Ekran System® is a universal insider threat protection platform that promises to help business with employee monitoring, subcontractor control, PAM, and compliance tasks. Working with all levels of user privileges, Ekran System
aims to help to track system configuration changes, critical application usage, and
sensitive data access for different insider groups: employees, server
administrators, third-party service providers.
The vendor says Ekran System is a software solution…
N/A
Netwrix Auditor
Score 8.6 out of 10
N/A
Netwrix Auditor is designed to enable auditing of the broadest variety of IT systems, including Active Directory, Exchange, file servers, SharePoint, SQL Server, VMware and Windows Server. It also supports monitoring of privileged user activity in all other systems.
According to the vendor, Netwrix Auditor eliminates these blind spots by delivering complete visibility into all changes to system configurations, content and permissions across the IT infrastructure. Moreover, Netwrix…
N/A
Pricing
Ekran System
Netwrix Auditor
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Ekran System
Netwrix Auditor
Free Trial
Yes
Yes
Free/Freemium Version
Yes
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
Ekran System® is licensed by a number of Ekran clients – end-points to be monitored. Ekran System is available in Standard Edition and Enterprise Edition.
Ekran System provides monitoring licenses for desktops and servers. While there is a single license type for desktop machines (Workstation Client license), several types of server monitoring licenses are provided depending on the server endpoint role in the corporate network.
—
More Pricing Information
Community Pulse
Ekran System
Netwrix Auditor
Considered Both Products
Ekran System
No answer on this topic
Netwrix Auditor
Verified User
Professional
Chose Netwrix Auditor
Netwrix Auditor is a visibility and governance platform that allows you to monitor changes, configurations and access in IT infrastructure of important IT infrastructure components such as Active Directory, event logs, Exchange, Office 365, SQL Server, and others. Apart from …