Kickidler DLP: Windows, MacOS, Linux client comparison
To make matters easier for you, we’ve decided to compile a comprehensive comparison table containing a full list of all technical capabilities of Kickidler’s DLP suite. With its help, you’ll be able to get a clear understating of whether certain features of our product are available for your particular operating system.
Feature comparison of Kickidler DLP’s Windows, MacOS, Linux clients
Technical capabilities / Client feature availability | Windows | Linux | MacOs |
Online monitoring | |||
Screen monitoring Capturing single live screenshots or as a video feed. Option to save to a video file. |
|||
Webcam monitoring Capturing single live screenshots or as a video feed. Option to save to a video file. |
|||
Audio and microphone monitoring Monitoring of microphones and audio. Option to save to an audio file. |
|||
Voice to text conversion. Real-time employee speech recognition with the option to save the conversation to a text file. Native offline speech-to-text conversion engine (in addition to Google’s existing online one). |
|||
List of processes and windows Provides a list of active processes and open windows of the user. |
|||
Pause monitoring Monitoring can always be paused and unpaused. |
|||
Suspicious activity response Notification of important user events in tray and browser window with sound. Option to receive SMS, e-mail, Telegram notifications. * Linux only includes “Running forbidden Linux command” and “Possible client deletion” events ** MacOS only includes “Possible client deletion” event |
|||
Messaging Ability to send instant messages to users. |
|||
Sending and locking messages | |||
Search in files Instant search for words, phrases, and regular expressions in files on client machines. |
|||
Keyboard and mouse locking | |||
Administration Executing a range of administrative functions online. |
|||
Admin-functions (computer)-“Restart” | |||
Admin-functions (computer)-“Shut down” | |||
Admin-functions (computer)-“Execute command” | |||
Admin-functions (computer)-“Delete local database” | |||
Admin-functions (computer)-“ Cancel transfer of pending data” | |||
Admin-functions (user)-“End session” | |||
Admin-functions (user)-“Disconnect terminal session” | |||
Admin-functions (user)-“Lock” | |||
Admin-functions (user)-“Start” | |||
Monitoring reports | |||
Analytics Report Group Powerful multifunctional analytical tool for HR analytics. |
|||
“Black Box” Continuous recording of video from screen and audio from microphone/speakers with encrypted storage on employee machines for subsequent detailed analysis in the event of an incident investigation. |
|||
Facial Recognition Ability to analyze employee faces from webcams on a periodic basis for matches with other employees. The report is useful for analyzing the employee’s presence or the fact of their substitution by someone else. An offline engine of our own development based on a neural network is used. |
|||
Risk and performance analyzer Customizable profile and dictionary-based analyzer shows effective, ineffective, or potentially dangerous employee activity. |
|||
Global Search Search by tags, keylogger words, window title, applications, and websites across the entire database for all employees with quick navigation to the screenshots of the found time interval by employee. |
|||
Search by templates Multiple search criteria, based on which it is possible to create customized templates. |
|||
Category and Rejection Report Summary report that shows statistics by resources used, categories and deviations from average employee values. |
|||
Summary Report Easy-to-use summary report on an individual employee in the form of clickable pie charts, which can be used to deeply analyze a person's performance. |
|||
Summary Simplified Report Summary report on an employee in a table format with the ability to export to Excel. |
|||
Activity feed Graphic report that allows you to evaluate what the user has been doing at what time intervals, with what and to what extent. |
|||
Activity comparison Textual representation of the “Activity feed” report with an easy-to-use interface for comparing indicators. |
|||
Keystroke dynamics Provides an assessment of an employee's status at the workplace and with some degree of certainty determine the possibility of another employee working in their place. |
|||
Machine time Provides an indication of how long employees' computers have been on. |
|||
CPU/GPU utilization The report allows you to look at a detailed overview of the CPU and video card resource utilization. |
|||
