Different types of employee monitoring software
Remote access software
At the onset of monitoring software market, programs like TeamViewer were used for remote access to the computers of the employees, including outsourcers. Such software is not specifically customized for spying, but nevertheless it can be used for basic monitoring functions.
For example, the abovementioned TeamViewer provides for employee screen mirroring by connecting two or more computers located no matter how far away one from another.
Radmin is another program with similar basic monitoring functions which was initially developed for remote technical support. Ammyy Admin, Supremo Remote Desktop, mRemoteNG, TightVNC, Remote Utilities can also be added to the list of such software. There is an only nuance that these programs can’t operate in stealth mode, so an employee is surely aware that the eye of Sauron… sorry, the boss’s eye is watching relentlessly all the time. Thus, it can’t be attributed to hidden monitoring of a remote computer.
Spyware for hidden computer monitoring
Now let’s move on to hidden computer monitoring. It’s obvious that when employees have no idea they are being watched, they are behaving in their natural way, doing what they are used to do. That’s why spyware operating in stealth mode is way more efficient.
The most primitive hidden computer monitoring spyware is a keylogger. According to our information, some old-school sysadmins are still using them in small companies. Keyloggers do not provide for employee computer monitoring or remote control, but they suggest something not less effective.
Keyloggers (also widely known as keyboard capturers) are spyware programs that record the keys struck on a keyboard. Data of all the keys pressed during the working day is then kept in a special logfile available for access of authorized persons. Sysadmins may put such hidden monitoring program into operating system process, or disguise it as running system task. The following top keyloggers are particularly worth mentioning: Ardamax Keylogger, Actual Spy, Spyrix Personal Monitor, Spytech SpyAgent, Refog Personal Monitor, All In One Keylogger, Elite Keylogger, Spytector.
Videologgers (not to be confused with videobloggers) operate the same way as keyloggers, but instead of logging keys pressed on the keyboard, they record screen activities making either screenshots or recording videos of monitor actions. Such programs may be activated with different frequency following target actions. They may also run in hidden mode and then transmit logfiles of their spying activity to the boss’s computer.
Computer spyware goes even further and may be actually considered as a tool for modern James Bond. According to its modification, spyware can collect almost any type of data. It allows you not only to obtain keylogging data or monitor screenshots, but also to get reports on visited websites, to intercept clipboard contents, e-mails, and files sent for printing or to removable USB drive. NeoSpy, Real Spy Monitor, Spy Go are the examples of the most popular computer spyware.
Spyware programs are widely used in different spheres. Apart from employee computer monitoring in an office, they are also used for private purposes such as spying on adultering spouses, or for parental control on the kids’ computers, etc. Please note that these programs and their elements can be used by hackers and fraudsters for malicious purposes, including stealing logins and passwords and other types of personal data.
The major drawback of all abovementioned programs is that they can’t operate in multi-user mode, therefore they do not meet the needs of medium and large companies.
Computer time tracking systems
Such programs are more than just remote control software. Instead, they provide for total monitoring of computers of any of your managers, or a secretary, or a designer, or even information security administrator. These solutions are really diverse and multi-faceted, so it’s better to have a closer look at them using some illustrative example.
To begin with, Kickidler is our exclusive proprietary solution developed on the grounds of long-term experience of our foreign colleagues. It is worldwide unique for a number of its functions. It is compatible with Windows, Mac, Linux, and it may run in either open or hidden mode.
Kickidler’s modus operandi is simple: Server program is installed onto the main computer, Viewer program is installed onto the computers of the executives authorized for employees monitoring, Grabber program is installed onto the computers of the employees to be monitored. There may be as many Grabbers, Viewers and even Servers as you need. If required, the client can store the Server in their own cloud service.
Grabber may run in both open or hidden mode. If necessary, it may be turned into completely invisible mode for a user.
Kickidler is a mighty source of solutions. It would be difficult to list them all, so let’s dwell on the key ones.
Monitor activity recording
As for videologging, Kickidler does not just make screenshots like other monitoring programs, but records a full-featured video of employee desktop activity with a rate of up to 30 frames per second. Viewing toolbar panel also allows to oversee the keys an employee presses on the keyboard at the same time and applications running on the computer. Monitor activity recording is carried on offline as well, when the employee’s computer has got no access to the Internet.
