Cloud Features | Teramind Starter Screen recording & live view, website and apps tracking |
Teramind UAM User activity monitoring, audit, forensics, UBA, policies and rules |
Teramind DLP Teramind UAM plus content-based data exfiltration rules |
---|---|---|---|
USD 39 per month – 5 users |
USD 69 per month – 5 users |
USD 79 per month – 5 users |
|
User Activity Monitoring | ![]() |
![]() |
![]() |
Web pages & applications | ![]() |
![]() |
![]() |
![]() |
![]() |
||
Console commands | ![]() |
![]() |
|
File transfers | ![]() |
![]() |
|
Instant messaging | ![]() |
![]() |
![]() |
Social media activity | ![]() |
![]() |
![]() |
Keystrokes | ![]() |
![]() |
|
Clipboard (copy and paste) | ![]() |
![]() |
|
Searches | ![]() |
![]() |
![]() |
Printing | ![]() |
![]() |
|
OCR | ![]() |
![]() |
|
Remote control | ![]() |
![]() |
![]() |
Activity blocking | ![]() |
![]() |
![]() |
Data Loss Prevention | ![]() |
||
Protect all data types and IP | ![]() |
||
Define content based rules | ![]() |
||
Define file operation based rules | ![]() |
||
Prevent malicious or negligent data exfiltration | ![]() |
||
Use pre-defined data categories | ![]() |
||
Leverage document and data fingerprinting to protect sensitive data | ![]() |
||
Ensure regulatory compliance involving PII, PHI/HIPAA, GDPR and more | ![]() |
||
User Behavior Analytic | ![]() |
![]() |
![]() |
Insider threat detection | ![]() |
![]() |
![]() |
Abusive behavior | ![]() |
![]() |
![]() |
Malicious behavior | ![]() |
![]() |
![]() |
Dynamic risk scoring | ![]() |
![]() |
|
Anomaly detection | ![]() |
![]() |
|
Workforce productivity analysis | ![]() |
![]() |
![]() |
Active vs idle time analysis |
![]() |
![]() |
![]() |
Template based scheduling | ![]() |
![]() |
![]() |
Interactive productivity reporting | ![]() |
![]() |
![]() |
Policy and Rules Management | ![]() |
![]() |
![]() |
Policy manager | ![]() |
![]() |
![]() |
Visual rule editor | ![]() |
![]() |
![]() |
Regular expression support | ![]() |
![]() |
|
Out-of-the box rule templates | ![]() |
![]() |
|
Audit & Forensics | ![]() |
![]() |
![]() |
Video recording of all user activity | ![]() |
![]() |
![]() |
Audio recording (optional) | ![]() |
![]() |
![]() |
OCR of screen content (optional) | ![]() |
![]() |
|
Option to record only during violation | ![]() |
![]() |
|
Full text search | ![]() |
![]() |
|
Worry-free cloud hosting | ![]() |
![]() |
![]() |
No servers needed | ![]() |
![]() |
![]() |
We set up and host for you | ![]() |
![]() |
![]() |
PCI certified data centers | ![]() |
![]() |
![]() |
Data is encrypted in motion and at rest | ![]() |
![]() |
![]() |