User time User's activity for the day, their absences, lateness to work, favorite applications and websites, synchronization with Outlook calendar and ACS. |
|||
Timesheet A standard timesheet with the ability to display data on computer activity or ACS data. The report displays information on absences, tardiness, start/end of the workday and total time worked. |
|||
Access Control Software detailing The report shows the actual employee entries and exits according to the ACS data. The current version supports Sigur (Sphinx) ACS. |
|||
Launching applications You will be able to see in which applications and for how long an employee was actively working. |
|||
Site monitoring sites Report on the websites accessed by the employee. |
|||
Input text (keylogger) It is possible to intercept input text in all applications and websites. |
|||
Input text (keylogger) Transmit text from HTTPS sites. |
|||
Input text (keylogger) Transmit password input in applications to the database. |
|||
Clipboard Text, files and pictures in the clipboard. |
|||
Search queries Ability to view all search queries in various search engines, such as Google, etc. |
|||
Supported browsers for site interception | Google Chrome, Firefox, Firefox ESR, Internet Explorer, Chromium, Vivaldi, Yandex browser, Opera, Edge, Tor | Google Chrome, Firefox, Firefox ESR, Internet Explorer, Chromium, Vivaldi, Yandex browser, Brave | Google Chrome, Firefox, Firefox ESR, Internet Explorer, Chromium, Vivaldi, Yandex browser, Brave, Safari, Tor |
Voice conversations Interception and recording of voice conversations in Skype, Lync, Viber, Telegram, Bitrix Desktop, ICQ, Mail.ru Agent, Microsoft Teams, Zoom, Slack, Myteam, Cisco Webex Teams, WhatsApp Desktop, eXpress Desktop, VK Teams (Cloud) Desktop. |
|||
Voice/Speech Recognition Converting intercepted voice to text and displaying as a text file. Native offline speech-to-text conversion engine (in addition to Google’s existing online one). For voice calls in messengers. |
|||
Text messages in messengers Telegram Desktop/Web, Skype, Microsoft Teams, WebSkype, Lync, Viber, Bitrix Desktop, BitrixWeb, Slack, Myteam, Cisco Webex Teams, WhatsApp Desktop/Web – all cases, corporate eXpress, VK Teams (Cloud) Desktop/Web, ICQ Desktop/Web, Yandex Messenger. * For Linux/Mac, Cisco Webex Teams, enterprise eXpress are also included. |
|||
Bitrix24 chat text messages Interception of correspondence in Bitrix24 Desktop and on the site (cloud and corporate versions of Bitrix). |
|||
Letters (e-mail) + attachments Interception of incoming and outgoing emails (with attachments) for: Microsoft Outlook – Exchange/IMAP/POP3/SMTP in all cases (with and without encryption); IBM Lotus Notes – all outgoing mail; Outlook Express, Thunderbird, Bat, Mail – POP3/SMTP (with and without encryption). |
|||
Sending files to the Internet Files sent via browser, email clients, Skype, Lync and popular messengers, FTP/FTPS. In all cases, files are intercepted and saved (with the option to block sending). |
|||
File operations Interception of file copying, deleting, transferring. Shadow copying is possible when copying files to a flash drive. WebDav support. * For Linux, copy operations, transfer to another disk partition are supported. Without shadow copying of files. |
|||
Screenshots Screenshot capture with many settings, including taking screenshots when switching windows, browser tabs. |
|||
Video from screenshots Generation of continuous video from screenshots for viewing via browser or media player. |
|||
Print monitoring + cost Ability to capture printed files in a spooler format and calculate the cost based on the set rate. |
|||
Suspicious events Recording in the report the events that you can configure yourself (launching applications, websites, text input). * Linux only includes “Running forbidden Linux command” and “Possible client deletion” events ** MacOS only includes “Possible client deletion” event |
|||
Information search by employee Ability to search in the generated report with regard to the inaccurate word comparison algorithm. |
|||
Recording from web cameras Automatic recording of images from webcams employees’ machines and saving them on the server. |
|||
Recording from microphones (wiretapping) Ability to continuously record from microphones and save audio files on the server. Ability to perform recording only when there is voice. |
|||
Contacts Report Ability to view the list of employee's contacts, with whom they have been communicating via email, Skype and chats. |
|||
Liaison Graph Report Visual display of the “Contacts” report as an easy-to-view graph. |
|||
