Standard and Enterprise Editions Comparison Chart


This page summarizes the full list of functionality offered by Ekran System, and shows which of these features are available in the Standard and Enterprise editions of the product.

NOTE: The Enterprise Edition features are only available if you have an activated serial key for the Enterprise Edition of Ekran System.


Feature

Standard Edition

Enterprise Edition

Functionality and Security

AES 256 encryption

Yes

Yes

Floating endpoint licenses

Yes

Yes

Protected mode

Yes

Yes

Password hiding during monitoring

Yes

Yes

Audit trail for system users

Yes

Yes

VDI golden images

Yes

Yes

Non-persistent VDI monitoring support

Yes

Yes

SIEM Integration

Yes

Detection of disconnected Clients

Yes

Hardware Security Module (HSM) support

Yes

Anonymizer

Yes

Deployment and Maintenance

On-premises deployment

Yes

Yes

Remote Client installation/uninstallation/updating

Yes

Yes

Updating endpoint Clients from the Application Server

Yes

Yes

MS SQL and PostgreSQL database support

Yes

Yes

Database cleanup

Yes

Yes

High availability and disaster recovery

Yes

Multi-Tenant mode

Yes

System health monitoring

Yes

Yes

Database archiving

Yes

Load balancer support

Yes

Basic Functionality

Integration with Active Directory

Yes

Yes

Access to the Management Tool using Smart Cards

Yes

Yes

Offline mode support for Clients

Yes

Yes

Product customization

Yes

Yes

Registering logs to the Windows Event log 

Yes

Ekran System API

Yes

Yes

Activity Monitoring

Session recording in video format

Yes

Yes

Live session viewing

Yes

Yes

Multi-monitor recording

Yes

Yes

Web pages & applications

Yes

Yes

Clipboard (copy and paste)

Yes

Yes

Keystroke logging

Yes

Yes

Keyword-triggered monitoring

Yes

Yes

USB device monitoring

Yes

Yes

Linux console commands and parameters

Yes

Yes

The Master Panel

Yes

Yes

Monitoring only during specified time periods (work hours)

Yes

Yes

File monitoring

Yes

SWIFT username monitoring

Yes

Monitoring of Linux sessions that use X Window System

Yes

Yes

Monitoring of Linux sessions that use X Forwarding

Yes

Yes

Filtering While Monitoring

Application filtering

Yes

Yes

User filtering

Yes

Yes

IP address filtering

Yes

Incident Response Functionality

Proactive real-time alerts and notifications

Yes

Yes

Out-of-the box alert templates

Yes

Yes

Blocking restricted USB devices

Yes

Yes

Blocking users

Yes

Yes

User behavior analytics & anomaly detection (UEBA)

Yes

Password Management

Password management to access Windows servers

Yes

Password management to access Linux/Unix servers (passwords and SSH keys)

Yes

Password management to access MS SQL

Yes

Password management to access web applications

Yes

RDP/PuTTY support

Yes

Role-based access control

Yes

Remote password rotation (Active Directory, MS SQL, Windows accounts, and SSH Keys)

Yes

Application Credentials Broker (Ekran System ACB)

Yes

Password checkout

Yes

Access Management

Secondary user authentication to identify users of shared and built-in accounts

Yes

Yes

Multi-factor authentication 

Yes

Yes

Time-based restrictions for user access

Yes

Approval Workflow

Request access

Yes

Yes

Require comment

Yes

Yes

Request access to plugged-in USB devices or mobile devices

Yes

One-time passwords (OTP)

Yes

Ticketing system integration

Yes

Enhanced Auditing and Reporting

Multi-parameter search in monitoring results

Yes

Yes

Search by metadata

Yes

Yes

Search inside Linux session output

Yes

Yes

Responsive & actionable dashboards

Yes

Yes

Scheduled & ad-hoc reports

Yes

Yes

Forensic session export and validation

Yes

Yes

Alerts events in monitoring results

Yes

Yes

Integration with Microsoft Power BI

Yes

Yes