Protect your business with iMonitor EAM The most complete employee computer activities monitoring software
Compare the difference between EAM Professional, EAM Encryption, EAM Standard and EAM Lite
Features | EAM Professional | EAM Encryption | EAM Standard | EAM Lite |
Online Monitoring | ||||
Visited Websites | ![]() |
![]() |
![]() |
|
Instant Messages/Chat | ![]() |
![]() |
![]() |
|
Sent/Received Email | ![]() |
![]() |
![]() |
|
Webmail | ![]() |
![]() |
![]() |
|
Email Attachments | ![]() |
![]() |
![]() |
|
Online Searches | ![]() |
![]() |
![]() |
|
Online Downloads | ![]() |
![]() |
![]() |
|
Accessed URLs | ![]() |
![]() |
![]() |
|
Skype File Transfer | ![]() |
![]() |
![]() |
|
FTP File Transfer | ![]() |
![]() |
![]() |
|
Online Storage | ![]() |
![]() |
![]() |
|
Network Traffic Monitoring & Statistics | ![]() |
![]() |
||
PC Tracking & Management | ||||
Keylogger | ![]() |
![]() |
![]() |
|
Screenshot Recorder | ![]() |
![]() |
![]() |
![]() |
Screenshot Recorder (sorted by different applications) | ![]() |
![]() |
![]() |
![]() |
Screenshot Tool Logs | ![]() |
![]() |
||
Videos | ![]() |
![]() |
||
Live Remote Desktop (multiple remote desktops) | ![]() |
![]() |
![]() |
![]() |
Remote Camera Monitor(Only a few laptops are supported) | ![]() |
![]() |
![]() |
|
File Activity Recorder | ![]() |
![]() |
||
Print Job Monitor | ![]() |
![]() |
![]() |
|
Clipboard Monitor | ![]() |
![]() |
![]() |
|
USB Disk Monitor | ![]() |
![]() |
![]() |
|
Website Time Tracker | ![]() |
![]() |
||
Application Time Tracker | ![]() |
![]() |
![]() |
|
Remote File Management | ![]() |
![]() |
![]() |
|
Remote Task Manager | ![]() |
![]() |
![]() |
|
Keyword Detector | ![]() |
![]() |
||
Real-Time Alerts | ![]() |
![]() |
![]() |
|
Hardware and Software Asset Management | ![]() |
![]() |
||
Centralized Managing Module | ![]() |
![]() |
![]() |
|
Automatically Backing Up Edited Files (customizable file type and file size) | ![]() |
![]() |
||
Keylogger (sorted by different applications) | ![]() |
![]() |
||
Used Applications (sorted by different types) | ![]() |
![]() |
![]() |
|
Clipboard Monitor (sorted by different APPs) | ![]() |
![]() |
![]() |
|
File Activity Recorder (sorted by different types) | ![]() |
![]() |
![]() |
|
Real Time Desktop Monitoring | ![]() |
![]() |
![]() |
|
Share Folder Management | ![]() |
![]() |
![]() |
|
IP Address Viewer | ![]() |
![]() |
![]() |
|
Auto-run Item Management | ![]() |
![]() |
![]() |
|
Software Installation/Uninstallation History | ![]() |
![]() |
![]() |
|
Install/Uninstall Software Remotely | ![]() |
![]() |
![]() |
|
Remote Screen Lock | ![]() |
![]() |
![]() |
|
Remote Control of Screen Saver | ![]() |
![]() |
![]() |
|
Remote Restart/Shut Down/Log Off | ![]() |
![]() |
![]() |
|
Remote Command | ![]() |
![]() |
![]() |
|
Live Remote Desktop & Control | ||||
Multiple Live Remote Desktops (up to 30 screens in one window) | ![]() |
![]() |
![]() |
|
Remote Desktop & Keyboard and Mouse Control | ![]() |
![]() |
![]() |
![]() |
Documents / files protection | ||||
Log file usages (copy, move, delete, rename, create, modify.) | ![]() |
![]() |
||
Log file transfers | ![]() |
![]() |
||
Disable USB storage devices | ![]() |
![]() |
||
Make USB storage devices readonly | ![]() |
![]() |
||
Encrypt file transfer in E-mail application (Outlook, Foxmail, etc.) | ![]() |
|||
Encrypt file transfer in web page (Webmail, Facebook, Online storage, etc.) | ![]() |
|||
Encrypt file transfer in IM clients (Skype, QQ, Wechat, Facebook, etc.) | ![]() |
|||
Block file transfer in E-mail application (Outlook, Foxmail, etc.) | ![]() |
![]() |
||
Block file transfer in web page (Webmail, Facebook, Online storage, etc.) | ![]() |
![]() |
||
Block file transfer in IM clients (Skype, QQ, Wechat, Facebook, etc.) | ![]() |
![]() |
||
Collect important docs from employee's computer and backup them on the server | ![]() |
![]() |
||
Take a copy when user transfer file to outside | ![]() |
![]() |
||
File Transfer Risk Events | ![]() |
![]() |
||
Filtering & Blocking | ||||
Block Application Installation | ![]() |
![]() |
||
Website Filtering & Blocking | ![]() |
![]() |
||
Social Network Blocking | ![]() |
![]() |
||
Webmail Blocking | ![]() |
![]() |
||
Keyword Blocking | ![]() |
![]() |
||
Application Blocking | ![]() |
![]() |
||
Portable Drive Blocking | ![]() |
![]() |
||
Gaming Blocking | ![]() |
![]() |
||
Website Blocking in Specific Time Sections | ![]() |
