Protégez votre entreprise avec iMonitor EAM Le logiciel de surveillance des activités informatiques des employés le plus complet
Compare the difference between EAM Professional and EAM Standard
Features | EAM Professional | EAM Standard | EAM Lite |
Online Monitoring | |||
Visited Websites | ![]() |
![]() |
|
Accessed URLs | ![]() |
![]() |
|
Online Searches | ![]() |
![]() |
|
Online Downloads | ![]() |
![]() |
|
Instant Messages/Chat | ![]() |
![]() |
|
Skype File Transfer | ![]() |
![]() |
|
Sent/Received Email | ![]() |
![]() |
|
Email Attachments | ![]() |
![]() |
|
Webmail | ![]() |
![]() |
|
FTP File Transfer | ![]() |
![]() |
|
Online Storage | ![]() |
![]() |
|
Network Traffic Monitoring & Statistics | ![]() |
![]() |
|
PC Tracking & Management | |||
Keylogger | ![]() |
![]() |
|
Keylogger (sorted by different applications) | ![]() |
||
Screenshot Recorder | ![]() |
![]() |
![]() |
Screenshot Recorder (sorted by different applications) | ![]() |
![]() |
![]() |
File Activity Recorder | ![]() |
![]() |
|
File Activity Recorder (sorted by different types) | ![]() |
||
Print Job Monitor | ![]() |
![]() |
|
Print Job Contents Screenshots | ![]() |
![]() |
|
Clipboard Monitor | ![]() |
![]() |
|
Clipboard Monitor (sorted by different APPs) | ![]() |
||
Usb Disk Monitor | ![]() |
![]() |
|
Website Time Tracker | ![]() |
![]() |
|
Used Applications | ![]() |
![]() |
|
Used Applications (sorted by different types) | ![]() |
||
Application Time Tracker | ![]() |
![]() |
|
Keyword Detector | ![]() |
||
Real-Time Alerts | ![]() |
![]() |
|
Remote Camera Monitor | ![]() |
![]() |
|
Automatically Backing Up Edited Files (customizable file type and file size) | ![]() |
||
Centralized Managing Module | ![]() |
![]() |
|
Remote File Managment | ![]() |
![]() |
|
Remote Task Manager | ![]() |
![]() |
|
Hardware and Software Asset Management | ![]() |
![]() |
|
Share Folder Management | ![]() |
![]() |
|
IP Address Viewer | ![]() |
![]() |
|
Autorun Item Management | ![]() |
![]() |
|
Software Installation/Uninstallation History | ![]() |
![]() |
|
Uninstall Software Remotely | ![]() |
![]() |
|
Remote Screen Lock | ![]() |
![]() |
|
Remote Control of Screen Saver | ![]() |
![]() |
|
Remote Restart/Shut Down/Log Off | ![]() |
![]() |
|
Remote Command | ![]() |
![]() |
|
Live Remote Desktop & Control | |||
Multiple Live Remote Desktops (up to 32 screens in one window) | ![]() |
![]() |
|
Remote Desktop & Keyborad and Mouse Control | ![]() |
![]() |
![]() |
Filtering & Blocking | |||
Website Filtering & Blocking | ![]() |
||
Social Network Blocking | ![]() |
||
Webmail Blocking | ![]() |
||
Keyword Blocking | ![]() |
||
Application Blocking | ![]() |
||
Portable Drive Blocking | ![]() |
||
Gaming Blocking | ![]() |
||
Website Blocking in Specific Time Sections | ![]() |
||
Application Blocking in Specific Time Sections | ![]() |
||
Real-time Alerts(Send Alerts to Manager's PC) | |||
Agent Starts Running | ![]() |
![]() |
|
Removable Disk Connected/Disconnected | ![]() |
![]() |
|
File Activities On Removable Disk | ![]() |
![]() |
|
File Copy/Move | ![]() |
![]() |
|
Document Printing | ![]() |
![]() |
|
File Downdoalding from Website | ![]() |
![]() |
|
File Transfer from/to FTP | ![]() |
![]() |
|
User Trying to Run a Blocked Program | ![]() |
||
User Trying to Visite a Blocked Website | ![]() |
||
Network Traffic Exceeds Maximum | ![]() |
||
Keyword Detected | ![]() |
||
Reporting Methods | |||
More than 40 Kinds of Build-in Reports | ![]() |
||
Graphical Charts | ![]() |
![]() |
|
Visual Statistics and Analysis |
![]() |
||
Top 20 Reports | ![]() |
![]() |
|
Search Capabilities | ![]() |
![]() |
|
Comprehensive HTML Reports | ![]() |
||
Other Features | |||
Centralized Management Console | ![]() |
![]() |
![]() |
Remote Management | ![]() |
![]() |
![]() |
Remote Control(Control remote computer's mouse and keyboard) | ![]() |
![]() |
![]() |
Send Instant Message to Remote User | ![]() |
![]() |
|
Send File to Remote User | ![]() |
![]() |
|
Get File from Remote PC | ![]() |
![]() |
|
Remote Agent Installation | ![]() |
![]() |
![]() |
Audit Company Software Asset | ![]() |
![]() |
|
Audit Company Hardware Asset | ![]() |
![]() |
|
Centralized Database | ![]() |
![]() |
![]() |
Stealth Mode | ![]() |
![]() |
![]() |
Password Protection | ![]() |
![]() |
![]() |
Multi User Account | ![]() |
![]() |
![]() |
Limited User Account | ![]() |
![]() |
![]() |
Database Backup | ![]() |
![]() |
![]() |
Offline/Online Computer Monitoring | ![]() |
![]() |
![]() |
Licensing & Support | |||
Min Licenses Purchase Required | 5 | 3 | 3 |
Upgrades | one year | one year | one year |
Tech Support | ![]() |
![]() |
![]() |
Operating Systems | |||
Windows 10 (32 & 64 bit) | ![]() |
![]() |
![]() |
Windows 8/8.1 (32 & 64 bit) | ![]() |
![]() |
![]() |
Windows 7 (32 & 64 bit) | ![]() |
![]() |
![]() |
Windows Vista (32 & 64 bit) | ![]() |
![]() |
![]() |
Windows Server 2003/2008/2012 (32 & 64 bit) | ![]() |
![]() |
![]() |
Windows Server 2003 | ![]() |
![]() |
![]() |
Windows 2000 | ![]() |
![]() |
![]() |
Mac OS 10.8 and newer version | ![]() |
![]() |
![]() |