Online Users Report Provides a visualized view of when certain users have been connected to the server. |
|||
Geolocation Geolocation of laptop locations on Google maps. Identification of external IP, country, city. |
|||
Software installation count monitoring Ability to see the number of installations of different software throughout the company to identify unlicensed software. |
|||
Hardware and software monitoring Shows changes in hardware composition on machines as well as installed/uninstalled software. |
|||
File search Report with automatic periodic search results for words, phrases and regular expressions in files on client machines. |
|||
System status Report includes important performance indicators of DBMS, servers, file storage, clients. |
|||
SQL query-based report Ability to build your own reports from the SQL database. |
|||
DLP features | |||
Anti-Photo Protection against PC screen photos being taken by a smartphone while critical applications or websites are running. |
|||
Voice DLP Instant reaction to phrases/words spoken by an employee in voice conversations via Skype, Lync, Viber, Telegram, Bitrix Desktop, ICQ, Mail.ru Agent, Zoom, MS Teams, Slack, Myteam, Cisco Webex Teams, WhatsApp Desktop, eXpress Desktop, VK Teams (Cloud) Desktop, TrueConf Desktop, WeChat Desktop. |
|||
Watermarks on images Ability to apply hidden watermarks to PrintScreen images and the Scissors/Screen Snippet application for the purpose of their further identification upon discovery in public sources. |
|||
DLP in documents Opening, sending to the web, printing, copying to flash drive, copying to clipboard documents with keywords or phrases is accompanied by an event (or a ban). Supports .docx, .xlsx, .odt, .ods, .sxw, .pptx, .odp, .txt, .csv, .pdf, .doc, .xls, .ppt, .rtf formats. Inexact text search possible, search by templates: credit cards, contacts, custom regular expressions (RegExp PCRE). |
|||
Outlook folder scanning Performs scanning of Drafts/Meetings/Tasks folders for confidential attachments with an option to delete found files. |
|||
Document labeling Hidden labels in documents to safeguard them from being sent. Resaving, copying a part of the document is allowed (not for .pdf). Source formats: pdf, docx, xlsx, pptx (option to re-save to OpenOffice formats: odt, ods, sx). |
|||
Ban on full or partial sending of files Ability to ban sending files via file-sharing sites, email sites and applications, chat rooms and social networks. |
|||
Facial recognition, employee substitution status If an employee at their workstation is replaced by another unauthorized person or another employee, the security officer will be immediately notified of this situation in the form of an event. |
|||
Protection against webcam taping If an employee covers or tapes the webcam, the system will lock their screen and generate a notification (when facial recognition is active). |
|||
Protection of the workstation from an unauthorized person If the facial recognition mechanism detects that another person is at the employee's workstation, the computer will be locked until the next login/password entry. |
|||
Alerts in case of atypical user behavior The software will notify the administrator if it detects atypical user behavior, such as copying, sending or deleting files, copying characters to the clipboard, opening browser tabs, etc. The number is configurable by the administrator. |
|||
Digital file imprints Supports digital file imprints for search and DLP operations. |
|||
Screenshot text recognition (OCR) Prohibit screenshots from being copied to the clipboard (if they contain important text data). Inaccurate text search is possible. Supports built-in offline OCR engine and online Abbyy OCR. |
|||
Cryptocurrency wallet address tracking Tracking of cryptocurrency wallet addresses in the buffer and their risk analysis with the possibility of blocking. |
|||
Possibility to ban clipboard Full ban. |
|||
Ability to disable clipboard when Remote Desktop window is active | |||
Ability to disable clipboard when copying from RDP session Block copying an image/text from a remote RDP session to a local PC via clipboard. |
|||
Ability to disable the PrintScreen key | |||
Ability to exclude applications from interception/banning (You can specify applications that will not be subject to clipboard bans and its monitoring). |
|||
Ability to ban web sites Ban browsers from accessing selected sites. |
|||
Ability to deny FTP Full ban on sending/receiving files via FTP protocol. |
|||
Ability to deny network connections via WiFi/Bluetooth/USB modem | |||
