Purchase2025-06-27T13:36:14+02:00
eAuditor V9 AI - Prices of the basic version and extensions

Select eAuditor V9 AI

Choose the right version of the system for you. Familiarize yourself with the basic functions and possible additional functions. If you have questions, please contact us using the form.

editions

Choose one of the following versions of the system. You can upgrade to a higher version at any time.

STANDARD

PROFESSIONAL

ENTERPRISE

Standard Professional Enterprise
Administrative access *
The number of administrative accesses (so-called named user) depends on the system version
1 3 5
MS SQL Server Express Edition
Provides high performance security processing for the number of computers < 250
+
MS SQL Server – commercial version
Provides high processing performance and security for installations > 250 computers
+ +

*You can increase the number of administrative accesses at any time.

Even more features in V9 AI version

Familiarize yourself with the possibilities of basic configuration.

TOP 10 functions in IT management

basic configuration

The basic configuration of the system is included in all edition versions and addresses all basic needs of IT departments.

IT inventory

  • Inventory of desktop and laptop computers
  • Server inventory
  • Network equipment inventory
  • Inventory of operating systems
  • Inventory of installed applications and packages
  • Hard drive inventory
  • Inventory of files
  • Inventory of printers
  • Inventory of all types of devices also resources added manually
  • Inventory of consumables (IT Warehouse)
  • Virtual environments scanner (API) – new
  • Hyper-V and VMWare inventory – new
  • Inventory and monitor permissions to local and shared resources (ACL Manager) – new
  • IT warehouse, keeping records of quantity and value
  • CMDB
  • API Importer

IT Management

  • Remote PC management (RDP, VNC, Intel vPro)
  • Remote firewall management – new
  • Remote access to the editor of registers/services/system processes
  • Task server integrated with AI (CMD and PowerShell).
  • Automation of administrator tasks
  • Software and licence management
  • Software uninstallation/automatic uninstallation of software
  • Virtual machine scanner (API) (Hyper-V and VMWare) – new
  • Communicator
  • Message server
  • Administrative Notifications
  • Splash Screen, message after login – new
  • Employee Panel (basic version)
  • Reporting (Report standard: SAP Business Objects and Stimulsoft (web version))
  • Built-in import schedule
  • Open API (based on restAPI)

IT monitoring

  • Network scanner and network map (SNMP v1, v2c, v3 support)
  • Network monitoring
  • Monitoring network services
  • Monitoring of computers
  • Monitoring employee performance
  • WorkTime Manager, monitoring of user groups (from the Employee Panel)
  • ACL privilege monitoring
  • Monitoring of visited websites
  • USB device monitoring
  • Mail monitoring Outlook (applies to: Outlook desktop version)
  • Monitoring of user login history
  • RDP session monitoring
  • Monitoring of running processes
  • Network transfer monitoring
  • Monitoring of network printers
  • Print monitoring
  • Performance monitoring
  • Monitoring of services
  • Monitoring of event logs
  • Sensor monitoring
  • Monitorowanie serwisów WWW
  • Monitoring MS Hyper-V and Vmware virtualization servers via built-in APIs – new
  • Report Builder (Report Standard: SAP Business Objects and Stimulsoft (web version))

IT Security

  • IT Operations Center
    • Dashboard (SOC)
    • Security Dashboard (SOC)
    • My Dashboard (SOC)
    • Network Dashboard
  • Blocking USB devices (USB whitelisting)
  • Software schemes (DLP)
  • Working Time, an action or notification when the defined computer working time is exceeded – new
  • Administrative notifications (ALERT, E-MAIL, SMS, TASK)
  • Multi-factor authentication (MFA)
    • Authorization by physical hardware security
    • Google Authenticator – new
    • Authorization by code to e-mail
    • Face video verification
    • Domain login
  • AI Cyber Security
  • Automatic information about category, security and productivity of websites and running processes / applications
  • Vulnerability management – new

Artificial intelligence

  • Website classification
  • Process and application classifier
  • AI in CMD and Powershell new
  • Video authentication
  • Integration with ChatGPTnew

Employee Panel*

  • Personalized access for each user from the organization
    • Dashboard
    • Abbreviations
    • My computer
    • Equipment
    • Software
    • Productivity
    • Messages
  • WorkTime Manager
    • Productivity calculation
    • Summary of monitoring for individual users or groups of users
    • Grouping of monitoring by area/department
    • Share group information in the Employee Panel with selected supervisors
  • Integration with other manufacturer’s solutions
    • Report problems to the technical support department
    • Participate in assigned training courses from the Learning Management System
    • Ability to install from the application kiosk

*Requires Microsoft SQL Server CAL (user/device) license or MS SQL Server per core license.

