EGNYTE PRICING PLANS FOR TEAM
Select the Best Plan for Your Organization
Team
1 - 10 users
Secure file collaboration solution to get your team up and running quickly and easily.
$10 / User / Month Paid Annually
Features
Team
Content Collaboration
Mobile App
Access, edit and share content on your mobile device using Egnyte's native apps
|
|
Desktop App
Edit and save files directly from Mac Finder or Windows Explorer and sync them automatically to Egnyte's cloud
|
|
1-Click Co-Editing in Google Workspace
Access and co-edit Google Docs, Slides, and Sheets and store them alongside all your other files
|
|
1-Click Co-Editing in Microsoft Office Online
Access and co-edit Microsoft Word, PowerPoint, and Excel files and store them alongside all your other files
|
|
Cloud Productivity App Integration
Seamlessly work with commonly used productivity apps such as Microsoft Teams, Slack, Zoom and more
|
|
Local File Caching
Cache large or frequently-accessed files locally for fast access. Folders can be selectively cached or auto-cached based on machine intelligence
|
|
Public Cloud File Caching
Cache files to Amazon S3 or Azure BLOB storage for easy access to workflows requiring high-compute environments
|
|
Folder Templates
Templatize folder structures for common work projects built to reduce project delivery time in service oriented industries such as engineering, construction and advertising
|
|
Connected Folders
Sync local local folders such as Desktop, Downloads, and
Documents to a user's private folder. Once in Egnyte, files can be securely shared from the
desktop, accessed via the user's mobile device, and scanned and classified for sensitive
content to ensure proper governance (plan dependant)
|
|
Advanced Metadata Management
Define and assign custom metadata tags to files and
folders for classification, policy enforcement, and ease of use
|
|
Video Playback
Transcode video formats for broader device compatibility and optimal viewing directly from the Egnyte web UI
|
|
Mobile PDF Annotation
Markup PDFs directly from the Egnyte mobile app while changes save back to the original file
|
Mobile App
Access, edit and share content on your mobile device using Egnyte's native apps
|
Desktop App
Edit and save files directly from Mac Finder or Windows Explorer and sync them automatically to Egnyte's cloud
|
1-Click Co-Editing in Google Workspace
Access and co-edit Google Docs, Slides, and Sheets and store them alongside all your other files
|
1-Click Co-Editing in Microsoft Office Online
Access and co-edit Microsoft Word, PowerPoint, and Excel files and store them alongside all your other files
|
Cloud Productivity App Integration
Seamlessly work with commonly used productivity apps such as Microsoft Teams, Slack, Zoom and more
|
Local File Caching
Cache large or frequently-accessed files locally for fast access. Folders can be selectively cached or auto-cached based on machine intelligence
|
Folder Templates
Templatize folder structures for common work projects built to reduce project delivery time in service oriented industries such as engineering, construction and advertising
|
Connected Folders
Sync local local folders such as Desktop, Downloads, and
Documents to a user's private folder. Once in Egnyte, files can be securely shared from the
desktop, accessed via the user's mobile device, and scanned and classified for sensitive
content to ensure proper governance (plan dependant)
|
Advanced Metadata Management
Define and assign custom metadata tags to files and
folders for classification, policy enforcement, and ease of use
|
Video Playback
Transcode video formats for broader device compatibility and optimal viewing directly from the Egnyte web UI
|
Mobile PDF Annotation
Markup PDFs directly from the Egnyte mobile app while changes save back to the original file
|
Security
Two-Factor Authentication
Basic includes: Push notification and Time-based One-Time Passwords (TOTP) Enhanced includes: All of Basic plus SMS and voice. Note: 2FA services may also be available via your SSO provider
|
Basic |
Strong Password Policy Enforcement
Set minimum password requirements including length, complexity, and frequency of password changes
|
|
Global File Access Policies
Set global access policies for files and folders to minimize improper file sharing
|
|
Granular Sub-Folder Permissions
Configure folder permissions to remove individual users or disable inheritance for specific subfolders
|
|
File Link Expiry
Set file link expiry rules based on a specific date or number of downloads
|
|
Static Link Security
Apply Global and Folder static link sharing settings
including password, internal, and specific users
|
|
Unified Permissions Viewer
Display Folder, Group, and User access permissions to
identify and manage folders usage. Non-Egnyte sources can be added to both Enterprise Lite and
Enterprise plans
|
|
Mobile Device Control
Remotely wipe Egnyte content synced to a mobile device. Set access controls on iOS and Android, such as requiring device passwords and encrypting device storage
|
|
Desktop Device Control
Remotely wipe Egnyte content synced to the desktop. Set functional restrictions such as controlling which users can sync files to the desktop and preventing the upload of specific files
|
|
Suspicious Login Detection
Identify login attempts that aren't possible from a
single users. Examples include simultaneous login attempts, impossible travel, and blacklisted
countries.
|
|
Unusual User Behaviour Detection
Identify behaviors that are uncharacteristic of a given
user to determine legitimacy and prevent data theft (Egnyte data sources and SharePoint
Online)
|
|
Ransomware Detection
Detect ransomware attacks and provide real-time alerts
to quickly mitigate the situation (Signature based: Egnyte and Microsoft data sources.
Behavior based: Egnyte data sources)
|
|
Dynamic Sensitive Content Safeguards
Create policies that dynamicaly apply restrictions to
sharing content based on sensitive data classification (PII, HIPAA, PCI), metadata, content
location and more
|
|
Egnyte-Managed Keys
Strong encryption while files are at rest via
Egnyte-controlled keys that are unique per domain and encrypted at the file object level
|
|
Customer-Managed Keys
Option to integrate with 3rd party HSM solutions like
Azure and AWS to augment the standard Egnyte encryption with your own key
|
Two-Factor Authentication
Basic includes: Push notification and Time-based One-Time Passwords (TOTP) Enhanced includes: All of Basic plus SMS and voice. Note: 2FA services may also be available via your SSO provider
|
Basic |
Strong Password Policy Enforcement
Set minimum password requirements including length, complexity, and frequency of password changes
|
Global File Access Policies
Set global access policies for files and folders to minimize improper file sharing
|
Granular Sub-Folder Permissions
Configure folder permissions to remove individual users or disable inheritance for specific subfolders
|
File Link Expiry
Set file link expiry rules based on a specific date or number of downloads
|
Static Link Security
Apply Global and Folder static link sharing settings
including password, internal, and specific users
|
Unified Permissions Viewer
Display Folder, Group, and User access permissions to
identify and manage folders usage. Non-Egnyte sources can be added to both Enterprise Lite and
Enterprise plans
|
Mobile Device Control
Remotely wipe Egnyte content synced to a mobile device. Set access controls on iOS and Android, such as requiring device passwords and encrypting device storage
|
Desktop Device Control
Remotely wipe Egnyte content synced to the desktop. Set functional restrictions such as controlling which users can sync files to the desktop and preventing the upload of specific files
|
Suspicious Login Detection
Identify login attempts that aren't possible from a
single users. Examples include simultaneous login attempts, impossible travel, and blacklisted
countries.
|
Unusual User Behaviour Detection
Identify behaviors that are uncharacteristic of a given
user to determine legitimacy and prevent data theft (Egnyte data sources and SharePoint
Online)
|
Ransomware Detection
Detect ransomware attacks and provide real-time alerts
to quickly mitigate the situation (Signature based: Egnyte and Microsoft data sources.
