Hardware ID security | SI | SI |
Running in isolated space (Kiosk Mode) | SI | NO |
Application monitoring | SI | SI |
Clipboard locking | SI | SI |
Internet usage monitoring | SI | SI |
Print monitoring | SI | SI |
Keylogger blocking | SI | NO |
Screenlogger blocking | SI | NO |
File access control | SI | SI |
Logging for detailed analysis or forensic investigation | SI | SI |
Task control and logging | NO | SI |
Screen shot logging | NO | SI |
Process blocking according to policies | SI | SI |
Blocking file uploads to the cloud or USB sticks | SI | SI |
Video activity logging | NO | SI |
Activity reports and alerts | SI | SI |