Protect your business with iMonitor EAM The most complete employee computer activities monitoring software
Compare the difference between EAM Professional, EAM Encryption, EAM Standard and EAM Lite
Features | EAM Professional | EAM Encryption | EAM Standard | EAM Lite |
Online Monitoring | ||||
Visited Websites | ||||
Instant Messages/Chat | ||||
Sent/Received Email | ||||
Webmail | ||||
Email Attachments | ||||
Online Searches | ||||
Online Downloads | ||||
Accessed URLs | ||||
Skype File Transfer | ||||
FTP File Transfer | ||||
Online Storage | ||||
Network Traffic Monitoring & Statistics | ||||
PC Tracking & Management | ||||
Keylogger | ||||
Screenshot Recorder | ||||
Screenshot Recorder (sorted by different applications) | ||||
Screenshot Tool Logs | ||||
Videos | ||||
Live Remote Desktop (multiple remote desktops) | ||||
Remote Camera Monitor(Only a few laptops are supported) | ||||
File Activity Recorder | ||||
Print Job Monitor | ||||
Clipboard Monitor | ||||
USB Disk Monitor | ||||
Website Time Tracker | ||||
Application Time Tracker | ||||
Remote File Management | ||||
Remote Task Manager | ||||
Keyword Detector | ||||
Real-Time Alerts | ||||
Hardware and Software Asset Management | ||||
Centralized Managing Module | ||||
Automatically Backing Up Edited Files (customizable file type and file size) | ||||
Keylogger (sorted by different applications) | ||||
Used Applications (sorted by different types) | ||||
Clipboard Monitor (sorted by different APPs) | ||||
File Activity Recorder (sorted by different types) | ||||
Real Time Desktop Monitoring | ||||
Share Folder Management | ||||
IP Address Viewer | ||||
Auto-run Item Management | ||||
Software Installation/Uninstallation History | ||||
Install/Uninstall Software Remotely | ||||
Remote Screen Lock | ||||
Remote Control of Screen Saver | ||||
Remote Restart/Shut Down/Log Off | ||||
Remote Command | ||||
Live Remote Desktop & Control | ||||
Multiple Live Remote Desktops (up to 30 screens in one window) | ||||
Remote Desktop & Keyboard and Mouse Control | ||||
Documents / files protection | ||||
Log file usages (copy, move, delete, rename, create, modify.) | ||||
Log file transfers | ||||
Disable USB storage devices | ||||
Make USB storage devices readonly | ||||
Encrypt file transfer in E-mail application (Outlook, Foxmail, etc.) | ||||
Encrypt file transfer in web page (Webmail, Facebook, Online storage, etc.) | ||||
Encrypt file transfer in IM clients (Skype, QQ, Wechat, Facebook, etc.) | ||||
Block file transfer in E-mail application (Outlook, Foxmail, etc.) | ||||
Block file transfer in web page (Webmail, Facebook, Online storage, etc.) | ||||
Block file transfer in IM clients (Skype, QQ, Wechat, Facebook, etc.) | ||||
Collect important docs from employee's computer and backup them on the server | ||||
Take a copy when user transfer file to outside | ||||
File Transfer Risk Events | ||||
Filtering & Blocking | ||||
Block Application Installation | ||||
Website Filtering & Blocking | ||||
Social Network Blocking | ||||
Webmail Blocking | ||||
Keyword Blocking | ||||
Application Blocking | ||||
Portable Drive Blocking | ||||
Gaming Blocking | ||||
Website Blocking in Specific Time Sections | ||||
Application Blocking in Specific Time Sections | ||||
Real-time Alerts(Send Alerts to Manager's PC) | ||||
Agent Starts Running | ||||
Removable Disk Connected/Disconnected | ||||
File Activities On Removable Disk | ||||
File Copy/Move | ||||
Document Printing | ||||
File Downloading from Website | ||||
File Transfer from/to FTP | ||||
User Trying to Run a Blocked Program | ||||
User Trying to Visit a Blocked Website | ||||
Network Traffic Exceeds Maximum | ||||
Keyword Detected | ||||
Reporting Methods | ||||
Export an Excel file | ||||
More than 40 Kinds of Build-in Reports | ||||
Visual Statistics and Analysis |
||||
Graphic charts | ||||
Top 20 Reports | ||||
Search Capabilities | ||||
Comprehensive HTML Reports | ||||
Global search in all records to locate key data by keywords | ||||
Other Features | ||||
Client Grouping Management | ||||
Cross-subnet Monitoring | TCP connections OK | TCP connections OK | TCP connections OK | TCP connections OK |
Remote Monitoring through Internet | Need Public Internet IP | Need Public Internet IP | Need Public Internet IP | Need Public Internet IP |
Centralized Management Console | ||||
Remote Management | ||||
Remote Control(Control remote computer's mouse and keyboard) | ||||
Send Instant Message to Remote User | ||||
Send File to Remote User | ||||
Get File from Remote PC | ||||
Remote Agent Installation | ||||
Audit Company Software Asset | ||||
Audit Company Hardware Asset | ||||
Centralized Database | ||||
Stealth Mode | ||||
Password Protection | ||||
Multi-user Account | ||||
Limited User Account | ||||
User Login History | ||||
Agent PC Online Status | ||||
Database Backup | ||||
Offline/Online Computer Monitoring | ||||
EAM Client IP settings | No settings required | No settings required | No settings required | No settings required |
EAM Server IP settings | Static IP | Static IP | Static IP | Static IP |
Multi-user Account Monitoring | ||||
Terminal Server & CITRIX Monitoring | Extra charge for more than 3 users | Extra charge for more than 3 users | Extra charge for more than 3 users | Extra charge for more than 3 users |
Licensing & Support | ||||
Validity of License | Lifetime | Lifetime | Lifetime | Lifetime |
Min Licenses Purchase Required | 5 | 5 | 3 | 3 |
Upgrades | one year | one year | one year | one year |
Tech Support | one year | one year | one year | one year |
Operating Systems | ||||
Windows 11 (32 & 64 bit) | ||||
Windows 10 (32 & 64 bit) | ||||
Windows 8/8.1 (32 & 64 bit) | ||||
Windows 7 (32 & 64 bit) | ||||
Windows Vista (32 & 64 bit) | ||||
Windows Server 2003/2008/2008R2/2012/2012R2/2016/2019/2022 (32 & 64 bit) | ||||
Windows XP | ||||
Windows 2000 | ||||
Mac OS 10.8 and newer version | ||||
Linux |
Top-level, all-in-one and centralized employee computer monitoring & control & management solution. Compare with EAM Standard, EAM Professional plus the flexible blocking features, daily/weekly/monthly reports features and basic data security feature. Suitable for medium or large company, who has all-around monitoring requirement and basic data protection requirement.
Our most affordable employee monitoring solution for startups and small businesses with powerful features such as real-time activity tracking, video capture and playback, and a set of productivity optimization tools.