Behavior based: Egnyte data sources)
|
Dynamic Sensitive Content Safeguards
Create policies that dynamicaly apply restrictions to
sharing content based on sensitive data classification (PII, HIPAA, PCI), metadata, content
location and more
|
Egnyte-Managed Keys
Strong encryption while files are at rest via
Egnyte-controlled keys that are unique per domain and encrypted at the file object level
|
Customer-Managed Keys
Option to integrate with 3rd party HSM solutions like
Azure and AWS to augment the standard Egnyte encryption with your own key
|
Compliance
HIPAA Compliant Storage
Comply with HIPAA requirements (other features and customer actions required for full HIPAA compliance)
|
|
FINRA Compliant Storage
Comply with FINRA requirements (other features and customer actions required for full FINRA compliance)
|
|
SOC2 Compliant Storage
Comply with SOC2 requirements
|
|
GDPR EU Data Residency
Comply with GDPR EU Data Residency requirements
|
|
ISO/IEC 27001 Compliant Storage
Comply with ISO/IEC 27001 requirements
|
|
Audit Reporting
Comprehensive audit reporting of file system changes, permission changes and more (Egnyte data sources only)
|
|
Legal hold
Retain content related to a legal issues by securing all
files created by selected users (referred to as custodians) or residing in specific folders,
within the specified date range (Egnyte data sources only)
|
|
Breach Reporting
Analyze and report on user activity after a breach to assess business impact, in order to support GDPR and CCPA obligations (Egnyte data sources only)
|
|
Subject Access Request Workflow
Comply with Subject Access Request (SAR) workflow requirements as required by laws such as GDPR and CCPA (All data sources)
|
|
Banking and Financial Compliance Patterns
Compliance patterns relevant to the Banking and Financial industries (SOX, PCI) (All data sources)
|
|
Healthcare Compliance Patterns
Compliance patterns relevant to the Healthcare industry (HIPAA) (All data sources)
|
|
North American Compliance Patterns
Regulatory compliance patterns supporting Federal and State based data privacy frameworks, including CCPA, NY SHIELD, PCI, SOX and more (All data sources)
|
|
European Compliance Patterns
Regulatory compliance patterns supporting European data privacy frameworks, including PII for all 28 EU member countries (All data sources)
|
|
Asia Pacific Compliance Patterns
Regulatory compliance patterns supporting Asia Pacific data privacy frameworks, including APPI, PDPA and Chinese Data Protection (All data sources)
|
|
Latin America Compliance Patterns
Regulatory compliance patterns supporting Latin American data privacy frameworks, including LGPD and LFPD (All data sources)
|
HIPAA Compliant Storage
Comply with HIPAA requirements (other features and customer actions required for full HIPAA compliance)
|
FINRA Compliant Storage
Comply with FINRA requirements (other features and customer actions required for full FINRA compliance)
|
SOC2 Compliant Storage
Comply with SOC2 requirements
|
GDPR EU Data Residency
Comply with GDPR EU Data Residency requirements
|
ISO/IEC 27001 Compliant Storage
Comply with ISO/IEC 27001 requirements
|
Audit Reporting
Comprehensive audit reporting of file system changes, permission changes and more (Egnyte data sources only)
|
Legal hold
Retain content related to a legal issues by securing all
files created by selected users (referred to as custodians) or residing in specific folders,
within the specified date range (Egnyte data sources only)
|
Breach Reporting
Analyze and report on user activity after a breach to assess business impact, in order to support GDPR and CCPA obligations (Egnyte data sources only)
|
Subject Access Request Workflow
Comply with Subject Access Request (SAR) workflow requirements as required by laws such as GDPR and CCPA (All data sources)
|
Banking and Financial Compliance Patterns
Compliance patterns relevant to the Banking and Financial industries (SOX, PCI) (All data sources)
|
Healthcare Compliance Patterns
Compliance patterns relevant to the Healthcare industry (HIPAA) (All data sources)
|
North American Compliance Patterns
Regulatory compliance patterns supporting Federal and State based data privacy frameworks, including CCPA, NY SHIELD, PCI, SOX and more (All data sources)
|
European Compliance Patterns
Regulatory compliance patterns supporting European data privacy frameworks, including PII for all 28 EU member countries (All data sources)
