Egnyte Pricing
Select the Best Plan for Your Organization
Business
- Secure collaboration
- Privilege management
- Ransomware protection
$20 / User / Month
Paid Annually
Enterprise Lite
Everything in Business, plus:
- 3rd-party source support
- Content lifecycle management
- Threat detection
Contact us for a custom quote
Enterprise
Everything in Enterprise Lite, plus:
- Privacy & compliance
- Advanced ransomware protection & recovery
- Content safeguards
Contact us for a custom quote
File Sharing And Collaboration
1 Click Co-Editing Edit a document simultaneously across multiple users | |||
Multi-Device Access (mobile, web, desktop) Access files from anywhere on any device | |||
Advanced Search Locate files and folders quickly using advanced functions such as: filters, wildcards and metadata | |||
Unified Admin Dashboard Report on file usage and user permissions and provision from a single control center | |||
Smart Cache Cache large or frequently accessed files locally for fast access, especially in areas of low bandwidth | |||
Public Cloud Connector Synchronize files between Egnyte and public clouds like Azure and Amazon S3 | |||
Global File Locking Automatically lock files to prevent collaborators from overwriting changes | |||
Upload Links Allow external users to securely upload to a specified folder | |||
Folder Templates Create templates to organize repeatable content and reduce project start-up time | |||
Connected Folders Sync folders stored on your computer with specified folders in the cloud | |||
Video Playback Playback video in preview mode across multiple formats and large files. Advanced video playback only available on Enterprise plans. | |||
Mobile PDF Annotation Markup PDFs from the Egnyte mobile app while changes save back to original file | |||
Review & Approval Workflow Assign documents to users to review and approve content in a repeatable and auditable way |
1 Click Co-Editing Edit a document simultaneously across multiple users | ||
Multi-Device Access (mobile, web, desktop) Access files from anywhere on any device | ||
Advanced Search Locate files and folders quickly using advanced functions such as: filters, wildcards and metadata | ||
Unified Admin Dashboard Report on file usage and user permissions and provision from a single control center | ||
Smart Cache Cache large or frequently accessed files locally for fast access, especially in areas of low bandwidth | ||
Public Cloud Connector Synchronize files between Egnyte and public clouds like Azure and Amazon S3 | ||
Global File Locking Automatically lock files to prevent collaborators from overwriting changes | ||
Upload Links Allow external users to securely upload to a specified folder | ||
Folder Templates Create templates to organize repeatable content and reduce project start-up time | ||
Connected Folders Sync folders stored on your computer with specified folders in the cloud | ||
Video Playback Playback video in preview mode across multiple formats and large files. Advanced video playback only available on Enterprise plans. | ||
Mobile PDF Annotation Markup PDFs from the Egnyte mobile app while changes save back to original file | ||
Review & Approval Workflow Assign documents to users to review and approve content in a repeatable and auditable way | ||
Access Governance
Owner Sub-Folder Permissions Folder owner can override automatic permissioning for sub-folders | |||
Granular Permissioning Modify, grant or deny permissions at any level of the folder hierarchy | |||
Permission Audits Report how permissions change over time for internal and external shared folders | |||
User Roles Set different permissions for Admins, Power Users, and Standard roles, or design custom | |||
Login Credential Policy Set domain level password and lockout rules | |||
Multi-Factor Authentication Use Egnyte native SMS / authenticator capabilities or work with current Auth scheme | |||
Unified Permissions Viewer Identify and manage folder, group and user access for Egnyte and non-Egnyte sources | |||
Device Controls for Mobile & Desktop Set access controls on user devices and remotely wipe Egnyte content |
Owner Sub-Folder Permissions Folder owner can override automatic permissioning for sub-folders | ||
Granular Permissioning Modify, grant or deny permissions at any level of the folder hierarchy | ||
Permission Audits Report how permissions change over time for internal and external shared folders | ||
