Unlike competitors, Ekran uses a session video format that's easy to interpret. Whether it's an authorized, compromised, or backdoor account session and no matter the level of permissions, all sessions are fully recorded and all action context is captured.
Each user session is recorded with configurable video quality. Recording can be triggered and filtered or include each second from session start to finish.
A YouTube-like player with FF and Live Session View options enables effortless analysis.
Ekran System enables search by keywords (name of the application opened, command entered, or word typed) both within the current session and across all recorded sessions.
Unlike basic screen monitoring software, Ekran System captures a number of additional employee activity logs used to index session video records: current application name, opened URLs, executed Linux commands, keystrokes, and more.
Metadata facilitates session analysis, PC user activity monitoring, search, alerting, and reporting.
Ekran System employee computer monitoring software includes an advanced alert system capable of notifying you in real time about potentially dangerous events in your infrastructure and automatically responding.
Ekran System provides libraries of the most important alerts and allows you to build custom alerts using activity parameters such as user and application names, window titles, folder or file names, URLs visited, USB devices connected, keywords typed, and Linux commands and parameters entered. You can specify a risk level for each alert and it will be reflected in reporting and monitoring information.
For the most critical alerts, you can set up automated incident response actions. These include employee activity monitoring notifications for your security team, allowing them to detect and immediately analyze an issue; customizable warning messages for users who trigger alerts, requiring them to acknowledge their actions; user blocking; and killing of related applications and processes.
Any comprehensive employee monitoring system should audit USB device usage. Ekran System not only logs and alerts about various USB device connections but can also block them with rules, whitelists, and blacklists.
Ekran System offers advanced productivity monitoring functionality to help you get a comprehensive view of your employees’ performance. With Ekran’s employee productivity tracking software, you can efficiently monitor your staff’s productivity, receive scheduled reports, and set alerts to prevent security incidents.
Use Ekran System’s employee productivity monitoring software to track the active and idle time of employees. This allows you to determine downtime with no user input and get valuable insights into how much time your employees actually spend actively working. You can even configure a schedule to automatically receive productivity reports on a daily, weekly, or monthly basis.
Leverage the power of user activity reports to determine which applications are used by which users or groups of users at a specific time. You can also request deeper insights like the duration of work for each application and try URL reports to compare how much time employees spend on work-related websites compared to social media and other entertainment resources.
Ekran System’s software for employee monitoring automatically sends notifications to managers when an employee launches an unwanted application or accesses a restricted website, allowing the manager to review the flagged session. This allows you to efficiently prevent inappropriate use of the internet and eliminate security risks.
Ekran System’s software to monitor employees provides powerful identity and access management capabilities for critical endpoints. Its toolset allows you to improve user identity verification, organize granular access, deliver and manage temporary credentials, and reinforce purpose-based access principles.
Build a robust identity confirmation process for your critical endpoints with embedded two-factor authentication solutions based on credentials and confirmation codes from users’ mobile devices.
Implement one-time passwords to organize emergency access and manage day-to-day access to your most critical endpoints. This functionality allows a security officer to generate a unique temporary password granting server access and send it to a user. Another option is to generate a one-time password at a user’s request via a form during the login procedure. All requests are then logged and manually processed by security experts, who decide whether to approve or deny temporary access.
The PAM module in Ekran System is developed according to NIST standards and helps manage access privileges on jump servers. With this toolset enabled on a jump box as an entry point, you can configure access rules to specific endpoints within a protected perimeter and securely store and manage the credentials of shared privileged accounts.
Ekran System is an employee activity monitor that delivers session recording and activity audit as well as identity and access management by means of a single lightweight software agent installed on an endpoint. Ekran can entirely support your insider threat program since it’s built in accordance with NIST 800-53 and most IT security standards.
Ekran System supports all popular operating systems, virtualization solutions, and network architectures. With Ekran System, you don't have to choose between agent-based and jump server schemes: we support any combination.
Designed to work on tens of thousands of endpoints, Ekran System demonstrates exceptional stability and performance. The platform provides several important feature sets to support large-scale projects, such as high availability, multi-tenancy, system resource and health monitoring dashboards, and automated maintenance tasks.
The unique licensing offered by Ekran System enables cost-effective deployments of any size, from small pilots to enterprise projects. Floating endpoint licensing enables license reassignment in a couple of clicks. For virtual environments, this process is automated.
Cybercriminals are constantly improving their ways of compromising privileged accounts. Powered by artificial intelligence, the Ekran UEBA system can detect a hacker who has penetrated a corporate system using stolen credentials.
Ekran System is quick to install and easily integrates with SIEM and ticketing systems. You’ll get a ready-to-use solution right after a coffee break.
The lightweight agent works silently and isn’t noticeable to users or other programs. Collected data is saved in searchable and highly optimized video, audio, and text file formats for compact log storage and easy reporting.
Ekran System employee tracking software integrates with your infrastructure, including with leading SIEM and ticketing systems.
What we like the most about the Ekran is how easy it was to get started. The communication with the team is both smooth and efficient. Also, the support received from Ekran System team, both informational and technical, has always been very prompt and helpful.
Ekran System provides a great solution for customers that need a session recording and activity audits, as well as incident response functionality to detect and prevent insider threats.