|
Asia Pacific Compliance Patterns
Regulatory compliance patterns supporting Asia Pacific data privacy frameworks, including APPI, PDPA and Chinese Data Protection (All data sources)
|
Latin America Compliance Patterns
Regulatory compliance patterns supporting Latin American data privacy frameworks, including LGPD and LFPD (All data sources)
|
Governed 3rd Party Data Sources
Desktop Endpoints (via Connected Folders)
Basic: All capabilities of the Enterprise Lite plan. Enhanced: All capabilities of the Enterprise plan
|
|
Windows File Servers
Basic: Detect and remediate security issues plus unified permissions and content lifecycle analytics. Enhanced: All of Basic plus discover, classify, remediate sensitive and regulated content, and comply with Subject Access Requests
|
|
Microsoft 365
Basic: Detect and remediate security issues plus unified permissions and content lifecycle analytics. Enhanced: All of Basic plus discover, classify, remediate sensitive and regulated content, and comply with Subject Access Requests
|
|
Google Workspace
Basic: Content lifecycle analytics. Enhanced: All of Basic plus discover and classify regulated and sensitive content, and comply with Subject Access Requests
|
|
Box
Basic: Content lifecycle analytics. Enhanced: All of Basic plus discover and classify regulated and sensitive content, and comply with Subject Access Requests
|
|
Dropbox
Basic: Content lifecycle analytics. Enhanced: All of Basic plus discover and classify regulated and sensitive content, and comply with Subject Access Requests
|
|
S3-Compatible Public Cloud Storage
Basic: Content lifecycle analytics. Enhanced: All of Basic plus discover and classify regulated and sensitive content, and comply with Subject Access Requests
|
|
Microsoft Exchange
Enhanced: Discover and classify regulated and sensitive content, and comply with Subject Access Requests
|
|
Other Apps and Repositories (Via API)
Basic: Detect security issues plus content lifecycle management. Enhanced: All of Basic plus discover and classify regulated and sensitive content, and comply with Subject Access Requests
|
Desktop Endpoints (via Connected Folders)
Basic: All capabilities of the Enterprise Lite plan. Enhanced: All capabilities of the Enterprise plan
|
Windows File Servers
Basic: Detect and remediate security issues plus unified permissions and content lifecycle analytics. Enhanced: All of Basic plus discover, classify, remediate sensitive and regulated content, and comply with Subject Access Requests
|
Microsoft 365
Basic: Detect and remediate security issues plus unified permissions and content lifecycle analytics. Enhanced: All of Basic plus discover, classify, remediate sensitive and regulated content, and comply with Subject Access Requests
|
Google Workspace
Basic: Content lifecycle analytics. Enhanced: All of Basic plus discover and classify regulated and sensitive content, and comply with Subject Access Requests
|
Box
Basic: Content lifecycle analytics. Enhanced: All of Basic plus discover and classify regulated and sensitive content, and comply with Subject Access Requests
|
Dropbox
Basic: Content lifecycle analytics. Enhanced: All of Basic plus discover and classify regulated and sensitive content, and comply with Subject Access Requests
|
S3-Compatible Public Cloud Storage
Basic: Content lifecycle analytics. Enhanced: All of Basic plus discover and classify regulated and sensitive content, and comply with Subject Access Requests
|
Microsoft Exchange
Enhanced: Discover and classify regulated and sensitive content, and comply with Subject Access Requests
|
Other Apps and Repositories (Via API)
Basic: Detect security issues plus content lifecycle management. Enhanced: All of Basic plus discover and classify regulated and sensitive content, and comply with Subject Access Requests
|
Intelligent Content Classification
Classification Policies (Pre-built and Dynamic)
Use pre-built classification policies for regulatory classification needs like GDPR, CCPA, HIPAA, PCI-DSS, and more, or create customized dynamic policies to meet specific classification needs
|
|
Sensitive Content Classification
Identify files that contain sensitive information including credit cards, names, emails, health data and more. Automatically apply custom metadata. (All data sources)
|
|
Multi-Language Classification
Discover and classify sensitive content in multiple
