Fully secure environment from malicious actions simply, quickly and effectively
Track suspicious actions in your technology environment
Tracking technology that can be installed on a computer. From the moment of installation, everything the user does is logged for analysis: keylog, file changes, browsing, usage metering, Office document versioning, Instant Messenger conversations.
This information can be accessed at any time, and reports can be generated from all the data stored so far.