As a Managed Service Provider we are responsible for our customers' servers but aren't the only ones with access and often well intentioned 3rd parties cause disruption with unauthorised changes. Ekran gives us peace of mind that all actions carried out on the server are recorded and we can quickly identify & rectify issues. It's like having CCTV for your server and in these times of a need for heightened security and auditing this is perfect for the job.
Our cloud based centralised management console makes it easy for us to monitor all our customers in one place, which is great for a MSP as we can quickly deploy this to customers with minimal, if any, changes to their network or infrastructure.
Ekran gives me confidence when working with external service providers, resolves concerns about using such services we had in the past. The system monitors suppliers and if there is any concern, I can track everything.
Ekran System has become a great choice to record and audit user actions in our infrastructure. It delivers a powerful and flexible toolset; moreover, the Ekran team was ready to customize the platform for our needs adding several new features.
Ekran System provides a great solution that protects sensitive data and improves productivity where required. The software records sessions which gives us full context and visibility of IT infrastructure and provides us with added protection. The user activity reports also are very helpful and enhance security and productivity.
User activity monitoring software allows you to track user activity within your corporate network, across devices, and throughout your entire IT infrastructure. With user activity tracking tools, you can identify which applications, sites, and data users access and how they interact with them.
With a user activity monitoring solution, you can strengthen your current cybersecurity, protect confidential data from malicious users, and enhance insider risk management.
The goal of implementing a user activity tracking application is to prevent insider threats. Using activity tracking software, you can identify suspicious activity and reduce the risk of a cybersecurity incident. You can also use such software to track employees’ active and idle time to monitor employee performance.
Main reasons to monitor user activities:
Yes. Digital user monitoring is legal, but it’s regulated by legislation.
To know how to monitor user activity legally, you should check with applicable laws within your jurisdiction. Typically, legislation requires businesses to inform users of monitoring and receive their consent.
If your organization operates in the US, you should pay attention to both federal and state laws, as state laws can have their own requirements. For example, businesses that operate in Connecticut and Delaware don’t have to notify employees about email or internet monitoring. Meanwhile, employers in Colorado and Tennessee must create written email monitoring policies.
Ekran System is a powerful insider threat management platform that ensures comprehensive user activity monitoring.
In particular, Ekran System monitors user activities in real time and makes video and audio recordings of user sessions so you can watch them later if needed. All records are searchable. Thus, you can find out whether a user has accessed certain data, launched specific applications, or visited particular websites during working hours.
Also, Ekran System continues monitoring user activity even if the internet connection goes down.
No. Ekran System does not influence the user experience. It monitors user activity smoothly without disturbing users.
However, Ekran may interrupt a user’s work if the user acts suspiciously. According to customizable rules, users can receive notifications explaining that a particular action violates cybersecurity policies. Also, your security admins can automatically or manually block suspicious sessions, users, and actions as needed.
When monitoring user activity on an organization’s network, Ekran System gathers the necessary data and stores it securely using military-grade encryption. Ekran System doesn’t store passwords entered by monitored users.
Ekran System offers more than just monitoring. Using this platform, you can:
As a robust insider threat management platform, Ekran System can easily be adjusted to the specific needs of your organization.
For example, you can receive automatic custom reports on a convenient schedule. Also, in case an incident occurs, you can quickly export a full monitored session or a fragment of a session into an independent file.
Ekran System is on-premise software that supports various deployment options. You can install Ekran System Client on each endpoint or install just one Ekran System Terminal Server Client on a jump server to ensure user activity monitoring of all sessions that come through your server.
Installation is easy and takes less than an hour. If you have any questions or doubts during the process, our 24/7 customer support team will be there for you.
That's what they're supposed to do, right? This is one of the major reasons why it's complicated to detect and investigate security incidents related to high-risk inside actors.
The most devastating and most covert attacks on the modern cybersecurity landscape originate from insiders who have access, know the ins and outs of the corporate infrastructure, and perform thousands of operations with data and configurations every day.
Share of insider-driven data breaches in the last 12 months * *According to the 2019 Data Breach Investigations Report from Verizon
** 2020 Cost of Insider Threats: Global
Organizations report by the Ponemon Institute
Total average cost of insider-related incidents over a 12-months period = $11.45 million.
36% of all data breaches in the financial sector are driven by an internal actor.*
59% of all data breaches in healthcare are driven by an internal actor.*
30% of all data breaches in public administration are driven by an internal actor.*
* According to the Verizon 2019 Data Breach Investigation Report
The out-of-the-box version of Ekran System supports on-premise and SaaS deployment.
We’re a universal employee monitoring solution that supports activity tracking on bastion hosts, infrastructure and terminal servers, and desktops.
Ekran System applies highly optimized formats to store session recordings and metadata. The platform is also optimized in terms of bandwidth usage. You can see actual performance numbers and basic hardware requirements for some typical deployments in our technical documentation.
Ekran System supports virtual desktop employee activity monitoring, such as Hyper-V, VMware, and Citrix Session.
Ekran System isn’t spyware, so it doesn’t support hiding. Although Ekran System agents are visible, we deliver the best client protection mechanisms on the market, making our software unstoppable even for privileged users.
Ekran System captures all keystrokes and even clipboard content. They’re hidden in the session recordings so security specialists can’t see sensitive data such as passwords in plain text. At the same time, all keystroke logs are searchable.
Our Linux clients capture entered exec* and sudo commands with all their parameters as well as content of all started scripts.