| Hardware ID security | SI | SI |
| Running in isolated space (Kiosk Mode) | SI | NO |
| Application monitoring | SI | SI |
| Clipboard locking | SI | SI |
| Internet usage monitoring | SI | SI |
| Print monitoring | SI | SI |
| Keylogger blocking | SI | NO |
| Screenlogger blocking | SI | NO |
| File access control | SI | SI |
| Logging for detailed analysis or forensic investigation | SI | SI |
| Task control and logging | NO | SI |
| Screen shot logging | NO | SI |
| Process blocking according to policies | SI | SI |
| Blocking file uploads to the cloud or USB sticks | SI | SI |
| Video activity logging | NO | SI |
| Activity reports and alerts | SI | SI |