User Roles Set different permissions for Admins, Power Users, and Standard roles, or design custom | ||
Login Credential Policy Set domain level password and lockout rules | ||
Multi-Factor Authentication Use Egnyte native SMS / authenticator capabilities or work with current Auth scheme | ||
Unified Permissions Viewer Identify and manage folder, group and user access for Egnyte and non-Egnyte sources | ||
Device Controls for Mobile & Desktop Set access controls on user devices and remotely wipe Egnyte content | ||
Ransomware Detection and Response
Ransomware Artifact Detection Monitor and alert to ransomware artifacts. Number of artifacts and confidence level of detection varies by plan level. | |||
Email Ransomware Notification Egnyte Tech Support notifies the admin in the event of probable attack | |||
Crowd-Sourced Artifact Updates Automatically updates signatures when new infections are detected | |||
Attack Mitigation Limit attacks to infected files at the source before files are uploaded to the cloud | |||
File & Login Auditing Aggregate suspicious login data and breadcrumbs left by an attack | |||
File Version Recovery Manually restore an older file version to recover from attack | |||
Assisted File Recovery Services Restore large sets of infected files with support from Egnyte's Recovery Desk (priced on per incident basis) | |||
Automated Ransomware Notification Automated email and dashbaord notification of probable attack | |||
Ransomware Blocking Automatically suspend infected endpoints for highly-confident ransomware artifacts | |||
Zero Day Behavior-Based Detection Detect abnormal behavior that might signal a probable ransomware attack | |||
Advanced Snapshot & Recovery Restore snapshots of large folder structures in minutes, if files are deleted or encrypted | Optional | Optional |
Ransomware Artifact Detection Monitor and alert to ransomware artifacts. Number of artifacts and confidence level of detection varies by plan level. | ||
Email Ransomware Notification Egnyte Tech Support notifies the admin in the event of probable attack | ||
Crowd-Sourced Artifact Updates Automatically updates signatures when new infections are detected | ||
Attack Mitigation Limit attacks to infected files at the source before files are uploaded to the cloud | ||
File & Login Auditing Aggregate suspicious login data and breadcrumbs left by an attack | ||
File Version Recovery Manually restore an older file version to recover from attack | ||
File & Login Auditing Aggregate suspicious login data and breadcrumbs left by an attack | ||
Assisted File Recovery Services Restore large sets of infected files with support from Egnyte's Recovery Desk (priced on per incident basis) | ||
Automated Ransomware Notification Automated email and dashbaord notification of probable attack | ||
Ransomware Blocking Automatically suspend infected endpoints for highly-confident ransomware artifacts | ||
Zero Day Behavior-Based Detection Detect abnormal behavior that might signal a probable ransomware attack | ||
Advanced Snapshot & Recovery Restore snapshots of large folder structures in minutes, if files are deleted or encrypted | ||
Optional | Optional |
Data Controls
Encryption at Rest and in Transit Uses HTTPS and Secure FTP to protect data using AES-256 | |||
File Link Expiry Set link expiration rules by date or number of downloads | |||
Preview Only Links Prevent recipients from downloading, printing or copy and pasting file content | |||
Email Validated Sharing Limit file sharing to specific email addresses and revoke permissions when necessary | |||
Dynamic File Sharing Restrictions Warn users when system detects an attempt to share files containing sensitive data | |||
Encryption Key Management Egnyte managed encryption keys available for all plans. Customer can retain and manage encryption keys on Enterprise plan only | |||
Preview-Only Folder Links Part of Enhanced Sharing Controls, allow recipient to view (but not download) all files in a folder with a single link | |||
Encrypted File Delivery Part of Enhanced Sharing Controls, send encrypted files to a MAC or PC endpoint using FileGuard | |||
Watermarking Part of Enhanced Sharing Controls, automatically watermark sensitive documents upon delivery | |||
Sensitive Content Safeguards Protect sensitive data by automating safeguards for sharing regulated and sensitive data |
Encryption at Rest and in Transit Uses HTTPS and Secure FTP to protect data using AES-256 | ||
