Compare BrowseReporter vs Teramind vs Ekran System

You May Also Like

Featured products that are similar to the ones you selected below.

Insightful
 (95)
Employee Monitoring Software
Try for Free
View Listing Visit Website View Listing

Crozscore

77%
what is this?
no significant changes

Crozscore

85%
what is this?
interest rising

Crozscore

83%
what is this?
interest falling
BrowseReporter screenshot view 4 more Teramind screenshot view 5 more Ekran System screenshot view 3 more

About BrowseReporter

CurrentWare customers use BrowseReporter to monitor the internet use of employees, capture evidence of technology misuse, and generate data-driven reports for employee productivity coaching.

BrowseReporter operates from a centralized console, allowing administrators to easily configure monitoring policies based on users, devices, departments, and other organizational units.

Other Use Cases & Features:

  • Bandwidth tracking to identify network bottlenecks caused by unproductive video streaming
  • Offsite Management for monitoring employees working from home or offsite
  • Monitor the web activities of students, patrons, and employees as an aid for enforcing acceptable use policies & CIPA compliance
  • Reduce software costs by tracking software application usage for improved software license management
  • Enable real-time alerts to notify admins of suspicious or undesirable browsing behaviors

About Teramind

Teramind is a pioneer in User Behavior Monitoring, providing a user-centric approach to IT security. Our solution offers tailored analytics, alerts and bullet-proof forensics to help companies address the fastest growing security risk - the insider threat.

Our insider threat solution allows for:

  • Monitor employees, privileged users, remote users, contractors
  • Detecting & Blocking Malicious Activity
  • Live View & History Playback
  • Rule Based Risk Analysis
  • IT Forensics
  • Intelligent Session Mining

Our Employee Monitoring solution provides smart rules and automated alerts and monitors the following activities:

  • Instant Messages
  • Printed Document Tracking
  • Keystroke Logger
  • Website Monitoring
  • Application Monitoring
  • Email Monitoring
  • File Transfer Tracking

Teramind DLP provides additional data loss prevention features that allows companies to:

  • Protect sensitive data and IP
  • Define content-based rules
  • Define file-based rules
  • Leverage document fingerprinting to protect confidential information
  • Prevent malicious or negligent data exfiltration and data leaks
  • Ensure regulatory compliance involving GDPR, HIPAA, PIC DSS etc.

Teramind Mobile App for Android:

  • Get full visibility on the go with Teramind Dashboard
  • Summary reports, detailed metrics and live monitoring of individual endpoints

About Ekran System

Don't let human behavior put your data at risk. Protect your assets with our insider risk management platform!

Ekran System is a comprehensive insider risk management platform with a rich functionality set. The Ekran System platform is designed to monitor, analyze, respond, and prevent cybersecurity risks associated with the activity of legitimate users and privileged accounts.

We help leading companies to protect their sensitive data from numerous industries like Financial, Healthcare, Energy, Manufacturing, Telecommunication and IT, Education, Government, etc. Over 2,500 organizations across the world rely on the Ekran System!

See our key solutions and capabilities to keep your data safe:

Insider threats management. The platform combines comprehensive activity monitoring and alerting functionality with an advanced access management and identity control toolset, manual and automated incident response, and powerful reporting capabilities. This makes Ekran System a one-stop solution to implement your insider security policy.

Privileged Access Management. The Ekran System PAM solution allows you to secure remote access to critical endpoints, get full visibility over all privileged accounts, granularly control access requests and permissions, and ensure compliance. Ekran System's key features include privileged access and session management via jump box, password management, and an access request and approval workflow.

User activity monitoring (UAM). By monitoring user activities in real time, companies can identify and prevent insider threats, including employee fraud or data theft.

User and entity behavior analytics (UEBA) provides rapid threat detection by alerting about suspicious behavior that may otherwise go unnoticed by traditional security tools.

Employee activity monitoring tracks any user action on physical and virtual desktops, remote laptops, corporate or jump servers. Ekran System works on Windows and Linux servers recording all connected sessions, and on Windows desktops monitoring local and remote users.

Enhanced Auditing and Reporting - provides a detailed summary about all applications used by specified users or user groups within a specified time interval and includes the duration of work within each application. Ekran System reports comprise crucial data to analyze users’ behavior such as visited URLs and started applications with time spent using them, captured keystrokes, executed Linux commands with parameters, and plugged-in/blocked USB devices. Each report can be generated in multiple formats including PDF, HTML, Excel spreadsheet, CSV, and Text format (simple & rich text).

