IMonitor EAM Employee Computer Surveillance Solution iMonitor Soft Co. Ltd., Tel:1-626-999-4601 Skype : imonitor.support

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

NetWatcher NetGuarder NetWatcher Introduction - Boost Enterprise Efficiency Dramatically
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Windows XP Basics OVERVIEW Next.
Advanced Workgroup System. Printer Admin Utility Monitors printers over IP networks Views Sharp and non-Sharp SNMP Devices Provided Standard with Sharp.
A Quick Review of Unit 2 – Using Windows 7 Computing Fundamentals © CCI Learning Solutions.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Chapter 11 - Monitoring Server Performance1 Ch. 11 – Monitoring Server Performance MIS 431 – created Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Operating System & Application Files BACS 371 Computer Forensics.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
OS and Application Files BACS 371 Computer Forensics.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Product Demo. Terminal Services Log By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Technology.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
eScan Total Security Suite with Cloud Security
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
Technology Coordinators Training. Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All rights.
Operating Systems Operating System
Week 2CSC 1511 Introduction to Information Systems CSC 151 Week 2.
Chapter 7: Using Windows Servers to Share Information.
Keylogger A presentation of computer safety. What is a Keylogger?  A keylogger is an invisible tool for surveillance that allows you to monitor the activities.
LANDesk Endpoint Security Audit 2.5
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
TERMS TO KNOW. Desktop This does not mean a computer desktop vs. a laptop. You probably keep a number of commonly used items on your desk at home such.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Module 7: Fundamentals of Administering Windows Server 2008.
WindowsXP Explorer The Explorer is a used to organize and control the files and folders of the different storage systems such as the hard drive, floppy.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Smart PSS Associate Certified Class Dahua Security Certification
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
CensorNet Desktop Surveillance Description, Target audience, Positioning Components, Features
Computer Emergency Notification System (CENS)
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Product Presentation. SysKit By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, Europe founded in Technology.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Introduction TO Network Administration
> > >> < <
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
OsMonitor Wangya Computer Co., Ltd. Employee Monitoring Software.
Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam.
Page PearsonAccess™ Technology Training Online Test Configuration.
Page ADP Technology Training. 2 Page2 Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All.
ITMT 1371 – Window 7 Configuration 1 ITMT Windows 7 Configuration Chapter 8 – Managing and Monitoring Windows 7 Performance.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Chapter 7: Using Windows Servers
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Configuring Internet-related services
LO3 – Understand Business IT Systems
Designing IIS Security (IIS – Internet Information Service)
Employee Monitoring Solution
Comodo Dome Data Protection
Presentation transcript:

iMonitor EAM Employee Computer Surveillance Solution iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Why Need Us? As employers, can you imagine the consequence of managing your employees just like people did in old days? Computers along with internet has been commonly introduced in almost all the enterprises, and obviously, employee’s work such as designing, developing or communicating with clients has to be achieved by various applications and computer programs. It is a hot potato that threatens employers’ highly efficient management. iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Why Need Us? As employers, are you confronting with the following problems?  Knock-offs of your company’s product are in hot sale before its official publication  Some of the employees do their own moonlighting during work time in the office  Valuable employees submit resignation without warning  Employees fail to hand over all his files and work before resignation  Important documents and data are deleted maliciously  Keeping an eye on employees all the time is too hard to put into effect  Leaking of confidential data and files causes huge losses … iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Why Need Us? Threats are from the insiders !!!  83% of employees take confidential files with them before resignation!  80% of the world's enterprises have the risk of information leakage!  Employees’ fun time takes up 48% with chatting, shopping, gaming or searching other stuff in work time!  One out of every 400 mails letters contains sensitive information!  96% of the confidential issues caused by employees’ wrongdoing or malicious acts! iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Our Solution Employee Computer Surveillance Solution iMonitor EAM is an easy-to-use surveillance software that provides total employee monitoring solution for enterprises at any size-from large ones to SMES. Surveillance software like ours is committed to catch and record employees’ computer activities stealthily in 360 degrees, protecting and growing your business by avoiding low productivity and confidential crisis. Our Solution iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features Computer Logs Remote Desktop Basic Management Process Management Technical Advantages Logs Agent Property Configuration Live Desktop Keystrokes Application Usage System Events Alerts Keyword Detection s Record Website History Chat Records File Tracking Removable & Online Storage FTP Transfer & Print Jobs Remote Control Live Desktop & Remote Camera Transfer Remotely Remote File Management Agent Installation Database Multilingual Version Department Management Multiple User Setting Process Management Asset Management Monitor Stealthily High Performance 360 Degrees Monitoring Efficient Database Storage Real-time Alert Complex Network Environment iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features Computer Logs 1 Logs 1.Log record: the graph reflects the log records of the computer activities, including keystrokes, files, clipboard, websites visited, downloads, print jobs, etc. 2.Keywords alert: according to preset keywords list, software can automatically detect related operations, send real-time alerts to the manager, and terminate inappropriate activity in time. 3.Application usage: saving details about application usage and sorted by title, time and frequency. 4.Website histories: catching and saving all visited websites, including URL, running time, frequency and page title, along with viewing live desktop in real time. 5.Traffic analytics: record traffic generated by each application, including the title, upload & download traffic and the path. Agent Property Configuration 1.Log settings: free to start or terminate the log along with uploading log records to server periodically. 2.Files/data security settings: disable the removable device, cellphone hard disk, and other storage devices and CD/DVD drive; monitor and record specific files and directories sorted by keywords and file name extensions. 3.Auto file backing up: Automatically backup important files and upload to the server sorted by file name extensions. 4.Traffic control settings: set limited traffic to the specific application. 5.Blacklist setting: Admin is entitled to add specific application, website URL, keywords to blacklist thus to prevent any abusive activities. iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features Computer Logs 2 Live Desktop 1.Free to set the period of snapshot by choosing certain time, set the pixel of the snapshots, add specific application to snapshot list. 2.Snapshots will be displayed like slide share with speed control 3.Call up specific snapshots of certain time 4.Support one computer equipped with multiple monitors Keystrokes Record keyboard details, including time, applications, keystrokes, etc. Alerts Once abusive activities occurs, the server /the console will get alert in the notification bar, including start up, file downloading, printing, USB storage device inserting, keywords, etc. System Events Save all computer activities, including start-up, user log in, system hibernation, waking-up, shutdown, etc. Keyword Detection Snapshots will occur automatically when preset keywords are typed or operated, including file title, application and clipboard. Removable Storage & Online Storage Record all online & removable storage activity once it happens iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features Computer Logs 3 s Records Outlook and attachments records, web mail records Website History Analyze employees’ internet surfing time in work time. Save the entire visited website including URL, title, time, keywords. Chat Records Record all contents and histories on the popular social networks: Facebook, Twitter, Skype, etc. File Tracking Record all file operations including creating, modifying, deleting, renaming, copying, location, path, etc. FTP Transfer Record employees' FTP / HTTP upload and download files, including time, file name file size, server, etc. Print Jobs Record details of each print job including printer name, user name, document name, pages, file size, paper size, number of copies, scale, etc. iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Live Desktop And Remote Camera Remote Desktop Features Remote Control Remote Transfer Remote File Management  Remote control client’s keyboard and mouse, etc.  Admin can send files, messages, commands to the clients, such as shutdown log out, restart, DOS command, URL, applications.  Send files to multiple clients with one click.  Send multiple files with one click.  Manage all files on the client, including copy, paste, cut, delete, rename, create folders, send files, upload files, etc.  Browse all clients’ files stealthily.  Get files on the client without permission.  View live desktop of employees’ computers.  Free to set the pixel and speed of snapshots.  Open the camera in real time on the client to view the work scene.  Support a computer connected to multiple monitors.  Real time monitoring multiple desktops in one window at the same time. iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features Basic Management Agent Installation Database Multilingual Version Department Management Multiple User Management  Three types of installation: Direct installation, remote installation, and installation via Group Policy based on Windows Active Directory on the server.  On the other way around, there are 3 ways to uninstall.  User can change the database path if necessary, and back up the database.  Multilingual Versions: English, Chinese (simplified and traditional), Japanese, Spanish, Portuguese, German, French, Italian and Korean.  Add, edit, delete departments, etc.  Add new users, edit, delete users, etc.  User permission at three levels: Administrator, Standard user, Limited user  Each admin monitors different groups of clients respectively iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Generate HTML reports and saved daily, weekly, monthly. Analyzing employees’ computer & internet activity based on stamps, frequency or keywords, and displaying in charts will help you get knowledge of employees productivity intuitively Features Reporting Features iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

View all processes on the client computer, running processes, networks, system services, system information, auto-run programs and management of IP shared files management Process Management System Service Auto - run Applications IP Management Share Management Features iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Hardware Asset Management Check the hardware asset statistical report and detect asset changes Asset Management Software Asset Management View, search software and patch deployment to detect asset changes. Features iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Three Ways To Uninstall At the same time EXE Install Directly Install Remotely Centralized Install Via Group Policy Based On Windows Server Features East To Install iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features Technical Advantages 1 Monitor Stealthily iMonitor client program will run in background after the installation, no pop-ups, no desktop icons, no menu item, and the client installation file will be hidden automatically. 360 Degrees Monitoring Total monitoring solution: iMonitor EAM can record the total computer activities, including screenshots, keystrokes, clipboard, files operations (copy, move, paste, delete, rename, create), print jobs, removable storage usage, websites visited, searches, file downloads, chat, s and attachments, FTP file transfer, web mails and network disk operations, power on/off, system events and so on. Offline monitoring: If employee’s laptop is offline for inevitable reasons, the client will keep monitoring, and all the offline records will be uploaded to the server once the laptop connects to the internet. Real-time monitoring: Multi-screen high-definition real-time remote desktop monitoring Office monitoring: Real-time HD remote camera monitoring with multiple screens No pop-ups No desktop icons No menu item iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Features Technical Advantages 2 Real-time Alert Certain activity alert: Get real-time alerts when employees insert an USB drive, copy file, process file on USB drive, print document, send s, etc. Keywords alert: Get real-time alerts when detect preset keywords in keystrokes, clipboard, file name, website content, , files, etc. Abusive activities alert: Get real-time alerts when employees try to run a blocked application or open a blocked website. Efficient Database Storage Private Database: iMonitor uses the file system which is similar to Apple's, completely independent, without any other third-party database. It eliminates inevitable redundancy to remain efficient, stable, and fast on data storage, access, and search. Ideally Support Multi-Platform Support: Windows 2000/XP/Vista/7/8, 32bit & 64bit Mac OS X 10.8, 10.9, and newer High performance Features of the client: iMonitor client program is small but with high stability. It takes up low CPU occupancy, low memory space, and low bandwidth usage. Employee will never find any trace of the agent. Network data transmission: iMonitor uses multithreading technology to transfer log and image data, with high efficiency, stability, and fast response. And it won’t burden the ring network condition of the enterprises. iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Complex Network Environment Q1: Does iMonitor client support the computers based on domain or workgroup? Yes, iMonitor EAM can be installed on the computers based on domain or workgroup. Q2: Does iMonitor support site-to-site VPN connections? Yes, iMonitor EAM supports site-to-site VPN connection. You can install the server program on the computer at headquarters to monitor computers in different areas. You can also use a domain admin to install the client program remotely. Q3: Does iMonitor support multi-segment network environment? Yes, the same as single segment network environment. Q4: Does iMonitor support Internet connections? Yes, iMonitor supports Internet connections. You can absolutely install the server and client programs on computers in different countries to monitor your employees. With a static IP address for the server, you just need to enter the IP of the server computer when install the agent exe. If without an IP address, you can install DDNS and sign up a free domain, after that you can monitor computers located in different places with iMonitor EAM. Features Technical Advantages 3 iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Multilingual Versions English, Chinese (simplified and traditional), Japanese, Spanish, Portuguese, German, French, Italian and Korean. Support Multiplatform Ideally Support Windows Mac OS X Features iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support

Our Clients Our Honor iMonitor Soft Co. Ltd., Tel: Skype : imonitor.support