Ability to deny RDP Ability to block incoming remote RDP connections to the computer. |
|||
Ability to block USB devices Ability to ban: camera/smartphone, removable disks, Bluetooth/WiFi/modem. “White” lists, exceptions. Generation of “USB device blocked” event when the blocking of the corresponding device is triggered. |
|||
“Black” and “white” lists of applications Ability to prohibit launching applications in accordance with the “black” and “white” lists. * For Linux, only a “black” list is available |
* | ||
Ability to ban flash disks Ability to disallow recording or full access to removable media. |
|||
Ban commands in Linux terminal Ability to disallow selected commands in the Linux terminal. |
|||
Architecture | |||
Client-server architecture Client transmits data to the server to be stored in a database. |
|||
Windows, Linux, MacOS The client part is available in Windows, Linux and MacOS versions. |
|||
Multiple server support Software can operate in both multiple-servers mode and one central database. |
|||
Additional IP address for connection to the server It is possible to specify an additional external IP-address of the server for connection (it is convenient when employees take their laptops out of the office). |
|||
Terminal server, thin client Clients of the software suite are “thin,” i.e. all data processing is performed on the server, therefore there are no difficulties when the software suite operates in terminal sessions. |
|||
Operating in physical and virtual environments Clients and server of the software can work both on physical and virtual machines. |
|||
Local storage If there is no connection with the server, the monitoring data will not be lost. It will be accumulated in the local database and guaranteed to be transmitted to the server after the connection is restored. Retrospective storage of local data is customizable. SQLite technology is used as the local database. |
|||
Postponed monitoring With a large number of client machines, it does not always make sense to collect data from all clients. When postponed monitoring is enabled, the data is sent to the server on request from selected machines. |
|||
Traffic limitation Ability to limit traffic from clients to the server when there are high traffic flows and multiple connections. |
|||
Remote (hidden) installation It is possible to install the client on remote machines in a hidden mode so that the employees do not detect the installation process. |
|||
Domain users You can build reports on domain users both for all machines they worked on in total and for specific machines. |
|||
Data traffic encryption Client-server channel is encrypted. |
|||
IPv6 support Operating on both IPv4 and IPv6 networks. |
|||
Personalized work schedules for employees Ability to assign personalized work schedules to an employee or a group of employees specifying days off, start/end of workday, breaks, including flexible/fixed schedule, round-the-clock. Ability to add holidays, pre-holiday days, personal vacations, sick days. |
|||
Built-in dictionaries A set of built-in dictionaries of various subjects for automatic evaluation of an employee's work and its appropriate categorization. It is also possible to to use the list of government banned sites. |
|||
Search engine for text in files on client machines Powerful multifunctional search engine with multiple options for indexing content of files on client machines (including multi-level, password-protected archives). |
|||
Integration with ACTIVE DIRECTORY | |||
Automatic installation on groups of machines Synchronization of client installations/uninstallations with AD computer groups. |
|||
Other features | |||
Covert and open monitoring The way you choose to monitor your employees is up to you. |
|||
Outsourced mode of operation In this mode, employees themselves can switch the monitoring on or off. |
|||
Protection against button sticking Users will not be able to imitate activity by jamming buttons on the keyboard. |
|||
“Panic button” Ability to quickly shut down or lock down all computers, or execute a script on the server by a command via Telegram messenger. |
|||
Selective monitoring The ability to monitor “only these” or “all but these” users of the computer(s). |
|||
Computer shutdown outside of a specified time interval | |||
Protection of the client part of the software complex from deletion |
Client (Linux): Astra, CentOS, Debian, Mint, Ubuntu, Rosa, RED OS
Client (MacOS): El Capitan, Sierra, High Sierra, Mojave, Catalina, Big Sur, Monterey, Ventura
Client (Windows): XP(SP3)/2003/Vista/Win7/2008/Win8/2012/Win10/11/2016 and later (32/64-bit)