Ekran System Features chart

 

Our features are among the reasons security professionals consider Ekran System the best insider threat protection platform in the market. Check out our features below.

 

Feature
Standard Edition
Enterprise Edition
Functionality and Security
AES 256 encryption

checked-icon

checked-icon

Endpoint floating license support

checked-icon

checked-icon

Protection from Client settings modification

checked-icon

checked-icon

Password hiding during monitoring

checked-icon

checked-icon

Audit trail for system users

checked-icon

checked-icon

VDI golden images

checked-icon

checked-icon

Non-persistent VDI monitoring

checked-icon

checked-icon

SIEM Integration

minus-icon

checked-icon

Offline Clients detection (“Lost” Clients)

checked-icon

checked-icon

Deployment & Maintenance
On-premises deployment

checked-icon

checked-icon

Remote installation/uninstallation/update of Clients

checked-icon

checked-icon

Centralized update of endpoint Clients

checked-icon

checked-icon

MS SQL and PostgreSQL database support

checked-icon

checked-icon

Database cleanup

checked-icon

checked-icon

High availability and disaster recovery

minus-icon

checked-icon

Multi-tenant mode

minus-icon

checked-icon

System health monitoring

checked-icon

checked-icon

Database archiving

minus-icon

checked-icon

Basic Functionality
Integration with Active Directory

checked-icon

checked-icon

Access to Management Panel via Smart Cards 

checked-icon

checked-icon

Offline work mode Clients 

checked-icon

checked-icon

Product customization

checked-icon

checked-icon

Register logs to the Windows Event Log

minus-icon

checked-icon

Activity Monitoring
Session recording in video format

checked-icon

checked-icon

Live session view

checked-icon

checked-icon

Multi-monitor recording

checked-icon

checked-icon

Web pages and applications

checked-icon

checked-icon

Clipboard (copy and paste)

checked-icon

checked-icon

Keystroke logging

checked-icon

checked-icon

Keyword-triggered monitoring

checked-icon

checked-icon

USB storage monitoring

checked-icon

checked-icon

Linux console commands and parameters

checked-icon

checked-icon

Audio recording

minus-icon

checked-icon

File monitoring

minus-icon

checked-icon

Monitoring only during specified time intervals (work hours)

minus-icon

checked-icon

SWIFT username monitoring

minus-icon

checked-icon

Filtering during Monitoring
Application filtering

checked-icon

checked-icon

User filtering

checked-icon

checked-icon

IP filtering

minus-icon

checked-icon

Incident Response Functionality
Pro-active real-time alerts and notifications

checked-icon

checked-icon

Out-of-the-box alert templates

checked-icon

checked-icon

Blocking restricted USB devices

checked-icon

checked-icon

User blocking

checked-icon

checked-icon

Behavior analytics and anomaly detection 

minus-icon

checked-icon

Password Management
Password management to access Windows servers (sharing account)

minus-icon

checked-icon

Password management to access Linux servers (sharing account)

minus-icon

checked-icon

SSH Key Management

minus-icon

checked-icon

RDP/PuTTY support

minus-icon

checked-icon

Role-based access control

minus-icon

checked-icon

Remote Password Rotation (Active Directory and Windows Accounts)

minus-icon

checked-icon

Access Management
Secondary authentication to identify users of shared and built-in accounts

checked-icon

checked-icon

Multi-factor authentication

checked-icon

checked-icon

Time-based user access restrictions

minus-icon

checked-icon

Approval Workflow
Request access

checked-icon

checked-icon

Require comment

checked-icon

checked-icon

Request access to USB mass storage and mobile device

minus-icon

checked-icon

One-time passwords (OTP)

minus-icon

checked-icon

Ticketing system integration

minus-icon

checked-icon

Enhanced Auditing and Reporting
Multi-parameter search in the monitoring results

checked-icon

checked-icon

Search by metadata

checked-icon

checked-icon

Search inside Linux session output

checked-icon

checked-icon

Responsive and actionable dashboards

checked-icon

checked-icon

Scheduled and ad-hoc reports

checked-icon

checked-icon

Export session

checked-icon

checked-icon