View

Sorting

Products found: 12

logo
Offer a reference bonus
1.00

ActivTrak

ActivTrak collects and normalizes user activity data providing visibility, analytics and context. Get the real story behind HOW your employees work and what hinders their productivity so you can streamline and optimize business tools, processes and teams.
  • Uncover poor operational processes and workflow bottlenecks
  • Analyze productivity activities and behavior patterns
  • Get visibility into cloud application proliferation and usage trends
  • Gain insights into remote employee work patterns and time management
  • Identify insider threats to reduce security vulnerabilities
  • Get alerted to employee activities that introduce compliance risk
  • Easily generate detailed reports for audit trail requirements
What Can I Use it For? Workforce Productivity Get a clear picture of how work gets done. Leverage data insights to analyze where time is spent and how to improve less productive behaviors to drive business. Remote Workforce Management Monitor employee activity including working hours, engagement, and productivity behaviors of remote workers. User Activity & Employee Monitoring Get an accurate picture of each employee’s performance and intent. Make informed management decisions and eliminate uncertainty about suspect behavior. Workforce Analytics Analyze insights in context so you can optimize workforce behaviors and take action on the findings to enhance productivity, business processes and the overall employee experience. Operational Efficiency Understand employee workflows, discover bottlenecks and poor organizational structures to better streamline operations. Data Privacy & Compliance Uncover compliance gaps, ensure sensitive data privacy, and quickly respond to audits with deep-dive compliance reporting generated with a few clicks.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

EKRAN SYSTEM User Activity Monitoring (UAM)

Ekran System® is a universal user activity monitoring software platform that covers each node of your infrastructure. FEATURES: Session Recording Ekran System® records on-screen users activity for all sessions in video format, indexed by accompanying text metadata. Also, the activity tracking software captures input and output audio streams on the endpoints. It provides Citrix and Windows user activity monitoring on servers and workstations with local, RDP, and terminal session recording. It also provides Telnet SSH session recording for Linux/UNIX servers. Each session record includes important details about remote connections and connecting users. You can also export it for further investigation and analysis. Advanced Monitoring Format Ekran System’s core monitoring format is high-performance video indexed with multilayer metadata including names of active applications, titles of active windows, websites (URLs) visited, keystrokes types, commands and scripts executed, and devices connected. Video recording is an efficient tool to log and monitor user activity, as it’s all-inclusive and integrated, allowing for quick comprehension and reconstruction and providing the tools to respond to a security incident. Real-time User Activity Monitoring & Incident Alerts Ekran System not only records user sessions but also monitors user activities in real time. It includes an AI-based user behavior analytics subsystem that continuously checks user activity against a normal baseline to detect deviations and possible account compromise in a timely manner. The Ekran System UEBA module can help security officers better detect insider threats when employees act maliciously during short periods of time or when they inadvertently exfiltrate corporate data. It also includes another alerting subsystem based on customizable rules that’s used to doubly secure the most critical assets and scenarios. USB Monitoring & Control An important aspect of user activity monitoring is controlling the use of connected devices. Ekran System user tracking software includes powerful USB device monitoring and management functionality for dealing with storage devices as well as any kind of USB equipment, including modems and keyboards. The user activity monitoring system can track device connections and can be configured to notify your security team about them. Besides monitoring, Ekran System can be set up to allow or block devices according to rules, blacklists, and whitelists. To add more flexibility, Ekran allows you to set up manual USB device approval for critical scenarios. Record Filtering Software to monitor user activity will log thousands of user actions over a typical day. Solutions for monitoring computer activity of a number of privileged users should provide tools to make logging more focused. To record user activity optimally, Ekran System gives you several filtering options. You can record a selected number of key applications or set up a list of private/non-critical applications or URLs you don’t wish to monitor. Continuous Monitoring Software to track user activity includes an offline monitoring option. If the network connection on the client goes down, the Ekran System Client will continue to work, collecting monitoring data in secure storage on the client to then send to the central storage according to a performance-aware protocol once the connection is restored. Ekran System Client and its data are protected from intrusion by monitoring users with any level of privilege. By enabling Protection from Client settings modification, you can prevent client uninstallation, process interruption, solution component editing, and other actions to block monitoring. WHY COMPANIES CHOOSE MONITORING USER ACTIVITY WITH EKRAN SYSTEM:
  • Full desktop and server OS support
  • Enterprise-ready
  • More than user activity monitoring solution
  • Low total cost of ownership
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