File Link Expiry Set link expiration rules by date or number of downloads | ||
Preview Only Links Prevent recipients from downloading, printing, copy and pasting file content | ||
Email Validated Sharing Limit file access to specific email addresses and revoke permissions when necessary | ||
Dynamic File Sharing Restrictions Warn users when system detects an attempt to share files containing sensitive data | ||
Encryption Key Management Egnyte managed encryption keys available for all plans. Customer can retain and manage encryption keys on Enterprise plan only | ||
Preview-Only Folder Links Part of Enhanced Sharing Controls, allow recipient to view (but not download) all files in a folder with a single link | ||
Encrypted File Delivery Part of Enhanced Sharing Controls, send encrypted files to a MAC or PC endpoint using FileGuard | ||
Watermarking Part of Enhanced Sharing Controls, automatically watermark sensitive documents upon delivery | ||
Sensitive Content Safeguards Protect sensitive data by automating safeguards for sharing regulated and sensitive data | ||
Lifecycle Management
Policy Creation Engine Create automated and enforceable policies to manage content throughout its lifecycle | |||
Unified Analytics and Reporting Gain real-time insight into files governed by lifecycle policies, including sensitive content based on regulatory policies | |||
Automated Retention, Deletion & Archiving Designate policies to retain, delete and/or archive files based on file or version creation date | |||
ROTS Management Eliminate Redundant, Obsolete, Trivial, and Stale data to lower storage costs and reduce risk. Classification and content analysis to automatically manage sensitive data lifecycle available on Enterprise plan only |
Policy Creation Engine Create automated and enforceable policies to manage content throughout its lifecycle | ||
Unified Analytics and Reporting Gain real-time insight into files governed by lifecycle policies, including sensitive content based on regulatory policies | ||
Automated Retention, Deletion & Archiving Designate policies to retain, delete and/or archive files based on file or version creation date | ||
ROTS Management Eliminate Redundant, Obsolete, Trivial, and Stale data to lower storage costs and reduce risk. Classification and content analysis to automatically manage sensitive data lifecycle available on Enterprise plan only | ||
Threat Management
Issue Alerting Dashboard notifies when potential file issues are detected | |||
Multi-Variate Anomaly Detection Combine insights across mutliple user behaviors to increase confidence in issue detection | |||
Suspicious Login Detection Detect anomalous user login activity that may indicate a compromised account | |||
Unusual Behavior Detection Detect users who download or delete an unusually large number of files, which may indicate malicious activity | |||
Risk Summary Dashboard Gain a unified view of content issues and risks, ranked and scored to support focused remediation efforts | |||
Issue Prioritization and Resolution View risk scores and take action on recommended resolutions with 1 click | |||
Audit Reporting Aggregate insights to support reporting on unusual file activity |
Issue Alerting Dashboard notifies when potential file issues are detected | ||
Multi-Variate Anomaly Detection Combine insights across mutliple user behaviors to increase confidence in issue detection | ||
Suspicious Login Detection Detect anomalous user login activity that may indicate a compromised account | ||
Unusual Behavior Detection Detect users who download or delete an unusually large number of files, which may indicate malicious activity | ||
Risk Summary Dashboard Gain a unified view of content issues and risks, ranked and scored to support focused remediation efforts | ||
Issue Prioritization and Resolution View risk scores and take action on recommended resolutions with 1 click | ||
Audit Reporting Aggregate insights to support reporting on unusual file activity | ||
Privacy and Compliance
Legal Hold Retain content related to legal issues by securing all files created by a selected user or that reside in specific folders | |||
Automated Compliance Management Facilitate compliance with government regulations and data privacy policies from a single viewer | |||
Audit & Breach Reporting Access detailed breach reports to provide a quick and effective assessment of impact | |||
