multi-parameter search in the monitoring results |

|

|
Search by metadata |

|

|
Search inside Linux session output |

|

|
Responsive and actionable dashboards |

|

|
Scheduled and ad-hoc reports |

|

|
Forensic session export and validation |

|

|
Alerts tab in the monitoring results |

|

|
Integration with Microsoft Power BI |

|

|