EmpMonitor

Manage all the computers in your organization remotely from a centralized location. Your EmpMonitor account is accessible from any internet-enabled device giving you access from anywhere at any time. With our real-time computer monitoring software, you can view activities as they happen and manage instantly. Time Management
  • Track employees presence and activities
  • Spot and eliminate wasted time
  • Optimize your team
User Management
  • Effectively manage multiple systems and users
  • Centralized network monitoring
  • Deputize your Peers
Get Real-Time Insights
  • See what your employees are doing in real-time
  • Live Refresh mode
  • Department level management
Manage Attendance
  • Log hours from anywhere (Flexible user-based settings)
  • Accurate work hours
  • Department wise attendance
  • Extract ready-made reports (up to 30 days)
Auto Screenshots
  • Take screenshots at regular intervals
  • Customized monitoring parameters
  • Generate random screenshots
  • Make sure Employees stays on track
Why EmpMonitor Is Best For Your Business? EmpMonitor can improve your employees’ productivity, business, and overall operation with its various amazing functionalities. These are just a few ways. Increase Productivity Gain complete visibility & full control over your employees’ computer activities. Graphical Reports Get detailed insights in the form of intuitive graphic reports and charts. Simple & Easy to understand. Save Time And Money Ditch the paperwork. EmpMonitor is 100% automatic. Less manual work and low compliance. Data Security Real-time monitoring, automatic screenshots at regular intervals and save data in the cloud. Stealth Operation Track employee activities on PC remotely from any location in 100% invisible mode. 24/7 Support Facing difficulties? Got any queries? EmpMonitor tech support team has got your back.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

Kickidler

Kickidler is the software that allows keeping account and time supervision of employees at the working computers. Kickidler was developed by Tele Link Soft company. The first release of the program happened in 2013. Now, in 2019 thousands of companies and state agencies on all five continents are using Kickidler employee surveillance software. Two main purposes of the program of accounting working hours Kickidler are automation of the function of control of personnel and improvement of the level of information security in the organizations. The program can be used by small, medium-sized and large businesses and also in the state agencies where employees work on personal computers. Kickidler allows monitoring from 1 up to 10,000 workstations. What is Kickidler needed for? Main functions of the Kickidler employee monitoring program are online (real time) monitoring of working computers, automated accounting of employee's working hours, analysis of personnel's efficiency in workplaces, keystroke monitoring and also overseeing violations and remote control of the personal computer. The program will be useful to:
  • Top management for control of employees.
  • IT-specialists for optimization of working processes.
  • Security team for prevention of insider threats.
  • HR specialists for analysis of the microclimate in the organization.
Besides, Kickidler can be used for control of computer science lessons in educational institutions and for parental control of the child's computer. How does Kickidler work? Kickidler's user monitoring software consists of 3 components: Server, Viewer and Grabber. Moreover, the first installed Server in the company gets the web interface. Server is where all data collected by the program are stored. Viewer is the program for monitoring employees and viewing reports. It is downloaded on the computer of the person that carries out the monitoring. Grabber is the agent for screen capture. It is downloaded on the controlled computers. Setup and coordination of all components of the program are carried out in the web interface. Furthermore, it has expanded reporting system. What effect can be achieved with Kickidler? Kickidler can be a powerful tool in the hands of the competent leader. Our program can do a lot of things:
  • It helps increase efficiency of employees.
  • It minimizes the risk of “insider threats”.
  • It allows controlling remote workers.
  • It counts the working hours.
  • It optimizes interaction between departments.
  • It detects illegal actions of employees.
  • It stores all data.
Kickidler’s advantages
  • Online monitoring of an unlimited number of working computers. Similar programs either don't have this function or have restrictions on the number of the screens that can be monitored.
  • Video recording and playback of employees' activity on the work PC. Videos are stored in the special indexed database that makes finding the necessary fragment easier and less time-consuming, just by using the filter.
  • Regular automatic updates of the program. Our product is constantly being developed, and it acquires new features. All updates are absolutely free for users.
  • Cross-platform. Our program works with almost all popular Windows, Mac and Linux distribution kits.
  • Hidden operating mode of the agent. If you want to, you can hide the agent from the list of processes.
  • Data security. All data collected by the program are stored on the client's servers, so there is no possibility of illegal access to them.
  • Data caching. Excludes the possibility of losing data during temporary lack of contact of the agent with the server.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

