Teramind captures and records user activity on computers and sends the information to the Teramind server located in the cloud, private cloud or on-premise. This data can then be used to determine employee productivity and process optimization, insider threat detection and data loss prevention based on policies and rules defined in Teramind.
We do not have a free version of Teramind. However, you can try it for free for 7 days (Cloud) or 14 days (On-Premise / Private Cloud).
To get started with the trial, visit https://www.teramind.co/product/price. Simply select the Teramind solution you are interested in, your preferred deployment model, and the expected number of users/endpoints/terminal servers etc. Then, click the free 14 day trial or the free 7 day trial button.
Cloud customers can start the trial immediately. If you are an On-Premise customer, please check out this article to learn about our On-Premise trial approval process.
Teramind customers range from small to medium size businesses, to large multinational conglomerates, to regional and federal government entities. Teramind can be used to ensure conformance with compliance initiatives (GDPR, ISO 270xx, HIPAA, PCI-DSS etc.), for data loss prevention, privileged user monitoring, third party vendor monitoring, audit, forensics and more! Visit www.teramind.co/sim and click the START TOUR button on the dashboard (top right corner) for a guided tour of the most common use cases.
Teramind software is licensed based on a monthly or annual subscription. Depending on the type of deployment, pricing is calculated based on number of users (Cloud) or endpoints (on-prem and private cloud) and terminal servers. To start, simply select the Teramind solution you are interested in, your preferred deployment model, and the expected number of users/endpoints/terminal servers and click “Start Free Trial” on the Teramind Pricing page. This will give you a free 14-day on-premise or 7-day cloud trial. Please contact us if you have any questions.
Teramind Agent can be deployed in hidden or revealed mode depending on your particular use case. When deployed in revealed mode, users are aware of the Agent’s existence and can sign into it using their email address and password. For more information, check out this article: How to use the Revealed Agent.