Ekran System Features chart

 

Ekran System’s wide-ranging and comprehensive set of features are among the reasons security professionals consider Ekran System the best insider threat protection platform in the market. Check out our list of features below.

 

Feature
Standard Edition
Enterprise Edition
Functionality and Security
AES 256 encryption

checked-icon

checked-icon

Floating endpoint licenses

checked-icon

checked-icon

Protected mode

checked-icon

checked-icon

Password hiding during monitoring

checked-icon

checked-icon

Audit trail for system users

checked-icon

checked-icon

VDI golden images

checked-icon

checked-icon

Non-persistent VDI monitoring support

checked-icon

checked-icon

SIEM Integration

minus-icon

checked-icon

Detection of disconnected Clients

minus-icon

checked-icon

Support of Hardware Security Module (HSM)

minus-icon

checked-icon

Anonymizer

minus-icon

checked-icon

Deployment & Maintenance
On-premises deployment

checked-icon

checked-icon

Remote installation/uninstallation/updating

checked-icon

checked-icon

Updating endpoint Clients from the Application Server

checked-icon

checked-icon

MS SQL and PostgreSQL database support

checked-icon

checked-icon

Database cleanup

checked-icon

checked-icon

High availability and disaster recovery

minus-icon

checked-icon

Multi-tenant mode

minus-icon

checked-icon

System health monitoring

checked-icon

checked-icon

Database archiving

minus-icon

checked-icon

Load balancer support

minus-icon

checked-icon

Basic Functionality
Integration with Active Directory

checked-icon

checked-icon

Access to the Management Tool using Smart Cards

checked-icon

checked-icon

Offline mode support for Clients

checked-icon

checked-icon

Product customization

checked-icon

checked-icon

Registering logs to the Windows Event log

minus-icon

checked-icon

Ekran System API

checked-icon

checked-icon

Activity Monitoring
Session recording in video format

checked-icon

checked-icon

Live session viewing

checked-icon

checked-icon

Multi-monitor recording

checked-icon

checked-icon

Web pages and applications

checked-icon

checked-icon

Clipboard (copy and paste)

checked-icon

checked-icon

Keystroke logging

checked-icon

checked-icon

Keyword-triggered monitoring

checked-icon

checked-icon

USB device monitoring

checked-icon

checked-icon

Linux console commands and parameters

checked-icon

checked-icon

The Master Panel

checked-icon

checked-icon

Monitoring only during specified time periods (work hours)

checked-icon

checked-icon

File monitoring

minus-icon

checked-icon

Audio recording

minus-icon

checked-icon

SWIFT username monitoring

minus-icon

checked-icon

Monitoring of Linux sessions that use X Window System Protocol

checked-icon

checked-icon

Monitoring of Linux sessions that use X Forwarding

checked-icon

checked-icon

Filtering during Monitoring
Application filtering

checked-icon

checked-icon

User filtering

checked-icon

checked-icon

IP address filtering

minus-icon

checked-icon

Incident Response Functionality
Proactive real-time alerts and notifications

checked-icon

checked-icon

Out-of-the-box alert templates

checked-icon

checked-icon

Blocking restricted USB devices

checked-icon

checked-icon

Blocking users

checked-icon

checked-icon

User behavior analytics & anomaly detection (UEBA)

minus-icon

checked-icon

Password Management
Password management to access Windows servers

minus-icon

checked-icon

Secrets management to access Linux/Unix servers (passwords and SSH keys)

minus-icon

checked-icon

Password management to access MS SQL

minus-icon

checked-icon

Password management to access web applications

minus-icon

checked-icon

RDP/PuTTY support

minus-icon

checked-icon

Role-based access control

minus-icon

checked-icon

Remote password rotation (Active Directory, MS SQL, Windows accounts, and SSH Keys)

minus-icon

checked-icon

Application Credentials Broker

minus-icon

checked-icon

Password Checkout

minus-icon

checked-icon

Access Management
Secondary user authentication to identify users of shared and built-in accounts

checked-icon

checked-icon

Multi-factor authentication

checked-icon

checked-icon

Time-based restrictions for user access

minus-icon

checked-icon

Approval Workflow
Request access

checked-icon

checked-icon

Require comment

checked-icon

checked-icon

Request access to plugged-in USB devices or mobile devices

minus-icon

checked-icon

One-time passwords (OTP)

minus-icon

checked-icon

Ticketing system integration

minus-icon

checked-icon

Enhanced Auditing and Reporting
Multi-parameter search in the monitoring results

checked-icon

checked-icon

Search by metadata

checked-icon

checked-icon

Search inside Linux session output

checked-icon

checked-icon

Responsive and actionable dashboards

checked-icon

checked-icon

Scheduled and ad-hoc reports

checked-icon

checked-icon

Forensic session export and validation

checked-icon

checked-icon

Alerts tab in the monitoring results

checked-icon

checked-icon

Integration with Microsoft Power BI

checked-icon

checked-icon