Platform Plans

Select the best plan for your organization

Business

  • Internal and external file sharing
  • Desktop and web co-editing
  • Granular, NTFS-like permissions
  • Ransomware protection
  • Multi-cloud and hybrid options

Start Free Trial

$20 / User / Month
Paid annually

Enterprise Lite

Everything in Business, plus:
  • User permissions dashboard
  • Content lifecycle management
  • Unusual behavior detection
  • Issue remediation
  • Review and approval workflows
Contact Us
Contact us for a custom quote

Enterprise

Everything in Enterprise Lite, plus:
  • AI-powered content classification
  • Content sharing safeguards
  • Automated compliance workflows
  • SAR/DSAR fulfillment
  • Watermarking
Contact Us
Contact us for a custom quote

Compare Features

Business

Free Trial

Enterprise Lite

Contact Us

Enterprise

Contact Us
Content Collaboration
Search & Knowledge Management
Controlled Sharing
Role-Based Access and Sharing Controls
Provide user types administrative roles for assigning access and sharing permissions
Link Sharing / Upload Links / Password Protected Links
Securely share links, not files and allow external users to upload files to a specified folder
Preview Only Files and Folders
Allow recipient to view (but not download) files and/or folders
Watermarking
Part of Enhanced Sharing Controls, automatically watermark sensitive documents upon delivery
Encrypted File Delivery
Part of Enhanced Sharing Controls, send encrypted files to a MAC or PC endpoint using FileGuard
Sensitive Content Sharing Safeguards
Protect sensitive data by automating safeguards for sharing regulated and sensitive data
Role-Based Access and Sharing Controls
Provide user types administrative roles for assigning access and sharing permissions
Link Sharing / Upload Links / Password Protected Links
Securely share links, not files and allow external users to upload files to a specified folder
Preview Only Files and Folders
Allow recipient to view (but not download) files and/or folders
Watermarking
Part of Enhanced Sharing Controls, automatically watermark sensitive documents upon delivery
Encrypted File Delivery
Part of Enhanced Sharing Controls, send encrypted files to a MAC or PC endpoint using FileGuard
Sensitive Content Sharing Safeguards
Protect sensitive data by automating safeguards for sharing regulated and sensitive data
Library Services
File Versioning
Manually restore an older file version
File Locking
Automatically lock files to prevent collaborators from overwriting changes
Templating
Create templates to organize repeatable content and reduce project start-up time
Metadata
Access metadata to files for search granularity
File Versioning
Manually restore an older file version
File Locking
Automatically lock files to prevent collaborators from overwriting changes
Templating
Create templates to organize repeatable content and reduce project start-up time
Metadata
Access metadata to files for search granularity
Device & User Access Management
Multi-factor Authentication
Use Egnyte native SMS / authenticator capabilities or work with current Auth scheme
Encryption
Uses HTTPS and Secure FTP to protect data using AES-256
Desktop & Mobile Device Control
Set access controls on user devices and remotely wipe Egnyte content
External authentication (AD and SSO/SAML)
Supports SAML, AD, etc. for external authorization
Optional
Multi-factor Authentication
Use Egnyte native SMS / authenticator capabilities or work with current Auth scheme
Encryption
Uses HTTPS and Secure FTP to protect data using AES-256
Desktop & Mobile Device Control
Set access controls on user devices and remotely wipe Egnyte content
External authentication (AD and SSO/SAML)
Supports SAML, AD, etc. for external authorization
Optional
Information Governance/ Records Management
Policy Creation Engine
Create automated and enforceable policies to manage content throughout its lifecycle
Content Lifecycle Analytics & Reporting
Real-time dashboard for files governed by lifecycle policies
RAD/ROTS Management
Automated policies for RAD/ROTS lower storage closts and reduce threat surface
Legal Hold
Retain content related to legal issues by securing all files created by a selected user or that reside in specific folders
Policy Creation Engine
Create automated and enforceable policies to manage content throughout its lifecycle
Content Lifecycle Analytics & Reporting
Real-time dashboard for files governed by lifecycle policies
RAD/ROTS Management
Automated policies for RAD/ROTS lower storage closts and reduce threat surface
Legal Hold
Retain content related to legal issues by securing all files created by a selected user or that reside in specific folders
Discovery & Classification
Data Discovery (including entities within files)
Discover sensitive and regulated data in cloud and on-premises systems
Prebuilt Classification Patterns
Select from over 100 pre-built policies to discover regulated data
Automated Labelling
AI-powered document labeling for documents unique to a business or function
Data Insights Dashboard
Unified view of all in-process policies and impacted data
Proactive Data Minimization
identify and delete duplicate files within an individual Egnyte content source
Data Discovery (including entities within files)
Discover sensitive and regulated data in cloud and on-premises systems
Prebuilt Classification Patterns
Select from over 100 pre-built policies to discover regulated data
Automated Labelling
AI-powered document labeling for documents unique to a business or function
Data Insights Dashboard
Unified view of all in-process policies and impacted data
Proactive Data Minimization
identify and delete duplicate files within an individual Egnyte content source
Issue Detection
Probable Ransomware Issue Detection (Signature-based)
Monitor and alert to ransomware artifacts. Number of artifacts and confidence level of detection varies by plan level.
Data Exfiltration Issue Detection
Aggregate suspicious login data and breadcrumbs left by an attack
Unusual and Suspicious Content Activity
Detect unusual and impossible user login activity between two locations or from a restricted country
External Sharing Issue Detection
Detect out of policy sharing of files with external users
Public Access Issue Detection