ObserveIT

ObserveIT empowers security teams to detect, investigate, and prevent potential insider threat incidents by delivering real-time alerts, and actionable insights into user activity in one easy-to-use solution. Detect Threats in Real-Time Protect the organization’s most valuable assets by identifying threats such as data exfiltration, nation state threats, and all other types of accidental or malicious insider activity. ObserveIT’s Insider Threat library—built with feedback from 1,900 customers & leveraging NIST, MITRE & CERT guidelines—enables unparalleled threat detection. Investigate Incidents Rapidly When a potential insider threat incident is detected, you need answers – fast. ObserveIT is the tool cybersecurity teams turn to for rapid and accurate insider threat investigations, gaining comprehensive visibility into user and data activity all in one place. Understand intent and build a case when the clock is ticking with ObserveIT. Respond to Incidents Once an insider threat incident has been identified, accurate and rapid response is everything. ObserveIT empowers teams to respond to insider threat incidents, whether malicious or unintentional. Block risky activity, provide interactive policy reminders to users, or build the evidence you need to take legal action when necessary with ObserveIT. Integrate ObserveIT insight into:
  • Splunk
  • HP ArcSight
  • IBM QRadar
  • LogRhythm
  • Securonix
  • Exabeam
  • ServiceNow
  • Lieberman
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
14
0
logo
Offer a reference bonus
1.00

REFOG Computer Monitoring Software

Can Employee Monitoring Benefit Your Company?

Do all your employees use their computer resources and Internet connection solely for your business? Do they work as hard when you are away as they do when you are watching over their shoulders? In other words, do you suspect your employee's productivity is lacking? You should consider installing a surveillance system to address the problem.

Look no further! Refog Employee Monitor records and monitors your employee's activities and provides you on-site and remote access to employee's logs and computer screens in real-time. The software-only solution can be installed in a matter of minutes and does not require any hardware other than an ordinary PC. No special surveillance skills or security training are needed to successfully configure and operate Refog Employee Monitor.

Improve Employee Productivity

Statistics show that surveillance disciplines employees and improves their productivity. Employees tend to perform better when they are being monitored - or even when they think they may be monitored. Refog Employee Monitor successfully accomplishes this goal by constantly monitoring your employee's working environment - their computers.

Real-Time Remote Monitoring

Employees perform better under constant control with real-time feedback from their supervisors. Simply logging keystrokes and saving screen captures for future analysis is not enough. A certain level of interaction and feedback is vital for tightening discipline and improving performance.

Letting your employees know that managers and supervisors can see what is happening on their computers in real-time even from remote locations provides the necessary feeling and improves discipline and productivity.

Refog Employee Monitoring Software allows managers and supervisors to monitor multiple employees remotely in real-time. There is no need to leave a comfortable Executive chair in order to check each employee's PC for unauthorized activities. Capture the action and see what your employees are doing while they are still doing it, and provide immediate feedback on their activities!

