Protect your business with iMonitor EAM The most complete employee computer activities monitoring software
Compare the difference between EAM Professional, EAM Encryption, EAM Standard and EAM Lite
| Features | EAM Professional | EAM Encryption | EAM Standard | EAM Lite |
| Online Monitoring | ||||
| Visited Websites | ![]() |
![]() |
![]() |
|
| Instant Messages/Chat | ![]() |
![]() |
![]() |
|
| Sent/Received Email | ![]() |
![]() |
![]() |
|
| Webmail | ![]() |
![]() |
![]() |
|
| Email Attachments | ![]() |
![]() |
![]() |
|
| Online Searches | ![]() |
![]() |
![]() |
|
| Online Downloads | ![]() |
![]() |
![]() |
|
| Accessed URLs | ![]() |
![]() |
![]() |
|
| Skype File Transfer | ![]() |
![]() |
![]() |
|
| FTP File Transfer | ![]() |
![]() |
![]() |
|
| Online Storage | ![]() |
![]() |
![]() |
|
| Network Traffic Monitoring & Statistics | ![]() |
![]() |
||
| PC Tracking & Management | ||||
| Keylogger | ![]() |
![]() |
![]() |
|
| Screenshot Recorder | ![]() |
![]() |
![]() |
![]() |
| Screenshot Recorder (sorted by different applications) | ![]() |
![]() |
![]() |
![]() |
| Screenshot Tool Logs | ![]() |
![]() |
||
| Videos (Optional) | ![]() |
![]() |
||
| Live Remote Desktop (multiple remote desktops) | ![]() |
![]() |
![]() |
![]() |
| Remote Camera Monitor(Only a few laptops are supported) | ![]() |
![]() |
![]() |
|
| File Activity Recorder | ![]() |
![]() |
||
| Print Job Monitor | ![]() |
![]() |
![]() |
|
| Clipboard Monitor | ![]() |
![]() |
![]() |
|
| USB Disk Monitor | ![]() |
![]() |
![]() |
|
| Website Time Tracker | ![]() |
![]() |
||
| Application Time Tracker | ![]() |
![]() |
![]() |
|
| Remote File Management | ![]() |
![]() |
![]() |
|
| Remote Task Manager | ![]() |
![]() |
![]() |
|
| Keyword Detector | ![]() |
![]() |
||
| Real-Time Alerts | ![]() |
![]() |
![]() |
|
| Hardware and Software Asset Management | ![]() |
![]() |
||
| Centralized Managing Module | ![]() |
![]() |
![]() |
|
| Automatically Backing Up Edited Files (customizable file type and file size) | ![]() |
![]() |
||
| Keylogger (sorted by different applications) | ![]() |
![]() |
||
| Used Applications (sorted by different types) | ![]() |
![]() |
![]() |
|
| Clipboard Monitor (sorted by different APPs) | ![]() |
![]() |
![]() |
|
| File Activity Recorder (sorted by different types) | ![]() |
![]() |
![]() |
|
| Real Time Desktop Monitoring | ![]() |
![]() |
![]() |
|
| Share Folder Management | ![]() |
![]() |
![]() |
|
| IP Address Viewer | ![]() |
![]() |
![]() |
|
| Auto-run Item Management | ![]() |
![]() |
![]() |
|
| Software Installation/Uninstallation History | ![]() |
![]() |
![]() |
|
| Install/Uninstall Software Remotely | ![]() |
![]() |
![]() |
|
| Remote Screen Lock | ![]() |
![]() |
![]() |
|
| Remote Control of Screen Saver | ![]() |
![]() |
![]() |
|
| Remote Restart/Shut Down/Log Off | ![]() |
![]() |
![]() |
|
| Remote Command | ![]() |
![]() |
![]() |
|
| Live Remote Desktop & Control | ||||
| Multiple Live Remote Desktops (up to 30 screens in one window) | ![]() |
![]() |
![]() |
|
| Remote Desktop & Keyboard and Mouse Control | ![]() |
![]() |
![]() |
![]() |
| Documents / files protection | ||||
| Log file usages (copy, move, delete, rename, create, modify.) | ![]() |
![]() |
||
| Log file transfers | ![]() |
![]() |
||
| Disable USB storage devices | ![]() |
![]() |
||
| Make USB storage devices readonly | ![]() |
![]() |
||
| Encrypt file transfer in E-mail application (Outlook, Foxmail, etc.) | ![]() |
|||
| Encrypt file transfer in web page (Webmail, Facebook, Online storage, etc.) | ![]() |
|||
| Encrypt file transfer in IM clients (Skype, QQ, Wechat, Facebook, etc.) | ![]() |
|||
| Block file transfer in E-mail application (Outlook, Foxmail, etc.) | ![]() |
![]() |
||
| Block file transfer in web page (Webmail, Facebook, Online storage, etc.) | ![]() |
![]() |
||
| Block file transfer in IM clients (Skype, QQ, Wechat, Facebook, etc.) | ![]() |
![]() |
||
| Collect important docs from employee's computer and backup them on the server | ![]() |
![]() |
||
| Take a copy when user transfer file to outside | ![]() |
![]() |
||
| File Transfer Risk Events | ![]() |
![]() |
||
| Document transfer approval (optional) | ![]() |
![]() |
||
| Watermark (optional) | ![]() |
![]() |
||
| Filtering & Blocking | ||||
| Block Application Installation | ![]() |
![]() |
||
| Website Filtering & Blocking | ![]() |
![]() |
||
| Social Network Blocking | ![]() |
![]() |
||
| Webmail Blocking | ![]() |
![]() |
||
| Keyword Blocking | ![]() |
![]() |
||
| Application Blocking | ![]() |
![]() |
||
| Portable Drive Blocking | ![]() |
![]() |
||