Subject Access Request Automatically retrieve documents containing personal information about data subjects |
Legal Hold Retain content related to legal issues by securing all files created by a selected user or that reside in specific folders | ||
Automated Compliance Management Facilitate compliance with government regulations and data privacy policies from a single viewer | ||
Audit & Breach Reporting Access detailed breach reports to provide a quick and effective assessment of impact | ||
Subject Access Request Automatically retrieve documents containing personal information about data subjects | ||
Discovery and Classification
Data Discovery Discover locations storing sensitive data with pre-built and customized policies | |||
Document Type Identification Automatically identify common document types with natural language processing, such as invoices, contracts and resumes | |||
Sensitive Data Classification Policies Create policies with a single-click from 500+ pre-built classification patterns relevant to industry and global data privacy regulations |
Data Discovery Discover locations storing sensitive data with pre-built and customized policies | ||
Document Type Identification Automatically identify common document types with natural language processing, such as invoices, contracts and resumes | ||
Sensitive Data Classification Policies Create policies with a single-click from 500+ pre-built classification patterns relevant to industry and global data privacy regulations | ||
Storage Included Base amount of storage included in each plan | Custom | Custom | Custom |
Max File Size Maximum size alllowed for a single file | 100GB | 100GB | 100GB |
Domains Included Number of account domains included with each plan | 1 | 1 Primary / 5 Secondary | 1 Primary / 5 Secondary |
Data Residency Options Off-Egnyte repository for file storage, choose from available locations in Azure, AWS and GCP | No | Yes | Yes |
Multi-Source Governance Use Egnyte to govern sensitive data in other cloud respositories and email systems | No | Optional | Optional |
Role Based Administration Delegate administrative tasks and features to a subset of business users | No | Yes | Yes |
User Authentication Choose your authentication method from password policy enforcement to 2FA. AD and SSO/SAML (optional on Business Plans) | Yes | Yes | Yes |
150+ Industry Application Integrations Work seamlessly with common industry and business applications | Yes | Yes | Yes |
Open APIs, Webhooks and SDKs Access Egnyte's capabilities to create customized business applications | Yes | Yes | Yes |
Self-Service Migration Single click migration of files, folders and permissions to Egnyte | Yes | Yes | Yes |
Support Services Included support plans for every plan | Standard | Standard | Standard |
Professional Services White-glove services for implementation, migration, health checks, comprehensive ransomware recovery and more | Optional | Optional | Optional |
Storage Included Base amount of storage included in each plan | ||
Custom | Custom | Custom |
Max File Size Maximum size alllowed for a single file | ||
100GB | 100GB | 100GB |
Domains Included Number of account domains included with each plan | ||
1 | 1 Primary / 5 Secondary | 1 Primary / 5 Secondary |
Data Residency Options Off-Egnyte repository for file storage, choose from available locations in Azure, AWS and GCP | ||
No | Yes | Yes |
Multi-Source Governance Use Egnyte to govern sensitive data in other cloud respositories and email systems | ||
No | Optional | Optional |
Role Based Administration Delegate administrative tasks and features to a subset of business users | ||
No | Yes | Yes |
User Authentication Choose your authentication method from password policy enforcement to 2FA. AD and SSO/SAML (optional on Business Plans) | ||
Yes | Yes | Yes |
150+ Industry Application Integrations Work seamlessly with common industry and business applications | ||
Yes | Yes | Yes |
Open APIs, Webhooks and SDKs Access Egnyte's capabilities to create customized business applications | ||
Yes | Yes | Yes |
Self-Service Migration Single click migration of files, folders and permissions to Egnyte | ||
Yes | Yes | Yes |
Support Services Included support plans for every plan | ||
Standard | Standard | Standard |
Professional Services White-glove services for implementation, migration, health checks, comprehensive ransomware recovery and more | ||
Optional | Optional | Optional |
