Functionality and Security |
AES 256 encryption | Yes | Yes |
Floating endpoint licenses | Yes | Yes |
Protected mode | Yes | Yes |
Password hiding during monitoring | Yes | Yes |
Audit trail for system users | Yes | Yes |
VDI golden images | Yes | Yes |
Non-persistent VDI monitoring support | Yes | Yes |
SIEM Integration | – | Yes |
Detection of disconnected Clients | – | Yes |
Hardware Security Module (HSM) support | – | Yes |
Anonymizer | – | Yes |
Deployment and Maintenance |
On-premises deployment | Yes | Yes |
Remote Client installation/uninstallation/updating | Yes | Yes |
Updating endpoint Clients from the Application Server | Yes | Yes |
MS SQL and PostgreSQL database support | Yes | Yes |
Database cleanup | Yes | Yes |
High availability and disaster recovery | – | Yes |
Multi-Tenant mode | – | Yes |
System health monitoring | Yes | Yes |
Database archiving | – | Yes |
Load balancer support | – | Yes |
Basic Functionality |
Integration with Active Directory | Yes | Yes |
Access to the Management Tool using Smart Cards | Yes | Yes |
Offline mode support for Clients | Yes | Yes |
Product customization | Yes | Yes |
Registering logs to the Windows Event log | – | Yes |
Ekran System API | Yes | Yes |
Activity Monitoring |
Session recording in video format | Yes | Yes |
Live session viewing | Yes | Yes |
Multi-monitor recording | Yes | Yes |
Web pages & applications | Yes | Yes |
Clipboard (copy and paste) | Yes | Yes |
Keystroke logging | Yes | Yes |
Keyword-triggered monitoring | Yes | Yes |
USB device monitoring | Yes | Yes |
Linux console commands and parameters | Yes | Yes |
The Master Panel | Yes | Yes |
Monitoring only during specified time periods (work hours) | Yes | Yes |
File monitoring | – | Yes |
SWIFT username monitoring | – | Yes |
Monitoring of Linux sessions that use X Window System | Yes | Yes |
Monitoring of Linux sessions that use X Forwarding | Yes | Yes |
Filtering While Monitoring |
Application filtering | Yes | Yes |
User filtering | Yes | Yes |
IP address filtering | – | Yes |
Incident Response Functionality |
Proactive real-time alerts and notifications | Yes | Yes |
Out-of-the box alert templates | Yes | Yes |
Blocking restricted USB devices | Yes | Yes |
Blocking users | Yes | Yes |
User behavior analytics & anomaly detection (UEBA) | – | Yes |
Password Management |
Password management to access Windows servers | – | Yes |
Password management to access Linux/Unix servers (passwords and SSH keys) | – | Yes |
Password management to access MS SQL | – | Yes |
Password management to access web applications | – | Yes |
RDP/PuTTY support | – | Yes |
Role-based access control | – | Yes |
Remote password rotation (Active Directory, MS SQL, Windows accounts, and SSH Keys) | – | Yes |
Application Credentials Broker (Ekran System ACB) | – | Yes |
Password checkout | – | Yes |
Access Management |
Secondary user authentication to identify users of shared and built-in accounts | Yes | Yes |
Multi-factor authentication | Yes | Yes |
Time-based restrictions for user access | – | Yes |
Approval Workflow |
Request access | Yes | Yes |
Require comment | Yes | Yes |
Request access to plugged-in USB devices or mobile devices | – | Yes |
One-time passwords (OTP) | – | Yes |
Ticketing system integration | – | Yes |
Enhanced Auditing and Reporting |
Multi-parameter search in monitoring results | Yes | Yes |
Search by metadata | Yes | Yes |
Search inside Linux session output | Yes | Yes |
Responsive & actionable dashboards | Yes | Yes |
Scheduled & ad-hoc reports | Yes | Yes |
Forensic session export and validation | Yes | Yes |
Alerts events in monitoring results | Yes | Yes |
Integration with Microsoft Power BI | Yes | Yes |