EGNYTE PRICING PLANS FOR BUSINESS
Select the Best Plan for Your Organization
Business
10 - 100 users
- Secure collaboration
- Large file sync & share
- Audit reporting
$20 / User / Month Paid Annually
Enterprise Lite
Everything in Business plus:
- Unusual behavior detection
- Security issue alerting
- Content lifecycle management
Most
Popular
Enterprise
Everything in Enterprise Lite plus:
- AI-based content classification
- Behavior-based ransomware detection
- Subject Access Request and Breach Reporting
Content Collaboration
Mobile App
Access, edit and share content on your mobile device using Egnyte's native apps
|
|||
Desktop App
Edit and save files directly from Mac Finder or Windows Explorer and sync them automatically to Egnyte's cloud
|
|||
1-Click Co-Editing in Google Workspace
Access and co-edit Google Docs, Slides, and Sheets and store them alongside all your other files
|
|||
1-Click Co-Editing in Microsoft Office Online
Access and co-edit Microsoft Word, PowerPoint, and Excel files and store them alongside all your other files
|
|||
Cloud Productivity App Integration
Seamlessly work with commonly used productivity apps such as Microsoft Teams, Slack, Zoom and more
|
|||
Local File Caching
Cache large or frequently-accessed files locally for fast access. Folders can be selectively cached or auto-cached based on machine intelligence
|
|||
Public Cloud File Caching
Cache files to Amazon S3 or Azure BLOB storage for easy access to workflows requiring high-compute environments
|
|||
Folder Templates
Templatized folder structures for common work projects built to reduce project delivery time in service oriented industries such as engineering, construction and advertising
|
|||
Custom Metadata Tagging
Define and assign custom metadata tags to files and folders for classification, policy enforcement, and ease of search
|
|||
Video Playback
Transcode video formats for broader device compatibility and optimal viewing directly from the Egnyte web UI
|
Advanced | Advanced | |
Mobile PDF Annotation
Markup PDFs directly from the Egnyte mobile app while changes save back to the original file
|
Optional |
Mobile App
Access, edit and share content on your mobile device using Egnyte's native apps
|
||
Desktop App
Edit and save files directly from Mac Finder or Windows Explorer and sync them automatically to Egnyte's cloud
|
||
1-Click Co-Editing in Google Workspace
Access and co-edit Google Docs, Slides, and Sheets and store them alongside all your other files
|
||
1-Click Co-Editing in Microsoft Office Online
Access and co-edit Microsoft Word, PowerPoint, and Excel files and store them alongside all your other files
|
||
Cloud Productivity App Integration
Seamlessly work with commonly used productivity apps such as Microsoft Teams, Slack, Zoom and more
|
||
Local File Caching
Cache large or frequently-accessed files locally for fast access. Folders can be selectively cached or auto-cached based on machine intelligence
|
||
Folder Templates
Templatized folder structures for common work projects built to reduce project delivery time in service oriented industries such as engineering, construction and advertising
|
||
Custom Metadata Tagging
Define and assign custom metadata tags to files and folders for classification, policy enforcement, and ease of use
|
||
Video Playback
Transcode video formats for broader device compatibility and optimal viewing directly from the Egnyte web UI
|
||
Advanced | Advanced | |
Mobile PDF Annotation
Markup PDFs directly from the Egnyte mobile app while changes save back to the original file
|
||
Optional |
Security
Two-Factor Authentication
Apply 2-factor authentication upon user log-in or use 2FA/MFA with your SSO provider
|
Basic | Enhanced | Enhanced |
Strong Password Policy Enforcement
Set minimum password requirements including length, complexity, and frequency of password changes
|
|||
Global File Access Policies
Set global access policies for files and folders to minimize improper file sharing
|
|||
Granular Sub-Folder Permissions
Configure folder permissions to remove individual users or disable inheritance for specific subfolders
|
|||
File Link Expiry
Set file link expiry rules based on a specific date or number of downloads
|
|||
Password-Protected Links
Safeguard public links via a system-generated or custom password
|
|||
Unified Folder Permissions Viewer
Display access permissions to identify and manage folders usage. Non-Egnyte sources can be added to both Enterprise Lite and Enterprise plans
|
|||
Mobile Device Control
Remotely wipe Egnyte content synced to a mobile device. Set access controls on iOS and Android, such as requiring device passwords and encrypting device storage
|
|||
Desktop Device Control
Remotely wipe Egnyte content synced to the desktop. Set functional restrictions such as controlling which users can sync files to the desktop and preventing the upload of specific files
|
|||
Security Issue Alerting
