Average implementation time: from 20 minutes to 2 hours
Integration with: ParagonERP, SysAid, ServiceNow, Microsoft Azure, AWS, a wide range of SIEM
Available: support for both physical and virtualized hardware across VMWare, Hyper-V, KVM, and OpenStack
Supported platforms: Window, Window Server, Linux, macOS, UNIX, XWindow System, Citrix, VMware
Why Ekran System?
Activity monitoring, access management, incident response
Ekran System is an all-in-one insider risk management enterprise-level platform that helps you detect and prevent cyber threats, investigate security incidents, monitor third-party users, and manage privileged access.
-
Insider risk mitigation and prevention
-
Protection of sensitive data
-
Full desktop and server OS support
-
Comprehensive functionality and configuration flexibility
-
Reduced cost of cybersecurity incidents
-
Lightweight and easy-to-use tool
Major user-based risk management controls in one platform
Quickly investigate any security incident related to your employees or third-party vendors
Form Heading
Best ITM software comparison: ObserveIT, Veriato, Teramind, Ekran System
Ekran System |
ObserveIT (Proofpoint) |
Veriato Cerebral |
Teramind |
|
Deployment model |
SaaS and on-premises |
SaaS and on-premises |
On-premises |
SaaS and on-premises |
Easy deployment |
V |
_ |
_ |
V |
Floating endpoint licenses |
V |
_ |
_ |
_ |
Multi-monitor recording |
V |
V |
V |
V |
Real-time alerts |
V |
V |
V |
V |
User behavior analytics |
V |
V |
V |
V |
User blocking |
V |
V |
_ |
V |
Save sessions in encrypted format |
V |
_ |
_ |
_ |
Multi-factor authentication |
V |
_ |
_ |
_ |
Time-based user access restrictions |
V |
_ |
_ |
_ |
Privileged account and session management |
V |
_ |
_ |
_ |
Password management |
V |
_ |
_ |
_ |
Privileged account management |
V |
_ |
_ |
V |
Total cost of ownership |
$ |
$$$ |
$$ |
$$ |
Product Benefits
Ekran System — insider risk management
Major user-based risk management controls in one platform
-
User activity monitoring and audits
-
Identity and access management
-
Alerts on suspicious activity
-
Automated and manual threat response
Full desktop and server OS support
-
Support for all popular operating systems and virtual environments
-
Support any hybrid enterprise architecture: agent-based and jump server deployment schemes
Enterprise-ready
-
Easily implemented in large-scale environments thanks to its high availability, multi-tenancy, and remote client management functionalities
-
Ekran system resource and health monitoring dashboards
-
Automatic license provisioning for virtual environments
Low total cost of ownership
-
Flexible licensing model
-
Floating endpoint licensing enables license reassignment in a couple of clicks
-
Pricing depends on the number of protected endpoints environments
YEARS OF WORK
VENDORS
USE CASES
Why cooperation with Softprom?
-
We implement projects together with Ekran specialists
-
We select the best packages for your tasks
-
Support in testin
-
We provide the possibility of payment in national currency
Portnox Network Access Control
Our Network Access Control (NAC) solution — Portnox NAC, 100% visibility of all devices in the network.
No matter the size and make-up of the network, our network access control (NAC) solution is easy-to-deploy and manage, and delivers all the security essentials to keep the data on your network. You need only 33 minutes to set up, it’s free to try.
Cyberbit Range
Cyberbit Range is a hyper-realistic cyber simulation platform that uses flight simulation disciplines to train, onboard, and dramatically improve the performance of incident response teams.
By training in cyber range exercises your team will excel, both technically and mentally when the real attack takes place.
LogRhythm SIEM
LogRhythm Security information and event management is a combination of information security management (SIM) and security event management (SEM) systems into a single security management system.
Available: SIEM technology can reside either on-premise (on your own hardware) or in the cloud (on someone else’s hardware) and collect data from a massive variety of data sources.