Skip to main content

Set a meeting with us at RSA Conference 2024

6-9 May 2024

|

Moscone Center

Meet With Us

Proofpoint vs Veriato vs Ekran System®

In this product review, we compare three alternatives: Ekran System, Veriato vs. Proofpoint. We try to determine reasons to choose these solutions, their strong suits, and their drawbacks with an emphasis on highlighting differences between them.

Product review: Summary

Each of the three solutions in this comparison presents different features and benefits, with each vendor targeting a slightly different audience.

Proofpoint provides large companies with an advanced insider threat detection toolset that includes monitoring and alerting tools. However, there are limited access management tools. Current Proofpoint pricing makes this system cost-prohibitive for smaller businesses, and plans to implement a subscription model have companies of all sizes looking for alternatives.

Veriato is an affordable solution that focuses on employee monitoring, performance review, and insider threat detection by employing user behavior analytics. But it doesn’t offer much in terms of incident response. Some Veriato reviewers also say it can have scalability issues with large deployments and that the product impacts server performance.

Ekran System provides a robust and stable feature set making it an easy recommendation for both SMBs and large companies. Its comprehensive user activity monitoring, identity and access management, multi-tenancy support, action logging, and incident response capabilities make Ekran System a strong Proofpoint and Veriato alternative for and insider threat protection.

At the end of 2019, Proofpoint was acquired by cybersecurity company Proofpoint. So far, Proofpoint has not declared plans to change the feature set of this product. However, Proofpoint has already announced a change to the Proofpoint pricing model from a lifelong license to a subscription.

Veriato has renamed Veriato 360 to Veriato in order to highlight its artificial intelligence tools for insider threat detection.

Market and Focus Overview


Proofpoint, Veriato, and Ekran System are close competitors using the similar technical approach. But each has a different feature set and licensing model that we’ll look at in more detail.

Description

Insider threat management platform

Insider threat management platform

Employee monitoring and insider threat detection platform

Target audience

Businesses of all sizes

Large enterprises

Businesses of all sizes

Technical approach

Agent-based software

Agent-based software

Agent-based software

Deployment

  • Agent-based deployment (Windows agents can be installed remotely)
  • Jump server deployment
  • Optimized for virtual environments
  • Agent-based deployment
  • Jump server deployment

Agent-based deployment

Maintenance

  • Remote installation/uninstallation of clients
  • Manual control panel updates
  • Centralized endpoint client updates
  • System health monitoring
  • Database cleanup
  • History archiving
  • Manual control panel updates
  • System health monitoring
  • Database cleanup
  • History archiving
  • Remote installation/uninstallation of clients
  • Manual control panel updates
  • Database cleanup

Price

$

$$$

$$

Licensing

  • Based on number of monitored endpoints
  • Several licensing tiers

Yearly subscription

Based on number of monitored endpoints

Pricing and Deployment


Proofpoint pricing

The Proofpoint price list is currently the most expensive of these three solutions. Since 2020, Proofpoint has charged a yearly subscription fee (instead of a one-time fee for a permanent license). The high subscription price makes the total cost of ownership too much for companies with small or medium-sized deployments.

Deploying Proofpoint may be tricky without online support of a product expert. Also, deploying and updating this product requires an internet connection. Once deployed, Proofpoint licenses live with agents.

Ekran System and Veriato Pricing

Feature and Usage Scenario Overview


Monitoring

  • Video recording of everything users see on the screen
  • Audio recording
  • Extensive metadata collection to index video
  • Linux SSH session support
  • USB device connection logging
  • USB mass storage connection logging
  • File activity monitoring
  • Records protected from tampering
  • Advanced report generation system
  • User anonymization
  • Video recording of everything users see on the screen
  • Extensive metadata collection to index video
  • Linux SSH session support
  • USB mass storage connection logging
  • File activity monitoring
  • Records protected from tampering
  • Email monitoring
  • Advanced report generation system
  • User anonymization
  • Video recording of everything users sees on their screen
  • Separate logs of various metadata: email, URLs, file monitoring, etc.
  • USB mass storage connection logging
  • Advanced report generation system
  • Email monitoring