Save Screens and Keystrokes

While real-time monitoring is essential to improve employee productivity, it does not completely solve the problem of employee loyalty. Hard evidence such as lists of visited Web sites, chat logs and other things typed by employees are critical in decreasing the possibilities of security breaches and identifying disloyal employees.

Invisible Mode

Refog Employee Monitor is completely invisible to your employees. It runs silently and unobtrusively while logging everything that happens on your employee's computers. The product captures all keystrokes, makes periodic screen captures of employee's desktops, logs programs that are opened or closed, and records all Web sites that they visit. You can access these logs on-site or remotely; there's no need to leave your chair to check out employee behavior.

Email and FTP reports

You can easily configure Employee Computer Monitoring Software to alert you about certain events via e-mail or by uploading it to an FTP server. Smart templates allow capturing only those keystrokes that contain one of the pre-defined trigger phrases, making it easy to configure for maximum security or minimal intrusion.

Conclusion

Employee Monitoring Software is a powerful tool to address a lack of employee productivity while protecting your company against security breaches and disloyal employees. Download the free evaluation version, install it on all your PCs, make your employees aware of it and see how quickly your bottom line is improved!

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

SoftActivity Monitor

Nobody would ever need monitoring software if everyone was hard-working and trustworthy, like you. Sadly, your people are out of control. They’re on Facebook. Looking for designer shoes on eBay. Watching funny cat videos. Conquering a Massive Multiplayer kingdom. Even worse, confidential information is leaking outside your network – but who did it? You don’t have time to babysit them at their computers – and spending valuable IT time investigating these trouble-makers is prohibitive. You’ve got a business to run! Get the Employee Monitoring Software that Works Monitor every PC on your Local Area Network. Whether you’re monitoring company workstations or university campus network users, catch them in the act. Show them the proof. Take action. Our computer activity monitor solution lets you:
  • Remotely Monitor Without Them Knowing. View their computers in real-time – from your own PC. SoftActivity Monitor works invisibly, without slowing down their PCs.
  • Track websites visited. Tom from accounting was on Facebook for 3 hours a day, every day this week? Let him explain that to HR.
  • Record their e-mails. End workplace harassment, IP theft and more.
  • Record keystrokes in work apps, emails, websites and IM chats in real-time. See what’s happening as it’s happening.
  • View multiple computers at the same time in your network. See disasters coming and prevent them from happening.
  • Generate reports and schedule screen captures. Then show the bad guys the evidence. Even better, show everyone.
  • Protect against insider threats. Your employees could be putting your company at risk.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

Staffcop Enterprise

StaffCop Enterprise on-premise software that makes your business safe and secure StaffCop provides a unique, fully integrated solution that focuses on detection and response to insider threats through a combination of advanced behavioral analysis and context-rich logging of insider activity.
  • Helps reduce the risks of data leakage and loss of reputation
  • Gives transparency in the workflow
  • Allows you to see your business processes in reality
  • Quick investment return & minimum maintenance cost
  • Easy Deployment
Automatic work time tracking StaffCop Enterprise logs the beginning and the end of each employee’s workday, including lunch and coffee breaks, etc. It enables executives and employees, themselves, to improve discipline at the workplace and reduce idle periods.
  • Daily PDF email reports
  • Productive, active, delays and lateness employee ratings
  • Work timesheets and more...
Employee productivity measurement Each employee, department or company can be assigned separate productivity policies — categorize activity into productive and unproductive. You can view statistics online in your web-browser or set up receiving daily PDF reports on chosen employees and departments for the previous day. The system calculates the amount of time spent in productive and unproductive applications and web-sites. All that is not categorized is marked as neutral. Security incidents investigation StaffCop is a wayback machine! At any moment, you can go back in time and see what a particular employee was doing in a specified period in the past.
  • Events Correlation
  • Searching by keywords and regular expressions
  • Relations graphs, heatmaps
  • Graphs of anomalies detection
Cutting-edge technologies for cybersecurity, threat detection and alerting Filter constructor Flexible constructor helps to specify various parameters for event filters that include a wide specter of data. Threats analyzer Automatic analysis of data regarding suspicious activities, search by regular expressions and keywords. Event alerts system In case of security policy breach, alerts system goes off and notifications are sent to specified contacts. Detailed reports Detailed aggregated reports are irreplaceable tool during analysis of user activities on PC. Search by keywords A search by specified words enables to quickly receive information about particular events or group of events. Flexible system of access rights Access to data retrieved by StaffCop Enterprise is partitioned via rights system based on filters and user roles.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