Additional features for IT professionals

Check out the list of additional system features.

TOP 8 IT Security with eAuditor

optional configuration

Select the optional functionalities of interest. You can buy them at any time you use the system. Activation of additional functionalities occurs remotely in about 10 minutes and does not require your intervention.

Patch management

  • Identification of uninstalled patches
  • Central implementation of amendments
  • Withdrawing amendments
  • Installation automation
  • Reporting

Remote Installation/Application Kiosk

  • Remote installation using WMI
  • Remote installation using eAgent
  • Remote installation via kiosk
  • Auto-installation
  • Public repository
  • Private repository

webRTC

  • Real-time communication
  • Remote connection to other computers on the local network
  • Access to the actual monitor image
  • Management of computer resources

BitLocker encryption

  • Integration with Microsoft BitLocker API
  • Disk encryption
  • Flash drive encryption
  • Access to encryption keys
  • Temporary security shutdowns
  • Encryption rules
Użytkownicy

Helpdesk

  • Creating a ticket
  • Reviewing the application
  • Request history
  • Handling of the request
  • Application form in the Employee Panel
RTC

LMS Training

  • Film library
  • Video diagrams
  • Training process
  • LMS certificates
DLP

eAuditor DLP

Control and protection of equipment

  • DEVICE
  • REMOVABLE DEVICE
  • WEB
  • WLAN

Data protection in use

  • PROCESS
  • CLIPBOARD
  • PRINTSCREEN,
  • SCREEN MONITORING

Protecting data on the move

  • E-MAIL
  • CLOUD STORAGE
  • FILE MOVE COPY

Classification and protection of documents

  • FINGERPRINT
  • SCHEDULED TAGGING

eAuditor stands for high quality and reliability

Review the technical support terms offered.

SLA – technical support

Select the technical support you are interested in. Support conditions are sufficient in most installations SLA STANDARD 5 / 8-16

Detailed information is available at: https://btc.com.pl/en/service-and-technical-support/

Join the ranks of our customers!

The quality of our products and services is the basis for effective IT management and security.

Selected recommendations

“The eAuditor system has streamlined the work of the IT department, helped simplify the management procedure and the creation of the company’s budget plans. The implementation of the system has also resulted in the comfort of working in a safer company that cares about the efficient use of IT resources. An important advantage of the solution is that the system protects the company from illegal software installations through ongoing monitoring.”

Wolters Kluwer

“The implementation of the eAuditor system allowed us to accurately determine the use of our software licenses. We are successfully using functionalities that help us improve the efficiency of our use of resources. We recommend the eAuditor software.”

Książnica Pomorska

“Totalizator Sportowy Sp. z o.o. decided to implement the eAuditor system, manufactured by BTC Sp. z o.o of Szczecin due to the efficient use of IT infrastructure, as well as ensuring control over the use of software licenses.”

Totalizator Sportowy

FAQ – frequently asked questions

What are the system requirements?2025-01-03T13:56:16+01:00

The technical requirements are available at the following link: https://www.eauditor.eu/en/faq-items/technical-requirements/

Is it possible to test the system in your own infrastructure?2024-07-26T09:45:11+02:00

Yes, the eAuditor system can be tested in your own infrastructure. The test period is possible for organizations with a minimum of 300 computers in the target infrastructure. Remote installation and startup of the system for 10 devices is carried out. The system testing period is 2 weeks, with the possibility of extension up to a month. During the testing period, the technical support department provides comprehensive assistance.