Configure sensitive content alerts and then view in a single dashboard, to quickly identify potential security issues with sensitive data
|
|||
Unusual User Behavior Detection
Identify behaviors that are uncharacteristic of a given user to determine legitimacy and prevent data theft
|
Machine Learning-Based | ||
Zero-Day Ransomware Detection
Identify system file activity with ransomware signatures and remediate by disabling affected users
|
Machine Learning-Based | ||
Sensitive Content Safeguards
Create policies that apply restrictions to sharing content based on sensitive data classification (PII, HIPAA, PCI), metadata, content location and more
|
Machine Learning-Based | ||
Encryption Key Management
Augment encryption with your own key atop Egnyte’s best in class key management
|
Two-Factor Authentication
Apply 2-factor authentication upon user log-in or use 2FA/MFA with your SSO provider
|
||
Basic | Enhanced | Enhanced |
Strong Password Policy Enforcement
Set minimum password requirements including length, complexity, and frequency of password changes
|
||
Global File Access Policies
Set global access policies for files and folders to minimize improper file sharing
|
||
Granular Sub-Folder Permissions
Configure folder permissions to remove individual users or disable inheritance for specific subfolders
|
||
File Link Expiry
Choose how long before a link expires based on a specific date or number of downloads
|
||
Password-Protected Links
Safeguard public links via a system-generated or custom password
|
||
Unified Folder Permissions Viewer
Display access permissions to identify and manage folders usage. Non-Egnyte sources can be added to both Enterprise Lite and Enterprise plans
|
||
Mobile Device Control
Remotely wipe Egnyte content synced to a mobile device. Set access controls on iOS and Android, such as requiring device passwords and encrypting device storage
|
||
Desktop Device Control
Remotely wipe Egnyte content synced to the desktop. Set functional restrictions such as controlling which users can sync files to the desktop and preventing the upload of specific files
|
||
Security Issue Alerting
Configure sensitive content alerts and then view in a single dashboard, to quickly identify potential security issues with sensitive data
|
||
Unusual User Behaviour Detection
Identify behaviors that are uncharacteristic of a given user to determine legitimacy and prevent data theft
|
||
Machine Learning-Based | ||
Zero-Day Ransomware Detection
Identify system file activity with ransomware signatures and remediate by disabling affected users
|
||
Machine Learning-Based | ||
Sensitive Content Safeguards
Create policies that apply restrictions to sharing content based on sensitive data classification (PII, HIPAA, PCI), metadata, content location and more
|
||
Machine Learning-Based | ||
Encryption Key Management
Augment encryption with your own key atop Egnyte’s best in class key management
|
||
Compliance
HIPAA Compliant Storage
Comply with HIPAA requirements (other features and customer actions required for full HIPAA compliance)
|
|||
FINRA Compliant Storage
Comply with FINRA requirements (other features and customer actions required for full FINRA compliance)
|
|||
SOC2 Compliant Storage
Comply with SOC2 requirements
|
|||
GDPR EU Data Residency
Comply with GDPR EU Data Residency requirements
|
|||
ISO/IEC 27001 Compliant Storage
Comply with ISO/IEC 27001 requirements
|
|||
Audit Reporting
Comprehensive audit reporting of file system changes, permission changes and more
|
|||
Breach Reporting
Analyze and report on user activity after a breach to assess business impact, in order to support GDPR and CCPA obligations
|
Machine Learning-Based | ||
Subject Access Request Workflow
Comply with Subject Access Request (SAR) workflow requirements as required by laws such as GDPR and CCPA
|
Machine Learning-Based | ||
Banking and Financial Compliance Patterns
Compliance patterns relevant to the Banking and Financial industries (SOX, PCI)
|
Machine Learning-Based | ||
Healthcare Compliance Patterns
Compliance patterns relevant to the Healthcare industry (HIPAA)
|
Machine Learning-Based | ||
North American Compliance Patterns
Regulatory compliance patterns supporting Federal and State based data privacy frameworks, including CCPA, NY SHIELD, PCI, SOX and more
|
Machine Learning-Based | ||
European Compliance Patterns
Regulatory compliance patterns supporting European data privacy frameworks, including PII for all 28 EU member countries
|
Machine Learning-Based | ||
Asia Pacific Compliance Patterns
Regulatory compliance patterns supporting Asia Pacific data privacy frameworks, including APPI, PDPA and Chinese Data Protection
|
Machine Learning-Based | ||
Latin America Compliance Patterns
Regulatory compliance patterns supporting Latin American data privacy frameworks, including LGPD and LFPD
|
Machine Learning-Based |
HIPAA Compliant Storage
Comply with HIPAA requirements (other features and customer actions required for full HIPAA compliance)
