How to select employee monitoring software?

SilverHawk

I’ve never used employee monitoring software, but we’ve added a few people to my business and I feel like it is something I should at least consider. What features are important to look for when choosing employee monitoring software?

Topic: Security
Answer this Question

Answers

3 total
ehtan
Vote Up (6)

It depends on what you are looking to achieve, but I would look for software that included blocking capabilities as well as monitoring. It might not be very popular, but in my experience restricting access to social media sites can significantly improve productivity. If you are in a very sensitive business, you could also choose software that logs everything (including a keylogger). I think this is overkill for 99% of businesses, though, and I personally wouldn’t feel comfortable with that level of monitoring. We are talking about employees, after all, not prisoners. 

 

One other thing I might look for is the ability to monitor file transfers and the use of external drives, especially if you have people dealing with a lot of proprietary information.

jimlynch
Vote Up (4)

Why Should You Get Employee Monitoring Software?
http://www.flixya.com/blog/5764513/Why-Should-You-Get-Employee-Monitorin...

"There have been cases where menacing employees have leaked trade secrets to competitor firms while some others have mindlessly wasted office hours in shopping or other personal exchanges. Your employee is paid to deliver a certain amount of output within the office hours and he cannot disrupt that for his personal pleasures. Now, of course it’s not possible to monitor your employee activities on the computer every time. Hence it’s suggested that you take to internet based employee monitoring software programs.

Here is a brief on the features you can expect to find in a cutting-edge employee monitoring software."

jellyfish25
Vote Up (4)

There are a lot of different employee monitoting software on Windows and I guess all of them have basic features such as:

Web time usage control

Web filtering option (allows to block sites, closec TCP ports and etc.);

Web access notifications and alerts (when specified web sites employees access including the username, computer, time, URL);

View screenshots from a user's computer in real-time mode;

Email capture;

IM recording;

User activity reports (what activities employees take up the most time at your company);

All data export;

Remote client installation;

Database optimization and lots of other things. You can check WorkExaminer software.

Ask a question

Join Now or Sign In to ask a question.
Over a thousand major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of Homeland Security (DHS) said in a cybersecurity alert on Friday.
When online services lack privacy controls, you can roll your own using near military-grade encryption.
The increased adoption of mobile, social and cloud computing is driving growth in security spending among organizations that are also becoming more aware of threats on all those fronts.
In the wake of recent security breaches of medical databases, doctors can’t be too careful
A security precaution skipped in mobile applications such as Facebook's Messenger could be abused to make an expensive phone call at a victim's expense, a developer contends.
The U.S. National Institute of Standards and Technology (NIST) is developing a guide for testing third-party apps to ensure that they are secure and don't introduce any vulnerabilities.
With a Microsoft-mandated deadline a little more than two months away, computer makers are still selling PCs equipped with Windows 7 Home Premium.
Many businesses focus on record retention, but here's why one lawyer says "Destroy!"
With a single massive power burst, storage media that suddenly heads south, or interaction with a light-fingered ne'er-do-well, the technology your student depends on can vanish. Take these five tips to heart, however, and the loss of a device or data need not be catastrophic.
U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.

White Papers & Webcasts

Webcast On Demand

Cloud BI Overview: Jaspersoft for AWS

Sponsor: TIBCO Jaspersoft

Webcast On Demand

Cloud BI in Action: Recorded Webinar of Customer, Kony, Inc.

Sponsor: TIBCO Jaspersoft

See more White Papers | Webcasts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness