Microsoft Clarity
Free, cookieless session recording and heatmaps from Microsoft.
Which session replay tools are genuinely GDPR compliant with proper PII masking? Not all tools that claim compliance actually stop recording when a user rejects analytics, and default masking settings vary wildly across vendors. This guide compares the leading session replay tools on default PII masking behavior, EU data residency, HIPAA BAA coverage, GPC signal handling, consent state behavior, and pricing, so privacy, legal, and engineering teams can make an informed choice.
Quick summary
What it does
Session replay records visitor interactions including mouse movement, clicks, scrolls, form interactions, and network requests so product and UX teams can understand exactly what happened during a session.
What to look for
Evaluate default form masking, EU data residency, HIPAA BAA availability, GPC signal handling, server-side relay options, and whether the tool truly stops recording on a consent reject.
Where Lokker fits
Lokker validates that session replay stops in reject and GPC states, detects every replay vendor across your portfolio regardless of how it was deployed, and enforces blocking on sensitive paths when consent fails.
The tools
Eight leading tools covering free, mid-market, and enterprise tiers, cloud and self-hosted deployment, and a range of privacy and compliance postures.
Microsoft Clarity
Free, cookieless session recording and heatmaps from Microsoft.
Hotjar
Session recording, heatmaps, and user feedback surveys in one platform.
FullStory
Enterprise digital experience intelligence with high-fidelity session replay and DX Data analytics.
LogRocket
Session replay with JavaScript error monitoring and network request logging for product and engineering teams.
Mouseflow
Session recording with funnel analysis, form analytics, and GDPR-focused privacy defaults.
Glassbox
Enterprise session analytics with on-premises deployment for financial services and regulated industries.
PostHog
Open-source product analytics platform with session replay, feature flags, A/B testing, and data warehouse exports.
Smartlook
Session recording and event analytics with native mobile SDKs at a competitive price point.
All product names and trademarks are property of their respective owners. Lokker is not affiliated with or endorsed by any of the companies listed. Pricing and feature information is based on publicly available data and may change; verify with each vendor before purchasing.
Feature comparison
How each tool compares across the dimensions that matter most for product, engineering, and privacy teams.
Focus the matrix
Showing 5 of 8 tools. Add vendors as needed, or show the full table when you want every column.
3 tools are hidden from the focused table. The full text matrix below keeps every capability visible in the page source.
| Capability | |||||
|---|---|---|---|---|---|
| Recording scope | Clicks, scrolls, mouse movement, and page structure; cookieless; all sessions captured | Clicks, scrolls, mouse movement; sampling by percentage or user attribute filters | High-fidelity DOM capture including dynamic content; DX Data analytics layer on top | Full session with JavaScript errors, network requests, Redux state, and console logs | Clicks, scrolls, movement, and form interactions; funnel and conversion path analysis |
| Heatmaps and click maps | Click maps, scroll maps, and area heatmaps included at no cost | Click maps, scroll maps, and move maps included in all plans | DX Data heatmaps and click maps; segment-filtered heatmaps on higher plans | Heatmaps included on paid plans | Click maps, scroll maps, movement maps, attention maps included |
| Rage and frustration detection | Rage click and dead click detection; frustration score per session | Rage click detection and frustration signal filtering | Rage click, error click, and thrash detection | Rage click detection and JavaScript error correlation | Rage click, cursor thrash, and frustration score per session |
| User identification and session tagging | Anonymous sessions only; no user identification API | Identify API for tagging sessions with user ID and custom attributes | FS.identify() with user variables and session search by user attributes | LogRocket.identify() with traits and attribute-based session search | User tagging with custom variables and segment filters |
| Native mobile app support | Web only; no native mobile SDK | Web only; mobile web recording supported | Native iOS and Android SDKs with mobile-specific session replay | Native iOS and Android SDKs | Web only |
| Developer and analytics integrations | Google Analytics 4 and Microsoft Advertising UET integration | HubSpot, Segment, Jira, Slack, and over 30 integrations | Segment, Amplitude, Heap, Salesforce, BigQuery, and data warehouse exports | Jira, GitHub, Segment, Amplitude, Sentry, and error monitoring platforms | Google Analytics, Salesforce, and major CMP integrations |
| Free tier | Fully free with no session or usage limits | Free for up to 35 daily sessions and 300 recordings per month | No free tier; enterprise pricing on request | Free for up to 1,000 sessions per month | Free for up to 500 recordings per month |
| Default data retention | 13 months (fixed; cannot be shortened) | 365 days (configurable on paid plans) | 90 days default; longer retention available on higher plans | 30 days default; longer periods on paid plans | 30 to 365 days depending on plan |
| Session sampling controls | No sampling; all sessions are captured automatically | Percentage sampling and user attribute filtering | Capture rules for URL targeting and attribute-based session sampling | Configurable sampling rate and attribute-based session targeting | Sampling rate controls on all paid plans |
| API and data export | No public API; GA4 export integration only | Recordings and heatmaps API on paid plans | Data Export API; BigQuery and data warehouse exports on enterprise plans | Data export API; analytics and CDP destination integrations | REST API on paid plans |
Does your tool actually stop in reject and GPC states?