Features

  • API
  • Batch Permissions & Access
  • Big Data
  • Dashboard
  • Data Export
  • Data Import
  • Data Visualization
  • Employee Database
  • Employee Onboarding
  • External Integrations
  • Multi-User
  • Notifications
  • Password & Access Management
  • Social-Media Integration
  • Site Access Management
  • Database
  • Employee Engagement

Features

  • API
  • Batch Permissions & Access
  • Big Data
  • Dashboard
  • Data Export
  • Data Import
  • Data Visualization
  • Employee Database
  • Employee Onboarding
  • External Integrations
  • Multi-User
  • Notifications
  • Password & Access Management
  • Social-Media Integration
  • Site Access Management
  • Database
  • Employee Engagement

Features

  • API
  • Batch Permissions & Access
  • Big Data
  • Dashboard
  • Data Export
  • Data Import
  • Data Visualization
  • Employee Database
  • Employee Onboarding
  • External Integrations
  • Multi-User
  • Notifications
  • Password & Access Management
  • Social-Media Integration
  • Site Access Management
  • Database
  • Employee Engagement

Summary

  • Track Internet Activities

  • Automated Email Reports

  • Bandwidth Usage Monitoring

  • Application Usage Tracking

  • Remote Screen Capture

  • Detailed Reports - Users, Departments, Devices, & OUs

  • Toggleable Stealth Mode

  • Offsite Management for Remote Workers

  • Remote Client Install

  • Centralized User & Device Management

Summary

  • Insider threat prevention

  • Data loss prevention (DLP)

  • Behavior risk monitoring

  • Employee monitoring

  • Remote user monitoring

Summary

  • User activity monitoring on servers and workstations with local, RDP, and terminal session recording.

  • Control and block usage of USB devices of any types using whitelisting and blacklisting rules.

  • Identify suspicious user activity and send alert notifications in real-time.

  • Secure critical assets with two-factor authentication, one-time passwords, and personalization of shared accounts.

  • Get full control over the sessions initiated from your jump servers, restrict or grant permissions, and deliver temporary credentials for allowed RDP sessions via the secure password vault.

  • Carefully record each session for detailed audit, use smart multi-parameter search and reporting tools for investigations, and export forensic data when needed.

  • The product captures a number of additional logs used to index session video records, such as current application name, opened URL, executed Linux commands, keystrokes, and others.

Pricing

10-99 Users

$3.99
1 user(s) / month
Included in plan:
  • All BrowseReporter features

100+ Users


Volume & prepurchase discounts available. Please contact sales for info.
Included in plan:
  • All BrowseReporter features

Pricing

Teramind Starter

$60.00
5 user(s) / month
Included in plan:
  • Policy & Rules: Policy manager, Visual rule editor
  • Audit & Forensics: Video recording of all user activity, Audio recording (optional)
  • Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
  • Monitoring for: Web pages & applications, Instant messaging, Social media, Searches, Remote control, Activity blocking
  • Hosting: Cloud, On-Premise, Private Cloud (AWS, Azure)

Teramind UAM

$125.00
5 user(s) / month
Included in plan:
  • Monitoring for: Web pages & applications, Emails, Console commands, File transfers, Networks, Instant messaging, Social media, Keystrokes, Clipboard, Searches, Printing, OCR, Remote control, Activity blocking
  • Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Dynamic risk scoring, Anomaly detection, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
  • Policy & Rules: Policy manager, Visual rule editor, Regular expression support, Out-of-the box rule templates
  • Audit & Forensics: Video recording of all user activity, Audio recording (optional), OCR of screen content (optional), Option to record only during violation, Full text search
  • Hosting: Cloud, On-Premise, Private Cloud (AWS, Azure)

Teramind DLP

$150.00
5 user(s) / month
Included in plan:
  • Monitoring for: Web pages & applications, Emails, Console commands, File transfers, Networks, Instant messaging, Social media, Keystrokes, Clipboard, Searches, Printing, OCR, Remote control, Activity blocking
  • Policy & Rules: Policy manager, Visual rule editor, Regular expression support, Out-of-the box rule templates
  • Audit & Forensics: Video recording of all user activity, Audio recording (optional), OCR of screen content (optional), Option to record only during violation, Full text search
  • Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Dynamic risk scoring, Anomaly detection, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
  • Hosting: Cloud, On-Premise, Private Cloud (AWS, Azure)
  • Data Loss Prevention: Content rules, File rules, Data exfiltration prevention, Use pre-defined data categories, Document and data fingerprinting, Compliance for GDPR, HIPPA, PCI DSS etc.

FAQs

    What is this service generally used for?
  • BrowseReporter is most often used by organizations with human resources (HR) concerns related to employee productivity and the acceptable use of devices.

    These organizations use BrowseReporter to identify employees who are disengaged from their work or who are accessing websites that may cause a hostile work environment.

    BrowseReporter is also used by industries that need to audit employee computer usage for compliance purposes. They monitor for suspicious activity such as attempts to visit unauthorized websites, unusual bandwidth spikes, high-risk keyword searches, and the use of shadow IT.

  • Does this service offer guides, tutorials and or customer support?
  • Absolutely!

    • Knowledge base that is regularly updated with FAQs, user guides, and video tutorials
    • Customer support through phone, email, and live chat.
    • Occasional webinars to highlight new features and take customer questions
  • Who are the main user groups of this service?
  • BrowseReporter is most popular with these core users:

    • Schools and Libraries searching for scalable monitoring solutions that satisfy compliance with the Children's Internet Protection Act (CIPA)
    • Business owners that want to address employee productivity & technology use
    • Employers looking for added insights to how their remote/off-site teams spend their time
    • Human Resources (HR) departments seeking to enforce acceptable use policies by identifying employees that are creating a hostile work environment by accessing inappropriate or harmful content
  • What are some applications this service is commonly used in tandem with?
  • BrowseReporter is often combined with CurrentWare's internet and application filter BrowseControl. BrowseReporter monitors internet and application activity and BrowseControl blocks access to problematic websites and applications.

