Select the Best Plan for Your Organization
Business
- Secure content collaboration
- Edge caching
- File and login auditing
Most Popular
Enterprise Lite
- Content lifecycle management
- Security issue detection
- Viewing with download restriction
- Data residency options
Enterprise
- Sensitive content classification
- Dynamic watermarking
- Legal hold
- OCR Search
- Snapshot and Recovery
Role-Based Access and Sharing Controls Provide user types administrative roles for assigning access and sharing permissions | |||
Link Sharing / Upload Links / Password Protected Links Securely share links, not files and allow external users to upload files to a specified folder | |||
Preview Only Files and Folders Allow recipient to view (but not download) files and/or folders | |||
Watermarking Part of Enhanced Sharing Controls, automatically watermark sensitive documents upon delivery | |||
Sensitive Content Sharing Safeguards Protect sensitive data by automating safeguards for sharing regulated and sensitive data |
Role-Based Access and Sharing Controls Provide user types administrative roles for assigning access and sharing permissions | ||
Link Sharing / Upload Links / Password Protected Links Securely share links, not files and allow external users to upload files to a specified folder | ||
Preview Only Files and Folders Allow recipient to view (but not download) files and/or folders | ||
Watermarking Part of Enhanced Sharing Controls, automatically watermark sensitive documents upon delivery | ||
Sensitive Content Sharing Safeguards Protect sensitive data by automating safeguards for sharing regulated and sensitive data | ||
File Versioning Manually restore an older file version | |||
File Locking Automatically lock files to prevent collaborators from overwriting changes | |||
Templating Create templates to organize repeatable content and reduce project start-up time | |||
Metadata Attach metadata to files for search granularity |
File Versioning Manually restore an older file version | ||
File Locking Automatically lock files to prevent collaborators from overwriting changes | ||
Templating Create templates to organize repeatable content and reduce project start-up time | ||
Metadata Attach metadata to files for search granularity | ||
Multi-factor Authentication Use Egnyte native SMS / authenticator capabilities or work with current Auth scheme | |||
Encryption Uses HTTPS and Secure FTP to protect data using AES-256 | |||
Desktop & Mobile Device Control Set access controls on user devices and remotely wipe Egnyte content | |||
External authentication (AD and SSO/SAML) Supports SAML, AD, etc. for external authorization | Optional |
Multi-factor Authentication Use Egnyte native SMS / authenticator capabilities or work with current Auth scheme | ||
Encryption Uses HTTPS and Secure FTP to protect data using AES-256 | ||
Desktop & Mobile Device Control Set access controls on user devices and remotely wipe Egnyte content | ||
External authentication (AD and SSO/SAML) Supports SAML, AD, etc. for external authorization | ||
Optional |
Policy Creation Engine Create automated and enforceable policies to manage content throughout its lifecycle | |||
Content Lifecycle Analytics & Reporting Real-time dashboard for files governed by lifecycle policies | |||
RAD/ROTS Management Automated policies for RAD/ROTS lower storage costs and reduce threat surface | |||
Legal Hold Retain content related to legal issues by securing all files created by a selected user or that reside in specific folders |
Policy Creation Engine Create automated and enforceable policies to manage content throughout its lifecycle | ||
Content Lifecycle Analytics & Reporting Real-time dashboard for files governed by lifecycle policies | ||
RAD/ROTS Management Automated policies for RAD/ROTS lower storage costs and reduce threat surface | ||
Legal Hold Retain content related to legal issues by securing all files created by a selected user or that reside in specific folders | ||
Data Discovery (including entities within files) Discover sensitive and regulated data in cloud and on-premises systems | |||
Prebuilt Classification Patterns Select from over 100 pre-built policies to discover regulated data | |||
Automated Labelling AI-powered document labeling for documents unique to a business or function | |||
Data Insights Dashboard Unified view of all in-process policies and impacted data | |||
Proactive Data Minimization identify and delete duplicate files within an individual Egnyte content source |
Data Discovery (including entities within files) Discover sensitive and regulated data in cloud and on-premises systems | ||