languages (all data sources)
|
|
Keyword Entity Abstraction
Create a policy to identify files that contain custom keywords and associate with relevant metadata. (Egnyte data sources only)
|
|
Document Identification
Discover, classify, and govern business documents such
as resumes, contracts, budgets, payroll documents, and more
|
|
Advanced OCR Classification Scanning
Identify and sensitive content contained in scanned or
faxed documents using OCR
|
Classification Policies (Pre-built and Dynamic)
Use pre-built classification policies for regulatory
classification needs like GDPR, CCPA, HIPAA, PCI-DSS, and more, or create customized dynamic
policies to meet specific classification needs
|
Sensitive Content Classification
Identify files that contain sensitive information including credit cards, names, emails, health data and more. Automatically apply custom metadata. (All data sources)
|
Multi-Language Classification
Discover and classify sensitive content in multiple
languages (all data sources)
|
Keyword Entity Abstraction
Create a policy to identify files that contain custom keywords and associate with relevant metadata. (Egnyte data sources only)
|
Document Identification
Discover, classify, and govern business documents such
as resumes, contracts, budgets, payroll documents, and more
|
Advanced OCR Classification Scanning
Identify and sensitive content contained in scanned or
faxed documents using OCR
|
Content Lifecycle Management
Content Lifecycle Policy Engine
Create automated and enforceble policies to manage
content lifecycle
|
|
Content Lifecycle Analytics and Reporting
Understand how data usage via detailed usage reporting
and advanced data analytics, plus see the impact of policy changes with draft policy views
(Egnyte data sources only)
|
|
Customizable File Retention Policies
Create automated retention workflows to prevent new and existing file versions from being purged based on predefined or custom classification policies (Egnyte data sources only)
|
|
Automated File Archiving
Create automated archive workflows to archive file versions older than a specified date and match predefined or custom classification policies (Egnyte data sources only)
|
|
Defensible Deletion
Create automated deletion workflows to delete file versions older than a specified date and match predefined or custom classification policies (Egnyte data sources only)
|
|
Redundant, Obsolete, Trivial, Stale (ROTS) Data Management
Apply automated lifecycle management policies based off file last access date and other criteria (Egnyte data sources only)
|
Content Lifecycle Policy Engine
Create automated and enforceble policies to manage
content lifecycle
|
Content Lifecycle Analytics and Reporting
Understand how data usage via detailed usage reporting
and advanced data analytics, plus see the impact of policy changes with draft policy views
(Egnyte data sources only)
|
Customizable File Retention Policies
Create automated retention workflows to prevent new and existing file versions from being purged based on predefined or custom classification policies (Egnyte data sources only)
|
Automated File Archiving
Create automated archive workflows to archive file versions older than a specified date and match predefined or custom classification policies (Egnyte data sources only)
|
Defensible Deletion
Create automated deletion workflows to delete file versions older than a specified date and match predefined or custom classification policies (Egnyte data sources only)
|
Redundant, Obsolete, Trivial, Stale (ROTS) Data Management
Apply automated lifecycle management policies based off file last access date and other criteria (Egnyte data sources only)
|
Administration
SCIM User Provisioning
Support for user and groups provisioning (depending on SAML provider) using SCIM 2.0
|
|
System-Wide Reporting Dashboard
Report on file usage, permissions, log-ins, user and group provisioning, and more from a unified dashboard
|
|
FTP / SFTP Access
Retire traditional FTP servers with Egnyte's integrated FTP / SFTP functionality
|
|
Migration Tools
Efficiently migrate all of your files, folders, and folder permissions to Egnyte
|
|
SAML Integration
Support for SAML-based authentication such as Azure AD
and Okta
|
|
Active Directory Integration
Use existing AD to create users and groups in Egnyte, saving deployment time
|
|
SSO Integration
