Click "Get It Now" Button above or below to activate this coupon code or deal. It's only valid on SoftCns.com If The Coupon Code Not Available Please bookmark this page first, and then clear the cookies of your browser. Lastly, restart your browser again or try to use another web browser, If you don't get it clearly, please visit Coupon Using Guide or send us expired.
Average user rating: Excellent (/5)
AtomPark Software Awards
Logging Security Curator allows highly efficient employee monitoring. Almost all staff PC activity can be exposed by logging:
• Website visits • Downloaded files from the Internet • Corporate and personal e-mail correspondence • Correspondence in instant messengers (ICQ/MSN, Skype, etc.) • All key strokes for a given application (including passwords: text beyond *****, system keys, etc.) • Running applications • Software installation/de-installation • User actions within files: for example, creating, deleting, editing, copying • Printed documents and files
Activity logging allows you to evaluate the effectiveness of personnel, measure the duration of inappropriate use of time and identify potential sources of confidential information leakage.
Monitoring Security Curator provides online monitoring of almost all employee activity at a work computer:
• Updates activity information in real time • Performs network surveillance by taking periodic snapshots of computer screens • Provides opportunity to monitor user's desktop online • Backs up files from USB devices • Offers storage of e-mail attachments in the database • Takes application screen shots, allowing for the reading and recording of correspondence
Control With Security Curator you can keep your company's confidential information under control. The start of any activity, application or process may be denied or canceled, including:
• Blocking the launch of a program • Restriction of access to all or certain websites • Denial of access to certain files and operations (deleting, editing, copying) • Blocking correspondence with certain contacts in ICQ/MSN, etc. • Notification of any violation of security policy • Monitoring and blocking of network connections (by port or IP address)
Implementing Security Curator allows you to restrict access to undesirable websites, programs and applications for a certain period of time or permanently.
Statistics Simple review and analysis of statistical data via a system of records. This system allows you to see where and how much time employees spend at work on the computer, in both absolute figures and percentages.
• Detailed statistical reports that track the start and stop of programs’ launch and times that they are modified • Easy-to-understand data charts greatly improve the understanding of statistical information • Powerful filtering of data system • Ability to search data by keyword • The possibility of agents grouping