Compare Teramind vs Ekran System

You May Also Like

Featured products that are similar to the ones you selected below.

Insightful
(95)
Employee Monitoring Software
Visit Website
Monitask
(10)
Employee Monitoring Software
Visit Website
View Listing View Listing

Crozscore

85%
what is this?
interest rising

Crozscore

83%
what is this?
interest falling
Teramind screenshot view 5 more Ekran System screenshot view 3 more

About Teramind

Teramind is a pioneer in User Behavior Monitoring, providing a user-centric approach to IT security. Our solution offers tailored analytics, alerts and bullet-proof forensics to help companies address the fastest growing security risk - the insider threat.

Our insider threat solution allows for:

  • Monitor employees, privileged users, remote users, contractors
  • Detecting & Blocking Malicious Activity
  • Live View & History Playback
  • Rule Based Risk Analysis
  • IT Forensics
  • Intelligent Session Mining

Our Employee Monitoring solution provides smart rules and automated alerts and monitors the following activities:

  • Instant Messages
  • Printed Document Tracking
  • Keystroke Logger
  • Website Monitoring
  • Application Monitoring
  • Email Monitoring
  • File Transfer Tracking

Teramind DLP provides additional data loss prevention features that allows companies to:

  • Protect sensitive data and IP
  • Define content-based rules
  • Define file-based rules
  • Leverage document fingerprinting to protect confidential information
  • Prevent malicious or negligent data exfiltration and data leaks
  • Ensure regulatory compliance involving GDPR, HIPAA, PIC DSS etc.

Teramind Mobile App for Android:

  • Get full visibility on the go with Teramind Dashboard
  • Summary reports, detailed metrics and live monitoring of individual endpoints

About Ekran System

Don't let human behavior put your data at risk. Protect your assets with our insider risk management platform!

Ekran System is a comprehensive insider risk management platform with a rich functionality set. The Ekran System platform is designed to monitor, analyze, respond, and prevent cybersecurity risks associated with the activity of legitimate users and privileged accounts.

We help leading companies to protect their sensitive data from numerous industries like Financial, Healthcare, Energy, Manufacturing, Telecommunication and IT, Education, Government, etc. Over 2,500 organizations across the world rely on the Ekran System!

See our key solutions and capabilities to keep your data safe:

Insider threats management. The platform combines comprehensive activity monitoring and alerting functionality with an advanced access management and identity control toolset, manual and automated incident response, and powerful reporting capabilities. This makes Ekran System a one-stop solution to implement your insider security policy.

Privileged Access Management. The Ekran System PAM solution allows you to secure remote access to critical endpoints, get full visibility over all privileged accounts, granularly control access requests and permissions, and ensure compliance. Ekran System's key features include privileged access and session management via jump box, password management, and an access request and approval workflow.

User activity monitoring (UAM). By monitoring user activities in real time, companies can identify and prevent insider threats, including employee fraud or data theft.

User and entity behavior analytics (UEBA) provides rapid threat detection by alerting about suspicious behavior that may otherwise go unnoticed by traditional security tools.

Employee activity monitoring tracks any user action on physical and virtual desktops, remote laptops, corporate or jump servers. Ekran System works on Windows and Linux servers recording all connected sessions, and on Windows desktops monitoring local and remote users.

Enhanced Auditing and Reporting - provides a detailed summary about all applications used by specified users or user groups within a specified time interval and includes the duration of work within each application. Ekran System reports comprise crucial data to analyze users’ behavior such as visited URLs and started applications with time spent using them, captured keystrokes, executed Linux commands with parameters, and plugged-in/blocked USB devices. Each report can be generated in multiple formats including PDF, HTML, Excel spreadsheet, CSV, and Text format (simple & rich text).

Features

  • API
  • Batch Permissions & Access
  • Big Data
  • Dashboard
  • Data Export
  • Data Import
  • Data Visualization
  • Employee Database
  • Employee Onboarding
  • External Integrations
  • Multi-User
  • Notifications
  • Password & Access Management
  • Social-Media Integration
  • Site Access Management
  • Database
  • Employee Engagement

Features

  • API
  • Batch Permissions & Access
  • Big Data
  • Dashboard
  • Data Export
  • Data Import
  • Data Visualization
  • Employee Database
  • Employee Onboarding
  • External Integrations
  • Multi-User
  • Notifications
  • Password & Access Management
  • Social-Media Integration
  • Site Access Management
  • Database
  • Employee Engagement

Summary

  • Insider threat prevention

  • Data loss prevention (DLP)

  • Behavior risk monitoring

  • Employee monitoring

  • Remote user monitoring

Summary

  • User activity monitoring on servers and workstations with local, RDP, and terminal session recording.

  • Control and block usage of USB devices of any types using whitelisting and blacklisting rules.

  • Identify suspicious user activity and send alert notifications in real-time.

  • Secure critical assets with two-factor authentication, one-time passwords, and personalization of shared accounts.

  • Get full control over the sessions initiated from your jump servers, restrict or grant permissions, and deliver temporary credentials for allowed RDP sessions via the secure password vault.

  • Carefully record each session for detailed audit, use smart multi-parameter search and reporting tools for investigations, and export forensic data when needed.

  • The product captures a number of additional logs used to index session video records, such as current application name, opened URL, executed Linux commands, keystrokes, and others.