|
||
FINRA Compliant Storage
Comply with FINRA requirements (other features and customer actions required for full FINRA compliance)
|
||
SOC2 Compliant Storage
Comply with SOC2 requirements
|
||
GDPR EU Data Residency
Comply with GDPR EU Data Residency requirements
|
||
ISO/IEC 27001 Compliant Storage
Comply with ISO/IEC 27001 requirements
|
||
Audit Reporting
Comprehensive audit reporting of file system changes, permission changes and more
|
||
Breach Reporting
Analyze and report on user activity after a breach to assess business impact, in order to support GDPR and CCPA obligations
|
||
Machine Learning-Based | ||
Subject Access Request Workflow
Comply with Subject Access Request (SAR) workflow requirements as required by laws such as GDPR and CCPA
|
||
Machine Learning-Based | ||
Banking and Financial Compliance Patterns
Compliance patterns relevant to the Banking and Financial industries (SOX, PCI)
|
||
Machine Learning-Based | ||
Healthcare Compliance Patterns
Compliance patterns relevant to the Healthcare industry (HIPAA)
|
||
Machine Learning-Based | ||
North American Compliance Patterns
Regulatory compliance patterns supporting Federal and State based data privacy frameworks, including CCPA, NY SHIELD, PCI, SOX and more
|
||
Machine Learning-Based | ||
European Compliance Patterns
Regulatory compliance patterns supporting European data privacy frameworks, including PII for all 28 EU member countries
|
||
Machine Learning-Based | ||
Asia Pacific Compliance Patterns
Regulatory compliance patterns supporting Asia Pacific data privacy frameworks, including APPI, PDPA and Chinese Data Protection
|
||
Machine Learning-Based | ||
Latin America Compliance Patterns
Regulatory compliance patterns supporting Latin American data privacy frameworks, including LGPD and LFPD
|
||
Machine Learning-Based |
Governed Data Sources
Egnyte Cloud
Discover and govern regulated and sensitive content in Egnyte Cloud
|
|||
Connected Desktop Folders
Discover and govern files stored on user desktop folders via the Desktop App
|
|||
Windows File Servers
Discover and govern regulated and sensitive content in Windows file servers
|
|||
Microsoft 365
Discover and govern regulated and sensitive content in Microsoft 365
|
|||
Google Workspace
Discover and classify regulated and sensitive content in Google Workspace
|
|||
Box
Discover and classify regulated and sensitive content in Box
|
|||
Dropbox
Discover and classify regulated and sensitive content in Dropbox
|
|||
Public Cloud Storage
Discover and classify regulated and sensitive content in Amazon S3, Azure Blob Storage, and Google Cloud Storage
|
|||
Microsoft Exchange
Discover and classify regulated and sensitive content in Exchange
|
|||
Other Apps and Repositories (Via API)
Discover and classify regulated and sensitive content stored in other cloud apps and data sources
|
Egnyte Cloud
Apply governance policies to content stored in Egnyte cloud
|
||
Connected Desktop Folders
Apply governance polices to files stored on user desktop folders via the Desktop App
|
||
Windows File Servers
Apply governance policies to content stored in Windows file servers
|
||
Microsoft 365
Apply governance policies to content stored in OneDrive and SharePoint Online
|
||
Google Workspace
Apply governance policies to content stored in Google Workspace apps
|
||
Box
Apply governance policies to content stored in Box
|
||
Dropbox
Apply governance policies to content stored in Dropbox
|
||
Public Cloud Storage
Apply governance policies to content stored in AWS, GCS, and Azure
|
||
Microsoft Exchange
Apply governance policies to content stored in Exchange
|
||
Other Apps and Repositories (Via API)
Apply governance policies to content stored in other cloud apps and data sources
|
||
Intelligent Content Classification
Sensitive Content Classification
Identify files that contain sensitive information including credit cards, names, emails, health data and more. Automatically apply custom metadata
|
|||
Automated File Metadata
Identify file types based on contents (e.g. contracts, resumes) and associate with relevant owners, departments. Integrate with public cloud APIs
|
Machine Learning-Based | ||
Keyword Entity Abstraction
Create a policy to identify files that contain custom keywords and associate with relevant metadata
|
Machine Learning-Based |
Sensitive Content Classification
Identify files that contain sensitive information including credit cards, names, emails, health data and more. Automatically apply custom metadata
|
||
Automated File Metadata
Identify file types based on contents (e.g. contracts, resumes) and associate with relevant owners, departments. Can also be integrated with public cloud APIs
|
||
Machine Learning-Based | ||
Keyword Entity Abstraction
Create a policy to identify files that contain custom keywords and associate with relevant metadata
|
||
Machine Learning-Based |
Content Lifecycle Management
Automated File Retention
