View real-time screenshot as if you were on-the-spot. Support multi-screen. Or record screenshots to review detailed employee actions later or export as video.
Record all website visits. Block porn, game, video, SNS, etc. by URL or category, or specify permitted websites. Support IE, Firefox, Chrome, Opera, etc.
Record a full copy of conversations from both sides. Block IM tools and control IM file sending. Support Skype, Yahoo Messenger, ICQ, MSN, Alitalk, QQ, etc.
Track document usage history, check who, what, how, when and where. Control type of document operation and disk. Create a backup before operations.
Record logs of applications, check application name and installation path. Block any unwanted applications by process name or categories.
Record logs of shared files, block or allow remote control, remote file transfer, IP/port range, control HTTP or FTP file upload, limit download/upload speed, etc.
Record file printing details. Support local, network, shared and virtual printer. Block printing by pinter type, task, application, etc. Or add watermark to printed files.
Send prepared warning message, send email notifications, pop up alerts or lock PC when violation is detected or conditions are met. Or take manual actions.
Manage or unistall software and hardware. Manage application, process, service, sharing, etc. Check device manager, disk management, etc.
Store all the data collected from the monitored computers. Micrsoft SQL Server Database is supported.
View data collected from the agent computers in console, and create policies to control the employee PC flexibly.
Create agent file on server and install the agent on PC, then the PC will be fully monitored and controlled.
Business secret needs to be protected! Data leakage may be fatal to a company! Time to decide who can read, copy, move, send or modify the confidential files.
Track who has accessed the confidential documents and what has been done to them. This can be used as evidence in civil and criminal litigation.
Protect your network, keep the cyber threat like phishing, malware, spyware, spam, online fraud, hacker attacks, etc. far away from your working computers.
Block web distractions in the working time, such as YouTube, shopping websites, online games, gambling, SNS and more, let the employess stay focused.
Statistics will show you active time spent on applications and websites as well as idle time, this could be a reference for checking employees' productivity.
After the agent is deployed to the monitored computer, the policies will still keep effective when Internet is not connected or changed, or you left the office.
SurveilStar is available for free trial. Try full function to monitor 5 computers for 30-days. Fully evaluate and review SurveilStar before you make up your mind to deploy it or not.
Any enquiry before or after purchasing will be welcome. And it's one-time purchase, any function and software upgrade are free of charge. No extra cost is needed.
You can easily monitor more computers by upgrading existed license whenver it's necessary. There is no money waste and it fully depends on your need.