Teramind UAM

Prevent Insider Threats with User Activity Monitoring and Behavioral Analytics Most organizations have cybersecurity measures in place including antivirus, firewall, intrusion detection to protect infrastructure and IT assets. While these are generally good at defending the organization from external threats, they leave a security hole when it comes to employees and other internal users, third-party vendors, contractors and privileged administrators who already have access to an organization’s valuable assets and sensitive data. Whether it is a company’s intellectual property, financial records, customer data, PII, PHI or other sensitive material, it only takes one insider to engage in unwanted behavior and expose an organization to risks. In fact, the majority of the data breaches in recent years involved weak or exploited employee credentials either by a malicious or accidental incident. This is where User Activity Monitoring (UAM) can help fill the gaps which already include features like Employee Monitoring, Privileged User Monitoring, Third-Party Monitoring, User and Entity Behavior Analytics (UEBA) and Endpoint Security, that is crucial for a holistic insider threat prevention solution. User activity monitoring is the process of tracking all user activity and behavior, while they are logged into a computer (endpoint). With an employee monitoring solution in place, businesses have the necessary means to keep an eye on their sensitive data, employees and third-party entities so that they can identify and stop the misuse of company data and resources. Teramind UAM Combines User Activity Monitoring, Behavior Analytics and Productivity Tools in a Single Platform Teramind user activity monitoring goes beyond the basic employee monitoring and tracking functionality and adds intelligent behavior-based analysis to provide actionable insight and automated responses to employee-generated threats. It can monitor employees, third-party vendors, contractors, remote and special/privileged users. With its rules and policies, Teramind UAM captures violation incidents as forensic evidence and takes action to alert, stop, block and more. Teramind UAM can also measure employee productivity, conduct risk analysis, prevent unauthorized data exfiltration and keep track of how employees and third-party vendors access company resources while logged in at work. Finally, in case of a data breach or security incident, Teramind provides comprehensive forensic data and session recordings to identify the employees and vendors who have triggered a rule violation along with their activity footprint with pinpoint accuracy. Teramind UAM Features:
  • Real-Time User Activity Monitoring
  • User Behavior Analytics
  • Policy and Rules Engine
  • Built-In Productivity Optimization
  • Audit and Forensics
  • Third-Party Vendor Management
  • Compliance Management
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