Prebuilt Classification Patterns Select from over 100 pre-built policies to discover regulated data | ||
Automated Labelling AI-powered document labeling for documents unique to a business or function | ||
Data Insights Dashboard Unified view of all in-process policies and impacted data | ||
Proactive Data Minimization identify and delete duplicate files within an individual Egnyte content source | ||
Probable Ransomware Issue Detection (Signature-based) Monitor and alert to ransomware artifacts. Number of artifacts and confidence level of detection varies by plan level. | |||
Data Exfiltration Issue Detection Aggregate suspicious login data and breadcrumbs left by an attack | |||
Unusual and Suspicious Content Activity Detect unusual and impossible user login activity between two locations or from a restricted country | |||
External Sharing Issue Detection Detect out of policy sharing of files with external users | |||
Public Access Issue Detection Detect unusual user download or deletion of data | |||
Probable Ransomware Issue Detection (AI-powered Behavior-based) Detect abnormal behavior that might signal a probable ransomware attack |
Probable Ransomware Issue Detection (Signature-based) Monitor and alert to ransomware artifacts. Number of artifacts and confidence level of detection varies by plan level. | ||
Data Exfiltration Issue Detection Aggregate suspicious login data and breadcrumbs left by an attack | ||
Unusual and Suspicious Content Activity Detect unusual and impossible user login activity between two locations or from a restricted country | ||
External Sharing Issue Detection Detect out of policy sharing of files with external users | ||
Public Access Issue Detection Detect unusual user download or deletion of data | ||
Probable Ransomware Issue Detection (AI-powered Behavior-based) Detect abnormal behavior that might signal a probable ransomware attack | ||
Granular Permissioning Modify, grant or deny permissions at any level of the folder hierarchy | |||
Least Privilege Access Intelligent controls for managing user access to files and folders | |||
Risky User Management (Unusual and Suspicious Access) Control access based on unusual or impossible user login behavior | |||
Data Owner Management Assign data controls and permissions to individual owners by function |
Granular Permissioning Modify, grant or deny permissions at any level of the folder hierarchy | ||
Least Privilege Access Intelligent controls for managing user access to files and folders | ||
Risky User Management (Unusual and Suspicious Access) Control access based on unusual or impossible user login behavior | ||
Data Owner Management Assign data controls and permissions to individual owners by function | ||
Issue Management and Alerting Includes: Issue Alerting, Issue prioritization and resolution, Risk summary dashboard | |||
Manual & API Based Remediation Remediation options for True Positive and False Posivitve issues | |||
Unusual and Suspicious Activity Remediation Deactivate suspicious user accounts based on issue severity | |||
SIEM Integrations Native integrations and data feeds into Splunk, Sumo Logic and more |
Issue Management and Alerting Includes: Issue Alerting, Issue prioritization and resolution, Risk summary dashboard | ||
Manual & API Based Remediation Remediation options for True Positive and False Posivitve issues | ||
Unusual and Suspicious Activity Remediation Deactivate suspicious user accounts based on issue severity | ||
SIEM Integrations Native integrations and data feeds into Splunk, Sumo Logic and more | ||
Compliant Storage (HIPAA, FINRA, SOC2, ISO/IEC 27001) Compliant storage with the strictest infosec and privacy standards | |||
Data Residency Option Choose file storage options available on non-Egnyte locations in Azure, AWS and GCP | |||
SAR/DSAR Fulfillment Automate SAR/DSAR fulfillment and reporting | |||
File & Login Audit Trails Aggregate insights to support reporting on file and login activity | |||
Predefined Industry Compliance Patterns (Banking and Financial, Healthcare) Pre-built patterns to discover and manage data under industry compliance requirements | |||
Predefined Regional Compliance Patterns (North America, Europe, Asia Pacific, Latin America) Pre-built patterns to discover and manage data under regional compliance requirements |
Compliant Storage (HIPAA, FINRA, SOC2, ISO/IEC 27001) Compliant storage with the strictest infosec and privacy standards | ||
Data Residency Option Choose file storage options available on non-Egnyte locations in Azure, AWS and GCP | ||
SAR/DSAR Fulfillment Automate SAR/DSAR fulfillment and reporting | ||
