Egnyte Business Pricing
Compare Egnyte pricing plans and costs for Business and Enterprise solutions with secure content collaboration, ransomware prevention & compliance features.
Select the Best Plan for Your Organization
Business
- Secure content collaboration
- Privilege management
- Ransomware protection
Contact us for a custom quote
Enterprise Lite
Everything in Business, plus:
- User permission dashboard
- Content lifecycle management
- Issue detection and remediation
Contact us for a custom quote
Enterprise
Everything in Enterprise Lite, plus:
- Privacy and compliance
- Advanced ransomware protection and recovery
- Content safeguard
Contact us for a custom quote
Compare Features | Business | Enterprise Lite | Enterprise |
---|---|---|---|
Content Collaboration | |||
Multi-device Access Access files from anywhere on any device |
|||
Co-Editing Edit a document simultaneously across multiple users |
|||
Comment and Task Assignment Comment and tag users to assign tasks in preview mode |
|||
Basic Workflows (Review & Approvals) Assign documents to users to review and approve content in a repeatable and auditable way |
|||
Large File Preview Preview large files like spreadsheets, audio, video and image files |
|||
Connected Folders Sync folders stored on your computer with specified folders in the cloud |
|||
Search & Knowledge Management | |||
Text Search Search in files for specific text |
|||
Document Q&A Ask questions about a document in preview pane and receive answers synthesized by large language models (LLMs) |
|||
Metadata Search Find documents and folders faster by searching with custom metadata |
|||
OCR Search Search for text found inside images and scanned documents |
|||
Controlled Sharing | |||
Role-Based Access and Sharing Controls Provide user types administrative roles for assigning access and sharing permissions |
|||
Link Sharing / Upload Links / Password Protected Links Securely share links, not files and allow external users to upload files to a specified folder |
|||
Preview Only Files and Folders Allow recipient to view (but not download) files and/or folders |
|||
Watermarking Part of Enhanced Sharing Controls, automatically watermark sensitive documents upon delivery |
|||
Sensitive Content Sharing Safeguards Protect sensitive data by automating safeguards for sharing regulated and sensitive data |
|||
Library Services | |||
File Versioning Manually restore an older file version |
|||
File Locking Automatically lock files to prevent collaborators from overwriting changes |
|||
Templating Create templates to organize repeatable content and reduce project start-up time |
|||
Metadata Attach metadata to files for search granularity |
|||
Device & User Access Management | |||
Multi-factor Authentication Use Egnyte native SMS / authenticator capabilities or work with current Auth scheme |
|||
Encryption AttUses HTTPS and Secure FTP to protect data using AES-256y |
|||
Desktop & Mobile Device Control Set access controls on user devices and remotely wipe Egnyte content |
|||
External authentication (AD and SSO/SAML) Supports SAML, AD, etc. for external authorization |
Optional | ||
Information Governance / Records Management | |||
Policy Creation Engine Create automated and enforceable policies to manage content throughout its lifecycle |
|||
Content Lifecycle Analytics & Reporting Real-time dashboard for files governed by lifecycle policies |
|||
RAD/ROTS Management Automated policies for RAD/ROTS lower storage closts and reduce threat surface |
|||
Legal Hold Retain content related to legal issues by securing all files created by a selected user or that reside in specific folders |
|||
Discovery & Classification | |||
Data Discovery (including entities within files) Discover sensitive and regulated data in cloud and on-premises systems |
|||
Prebuilt Classification Patterns Select from over 100 pre-built policies to discover regulated data |
|||
Automated Labelling AI-powered document labeling for documents unique to a business or function |
|||
Data Insights Dashboard Unified view of all in-process policies and impacted data |
|||
Proactive Data Minimization Identify and delete duplicate files within an individual Egnyte content source |
|||
Issue Detection | |||
Probable Ransomware Issue Detection (Signature-based) Monitor and alert to ransomware artifacts. Number of artifacts and confidence level of detection varies by plan level. |
|||
Data Exfiltration Issue Detection Aggregate suspicious login data and breadcrumbs left by an attack |