Detect unusual user download or deletion of data
Probable Ransomware Issue Detection (AI-powered Behavior-based)
Detect abnormal behavior that might signal a probable ransomware attack
Probable Ransomware Issue Detection (Signature-based)
Monitor and alert to ransomware artifacts. Number of artifacts and confidence level of detection varies by plan level.
Data Exfiltration Issue Detection
Aggregate suspicious login data and breadcrumbs left by an attack
Unusual and Suspicious Content Activity
Detect unusual and impossible user login activity between two locations or from a restricted country
External Sharing Issue Detection
Detect out of policy sharing of files with external users
Public Access Issue Detection
Detect unusual user download or deletion of data
Probable Ransomware Issue Detection (AI-powered Behavior-based)
Detect abnormal behavior that might signal a probable ransomware attack
Access Governance
Granular Permissioning
Modify, grant or deny permissions at any level of the folder hierarchy
Least Privilege Access
Intelligent controls for managing user access to files and folders
Risky User Management (Unusual and Suspicious Access)
Control access based on unusual or impossible user login behavior
Data Owner Management
Assign data controls and permissions to individual owners by function
Granular Permissioning
Modify, grant or deny permissions at any level of the folder hierarchy
Least Privilege Access
Intelligent controls for managing user access to files and folders
Risky User Management (Unusual and Suspicious Access)
Control access based on unusual or impossible user login behavior
Data Owner Management
Assign data controls and permissions to individual owners by function
Remediation & Prevention
Issue Management and Alerting
Includes: Issue Alerting, Issue prioritization and resolution, Risk summary dashboard
Manual & API Based Remediation
Remediation options for True Positive and False Posivitve issues
Unusual and Suspicious Activity Remediation
Deactivate suspicious user accounts based on issue severity
SIEM Integrations
Native integrations and data feeds into Splunk, Sumo Logic and more
Issue Management and Alerting
Includes: Issue Alerting, Issue prioritization and resolution, Risk summary dashboard
Manual & API Based Remediation
Remediation options for True Positive and False Posivitve issues
Unusual and Suspicious Activity Remediation
Deactivate suspicious user accounts based on issue severity
SIEM Integrations
Native integrations and data feeds into Splunk, Sumo Logic and more
Privacy, Audit & Compliance
Compliant Storage (HIPAA, FINRA, SOC2, ISO/IEC 27001)
Compliant storage with the strictest infosec and privacy standards
Data Residency Option
Choose file storage options available on non-Egnyte locations in Azure, AWS and GCP
SAR/DSAR Fulfillment
Automate SAR/DSAR fulfillment and reporting
File & Login Audit Trails
Aggregate insights to support reporting on file and login activity
Predefined Industry Compliance Patterns (Banking and Financial, Healthcare)
Pre-built patterns to discover and manage data under industry compliance requirements
Predefined Regional Compliance Patterns (North America, Europe, Asia Pacific, Latin America)
Pre-built patterns to discover and manage data under regional compliance requirements
Compliant Storage (HIPAA, FINRA, SOC2, ISO/IEC 27001)
Compliant storage with the strictest infosec and privacy standards
Data Residency Option
Choose file storage options available on non-Egnyte locations in Azure, AWS and GCP
SAR/DSAR Fulfillment
Automate SAR/DSAR fulfillment and reporting
File & Login Audit Trails
Aggregate insights to support reporting on file and login activity
Predefined Industry Compliance Patterns (Banking and Financial, Healthcare)
Pre-built patterns to discover and manage data under industry compliance requirements
Predefined Regional Compliance Patterns (North America, Europe, Asia Pacific, Latin America)
Pre-built patterns to discover and manage data under regional compliance requirements
Infrastructure & Administration
Intelligent File Caching
Cache large or frequently accessed files locally for fast access, especially in areas of low bandwidth
Yes Yes Yes
Storage included
Base amount of storage included in each plan
Custom Custom Custom
Max File Size
Maximum size alllowed for a single file
100GB 100GB 100GB
Domains included
Number of account domains included with each plan
1 1 primary / 5 secondary 1 primary / 5 secondary
Unified Admin Dashboard
Single dashboard for managing users, content and issues
Yes Yes Yes
Role Based Administration
Delegate administrative tasks and features to a subset of business users
No Yes Yes
Egnyte to Egnyte Connector
Connect separate Egnyte tenants via a 1-way sync
No Yes Yes
Native App Integrations
Over 100 native integrations with common industry and business applications
Yes Yes Yes
Self-service Migration
Single click migration of files, folders and permissions to Egnyte
Yes Yes Yes
Intelligent File Caching
Cache large or frequently accessed files locally for fast access, especially in areas of low bandwidth
Yes Yes Yes
Storage included
Base amount of storage included in each plan
Custom Custom Custom
Max File Size
Maximum size alllowed for a single file
100GB 100GB 100GB
Domains included
Number of account domains included with each plan
1 1 primary / 5 secondary 1 primary / 5 secondary
Unified Admin Dashboard
Single dashboard for managing users, content and issues
Yes Yes Yes
Role Based Administration
Delegate administrative tasks and features to a subset of business users
No Yes Yes
Egnyte to Egnyte Connector
Connect separate Egnyte tenants via a 1-way sync
No Yes Yes
Native App Integrations
Over 100 native integrations with common industry and business applications
Yes Yes Yes
Self-service Migration
Single click migration of files, folders and permissions to Egnyte
Yes Yes Yes
Services
Support Services
Included support plans for every plan
Standard Standard Standard
Professional Services
Techncial services for implementation, migration, health checks, jumpstarts and more
Optional Optional Optional
Support Services
Included support plans for every plan
Standard Standard Standard
Professional Services
Techncial services for implementation, migration, health checks, jumpstarts and more
Optional Optional Optional