  • Does this service offer multi-user capability (e.g. teams)?
  • For monitoring groups, BrowseReporter can manage Organizational Units from Active Directory as well as groupings by user, department, or device.

    For administration, BrowseReporter can be configured with the CurrentWare Console to add dedicated users as trusted Operators of BrowseReporter. Each operator can be assigned their own permissions for how they are allowed to use BrowseReporter (generating reports, configuring tracking parameters, etc)

  • What platforms does this service support?
  • All components of CurrentWare are supported on desktop computers and server computers with the following specifications.

    • Windows 7 SP1 Pro/Enterprise and Ultimate 32-bit or 64-bit
    • Windows 8 & 8.1 Pro/Enterprise 32-bit or 64-bit
    • Windows 10 Home/Pro/Enterprise 32-bit or 64-bit
    • Windows Server 2008 R2, 2012 and 2016
  • Does this service integrate with any other apps?
  • Along with all of the products within the CurrentWare product suite, BrowseReporter integrates with the CurrentWare Console.

    The CurrentWare Console manages:

    • BrowseReporter internet & application activity monitor
    • BrowseControl internet & application blocker
    • AccessPatrol endpoint security & data loss prevention
    • enPowerManager remote power management

FAQs

    Does this service integrate with any other apps?
    • Yes.
    • Project management systems such as: JIRA, Trello, BaseCamp, Redmine etc.
    • SIEM and threat analytics tools such as: HP ArcSight, Splunk, IBM QRadar, McAfee Enterprise Security Manager, LogRhythm, NetIQ Sentinel etc.
  • Does this service offer multi-user capability (e.g. teams)?
  • Yes.

  • What is this service generally used for?
    • User activity monitoring
    • Remote employee monitoring
    • Insider threat prevention
    • Data loss prevention
    • Increase workplace productivity
    • Compliance and audit
  • Does this service offer guides, tutorials and or customer support?
  • Yes.

  • What platforms does this service support?
    • Windows 7 & Up
    • Citrix XenApp®
    • XenDesk®
    • Windows Server 2008 & Up
    • VMware Horizon
    • Mac OSX
  • Who are the main user groups of this service?
  • Any employer who wished to monitor and prevent his employees from leaking sensitive data.

  • Does this service offer an API?
  • Yes.

FAQs

    Does this service offer guides, tutorials and or customer support?
  • We provide technical documentation, guides, tutorials and 24/7 customer support.

  • What is this service generally used for?
  • Insider Threat Program Solution:

    • Subcontractor Monitoring (third party vendor monitoring) [managed security service providers (MSSP), IT outsourcing service providers (IT providers), remote third-party vendors, independent auditors, and experts]
    • Employee Activity Monitoring
    • IT Compliance Requirements - who and when access to sensitive data and what actions were done, as well as monitoring and controlling all privileged user sessions
    • Privileged Access Management (PAM) - allows for granular access control, automation of password management, two-factor authentication (2FA), and other robust capabilities, freeing up your IT staff to focus on other critical tasks.
    • Security Incidents Investigation (fraud and data leakage investigation)
    • User and entity behavior analytics (UEBA) - provides rapid threat detection by alerting about suspicious behavior that may otherwise go unnoticed by traditional security tools. *Audits and comprehensive reports including compliance reports can help companies meet regulations and data security standards including NIST 800-53, GDPR, and HIPAA. 
  • Does this service offer an API?
  • Yes.

  • What are some applications this service is commonly used in tandem with?
    • SIEM systems
    • Ticketing systems (SysAid, ServiceNow)
  • Does this service offer multi-user capability (e.g. teams)?
  • Yes.

  • What platforms does this service support?
    • Windows Desktops OS and Windows Servers OS
    • MacOS
    • Linux/Unix SSH (including Oracle Solaris, and IBM AIX)
    • Virtual infrastructure (Hyper-V, VMware, and Citrix)
  • Does this service integrate with any other apps?
    • Active directory
    • SIEM systems
    • Ticketing systems (SysAid, ServiceNow)
  • Who are the main user groups of this service?
  • Сompany size - ANY:
    * Enterprise
    * SMB
    * Public institutions

    In particular companies with sensitive information:

    • Fintech (banks, insurance companies, other fintech companies)
    • Healthcare
    • Government institution
    • Public administrations
    • Education
    • Service companies (MSP or MSSP)

Vendor Information

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:
664

Vendor Information

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:
796

Vendor Information

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:
217

Other

Who uses BrowseReporter
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Windows
Languages:
English
Regional Restrictions:
No restrictions.

Other

Who uses Teramind
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Languages:
English, Spanish, Japanese, Russian
Regional Restrictions:
No restrictions.

Other

Who uses Ekran System
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Languages:
English, Korean, Japanese, Chinese, Spanish, German, Turkish, Polish
Regional Restrictions:
No restrictions.
Back to top