Pricing:
- Starting from: $60.00/month
- Credit card required: No
Teramind Starter
$60.00
5 user(s) / month
- Policy & Rules: Policy manager, Visual rule editor
- Audit & Forensics: Video recording of all user activity, Audio recording (optional)
- Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
- Monitoring for: Web pages & applications, Instant messaging, Social media, Searches, Remote control, Activity blocking
- Hosting: Cloud, On-Premise, Private Cloud (AWS, Azure)
Teramind UAM
$125.00
5 user(s) / month
- Monitoring for: Web pages & applications, Emails, Console commands, File transfers, Networks, Instant messaging, Social media, Keystrokes, Clipboard, Searches, Printing, OCR, Remote control, Activity blocking
- Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Dynamic risk scoring, Anomaly detection, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
- Policy & Rules: Policy manager, Visual rule editor, Regular expression support, Out-of-the box rule templates
- Audit & Forensics: Video recording of all user activity, Audio recording (optional), OCR of screen content (optional), Option to record only during violation, Full text search
- Hosting: Cloud, On-Premise, Private Cloud (AWS, Azure)
Teramind DLP
$150.00
5 user(s) / month
- Monitoring for: Web pages & applications, Emails, Console commands, File transfers, Networks, Instant messaging, Social media, Keystrokes, Clipboard, Searches, Printing, OCR, Remote control, Activity blocking
- Policy & Rules: Policy manager, Visual rule editor, Regular expression support, Out-of-the box rule templates
- Audit & Forensics: Video recording of all user activity, Audio recording (optional), OCR of screen content (optional), Option to record only during violation, Full text search
- Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Dynamic risk scoring, Anomaly detection, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
- Hosting: Cloud, On-Premise, Private Cloud (AWS, Azure)
- Data Loss Prevention: Content rules, File rules, Data exfiltration prevention, Use pre-defined data categories, Document and data fingerprinting, Compliance for GDPR, HIPPA, PCI DSS etc.
|