Pricing

Teramind Starter

$60.00
5 user(s) / month
Included in plan:
  • Policy & Rules: Policy manager, Visual rule editor
  • Audit & Forensics: Video recording of all user activity, Audio recording (optional)
  • Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
  • Monitoring for: Web pages & applications, Instant messaging, Social media, Searches, Remote control, Activity blocking
  • Hosting: Cloud, On-Premise, Private Cloud (AWS, Azure)

Teramind UAM

$125.00
5 user(s) / month
Included in plan:
  • Monitoring for: Web pages & applications, Emails, Console commands, File transfers, Networks, Instant messaging, Social media, Keystrokes, Clipboard, Searches, Printing, OCR, Remote control, Activity blocking
  • Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Dynamic risk scoring, Anomaly detection, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
  • Policy & Rules: Policy manager, Visual rule editor, Regular expression support, Out-of-the box rule templates
  • Audit & Forensics: Video recording of all user activity, Audio recording (optional), OCR of screen content (optional), Option to record only during violation, Full text search
  • Hosting: Cloud, On-Premise, Private Cloud (AWS, Azure)

Teramind DLP

$150.00
5 user(s) / month
Included in plan:
  • Monitoring for: Web pages & applications, Emails, Console commands, File transfers, Networks, Instant messaging, Social media, Keystrokes, Clipboard, Searches, Printing, OCR, Remote control, Activity blocking
  • Policy & Rules: Policy manager, Visual rule editor, Regular expression support, Out-of-the box rule templates
  • Audit & Forensics: Video recording of all user activity, Audio recording (optional), OCR of screen content (optional), Option to record only during violation, Full text search
  • Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Dynamic risk scoring, Anomaly detection, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
  • Hosting: Cloud, On-Premise, Private Cloud (AWS, Azure)
  • Data Loss Prevention: Content rules, File rules, Data exfiltration prevention, Use pre-defined data categories, Document and data fingerprinting, Compliance for GDPR, HIPPA, PCI DSS etc.

FAQs

    Does this service integrate with any other apps?
    • Yes.
    • Project management systems such as: JIRA, Trello, BaseCamp, Redmine etc.
    • SIEM and threat analytics tools such as: HP ArcSight, Splunk, IBM QRadar, McAfee Enterprise Security Manager, LogRhythm, NetIQ Sentinel etc.
  • Does this service offer multi-user capability (e.g. teams)?
  • Yes.

  • What is this service generally used for?
    • User activity monitoring
    • Remote employee monitoring
    • Insider threat prevention
    • Data loss prevention
    • Increase workplace productivity
    • Compliance and audit
  • Does this service offer guides, tutorials and or customer support?
  • Yes.

  • What platforms does this service support?
    • Windows 7 & Up
    • Citrix XenApp®
    • XenDesk®
    • Windows Server 2008 & Up
    • VMware Horizon
    • Mac OSX
  • Who are the main user groups of this service?
  • Any employer who wished to monitor and prevent his employees from leaking sensitive data.

  • Does this service offer an API?
  • Yes.

FAQs

    Does this service offer guides, tutorials and or customer support?
  • We provide technical documentation, guides, tutorials and 24/7 customer support.

  • What is this service generally used for?
  • Insider Threat Program Solution:

    • Subcontractor Monitoring (third party vendor monitoring) [managed security service providers (MSSP), IT outsourcing service providers (IT providers), remote third-party vendors, independent auditors, and experts]
    • Employee Activity Monitoring
    • IT Compliance Requirements - who and when access to sensitive data and what actions were done, as well as monitoring and controlling all privileged user sessions
    • Privileged Access Management (PAM) - allows for granular access control, automation of password management, two-factor authentication (2FA), and other robust capabilities, freeing up your IT staff to focus on other critical tasks.
    • Security Incidents Investigation (fraud and data leakage investigation)
    • User and entity behavior analytics (UEBA) - provides rapid threat detection by alerting about suspicious behavior that may otherwise go unnoticed by traditional security tools. *Audits and comprehensive reports including compliance reports can help companies meet regulations and data security standards including NIST 800-53, GDPR, and HIPAA. 
  • Does this service offer an API?
  • Yes.

  • What are some applications this service is commonly used in tandem with?
    • SIEM systems
    • Ticketing systems (SysAid, ServiceNow)
  • Does this service offer multi-user capability (e.g. teams)?
  • Yes.

  • What platforms does this service support?
    • Windows Desktops OS and Windows Servers OS
    • MacOS
    • Linux/Unix SSH (including Oracle Solaris, and IBM AIX)
    • Virtual infrastructure (Hyper-V, VMware, and Citrix)
  • Does this service integrate with any other apps?
    • Active directory
    • SIEM systems
    • Ticketing systems (SysAid, ServiceNow)
  • Who are the main user groups of this service?
  • Сompany size - ANY:
    * Enterprise
    * SMB
    * Public institutions

    In particular companies with sensitive information:

    • Fintech (banks, insurance companies, other fintech companies)
    • Healthcare
    • Government institution
    • Public administrations
    • Education
    • Service companies (MSP or MSSP)

Vendor Information

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:
796

Vendor Information

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:
217

Other

Who uses Teramind
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Languages:
English, Spanish, Japanese, Russian
Regional Restrictions:
No restrictions.

Other

Who uses Ekran System
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Languages:
English, Korean, Japanese, Chinese, Spanish, German, Turkish, Polish
Regional Restrictions:
No restrictions.
Back to top