RM Enteprise records every detail:
- Emails : Archives every email sent or received using the corporate mail and sent via webmail such as Gmail with all file attachments.
- Chat & IM : Record a complete copy of both sides of chat and instant messaging conversations.
- Website Activity : Tracking websites visited, search queries, social networking activities and exact time of activity.
- Network Activity : Tracking network connections application with the time and address connection. Capture files sent via ftp or uploaded to cloud storages.
- File & Document Track : Track activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed. Creating shadow copies.
- Application Usage : Know when the application was used, what was done while open and how much time is used by the application.
- Screen Capture : RM Enterprise can take screenshots of the desktop at specific intervals, when changing the active window, and also record a continuous video screen.
- Keystrokes : Capture communications activity in traditional email clients as well as many popular webmail services, and have a searchable system of record that can be alerted and reported on.
- Mic Recoding : Hear what happens in the office through microphones connected to computers. Feature helps to reveal the fraud.
How it works:
Provides a unique, fully integrated solution that focuses on detection and response to insider threats through a combination of advanced behavioral analysis and context-rich logging of insider activity.
- Collect
- Collect all activity events at the end points for subsequent analysis, notifications and decision making.
- Analyze
- Automatic and statistical analysis of data to detect anomalies of user behavior, identify incidents, insiders and disloyal employees.
- Alert
- Automatic alerts about violations of security policies, dangerous and unproductive activities of employees.
- Report
- Pre-configured & self-made reports width periodic e-mail sending. You can easily create reports with a powerful constructor.
- Block
- Blocking access to "negative" sites, running applications and removable USB-storages to reduces the risk of malware infection and increase employee productivity.
- Review
- Search for all data for keywords and regular expressions, easy correlation & drilldown allows you to find data cleared from noise in a few clicks.