Employee PC and Server Activity Monitoring Solution



Similar documents
Data Sheet: Work Examiner Professional and Standard

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

Using Computer Surveillance to Watch Corporate Security and Employee Performance

Specifications SMART Bridgit software

User manual of the Work Examiner Contents

Downloading and Mass Deploying Applications

Backup Exec 15. Quick Installation Guide

Comprehensibility: Look and Feel: Time to install and configure: 130 minutes NAME PROFIL PARENTAL FILTER 2. Profil Technology. Company. Version 2.4.

ABBYY FineReader 11 Corporate Edition

McAfee Web Reporter Turning volumes of data into actionable intelligence

Installation Instructions Release Version 15.0 January 30 th, 2011

Puresight Technologies Ltd. Arabic, Dutch, English, German, Greece, Russian. 12 years old users: 1/21 (points 2,67 out of 4)

Desktop Surveillance Help

DataSuite Installation and Activation Guide

escan Corporate Edition User Guide

Administration Guide Messenger 2.2 July 30, 2013

AdminToys Suite. Installation & Setup Guide

RELEASE NOTES. F-Secure Client Security Version build 309 (RTM) F-Secure Client Security Premium Version build 118 (RTM) 1.

1. PRODUCT OVERVIEW PRODUCT COMPONENTS... 3

`````````````````SIRE QUICK START GUIDE

MailStore Server Specifications. 6 - Technical. Archiving. Supported Servers and Internet Mailboxes. Supported Clients

Lindenbaum Web Conference

Safe internet for business use: Getting Started Guide

Novell Filr. Windows Client

A new business application, that supports e- mail, IM communication, calendaring and collaboration

RightNow November 09 Workstation Specifications

User's Guide. Copyright 2012 Bitdefender

Feature and Technical

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration

SMART Bridgit software

USER MANUAL OPTENET WEB FILTER PC Version 9.8

Live Office. Personal Archive User Guide

MailStore Server. The Standard in Archiving

This document provides the first-priority information on Parallels Virtuozzo Containers 4.0 for Windows and supplements the included documentation.

Ad Hoc Transfer Plug-in for Outlook Installation Guide

Personal Archive User Guide

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32)

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Kaspersky Anti-Virus 2012 User Guide

Cox Business Premium Security Service FAQs

VoIP Infrastructure Upgrade Desktop. User Group March 2014

Client Program Installation Guide

SecureVault Online Backup Service FAQ

VisionView Maintenance Utility Release Notes

IBM Tivoli Remote Control

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

MailStore Server 7 - Technical Specifications

Bomgar License Comparison

ABBYY FineReader 9.0 Corporate Edition System Administrator s Guide

User's voice OPTENET WEBFILTER PC. Comprehensibility: Test user did not provide any comments. Look and Feel: Time to install and configure: 45 minutes

Sage 100 Standard ERP Version 2013 Supported Platform Matrix Created as of November 21, 2013

IBackup Drive User Guide

MGC WebCommander Web Server Manager

How to deploy SurveilStar PC/Internet Monitoring Software

Administration Guide Messenger 3.0 February 2015

OfficeServ Application Suite

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

MailStore Server 7 Technical Specifications

EntraPass WebStation. Installation Manual DN

Charter Business Desktop Security Administrator's Guide

User Guide Microsoft Exchange Remote Test Instructions

Novell Filr. Mobile Client

Setting Up a One-Click Meeting

PUBLIC Password Manager for SAP Single Sign-On Implementation Guide

System Administrator s Guide. ABBYY FineReader 8.0. Corporate Edition

Information. OpenScape Web Collaboration

ipecs UCS Unified Communications Solution Easy to access and activate Highlights Single server solution

Kaspersky Total Security User Guide

Network Connect Installation and Usage Guide

How to configure your Windows PC post migrating to Microsoft Office 365

Cisco Unified Attendant Console Business Edition Version 9.1

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

Comodo BackUp Software Version 4.4

Recording. Smart recording (depending on the camera models)

GUARD1 PLUS SE Administrator's Manual

Web Conferencing Comparison Guide

Open Cloud Store. End-user manual. For

Similar to basic pricing, usage cost is added in specified time intervals. Example: Each 15 minutes, add $1.00. Overtime option is optional.

User Guide. Web Chat Gateway. Release 4.0

MAPI Connector Overview

Access to Front Office services

System Management. What are my options for deploying System Management on remote computers?

OpenScape Web Collaboration