Incident response features

  • Real-time alerts
  • Custom alerts
  • Predefined alerts
  • Live session view
  • Forced user messaging
  • Kill process on alert / block user on alert
  • Automatic USB device blocking
  • User behavior analytics
  • Real-time alerts
  • Custom alerts
  • Rule-based behavior analysis
  • Live session view
  • Forced user messaging
  • Kill process on alert / block user on alert
  • Alerting on connection of a USB storage device or mobile phone
  • User behavior analytics and risk scoring
  • Customizable alert system
  • Language sentiment analysis
  • Live session view
  • Kill process on alert / block user on alert
  • User behavior analytics and risk scoring

Access management

  • Secondary authentication for identifying users of shared accounts
  • Access request functionality
  • Two-factor authentication
  • One-time passwords
  • Time-based user access restrictions
  • Privileged account and session management (PASM)
  • Password sharing

Secondary authentication for identifying users of shared accounts

Secondary authentication for identifying users of shared accounts

Integrations

  • Active Directory
  • SIEM
  • Ticketing systems
  • Active Directory
  • SIEM
  • Ticketing systems
  • Active Directory
  • SIEM

Additional benefits

  • Forensic export
  • Flexible endpoint licensing scheme
  • Highly optimized performance and stability
  • Support for MS SQL and PostgreSQL
  • Support for free and commercial databases
  • Specifically catered to work in virtual environments
  • Multi-tenancy support
  • Protected client
  • Driver-level uninstall protection
  • Forensic export
  • Support for MS SQL databases

Flexible licensing scheme

Access an Ekran System® demo now!

Clients from 70+ countries already use Ekran System

Recording Functionality


Ekran System, Proofpoint, and Veriato all use a similar agent-based architecture.

They provide video recordings of everything a user sees on the screen without any limitations for any target endpoint where the monitoring agent is installed. In addition, Ekran System records audio input and output.

The resulting recordings contain indexed video and searchable metadata including:

  • keystrokes
  • web pages and applications
  • executed commands and scripts
  • connected devices

The main difference between Veriato vs Proofpoint and Ekran System lies in how they treat their data streams. While Ekran System and Proofpoint present video as the main data stream – accompanied by relevant synchronized metadata – Veriato presents all data equally, with video serving mainly as an illustration of the larger metadata. Also, Veriato stores all recorded metadata in the form of separate logs.

All three solutions use different algorithms for data compression and storage. Ekran System can either save records with the original screen resolution or compress them. This efficiently uses storage space, as it allows for saving the master image and deltas. The records data structure is optimized to ensure fast insertion and deletion of records with any number of active sessions. Also, records of each session are encrypted with a unique session key.

Proofpoint saves disk space by dividing the screen into nine parts and storing those records independently. There’s no need to save recordings of static parts of the screen. However, such an approach slows down the deletion, transfer, and archiving of data because several records can refer to the same screenshot.

Veriato compresses screen records and stores them in a default format.

Incident Response Features


Incident response functionality differs significantly different between Ekran System and Proofpoint vs Veriato.

Alerting

While Veriato features customizable alerts, allowing for efficient insider threat detection, it does not provide much in the form of incident response tools.

All three solutions have UEBA modules for user behavior analytics. Proofpoint uses this feature to display statistics on the main dashboard. Ekran System detects abnormal user activity and alerts a security officer about it.

USB Management

Access Management

Veriato, Proofpoint, and Ekran System all allow you to clearly distinguish between users of shared accounts by employing additional authentication measures.

  • Secondary authentication to positively identify users of shared accounts
  • Access request functionality to manually provide access to the most critical resources
  • Time-based user access restrictions to limit interactions with critical resources
  • Password sharing to secure credentials management

Let’s get the conversation started

Contact our team to learn how our insider risk management software can safeguard your organization’s data from any risks caused by human factors. Book a call with us at a time that suits you best, and let’s explore how we can help you achieve your security goals.