|||
Unusual and Suspicious Content Activity Detect unusual and impossible user login activity between two locations or from a restricted country |
|||
External Sharing Issue Detection Detect out of policy sharing of files with external users |
|||
Public Access Issue Detection Detect unusual user download or deletion of data |
|||
Probable Ransomware Issue Detection (AI-powered Behavior-based) Detect abnormal behavior that might signal a probable ransomware attack |
|||
Access Governance | |||
Granular Permissioning Modify, grant or deny permissions at any level of the folder hierarchy |
|||
Least Privilege Access Intelligent controls for managing user access to files and folders |
|||
Risky User Management (Unusual and Suspicious Access) Control access based on unusual or impossible user login behavior |
|||
Data Owner Management Assign data controls and permissions to individual owners by function |
|||
Remediation & Prevention | |||
Issue Management and Alerting Includes: Issue Alerting, Issue prioritization and resolution, Risk summary dashboard |
|||
Manual & API Based Remediation Remediation options for True Positive and False Posivitve issues |
|||
Unusual and Suspicious Activity Remediation Deactivate suspicious user accounts based on issue severity |
|||
SIEM Integrations Native integrations and data feeds into Splunk, Sumo Logic and more |
|||
Privacy, Audit & Compliance | |||
Compliant Storage (HIPAA, FINRA, SOC2, ISO/IEC 27001) Compliant storage with the strictest infosec and privacy standards |
|||
Data Residency Option Choose file storage options available on non-Egnyte locations in Azure, AWS and GCP |
|||
SAR/DSAR Fulfillment Automate SAR/DSAR fulfillment and reporting |
|||
File & Login Audit Trails Aggregate insights to support reporting on file and login activity |
|||
Predefined Industry Compliance Patterns (Banking and Financial, Healthcare) Pre-built patterns to discover and manage data under industry compliance requirements |
|||
Predefined Regional Compliance Patterns (North America, Europe, Asia Pacific, Latin America) Pre-built patterns to discover and manage data under regional compliance requirements |
|||
Infrastructure & Administration | |||
Intelligent File Caching Cache large or frequently accessed files locally for fast access, especially in areas of low bandwidth |
Yes | Yes | Yes |
Storage included Base amount of storage included in each plan |
Custom | Custom | Custom |
Max File Size Maximum size alllowed for a single file |
100GB | 150GB | 150GB |
Domains included Number of account domains included with each plan |
1 | 1 primary / 5 secondary | 1 primary / 5 secondary |
Unified Admin Dashboard Single dashboard for managing users, content and issues |
Yes | Yes | Yes |
Role Based Administration Delegate administrative tasks and features to a subset of business users |
No | Yes | Yes |
Egnyte to Egnyte Connector Connect separate Egnyte tenants via a 1-way sync |
No | Yes | Yes |
Native App Integrations Over 100 native integrations with common industry and business applications |
Yes | Yes | Yes |
Self-service Migration Single click migration of files, folders and permissions to Egnyte |
Yes | Yes | Yes |
Services | |||
Support Services Included support plans for every plan |
Standard | Standard | Standard |
Professional Services Techncial services for implementation, migration, health checks, jumpstarts and more |
Optional | Optional | Optional |
Popular Platform Add-Ons
Data Security and Protection
AVAILABLE ADD-ONS
Snapshot and Recovery
With a single click, recover files/folders and associated permissions from a ransomware attack or accidental deletion.
Available on all Plans**
Except Team
Data Security and Governance
Identify and mitigate security risks associated with data stored in 3rd-party cloud and on-premises sources, including email.
Available as an Add-On or as a Stand Alone Plan
Employee Productivity
AVAILABLE ADD-ONS
Egnyte Copilot
Get answers to questions, summarize documents, and create first drafts with a private and secure AI grounded in your company data.
Available as an Add-On
PDF Annotator
Simplify working with PDFs by annotating and creating and filling forms directly in Egnyte.
Available on all Plans**
Except Team
Infosec and Privacy Control Framework
AVAILABLE ADD-ONS
Infosec and Privacy Control Frameworks
Reduce the cost and time to implement, manage, and satisfy data
regulatory requirements. Available for ISO/ IEC 27001, NIST 800-171,
NIST 800-53, GDPR, CPRA