Protect your business with iMonitor EAM The most complete employee computer activities monitoring software

Comparison of iMonitor EAM Versions

Compare the difference between EAM Professional, EAM Encryption, EAM Standard and EAM Lite


Features EAM Professional EAM Encryption EAM Standard EAM Lite
Online Monitoring
Visited Websites
Instant Messages/Chat
Sent/Received Email
Webmail
Email Attachments
Online Searches
Online Downloads
Accessed URLs
Skype File Transfer
FTP File Transfer
Online Storage
Network Traffic Monitoring & Statistics
PC Tracking & Management
Keylogger
Screenshot Recorder
Screenshot Recorder (sorted by different applications)
Screenshot Tool Logs
Videos
Live Remote Desktop (multiple remote desktops)
Remote Camera Monitor(Only a few laptops are supported)
File Activity Recorder
Print Job Monitor
Clipboard Monitor
USB Disk Monitor
Website Time Tracker
Application Time Tracker
Remote File Management
Remote Task Manager
Keyword Detector
Real-Time Alerts
Hardware and Software Asset Management
Centralized Managing Module
Automatically Backing Up Edited Files (customizable file type and file size)
Keylogger (sorted by different applications)
Used Applications (sorted by different types)
Clipboard Monitor (sorted by different APPs)
File Activity Recorder (sorted by different types)
Real Time Desktop Monitoring
Share Folder Management
IP Address Viewer
Auto-run Item Management
Software Installation/Uninstallation History
Install/Uninstall Software Remotely
Remote Screen Lock
Remote Control of Screen Saver
Remote Restart/Shut Down/Log Off
Remote Command
Live Remote Desktop & Control
Multiple Live Remote Desktops (up to 30 screens in one window)
Remote Desktop & Keyboard and Mouse Control
Documents / files protection
Log file usages (copy, move, delete, rename, create, modify.)
Log file transfers
Disable USB storage devices
Make USB storage devices readonly
Encrypt file transfer in E-mail application (Outlook, Foxmail, etc.)
Encrypt file transfer in web page (Webmail, Facebook, Online storage, etc.)
Encrypt file transfer in IM clients (Skype, QQ, Wechat, Facebook, etc.)
Block file transfer in E-mail application (Outlook, Foxmail, etc.)
Block file transfer in web page (Webmail, Facebook, Online storage, etc.)
Block file transfer in IM clients (Skype, QQ, Wechat, Facebook, etc.)
Collect important docs from employee's computer and backup them on the server
Take a copy when user transfer file to outside
File Transfer Risk Events
Filtering & Blocking
Block Application Installation
Website Filtering & Blocking
Social Network Blocking
Webmail Blocking
Keyword Blocking
Application Blocking
Portable Drive Blocking
Gaming Blocking
Website Blocking in Specific Time Sections
Application Blocking in Specific Time Sections
Real-time Alerts(Send Alerts to Manager's PC)
Agent Starts Running
Removable Disk Connected/Disconnected
File Activities On Removable Disk
File Copy/Move
Document Printing
File Downloading from Website
File Transfer from/to FTP
User Trying to Run a Blocked Program
User Trying to Visit a Blocked Website
Network Traffic Exceeds Maximum
Keyword Detected
Reporting Methods
Export an Excel file
More than 40 Kinds of Build-in Reports  
Visual Statistics and Analysis
 
Graphic charts  
Top 20 Reports
Search Capabilities
Comprehensive HTML Reports
Global search in all records to locate key data by keywords
Other Features
Client Grouping Management
Cross-subnet Monitoring TCP connections OK TCP connections OK TCP connections OK TCP connections OK
Remote Monitoring through Internet Need Public Internet IP Need Public Internet IP Need Public Internet IP Need Public Internet IP
Centralized Management Console
Remote Management
Remote Control(Control remote computer's mouse and keyboard)
Send Instant Message to Remote User
Send File to Remote User
Get File from Remote PC
Remote Agent Installation
Audit Company Software Asset
Audit Company Hardware Asset
Centralized Database
Stealth Mode
Password Protection
Multi-user Account
Limited User Account
User Login History
Agent PC Online Status
Database Backup
Offline/Online Computer Monitoring
EAM Client IP settings No settings required No settings required No settings required No settings required
EAM Server IP settings Static IP Static IP Static IP Static IP
Multi-user Account Monitoring
Terminal Server & CITRIX Monitoring Extra charge for more than 3 users Extra charge for more than 3 users Extra charge for more than 3 users Extra charge for more than 3 users
Licensing & Support
Validity of License Lifetime Lifetime Lifetime Lifetime
Min Licenses Purchase Required 5 5 3 3
Upgrades one year one year one year one year
Tech Support one year one year one year one year
Operating Systems
Windows 11 (32 & 64 bit)
Windows 10 (32 & 64 bit)
Windows 8/8.1 (32 & 64 bit)
Windows 7 (32 & 64 bit)
Windows Vista (32 & 64 bit)
Windows Server 2003/2008/2008R2/2012/2012R2/2016/2019/2022 (32 & 64 bit)
Windows XP
Windows 2000
Mac OS 10.8 and newer version
Linux

Powerful insider threat detection & prevention solution and data security solution

EAM Encryption

Powerful insider threat detection & prevention solution and data security solution. Has all features of EAM Professional, plus the driver layer transparent encryption function, effective defense against data breaches and data leaks. Suitable for large company or the companies who has confidential data need to be protected such as Financial, Research and Development, IT, Design industries.


EAM Professional

Top-level, all-in-one and centralized employee computer monitoring & control & management solution. Compare with EAM Standard, EAM Professional plus the flexible blocking features, daily/weekly/monthly reports features and basic data security feature. Suitable for medium or large company, who has all-around monitoring requirement and basic data protection requirement.

Top-level, all-in-one and centralized employee computer monitoring & control & management solution.

Multifunctional centralized employee behavior monitoring solution.

EAM Standard

Multifunctional centralized employee behavior monitoring solution, tracking employee's basic internet and computer activities. Suitable for small & medium business, and the administrator who want to increase the employee working productivity.


EAM Lite

Our most affordable employee monitoring solution for startups and small businesses with powerful features such as real-time activity tracking, video capture and playback, and a set of productivity optimization tools.

most affordable employee monitoring solution for startups and small businesses.

iMonitor EAM is TRUSTED by

25000+ companies including Fortune Top 500 in 100 countries are using iMonitor EAM.