Standard and Enterprise Editions Comparison Chart


This page summarizes the full list of functionality offered by Ekran System, and shows which of these features are available in the Standard and Enterprise editions of the product.

NOTE: The Enterprise Edition features are only available if you have an activated serial key for the Enterprise Edition of Ekran System.


Feature

Standard Edition

Enterprise Edition

Functionality and Security

AES 256 encryption

Floating endpoint licenses

Protected mode

Password hiding during monitoring

Audit trail for system users

VDI golden images

Non-persistent VDI monitoring support

SIEM Integration

Detection of disconnected Clients

Deployment and Maintenance

On-premises deployment

Remote Client installation/uninstallation/updating

Updating endpoint Clients from the Application Server

MS SQL and PostgreSQL database support

Database cleanup

High availability and disaster recovery

Multi-Tenant mode

System health monitoring

Database archiving

Load balancer support

Basic Functionality

Integration with Active Directory

Access to the Management Tool using Smart Cards

Offline mode support for Clients

Product customization

Registering logs to the Windows Event log 

Activity Monitoring

The Master Panel

Session recording in video format

Live session viewing

Multi-monitor recording

Web pages & applications

Clipboard (copy and paste)

Keystroke logging

Keyword-triggered monitoring

USB device monitoring

Monitoring only during specified time periods (work hours)

File monitoring

SWIFT username monitoring

Filtering While Monitoring

Application filtering

User filtering

IP address filtering

Incident Response Functionality

Proactive real-time alerts and notifications

Out-of-the box alert templates

Blocking restricted USB devices

Blocking users

User behavior analytics & anomaly detection (UEBA)

Password Management

Password management to access Windows servers

Secrets management to access Linux/Unix servers (passwords and SSH keys)

Password management to access MS SQL

Password management to access web applications

RDP/PuTTY support

Role-based access control

Remote password rotation (Active Directory, MS SQL, Windows accounts, and SSH Keys)

Access Management

Secondary user authentication to identify users of shared and built-in accounts

Multi-factor authentication 

Time-based restrictions for user access

Approval Workflow

Request access

Require comment

Request access to plugged-in USB devices or mobile devices

One-time passwords (OTP)

Ticketing system integration

Enhanced Auditing and Reporting

Multi-parameter search in monitoring results

Search by metadata

Search inside Linux session output

Responsive & actionable dashboards

Scheduled & ad-hoc reports

Forensic session export and validation