Here’s a complete multi-system monitoring solution to keep an eye on your employees’ activities

« Back to Previous Page
17
0

Please to read the entire article.

Marked as spam
Posted by Kernel Data Recovery (Discussions: 1, Comments: 1)
Replied on August 9, 2017 12:00 am
Category: IT Security
3 views
0
Private comment
Worthy Tool..!!!
Marked as spam
Posted by Bob Maria (Discussions: 0, Comments: 1)
Replied on August 8, 2017 8:00 pm
0
Private comment
I think this is a bit an overkill !
Marked as spam
Posted by Alexandre BLANC (Discussions: 0, Comments: 1)
Replied on August 9, 2017 8:00 pm
0
Private comment
If your enterprise is a plan economy, you probably need a stasi.
Marked as spam
Posted by Emile van Bergen (Discussions: 0, Comments: 1)
Replied on August 9, 2017 8:00 pm
0
Private comment
1984
Marked as spam
Posted by Frank M. (Discussions: 0, Comments: 1)
Replied on August 9, 2017 8:00 pm
0
Private comment
Misguided security practice.
Marked as spam
Posted by James McGovern (Discussions: 0, Comments: 1)
Replied on August 9, 2017 8:00 pm
0
Private comment
Haha, must be some kind of joke :-D
Marked as spam
Posted by Marius Iversen (Discussions: 0, Comments: 1)
Replied on August 9, 2017 8:00 pm
0
Private comment
If it were malware the world would be in shock of the number of privacy and confidentiality issues !
Marked as spam
Posted by Sven Biebaut (Discussions: 0, Comments: 1)
Replied on August 9, 2017 8:00 pm
0
Private comment
Not sure if this will solve your problems as an employer. Once you think you need this tool, you've clearly lost any faith in your employees. Besides that, I'm wondering if installing malware like this on your systems isn't setting you up for bigger security issues....
Marked as spam
Posted by Remy Lang (Discussions: 0, Comments: 1)
Replied on August 9, 2017 8:00 pm
0
Private comment
I understand the need of implementing controls to drive employees accountability. However, this spy solution is a bit extreme.

Why would you hire people you don't trust to this degree in the first place?

And if it gets to this point with long term associates, then your HR department rules and processes are failing.
Marked as spam
Posted by Joel Granado (Discussions: 0, Comments: 1)
Replied on August 10, 2017 8:00 pm
0
Private comment
Seems very intrusive, this would not wash in UK/EU. Where you still expect are entitled to a reasonable level of privacy even at work. Just checked and it's not April.
Marked as spam
Posted by Andrew Styler (Discussions: 0, Comments: 1)
Replied on August 10, 2017 8:00 pm
0
Private comment
I think it's more of security precaution than faith. We can't make out honest of people during recruitment process we won't be 100% sure, we can only go by our interaction with that person at that moment. When employees do right thing, they don't worry about any tool that monitors their activity.
Marked as spam
Posted by Rashmi Nataraj (Discussions: 0, Comments: 1)
Replied on August 10, 2017 8:00 pm
0
Private comment
Insider threat is #1. Extreme, but you are probably being watched already anyway and when you are at work your time is bought by your employer. Anyone can abuse power so requires checks and balances and neutrality in implementation. And no bipolar watchers. My only question is what employer has time/humanpower to sift through all the accumulated data?
Marked as spam
Posted by Erika M. (Discussions: 0, Comments: 1)
Replied on August 10, 2017 8:00 pm
0
Private comment
That's getting too personal and not required unless employee has very confidential information about company products on his laptop and company don't trust on him.. then why he has that information in his laptops or why he has access to that data.
Marked as spam
Posted by Parmanand Patil (Discussions: 0, Comments: 1)
Replied on August 10, 2017 8:00 pm
0
Private comment
Guys, The tool is developed to offer uninterrupted surveillance to monitoring employees desktop activities without knowing them. In fact, employee desktop monitoring is essential in any company where the employees spend most of their time in unrequired activities. Moreover, the tool is programmed just to avoid inside threat which can be in the form of:- 1. Transfer of confidential information through USB media to any untrusted source. 2. Deliberate deletion and modification of business information. 3. Unauthorized act of deactivating antivirus services without admin concerns. 4. Downloading of malicious contents in the form of videos, songs, documents. 5. Installation of malicious software’s or programs without consulting admin. and many other reasons.
Refer this blog post to know about what kind of threat you might have faced or how you can prevent yourself from it:- https://www.nucleustechnologies.com/datarecoveryblog/how-employee-monitoring-tool-helps-in-boosting-employees-producti
Marked as spam
Posted by Kernel Data Recovery (Discussions: 1, Comments: 1)
Replied on August 10, 2017 8:00 pm
0
Private comment
Not applicable in many countries for legal reasons
Marked as spam
Posted by Marco Mirelli (Discussions: 0, Comments: 1)
Replied on August 10, 2017 8:00 pm
« Back to Previous Page