Veriato Cerebral

Stop Reacting to Threats & Start Hunting Them Integrated & Intelligent Cerebral is an AI-powered security platform that integrates User & Entity Behavior Analytics (UEBA) with User Activity Monitoring (UAM), allowing rapid Data Breach Response (DBR). The ability to hunt threats by proactively recognizing signs of risk, like changes in an employee’s attitude and behavioral patterns, allows you to move your security posture from reactive to proactive. Unlike network monitoring or document tracking, Cerebral immediately alerts you to who is exhibiting signs of risk, shows you related screenshots so that you can immediately determine the true nature of the incident. This visibility empowers your IT security team to rapidly take action (with 100% confidence) all while gathering the evidence essential to taking legal action. Cerebral’s Risk Scoring At a glance, you’ll see all individuals with elevated levels of risk. This daily Risk Scoring maximizes efficiency and productivity by allowing your security team to hunt threats proactively. Cerebral’s AI-based behavior analysis continually tracks each user's activity and language to create their daily risk score. The Risk Score dashboard shows high scores for each day, trends, recent alerts, and user details. It provides an immediate overview of high risk, user behavior within your organization. Expanding the Scope of Your Cyber Security Strategy Insider Threat Game Plan Without an insider threat game plan, corporations are leaving a gaping hole in their security strategy. The average time it takes for a corporation to detect a data breach is over five months! If you have critical data to protect, having an incomplete insider threat strategy puts your corporation in significant jeopardy. Endpoint Visibility & Analysis With up to 60% of breaches coming from insider threats, it’s critical that corporations proactively monitor all endpoints for the rapid detection of internal breaches. Cerebral agents can be deployed on Windows, MAC, Android devices as well as Windows servers (prime targets for attackers posing as insiders, utilizing compromised credentials). Cerebral protects both physical and virtualized endpoints. Detection Alone Is Not Enough Data Breach Response (DBR) is critical to minimizing the impact of a breach. Once the alarm is sounded, how quickly can you react? Cerebral’s Time-Capsule DVR lets you see video playback of the incident as it unfolded. This visibility allows you to immediately delineate false alarms from real threats and take immediate action with 100% confidence.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

Work Examiner

This outstanding Internet monitoring software brings valuable benefits to your company Increase Productivity Internet and computer monitoring software shows you who is working hard and who is lazing - spending a lot of hours in social networks, coming late and leaving early. Most of our customers get a 25% productivity boost after notifying users that they are being monitored. Prevent Data Thefts Enhanced computer surveillance functionality helps to handle all the data copied to the removable media or sent over the Internet. Apply indepth Internet and computer usage monitoring to suspicious employees to prevent critical data leaks. Improve Efficiency Use Internet monitoring software for employees as a self-control tool to understand how the computer hours are distributed between various actions. Each user may receive a personal report about his PC usage and identify productivity boost zones. New Level of HR Management W.E. Professional's organization unit tree model is very flexible for big companies with dozens of departments and thousands of employees. Active directory integration of security groups and users simplifies HR-related actions significantly. Product Overview
  • Surveillance. Stealth client records everything the user see or type and offers both on-line and recorded views.
  • Web Usage Control. Get a full view of the Internet usage and block any distracting content.
  • Work Time Tracking. Computer utilization and attendance tracking features help to manage HR resources.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

Workpuls Employee Monitoring Software

Time Management Reinvented for Digital Organizations

 

Employee Monitoring

It’s impossible to watch your employees every minute of the day. But Workpuls employee monitoring software can do it for you, creating a more productive workplace.

Computer Activity Tracking. Working hard, browsing social media or time-wasting? Always know how employees use their time, app and website usage, and overall productivity.

Regular Screenshots. Slackers are gone! Periodic or rules-based screenshots provide proof employees are doing their work at any moment during the day.

Verified Attendance. Manual clock-ins and outs can be unreliable – and costly. Automatically track employee work time via their computer activity instead.

 

Time Tracking

Workpuls is a time tracking software that keeps all your critical operations in check, on time and on budget. So you can stay focused on growing your business.

Project Overview. Get the whole team going in the same direction. Add projects and tasks, assign employees and ensure efficiently, focused work is being done.

Definitive Proof of Work. Automatically captured screenshots and computer activities mean you never foot the bill for time spent on other tasks, inflated timesheets or slacking.

Project Budgeting. Avoid debt and boost revenue with precise, down-to-the-decimal project budgeting. With our advanced data, budget forecasting becomes less guesswork and more yes-work.

 

Automatic Time Mapping

Manual project time tracking can be a real bottleneck. Workpuls makes it automatic, efficient and effortless - without a mistake insight.

Precise Project Insights. Our detailed reports will help you stay on top of project progress and make sure that every second is counted.

Eliminate Human Error. Instead of depending on the information, your employees enter in a sheet, automatic time mapping data relies on workers’ activity.

Hands-Off Time Allocation. Our automatic time mapper assigns work to projects automatically without bothering your employees.

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.