Create automated retention workflows to prevent new and existing file versions from being purged based on predefined or custom classification policies
|
Optional | Folder Based Policies | Machine Learning-Based Policies |
Automated File Archiving
Create automated archive workflows to archive file versions older than a specified date and match predefined or custom classification policies
|
Optional | Folder Based Policies | Machine Learning-Based Policies |
Automated Defensible Delete
Create automated deletion workflows to delete file versions older than a specified date and match predefined or custom classification policies
|
Optional | Folder Based Policies | Machine Learning-Based Policies |
Redundant, Obsolete, Trivial (ROT) Data Management
Apply automated lifecycle management policies based off file last access date and other criteria
|
Optional |
Automated File Retention
Create automated retention workflows to prevent new and existing file versions from being purged based on predefined or custom classification policies
|
||
Optional | Folder Based Policies | Machine Learning-Based Policies |
Automated File Archiving
Create automated archive workflows to archive file versions older than a specified date and match predefined or custom classification policies
|
||
Optional | Folder Based Policies | Machine Learning-Based Policies |
Automated Defensible Delete Workflow
Create automated deletion workflows to delete file versions older than a specified date and match predefined or custom classification policies
|
||
Optional | Folder Based Policies | Machine Learning-Based Policies |
Redudant, Obsolete, Trivial (ROT) Data Management
Apply automated lifecycle management policies based off file last access date and other criteria
|
||
Optional |
Administration
SCIM User Provisioning
Support for user and groups provisioning (depending on SAML provider) using SCIM 2.0
|
|||
System-Wide Reporting Dashboard
Report on file usage, permissions, log-ins, user and group provisioning, and more from a unified dashboard
|
|||
FTP / SFTP Access
Retire traditional FTP servers with Egnyte's integrated FTP functionality
|
|||
Migration Tools
Efficiently migrate all of your existing files, folders, and folder permissions to Egnyte
|
|||
Developer API
Create custom integrations and workflows using Public APIs
|
|||
Active Directory Integration
Use existing AD to create users and groups in Egnyte, saving deployment time
|
Optional | ||
SSO Integration
Authenticate via 3rd party SSO providers
|
Optional | ||
Role-Based Administration
Delegate specific administrative tasks to another user, such as billing to a user in Finance, or managing project groups to a Project Manager
|
SCIM User Provisioning
Support for user and groups provisioning (depending on SAML provider) using SCIM 2.0
|
||
System-Wide Reporting Dashboard
Report on file usage, permissions, log-ins, user and group provisioning, and more from a unified dashboard
|
||
FTP / SFTP Access
Retire traditional FTP servers with Egnyte's integrated FTP / SFTP functionality
|
||
Migration Tools
Efficiently migrate all of your files, folders, and folder permissions from an on-premises server to Egnyte
|
||
Developer API
Create custom integrations and workflows using Public APIs
|
||
Active Directory Integration
Use existing AD to create users and groups in Egnyte, saving deployment time
|
||
Optional | ||
SSO Integration
Authenticate via 3rd party SSO providers
|
||
Optional | ||
Role-Based Administration
Delegate specific administrative tasks to another user, such as billing to a user in Finance, or managing project groups to a Project Manager
|
||
Plan Basics
Storage Included
Base amount of cloud storage included in the plan
|
1TB + 10GB/user or Custom |
Custom | Custom |
Max File Size
Maximum size allowed for a single file
|
100GB | 100GB | 100GB |
Domains Included
Multiple account domains (acme.eg.com, acmearchive.eg.com, acmeeurope.eg.com, etc) available with higher plans
|
1 | 1 Primary / 5 Secondary | 1 Primary / 5 Secondary |
Custom Access URL
Access and share content through a custom-branded URL
|
Storage Included
Base amount of cloud storage included in the plan
|
||
1TB + 10GB/user or Custom |
Custom | Custom |
Max File Size
Maximum size allowed for a single file
|
||
100GB | 100GB | 100GB |
Domains Included
Multiple account domains (acme.eg.com, acmearchive.eg.com, acmeeurope.eg.com, etc) available with higher plans
|
||
1 | 1 Primary / 5 Secondary | 1 Primary / 5 Secondary |
Custom Access URL
Access your content through a custom URL that's easier for your users to remember and aligns with your brand
|
||
Services & Support
Included Support
|
Standard | Premium | Platinum |
Professional Services
White-glove services for migration, deployment and implementation for a rapid return on investment
|
Optional | Optional | Optional |
Included Support Package
|
||
Standard | Premium | Platinum |
Professional Services
|
||
Optional | Optional | Optional |