![]() |
||
Application Blocking in Specific Time Sections | ![]() |
![]() |
||
Real-time Alerts(Send Alerts to Manager's PC) | ||||
Agent Starts Running | ![]() |
![]() |
![]() |
|
Removable Disk Connected/Disconnected | ![]() |
![]() |
![]() |
|
File Activities On Removable Disk | ![]() |
![]() |
![]() |
|
File Copy/Move | ![]() |
![]() |
![]() |
|
Document Printing | ![]() |
![]() |
![]() |
|
File Downloading from Website | ![]() |
![]() |
![]() |
|
File Transfer from/to FTP | ![]() |
![]() |
![]() |
|
User Trying to Run a Blocked Program | ![]() |
![]() |
||
User Trying to Visit a Blocked Website | ![]() |
![]() |
||
Network Traffic Exceeds Maximum | ![]() |
![]() |
||
Keyword Detected | ![]() |
![]() |
||
Reporting Methods | ||||
Export an Excel file | ![]() |
![]() |
||
More than 40 Kinds of Build-in Reports | ![]() |
![]() |
||
Visual Statistics and Analysis |
![]() |
![]() |
||
Graphic charts | ![]() |
![]() |
||
Top 20 Reports | ![]() |
![]() |
![]() |
|
Search Capabilities | ![]() |
![]() |
![]() |
|
Comprehensive HTML Reports | ![]() |
![]() |
||
Global search in all records to locate key data by keywords | ![]() |
![]() |
||
Other Features | ||||
Client Grouping Management | ![]() |
![]() |
![]() |
![]() |
Cross-subnet Monitoring | TCP connections OK | TCP connections OK | TCP connections OK | TCP connections OK |
Remote Monitoring through Internet | Need Public Internet IP | Need Public Internet IP | Need Public Internet IP | Need Public Internet IP |
Centralized Management Console | ![]() |
![]() |
![]() |
![]() |
Remote Management | ![]() |
![]() |
![]() |
![]() |
Remote Control(Control remote computer's mouse and keyboard) | ![]() |
![]() |
![]() |
![]() |
Send Instant Message to Remote User | ![]() |
![]() |
![]() |
|
Send File to Remote User | ![]() |
![]() |
![]() |
|
Get File from Remote PC | ![]() |
![]() |
![]() |
|
Remote Agent Installation | ![]() |
![]() |
![]() |
![]() |
Audit Company Software Asset | ![]() |
![]() |
![]() |
|
Audit Company Hardware Asset | ![]() |
![]() |
![]() |
|
Centralized Database | ![]() |
![]() |
![]() |
![]() |
Stealth Mode | ![]() |
![]() |
![]() |
![]() |
Password Protection | ![]() |
![]() |
![]() |
![]() |
Multi-user Account | ![]() |
![]() |
![]() |
![]() |
Limited User Account | ![]() |
![]() |
![]() |
![]() |
User Login History | ![]() |
![]() |
![]() |
|
Agent PC Online Status | ![]() |
![]() |
![]() |
|
Database Backup | ![]() |
![]() |
![]() |
![]() |
Offline/Online Computer Monitoring | ![]() |
![]() |
![]() |
![]() |
EAM Client IP settings | No settings required | No settings required | No settings required | No settings required |
EAM Server IP settings | Static IP | Static IP | Static IP | Static IP |
Multi-user Account Monitoring | ![]() |
![]() |
![]() |
![]() |
Terminal Server & CITRIX Monitoring | Extra charge for more than 3 users | Extra charge for more than 3 users | Extra charge for more than 3 users | Extra charge for more than 3 users |
Licensing & Support | ||||
Validity of License | Lifetime | Lifetime | Lifetime | Lifetime |
Min Licenses Purchase Required | 5 | 5 | 3 | 3 |
Upgrades | one year | one year | one year | one year |
Tech Support | one year | one year | one year | one year |
Operating Systems | ||||
Windows 11 (32 & 64 bit) | ![]() |
![]() |
![]() |
![]() |
Windows 10 (32 & 64 bit) | ![]() |
![]() |
![]() |
![]() |
Windows 8/8.1 (32 & 64 bit) | ![]() |
![]() |
![]() |
![]() |
Windows 7 (32 & 64 bit) | ![]() |
![]() |
![]() |
![]() |
Windows Vista (32 & 64 bit) | ![]() |
![]() |
![]() |
![]() |
Windows Server 2003/2008/2008R2/2012/2012R2/2016/2019/2022 (32 & 64 bit) | ![]() |
![]() |
![]() |
![]() |
Windows XP | ![]() |
![]() |
![]() |
![]() |
Windows 2000 | ![]() |
![]() |
![]() |
![]() |
Mac OS 10.8 and newer version | ![]() |
![]() |
![]() |
![]() |
Linux | ![]() |
![]() |
![]() |
![]() |
Top-level, all-in-one and centralized employee computer monitoring & control & management solution. Compare with EAM Standard, EAM Professional plus the flexible blocking features, daily/weekly/monthly reports features and basic data security feature. Suitable for medium or large company, who has all-around monitoring requirement and basic data protection requirement.
Our most affordable employee monitoring solution for startups and small businesses with powerful features such as real-time activity tracking, video capture and playback, and a set of productivity optimization tools.