Popular Platform Add-Ons

Data Security and Protection

Protect sensitive content with classification-based security controls and AI-powered detection and remediation

Employee Productivity

Accelerate team productivity by simplifying specialized file handling and content workflows

Infosec and Privacy Control Framework

Reduce compliance costs and regulated data exposure with a pre-configured data enclave and automated workflow and reporting

Data Security and Protection

Protect sensitive content with classification-based security controls and AI-powered detection and remediation

AVAILABLE ADD-ONS

Snapshot and Recovery

With a single click, recover files/folders and associated permissions from a ransomware attack or accidental deletion.

$10 / User / Month
Available on all Plans**
Except Team

Data Security and Governance

Identify and mitigate security risks associated with data stored in 3rd-party cloud and on-premises sources, including email.

Available as an Add-On or as a Stand Alone Plan

Employee Productivity

Accelerate team productivity by simplifying specialized file handling and content workflows

AVAILABLE ADD-ONS

PDF Annotator

Simplify working with PDFs by annotating and creating and
filling forms directly in Egnyte.

$6 / User / Month
Available on all Plans**
Except Team

Infosec and Privacy Control Framework

Reduce compliance costs and regulated data exposure with a pre-configured data enclave and automated workflow and reporting

AVAILABLE ADD-ONS

Infosec and Privacy Control Frameworks

Reduce the cost and time to implement, manage, and satisfy data
regulatory requirements. Available for ISO/ IEC 27001, NIST 800-171,
NIST 800-53, GDPR, CPRA

Get Started With Egnyte Today

Request A Demo