File & Login Audit Trails Aggregate insights to support reporting on file and login activity | ||
Predefined Industry Compliance Patterns (Banking and Financial, Healthcare) Pre-built patterns to discover and manage data under industry compliance requirements | ||
Predefined Regional Compliance Patterns (North America, Europe, Asia Pacific, Latin America) Pre-built patterns to discover and manage data under regional compliance requirements | ||
Intelligent File Caching Cache large or frequently accessed files locally for fast access, especially in areas of low bandwidth | Yes | Yes | Yes |
Storage included Base amount of storage included in each plan | Custom | Custom | Custom |
Max File Size Maximum size alllowed for a single file | 100GB | 150GB | 150GB |
Domains included Number of account domains included with each plan | 1 | 1 primary / 5 secondary | 1 primary / 5 secondary |
Unified Admin Dashboard Single dashboard for managing users, content and issues | Yes | Yes | Yes |
Role Based Administration Delegate administrative tasks and features to a subset of business users | No | Yes | Yes |
Egnyte to Egnyte Connector Connect separate Egnyte tenants via a 1-way sync | No | Yes | Yes |
Native App Integrations Over 100 native integrations with common industry and business applications | Yes | Yes | Yes |
Self-service Migration Single click migration of files, folders and permissions to Egnyte | Yes | Yes | Yes |
Intelligent File Caching Cache large or frequently accessed files locally for fast access, especially in areas of low bandwidth | ||
Yes | Yes | Yes |
Storage included Base amount of storage included in each plan | ||
Custom | Custom | Custom |
Max File Size Maximum size alllowed for a single file | ||
100GB | 150GB | 150GB |
Domains included Number of account domains included with each plan | ||
1 | 1 primary / 5 secondary | 1 primary / 5 secondary |
Unified Admin Dashboard Single dashboard for managing users, content and issues | ||
Yes | Yes | Yes |
Role Based Administration Delegate administrative tasks and features to a subset of business users | ||
No | Yes | Yes |
Egnyte to Egnyte Connector Connect separate Egnyte tenants via a 1-way sync | ||
No | Yes | Yes |
Native App Integrations Over 100 native integrations with common industry and business applications | ||
Yes | Yes | Yes |
Self-service Migration Single click migration of files, folders and permissions to Egnyte | ||
Yes | Yes | Yes |
Support Services Included support plans for every plan | Standard | Standard | Standard |
Professional Services Techncial services for implementation, migration, health checks, jumpstarts and more | Optional | Optional | Optional |
Support Services Included support plans for every plan | ||
Standard | Standard | Standard |
Professional Services Techncial services for implementation, migration, health checks, jumpstarts and more | ||
Optional | Optional | Optional |
Popular Platform Add-Ons
Data Security and Protection
Protect sensitive content with classification-based security controls and AI-powered detection and remediation
Employee Productivity
Accelerate team productivity by simplifying specialized file handling and content workflows
Infosec and Privacy Control Framework
Reduce compliance costs and regulated data exposure with a pre-configured data enclave and automated workflow and reporting
Data Security and Protection
Protect sensitive content with classification-based security controls and AI-powered detection and remediation
AVAILABLE ADD-ONS
Snapshot and Recovery
With a single click, recover files/folders and associated permissions from a ransomware attack or accidental deletion.
Available on all Plans**
Except Team
Data Security and Governance
Identify and mitigate security risks associated with data stored in 3rd-party cloud and on-premises sources, including email.
Employee Productivity
Accelerate team productivity by simplifying specialized file handling and content workflows
AVAILABLE ADD-ONS
Egnyte Copilot
Get answers to questions, summarize documents, and create first drafts with a private and secure AI grounded in your company data.
PDF Annotator
Simplify working with PDFs by annotating and creating and filling forms directly in Egnyte.
Available on all Plans**
Except Team
Infosec and Privacy Control Framework
Reduce compliance costs and regulated data exposure with a pre-configured data enclave and automated workflow and reporting
AVAILABLE ADD-ONS
Infosec and Privacy Control Frameworks
Reduce the cost and time to implement, manage, and satisfy data
regulatory requirements. Available for ISO/ IEC 27001, NIST 800-171,
NIST 800-53, GDPR, CPRA