How to select employee monitoring software?

SilverHawk

I’ve never used employee monitoring software, but we’ve added a few people to my business and I feel like it is something I should at least consider. What features are important to look for when choosing employee monitoring software?

Topic: Security
Answer this Question

Answers

3 total
jellyfish25
Vote Up (3)

There are a lot of different employee monitoting software on Windows and I guess all of them have basic features such as:

Web time usage control

Web filtering option (allows to block sites, closec TCP ports and etc.);

Web access notifications and alerts (when specified web sites employees access including the username, computer, time, URL);

View screenshots from a user's computer in real-time mode;

Email capture;

IM recording;

User activity reports (what activities employees take up the most time at your company);

All data export;

Remote client installation;

Database optimization and lots of other things. You can check WorkExaminer software.

ehtan
Vote Up (3)

It depends on what you are looking to achieve, but I would look for software that included blocking capabilities as well as monitoring. It might not be very popular, but in my experience restricting access to social media sites can significantly improve productivity. If you are in a very sensitive business, you could also choose software that logs everything (including a keylogger). I think this is overkill for 99% of businesses, though, and I personally wouldn’t feel comfortable with that level of monitoring. We are talking about employees, after all, not prisoners. 

 

One other thing I might look for is the ability to monitor file transfers and the use of external drives, especially if you have people dealing with a lot of proprietary information.

jimlynch
Vote Up (2)

Why Should You Get Employee Monitoring Software?
http://www.flixya.com/blog/5764513/Why-Should-You-Get-Employee-Monitorin...

"There have been cases where menacing employees have leaked trade secrets to competitor firms while some others have mindlessly wasted office hours in shopping or other personal exchanges. Your employee is paid to deliver a certain amount of output within the office hours and he cannot disrupt that for his personal pleasures. Now, of course it’s not possible to monitor your employee activities on the computer every time. Hence it’s suggested that you take to internet based employee monitoring software programs.

Here is a brief on the features you can expect to find in a cutting-edge employee monitoring software."

Ask a question

Join Now or Sign In to ask a question.
Financial institutions use many technologies to fight crime, but much of the work comes too late, focusing on suspicious activity, like uncharacteristic charges or money transfers, after it happens.
Dennis Technology Labs says it tested it because of marketing claims for it; Malwarebytes says free version of product is just a clean-up tool.
A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.
The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.
Public certificate authorities (CAs) are warning that as of Nov. 1 they will reject requests for internal SSL server certificates that don't conform to new internal domain naming and IP address conventions designed to safeguard networks.
European data protection authorities still have questions after meeting with Google, Microsoft and Yahoo about the implementation of a recent ruling that gave European citizens the right to be forgotten by search engines.
An iPhone user has filed a lawsuit for invasion of privacy against Apple, about a week after a Chinese state broadcaster raised security concerns about the device's location-tracking functions.
Handling a software flaw can be messy, both for a security researcher who found it and for the company it affects. But a new set of guidelines aims to make that interaction less mysterious and confrontational.
A hacker group calling itself "Anonymous Kenya" has poked holes at the government's cybersecurity preparedness by hacking two official Twitter accounts.
New guidance from Microsoft researchers suggests that users re-use simple passwords and avoid password management services.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+