Supported Platforms

 

Ekran System® is a platform that allows you to monitor various types of end-points and get access to all those records via a single pane of glass.

 

The product supports the most complete set of platforms:

 

 

Ekran System Web Management Console is your insider security monitoring center with quick access to alerts, monitored and live sessions, and reporting tools.

 

 

 

Windows desktop

Windows 10

Windows 8.1

Windows 8

Windows 7

Windows Vista

macOS

Windows Server 2019

Windows Server 2016

Windows Server 2012

Linux ssh session monitoring

macOS Big Sur 11

macOS Catalina 10.15

macOS Mojave 10.14

macOS High Sierra 10.13

macOS Sierra 10.12

Linux SSH sessions

Linux kernel 2.6.32 and higher

Oracle Solaris 11.x – 10.x

IBM AIX 7.2, 7.1

Windows desktop user session monitoring

Ubuntu 20.04 LTS, 18.04.1 LTS, 16.04.5 LTS, 16.04.2, 14.04.5 LTS, 14.04.2, and 12.04.1, 14.04 LTS

Red Hat 7.0 – 7.6, 6.0 – 6.10

CentOS 7.1 – 7.5, 6.1 – 6.9

Suse Linux Enterprise Server 12 (SP1, SP2, SP3

Activity Monitoring

Session recording in video format

blue_tick

blue_tick

blue_tick

blue_tick

blue_tick

Offline mode support for Clients

blue_tick

blue_tick

blue_tick

blue_tick

blue_tick

Live session viewing

blue_tick

blue_tick

blue_tick

blue_tick

blue_tick

Multi-monitor recording

blue_tick

blue_tick

blue_tick

blue_tick

Web pages and applications

blue_tick

blue_tick

blue_tick

blue_tick

Clipboard (copy and paste)

blue_tick

blue_tick

Keystroke logging

blue_tick

blue_tick

Keyword-triggered monitoring

blue_tick

blue_tick

USB device monitoring

blue_tick

blue_tick

Linux console commands and parameters

blue_tick

blue_tick

Audio recording

blue_tick

blue_tick

File monitoring

blue_tick

blue_tick

Monitoring only during specified time periods (work hours)

blue_tick

blue_tick

blue_tick

Filtering during Monitoring

Application filtering

blue_tick

blue_tick

User filtering

blue_tick

blue_tick

blue_tick

blue_tick

IP address filtering

blue_tick

blue_tick

Incident Response Functionality

Proactive real-time alerts and notifications

blue_tick

blue_tick

blue_tick

blue_tick

blue_tick

Blocking restricted USB devices

blue_tick

blue_tick

Blocking users

blue_tick

blue_tick

User behavior analytics & anomaly detection (UEBA)

blue_tick

blue_tick

blue_tick

blue_tick

blue_tick

Access Management

Secondary user authentication to identify users of shared and built-in accounts

blue_tick

blue_tick

Multi-factor authentication

blue_tick

blue_tick

blue_tick

Time-based restrictions for user access

blue_tick

blue_tick

blue_tick

Privileged user accounts and session management (PASM)

blue_tick

Approval Workflow

Request access

blue_tick

blue_tick

Require comment

blue_tick

blue_tick

Request access to plugged-in USB devices or mobile devices

blue_tick

blue_tick

One-time passwords (OTP)

blue_tick

Ticketing system integration

blue_tick

blue_tick

Enhanced Auditing and Reporting

Multi-parameter search in the monitoring results

blue_tick

blue_tick

blue_tick

blue_tick

blue_tick

Search by metadata

blue_tick

blue_tick

blue_tick

blue_tick

blue_tick

Search inside Linux session output

blue_tick

Responsive and actionable dashboards

blue_tick

blue_tick

blue_tick

blue_tick

blue_tick

Scheduled and ad-hoc reports

blue_tick

blue_tick

blue_tick

blue_tick

blue_tick

Forensic session export and validation

blue_tick

blue_tick

blue_tick

blue_tick

blue_tick

 

More

More

More

More

More