| Gaming Blocking | ![]() |
![]() |
||
| Website Blocking in Specific Time Sections | ![]() |
![]() |
||
| Application Blocking in Specific Time Sections | ![]() |
![]() |
||
| Real-time Alerts(Send Alerts to Manager's PC) | ||||
| Agent Starts Running | ![]() |
![]() |
![]() |
|
| Removable Disk Connected/Disconnected | ![]() |
![]() |
![]() |
|
| File Activities On Removable Disk | ![]() |
![]() |
![]() |
|
| File Copy/Move | ![]() |
![]() |
![]() |
|
| Document Printing | ![]() |
![]() |
![]() |
|
| File Downloading from Website | ![]() |
![]() |
![]() |
|
| File Transfer from/to FTP | ![]() |
![]() |
![]() |
|
| User Trying to Run a Blocked Program | ![]() |
![]() |
||
| User Trying to Visit a Blocked Website | ![]() |
![]() |
||
| Network Traffic Exceeds Maximum | ![]() |
![]() |
||
| Keyword Detected | ![]() |
![]() |
||
| Reporting Methods | ||||
| Export an Excel file | ![]() |
![]() |
||
| More than 40 Kinds of Build-in Reports | ![]() |
![]() |
||
| Visual Statistics and Analysis |
![]() |
![]() |
||
| Graphic charts | ![]() |
![]() |
||
| Top 20 Reports | ![]() |
![]() |
![]() |
|
| Search Capabilities | ![]() |
![]() |
![]() |
|
| Comprehensive HTML Reports | ![]() |
![]() |
||
| Global search in all records to locate key data by keywords | ![]() |
![]() |
||
| Other Features | ||||
| Client Grouping Management | ![]() |
![]() |
![]() |
![]() |
| Cross-subnet Monitoring | TCP connections OK | TCP connections OK | TCP connections OK | TCP connections OK |
| Remote Monitoring through Internet | Need Public Internet IP | Need Public Internet IP | Need Public Internet IP | Need Public Internet IP |
| Centralized Management Console | ![]() |
![]() |
![]() |
![]() |
| Remote Management | ![]() |
![]() |
![]() |
![]() |
| Remote Control(Control remote computer's mouse and keyboard) | ![]() |
![]() |
![]() |
![]() |
| Send Instant Message to Remote User | ![]() |
![]() |
![]() |
|
| Send File to Remote User | ![]() |
![]() |
![]() |
|
| Get File from Remote PC | ![]() |
![]() |
![]() |
|
| Remote Agent Installation | ![]() |
![]() |
![]() |
![]() |
| Audit Company Software Asset | ![]() |
![]() |
![]() |
|
| Audit Company Hardware Asset | ![]() |
![]() |
![]() |
|
| Centralized Database | ![]() |
![]() |
![]() |
![]() |
| Stealth Mode | ![]() |
![]() |
![]() |
![]() |
| Password Protection | ![]() |
![]() |
![]() |
![]() |
| Multi-user Account | ![]() |
![]() |
![]() |
![]() |
| Limited User Account | ![]() |
![]() |
![]() |
![]() |
| User Login History | ![]() |
![]() |
![]() |
|
| Agent PC Online Status | ![]() |
![]() |
![]() |
|
| Database Backup | ![]() |
![]() |
![]() |
![]() |
| Offline/Online Computer Monitoring | ![]() |
![]() |
![]() |
![]() |
| EAM Client IP settings | No settings required | No settings required | No settings required | No settings required |
| EAM Server IP settings | Static IP | Static IP | Static IP | Static IP |
| Multi-user Account Monitoring | ![]() |
![]() |
![]() |
![]() |
| Terminal Server & CITRIX Monitoring | Extra charge for more than 3 users | Extra charge for more than 3 users | Extra charge for more than 3 users | Extra charge for more than 3 users |
| Licensing & Support | ||||
| Validity of License | Lifetime | Lifetime | Lifetime | Lifetime |
| Min Licenses Purchase Required | 5 | 5 | 3 | 3 |
| Upgrades | one year | one year | one year | one year |
| Tech Support | one year | one year | one year | one year |
| Operating Systems | ||||
| Windows 11 (32 & 64 bit) | ![]() |
![]() |
![]() |
![]() |
| Windows 10 (32 & 64 bit) | ![]() |
![]() |
![]() |
![]() |
| Windows 8/8.1 (32 & 64 bit) | ![]() |
![]() |
![]() |
![]() |
| Windows 7 (32 & 64 bit) | ![]() |
![]() |
![]() |
![]() |
| Windows Vista (32 & 64 bit) | ![]() |
![]() |
![]() |
![]() |
| Windows Server 2003/2008/2008R2/2012/2012R2/2016/2019/2022 (32 & 64 bit) | ![]() |
![]() |
![]() |
![]() |
| Windows XP | ![]() |
![]() |
![]() |
![]() |
| Windows 2000 | ![]() |
![]() |
![]() |
![]() |
| Mac OS 10.8 and newer version | ![]() |
![]() |
![]() |
![]() |
| Linux | ![]() |
![]() |
![]() |
![]() |
Top-level, all-in-one and centralized employee computer monitoring & control & management solution. Compare with EAM Standard, EAM Professional plus the flexible blocking features, daily/weekly/monthly reports features and basic data security feature. Suitable for medium or large company, who has all-around monitoring requirement and basic data protection requirement.
Our most affordable employee monitoring solution for startups and small businesses with powerful features such as real-time activity tracking, video capture and playback, and a set of productivity optimization tools.