Controla el uso de tus equipos de empresa al 100%

No es agradable tener que hacer de policía pero si necesario para asegurar el buen uso de los equipos informáticos de la empresa.
Saber cuales son los perfiles de nuestros usuarios nos ayuda a adaptarnos a cada uno de ellos y en la toma de decisiones.
Hospedado en España
licencia / mo
- User Activity Monitoring
- Web pages & applications
- Console commands
- Online meetings
- File transfers
- Instant messaging
- Social media activity
- Keystrokes
- Clipboard (copy and paste)
- Searches
- Printing
- OCR
- Remote control
- Activity blocking
- Data Loss Prevention
- Protect all data types and IP
- Define content based rules
- Define file operation based rules
- Prevent malicious data exfiltration
- Use pre-defined data categories
- Leveragefingerprinting to protect
- Ensure PII, PHI/HIPAA, GDPR and more
- User Behavior Analytics
- Insider threat detection
- Abusive behavior
- Malicious behavior
- Dynamic risk scoring
- Anomaly detection
- Workforce productivity analysis
- Active vs idle time analysis
- Template based scheduling
- Interactive productivity reporting
- Policy and Rules Management
- Policy manager
- Visual rule editor
- Regular expression support
- Out-of-the box rule templates
- Audit & Forensics
- Video recording of all user activity
- Audio recording (optional)
- OCR of screen content (optional)
- Option to record only during violation
- Full text search
- Worry-free cloud hosting
- No servers needed
- We set up and host for you
- Secure, datacenter redundado
- Data is encrypted in motion and at rest
- * Minimo 2 usuarios