Lokker Consent Validator runs automated browser sessions across every consent state and confirms at the network layer whether tools in this category still send requests when they should not.
Privacy and compliance
The dimensions Lokker Privacy Edge evaluates when it detects session replay tools on your properties. Use this scorecard alongside the capability matrix when making your vendor decision.
| Privacy dimension | ||||||||
|---|---|---|---|---|---|---|---|---|
| Password fields masked by default | ||||||||
| Text inputs masked by default | ||||||||
| GPC (Global Privacy Control) respected | ||||||||
| EU data residency option | ||||||||
| HIPAA BAA available | ||||||||
| Block recording on specific URLs | ||||||||
| Server-side relay or proxy option | ||||||||
| Cookie-free mode | ||||||||
| Configurable retention period | ||||||||
| Published sub-processor list |
Scores reflect publicly available product documentation as of 2026. Vendor capabilities change; verify current behavior with each vendor and through independent testing. "Partial" indicates the capability exists but requires non-default configuration, an additional plan tier, or has meaningful limitations.
Buyer guidance
Choosing among these session replay tools depends on your industry, infrastructure, privacy posture, and budget. Use these decision guides to narrow your evaluation.
Mouseflow, Glassbox, and PostHog mask all text inputs by default, making them the strongest choices for GDPR-compliant deployments that prioritize PII masking out of the box. FullStory and LogRocket require configuration to mask general text fields beyond passwords. Microsoft Clarity requires explicit CSS selector configuration to mask any input beyond passwords. Default masking is only part of the story: you must also confirm the tool stops recording entirely when a user rejects analytics, which requires network-layer validation rather than dashboard inspection.
Lokker note: For teams that need strong default masking with minimal configuration overhead, Mouseflow or PostHog self-hosted are the most GDPR-aligned starting points. Pair any choice with Lokker Consent Validator to confirm the tool stops recording on reject and GPC states.
Only FullStory, LogRocket (enterprise), Glassbox, and PostHog (enterprise cloud or self-hosted) offer HIPAA BAA coverage. Clarity and Hotjar should not be used on any page that renders PHI or ePHI.
Lokker note: Validate that the tool you choose stops recording in reject and GPC states using Lokker Consent Validator, and confirm that your CMP gates the script correctly.
All listed vendors offer EU data residency, but residency alone does not satisfy GDPR. Require a DPA, confirm sub-processor lists, and validate that the tool is gated by explicit opt-in consent before any recording occurs.
Lokker note: PostHog self-hosted gives the highest level of data location control. Mouseflow and Hotjar have long-standing EU hosting with straightforward DPA processes.
Microsoft Clarity is fully free with no session limits. PostHog and Smartlook offer generous free tiers. Hotjar and Mouseflow have entry plans under $50 per month.
Lokker note: Even free tools create compliance obligations. Validate consent gating before go-live, regardless of cost tier.
Glassbox was designed for financial services with strong default masking, on-premises deployment, and audit trail capabilities. FullStory also serves regulated industries with its enterprise privacy controls.
Lokker note: Prioritize default masking configuration, on-premises or private cloud options, and the ability to block recording on sensitive transactional URLs.