Authenticate via 3rd party SSO providers
|
|
Role-Based Administration
Delegate specific administrative tasks to another user, such as billing to a user in Finance, or managing project groups to a Project Manager
|
|
Integration with 3rd party MDM solutions
Simplify deployment, configuration and management of
mobile devices that use the Egnyte mobile app via 3rd party MDM solutions
|
|
SIEM/SOAR Integration
Support for SIEM and SOAR security tools
|
SCIM User Provisioning
Support for user and groups provisioning (depending on SAML provider) using SCIM 2.0
|
System-Wide Reporting Dashboard
Report on file usage, permissions, log-ins, user and group provisioning, and more from a unified dashboard
|
FTP / SFTP Access
Retire traditional FTP servers with Egnyte's integrated FTP / SFTP functionality
|
Migration Tools
Efficiently migrate all of your files, folders, and folder permissions to Egnyte
|
SAML Integration
Support for SAML-based authentication such as Azure AD
and Okta
|
Active Directory Integration
Use existing AD to create users and groups in Egnyte, saving deployment time
|
SSO Integration
Authenticate via 3rd party SSO providers
|
Role-Based Administration
Delegate specific administrative tasks to another user, such as billing to a user in Finance, or managing project groups to a Project Manager
|
Integration with 3rd party MDM solutions
Simplify deployment, configuration and management of
mobile devices that use the Egnyte mobile app via 3rd party MDM solutions
|
SIEM/SOAR Integration
Support for SIEM and SOAR security tools
|
For Developers
Governance APIs
Create secure custom applications that interact with
Egnyte security and governance capabilities such as content classification, finding sensitive
content, identifying potentially exposed data, and more. Note: Capabilities vary by plan
|
|
Collaboration APIs
Create secure custom applications that interact with
Egnyte collaboration capabilities such as managing users and groups, uploading and downloading
files, creating folders, setting access permissions, and more. Note: Capabilities vary by plan
|
|
Webhooks
Register for events and receive event-driven
notifications via Webhooks
|
|
Developer SDK
SDKs for popular programming languages including
JavaScript, .NET, Android, iOS, and others to expedite development using the Egnyte public
APIs
|
|
Custom App Install
Create your own application that can hook into the
Egnyte Web UI, Desktop and Mobile applications to expose custom actions and workflows
|
|
Training Portal
Interactive console to explore our APIs, documentation,
and SDKs, plus access to Egnyte product managers, and developer evangelists
|
Governance APIs
Create secure custom applications that interact with
Egnyte security and governance capabilities such as content classification, finding sensitive
content, identifying potentially exposed data, and more. Note: Capabilities vary by plan
|
Collaboration APIs
Create secure custom applications that interact with
Egnyte collaboration capabilities such as managing users and groups, uploading and downloading
files, creating folders, setting access permissions, and more. Note: Capabilities vary by plan
|
Webhooks
Register for events and receive event-driven
notifications via Webhooks
|
Developer SDK
SDKs for popular programming languages including
JavaScript, .NET, Android, iOS, and others to expedite development using the Egnyte public
APIs
|
Custom App Install
Create your own application that can hook into the
Egnyte Web UI, Desktop and Mobile applications to expose custom actions and workflows
|
Training Portal
Interactive console to explore our APIs, documentation,
and SDKs, plus access to Egnyte product managers, and developer evangelists
|
Plan Basics
Storage Included
Base amount of cloud storage included in the plan
|
1 TB |
Max File Size
Maximum size allowed for a single file
|
100GB |
Domains Included
Multiple account domains (acme.eg.com, acmearchive.eg.com, acmeeurope.eg.com, etc) available with higher plans
|
1 |
Custom Access URL
Access and share content through a custom-branded URL
|
Storage Included
Base amount of cloud storage included in the plan
|
1 TB |
Max File Size
Maximum size allowed for a single file
|
100GB |
Domains Included
Multiple account domains (acme.eg.com, acmearchive.eg.com, acmeeurope.eg.com, etc) available with higher plans
|
1 |
Custom Access URL
Access and share content through a custom-branded URL
|