Transcription:

Employee PC and Server Activity Monitoring Solution

Employee PC and Server Activity Monitoring Ever dreamed of a software tool to track your network activity in real time? Ever thought of how useful it would be to know what your employees or students do when they are supposed to work or study? Ever lost money and/or confidential information, lacking control over your staff online activity? E-SPIN Represented Activity Monitor is the solution you needed! This powerful tool allows you to track any LAN, giving you the most detailed information on what, how and when your network users performed. Whether it is a library public network, university or commercial organization network Activity Monitor offers efficient control. The system consists of server and client parts. Activity Monitor server can be installed on any computer in the entire LAN. Remote spy software (Agent) is a small client program that is installed on all computers on the network you want to monitor. It can be installed even remotely from the PC with Activity Monitor on it or via Active Directory Group Policy in a Windows domain. Any computer in the network under control can be spied remotely. You may tune this computer monitoring software so that it will record activity on all networked computers. This information can be later used for the deeper analysis and advanced report generation. Activity Monitor has proved its excellent efficiency in increasing the overall productivity of the establishments where it was used to track the local networks. This powerful tool from Softactivity saves your money.

Activity Monitor Key Features Live view of remote desktops. You may easily have a look at any user s desktop. Easy Internet usage monitoring. Web surfing history logging. Real time tracking and recording of all URLs visited in browser. Monitor software usage. Monitor programs usage activity in real time. With this feature you know what programs and for how long your network users use during the day. Centralized management. Record activity log for all workplaces in one centralized location on main computer with Activity Monitor installed. Central Log Database stores typed keystrokes, programs usage info with time stamps, application path and window names, visited web sites, email, IM messages and more. Store complete history of communications for every user. Emails sent and received by employees Supported: unsecure POP3/SMTP in all email clients. This includes most sent and received email in Outlook, Outlook Express, Windows Live Mail, Thunderbird, The Bat and all other mail programs Microsoft Exchange email in Outlook (new!) secured POP3/SMTP email in Outlook (new!) IMAP (secure and unsecure connections) email in Outlook (new!) Webmail can be seen on series of screenshots and keystrokes log IM chats in popular instant messengers. You can see both sides of all conversations. Instant messenger clients supported: MSN Messenger, Windows Live Messenger Yahoo messenger Skype (new!) AIM (AOL Instant Messenger) (new!) ICQ IRC Messages typed in all web forums, chat rooms, social networking, webmail can be seen on a keystrokes log and series of screenshots. Track any user s keystrokes on your screen in real time mode. Passwords, email, chat conversation - you have the full picture! SoftActivity Keylogger module supports all international characters including English, Spanish, Portuguese, Japanese, Chinese, Korean, Cyrillic, etc.

Activity Monitor Key Features Take snapshots of the remote PC screen with SoftActivity's IntelliSnap technology. Easy spying without your presence. Time-sorted history of the activity in compressed JPEGs on your computer. Screenshots recorded on all computers can be stored in one centralized location on main computer; IntelliSnap technology takes screenshots based on user actions, versus just time intervals; With IntelliSnap you will see screenshots of every web page visited, every instant message, email and webmail messages the person was reading or sending, and more Completely secure solution (Improved!) Only managers authorized with password can connect to a remote computer New! Network communications are encrypted with SSL Central Log Database is strongly encrypted to provide access to reports only for authorized managers Strong encryption of log files located on monitored computers, so users can t view or modify them Total control over the networked computers. Start or terminate remote processes, run commands, copy files from remote systems. You may even turn the computer off or restart it, not to mention logging off the current user. Deploy Activity Monitor Agent (the client part of the software) remotely