LogRocket combines session replay with JavaScript error monitoring and network request logging in a single tool, making it particularly useful for engineering teams that need to correlate UX issues with code-level errors. PostHog offers an open-source stack with analytics, feature flags, and A/B testing alongside replay.
Lokker note: PostHog self-hosted gives engineering teams full data ownership and eliminates third-party data transfer concerns entirely.
PostHog is the only mainstream session replay tool that is fully open source and self-hostable with complete feature parity. Glassbox offers an on-premises enterprise option. All other tools are cloud-only.
Lokker note: Self-hosted deployments shift data processing entirely to your infrastructure, but you still need to validate consent logic, since the recording script still runs in the visitor browser.
Privacy context
Session replay is one of the highest-risk third-party tool categories in web privacy law. Three separate legal theories have produced active litigation: VPPA (Video Privacy Protection Act) claims for recording "video" content, HIPAA tracking technology obligations from HHS OCR guidance, and wiretapping-theory suits under California CIPA. Understanding what session replay actually captures, beyond what the vendor marketing says, is essential before deployment.
Even fully masked session replay loads the recording script, sets cookies or local storage, and transmits session metadata including URLs, referrers, session durations, and device fingerprints to the vendor. A consent reject must prevent the script from loading entirely, not merely mask inputs. Most CMP configurations block the visual output but leave the script running.
Session replay captures the full URL for every page visit, including query parameters and fragments that may encode search terms, filter states, user IDs, product details, or health-related keywords. A URL like /results?condition=diabetes&zip=90210 transmitted to a third party may constitute a disclosure of health data even if all form inputs are masked.
Replay tools that support user identification or custom event tracking can receive explicit PII through developer API calls. Attributes like name, email, user ID, and behavioral properties are transmitted to vendor servers. These calls often originate from product analytics code rather than the replay SDK directly, making them easy to miss in a consent audit.
VPPA class actions in the US have alleged that session replay tools capture "video" of the visitor interacting with video content on the page, creating an unlawful disclosure of viewing history to the replay vendor. Healthcare, streaming, and news sites are common targets. The legal theory does not require a dedicated video player; embedded players in editorial content are sufficient.
Session replay scripts are frequently deployed through Google Tag Manager or similar containers. If the tag manager itself loads before the CMP resolves, or if the replay tag lacks proper consent-mode integration, it may fire in pre-consent or reject states regardless of the CMP configuration. Network-layer validation is the only reliable way to confirm this.
Global Privacy Control is a browser-level signal for opt-out of sale and sharing of personal data. None of the session replay tools in this comparison natively intercept the GPC signal and stop recording without additional configuration. Organizations with California GPC obligations must gate session replay through a CMP or network-layer enforcement tool.
Where Lokker fits
Deploying a session replay tool is only the first decision. Confirming that it operates within your consent framework, stops on reject and GPC states, and does not fire on sensitive paths requires independent validation. That is what Lokker is built for.
Privacy Edge scans your web properties and identifies session replay scripts by network fingerprint, not just domain name. It surfaces obfuscated or tag-manager-delivered replay tools that may not appear in a manual inventory, maps them to the Session Replay risk category, and produces HIPAA and VPPA-mapped reason codes where applicable.
See Privacy EdgeConsent Validator runs automated browser sessions in pre-consent, reject, accept, and GPC states and captures exactly what the session replay tool does in each. If replay requests fire in a state where they should not, Consent Validator surfaces the finding with network-level evidence for your legal and privacy team.
See Consent ValidatorGuardian intercepts session replay scripts at the browser network layer before they can load, transmit data, or identify the visitor. Trust rules defined in Privacy Edge are enforced in real time, so a CMP misconfiguration cannot result in an unauthorized replay session reaching the vendor.
See GuardianCommon questions
The most common questions from privacy teams, legal counsel, and buyers evaluating session replay tools.
More comparison guides
Next step
Lokker confirms that the tool you choose stops collecting data in reject and GPC states, surfaces any gaps in your CMP configuration, and enforces blocking at the network layer so a misconfigured consent banner cannot result in an unauthorized data collection event.