What is the process of implementing the eAuditor system?2024-07-26T09:48:26+02:00

The process of implementing the eAuditor system begins at the stage of contact with the organization’s representative. Several hundred installations carried out with sukcsem (on-premis and cloud) allowed us to isolate the key stages. It is also possible to install the system yourself, but we recommend taking advantage of the full range of implementation support.

1. customer needs survey – at this stage, our expert, together with the organization’s representative, determines the needs and challenges that we can solve by implementing the eAuditor system into the organization’s infrastructure. The most common are:
– difficult remote management of computers and installation of applications (including outside NAT),
– lack of a single software for mass and remote disk encryption,
– the need to buy different systems to inventory, manage and monitor the infrastructure,
– Lack of control (due to volume) over connected USB drives,
– the difficulty in evidencing and reporting the current status of all types of devices in a distributed infrastructure.

2. Provision of materials about the system- based on the researched needs, our consultant provides materials that provide a basis for learning about the system’s functionality. In addition, it allows you to test the system in DEMO version. This allows everyone to check the functioning of eAuditor in practice.

3. individual presentation – anyone interested can take part in an individual 1:1 presentation with an eAuditor system expert. We are currently implementing online and offline presentations. During the meeting, the expert answers nagging questions and presents an example of how the system works based on diagnosed needs. Before this meeting, it is advisable to read the materials sent and write down the questions.

4. quote – based on the findings of the individual presentation we send a personalized commercial offer.

5. acceptance of the terms of the offer – in a situation when the commercial offer is accepted, we begin to prepare the implementation work.

6. Determination of technical requirements for configuration of the system – we want the system to be installed according to customer expectations, so an online meeting with a technician to discuss configuration requirements takes place.

7. Installation and configuration of the system – at this stage, the technical support representative installs the eAuditor system in the customer’s infrastructure and implements a complete environment to enable the system to function.

8. Confirmation of system implementation – at the final stage of implementation, the correctness of communication between the various components of the eAuditor system is established (e.g. sending and receiving data, response to administrative commands).

9. Administrative and Application Training – In order to better understand how to use the eAuditor system to inventory, monitor, manage and ensure infrastructure security, we offer administrative and application training courses. These are an extension of the instructional videos and materials available in the console’s documentation and knowledge base.

Is the administration console installed on the computer?2024-07-26T09:49:56+02:00

No, the console is fully web-based.

What is the scope of the warranty?2024-07-26T09:50:56+02:00

Warranty includes:

Technical support (under license – min. 12 months, under subscription – for the entire subscription period),
Updates to knowledge bases, application templates and packages,
Software updates consultations – the software vendor’s time spent communicating with the User, support, advice, instructions. Updates to new versions within an edition version

What are the terms of the SLA?2025-06-27T13:56:47+02:00

The terms and conditions of technical support are specified at:

https://www.btc.com.pl/wsparcie-techniczne/

What is the cost of support/service?2025-06-27T13:56:52+02:00

Cost of system maintenance subscription eAuditor depends on: the version of the system, the number of posts and the sector.

Does the cost of purchasing the add-on functionality depend on the number of posts?2025-06-27T13:56:55+02:00

The cost of purchasing the system depends on the size of the infrastructure, i.e. the number of computer workstations (computers, servers) covered by the installation of eAgent, which allows remote management, monitoring and inventory. The cost of purchasing the basic version of the system is the unit price multiplied by the number of devices. The unit price depends on the selected version of the system: standard, professional or enterprise. The amount of the unit price decreases as the number of stations increases, the value decreases exponentially.

Does the system integrate with Active Directory?2025-06-27T13:56:59+02:00

Yes, the system integrates with AD. We can automatically import data from AD, including user information, system access permissions (domain login capability), organizational structures and computers. The system also allows integration via API – specifically, we support the REST API, which offers unlimited possibilities – allowing interactions with other tools that support this interface.

Is it possible to install “offline” and update manually?2025-06-27T13:57:04+02:00

Installation of the system takes place in the customer’s infrastructure – on- premises. It is the system user who decides whether the installation will have communication with our data center, which would eventually enable automatic updates. If communication is not provided, the system will operate offline. In such circumstances, it will be necessary to download the update file provided by the support department and use the option available under “Tools → Update from file.