from the administrator's PC to all computers in your network. View reports based on Central Logs Database with SoftActivity LogViewer Top Programs report for every user shows in what applications users spent their working computer time. Top Websites report for every user on the network combined with complete Internet history View all email and chat messages sent/received by users Search reports and filter by date interval Easy to understand reports in HTML format for viewing in browser. Export logs to MS Excel for advanced analysis. View total picture of what programs users work with. Screenshot Several managers in the organization can use Activity Monitor to track users in their departments. New! One computer can be monitored by more than one administrator at the same time Multilingual international features Activity Monitor user interface is available in 12 languages: English, German, Spanish, Italian, French, Portuguese, Russian, Turkish, Chinese Simplified, Chinese Traditional, Japanese, Korean Can display email, chat, other reports and record keystrokes is any language. Activity Monitor is a unicode program

Product Benefits Increase personnel productivity instantly. Eliminate personal use of Internet, Email, IM and social networks at work Prevent viewing of inappropriate content by employees at work Stop employees wasting work time on computer games Protect your company from legal lawsuits & reduce liability risk. In most jurisdictions, employers hold some form liability and accountability for the actions of their employees. You need to monitor their communications Employees can sue the company for a hostile workplace environment if they are unwittingly exposed to inappropriate or offensive materials on company computers or harassment via email, for example Protect your company from fraudulent activity. Employees often have access to sensitive personal information which can either be misused by the employee or sold on to a third party. Protect from intellectual property and trade secrets theft A recent study by Carnegie Mellon University s Software Engineering Institute found that 75% of IPT s were carried out by current members of staff. Keep records of your company s electronic communications For some companies/organizations retention of records can be a regulatory compliance requirement Collected records can be used in an internal investigation if such need arises Other Activity Monitor features include: You see it instantly on your screen when users type text on their computers. Autodetection of all networked computers with Agent installed. Monitor multiple employee computers simultaneously from a single workstation in LAN. Workplace surveillance software part, running on the monitored PC, is difficult to find for an employee as it runs completely invisible. Users can not terminate Activity Monitor Agent in Task Manager without Administrator user rights, not see recorded logs Install, uninstall or stop Agent spy program remotely from the administrator's PC. Automatically download recordings files from all computers on a scheduled basis and store them in central database. Automatic update of Agents on all remote computers from Activity Monitor. There is no need to reinstall client on all computer when new version is released. Easy to install and use. System Requirements Intel Pentium 233 MHz or equivalent (Recommended: Pentium 500MHz or newer) For monitoring module (manager's/administrator's PC): Microsoft Windows 7; Microsoft Windows Vista; Windows XP; Windows Server 2003; Windows Server 2008; For monitored computers (Agent module): Microsoft Windows 7; Microsoft Windows Vista; Windows XP. (for monitoring users on Windows Server please use TS Monitor) Both 32- and 64-bit editions of above Windows versions are supported 128MB of RAM (Recommended: 512MB or more) Hard Drive Space: Activity Monitor: 100 MB or more for recording logs for longer periods or more computers. About 50Mb per computer Agent on monitored computers: 50 MB or more for local recordings Network connection to the monitored computers (Recommended: 100Mb LAN). Monitoring over a VPN connection is also supported. Both Workgroup and Domain network configurations are supported as well as a simple peer-to-peer LAN.

Screenshot(s) Live view of remote desktops Easy Internet Usage Monitoring

Screenshot(s) Monitor software usage Centralize activity log recording

Screenshot(s) Email send and receive recording IM chat and conversations recording

Screenshot(s) Total control of networked computers Search reports and fileted by date interval

Screenshot(s) Easy to understand and browser based reports Export logs to MS Excel for Advanced Analysis