The Viewer allows to watch monitor activity recordings in usual mode or fast forward mode. The user can sort videos by certain apps running or certain websites visited. This feature is unique and does not have analogues worldwide. Owing to video data compression, these video files do not take much space. They may be kept as archives for many months or even years (however, by default they are only kept for 7 days, this is far enough as we have seen from our experience).
Online monitoring and control of employee activities (real-time computer monitoring)
This feature allows to oversee what an employee is busy with at the current moment – what apps are running on the computer and what websites are being visited. Real-time screen activity of the computers with Grabber installed are webcasted live via Viewer on the manager’s or CEO’s computer.
Kickidler has got a very user-friendly interface, Quad Splitter, for live webcasting of employees’ desktops. Quad Splitter allows to display on the computer screen an unlimited number of employee desktop views, although we highly recommend to divide them into smaller groups (for instance, sorting by corporate subdivisions) and then switch between them. As an alternative option, use several displays for monitoring all computers of a whole department at the same time.
Screenshot: Quad Splitter interface
If needed, you may click on a particular quad and turn it full-screen so as to have a closer look at the activities of a certain employee.
Check this video to see how Quad Splitter works:
Time logging system (Time tracking)
Time tracking features allow to record time of all actions of an employee on the computer – the actual time of arrival at work, time of lunch break, time of absence at the work place, etc. All these data are recorded in Time Tracking report and in the Time Sheet.
Screenshot: Time tracking report
These data are presented in the form of graphs or diagrams and can be shown in Viewer or in its web user interface, or in an e-mail set for sending at a convenient time. It is much easier than to flip through the pages of real-life time register.
Screenshot: Time Sheet
While the previous feature suits intuitive persons, this feature is designed rather for sensory types of users who want structured information which allows to have an overall view of efficiency of a certain employee or a whole department.
By the way, you don’t even have to start Viewer in order to check on the employees’ efficiency report, as it is available in Kickidler web interface as well.
Screenshot: “Details of the day” report
Work time efficiency report
Work time efficiency reports are presented in the form of pie charts or line charts in which productive actions, non-productive actions, and neutral actions of the employees are marked with different colors. Height of every bar of the histogram reflects the intensity of the employee’s activities at the given period of time (one bar equals 5 min). Spaces refer to the time when the user was idle. A pie chart shows the percentage of time an employee wasted on surfing social networks and the percentage time dedicated to actual work assignments.
Screenshot: time tracking report in the form of a line chart
Productive activity of an employee is estimated on the basis of the time spent on the websites and applications required for performing work assignments and listed as productive web resources. For instance, Photoshop and Corel are considered productive applications for a designer, while SAP is a productive application for an accountant.
Non-productive resources are listed the same way. For example, if your employee spends half of a working day on FB, it will be recorded as non-productive activity. Provided that this employee does not work with social media marketing, of course. If a programmer is using Word, it will be also recorded as non-productive activity. Why a programmer would ever use Word? Applications and web resources are listed as Neutral if they may be used for both productive and non-productive activities. A good example of such resource is Google searching machine.
All the activities which are not marked Productive, or Non-productive, or Neutral, are recorded as Not Assessed.
Using keylogging feature Kickidler records all the keystrokes on the keyboard and displays the keylogging report at the special tab of the Viewer. Search command by a keyword is available for keylogging files.
Screenshot: Keylogger tab in Viewer window
Computer remote control (PC administration via remote access)
Computer remote control feature provides solution for all basic tasks of remote PC administration, such as remote computer technical support, remote desktop control, etc. For instance, a system administrator may get remote access to an employee’s desktop and install applications this employee needs for work. This feature may be also useful for remote training, for example, when an employee located in a remote office needs training for working in some particular program.
Screenshot: access to remote desktop with the use of Kickidler
Problems that Kickidler solves:
- assessment of overall productivity of employees, departments, heads of deaprtments, and the company itself;
- precise employee time-tracking;
- remote employee monitoring;
- detailed visual and technical monitoring of employee computer activities;
- lost corporate data recovery (e.g. logins and passwords);
- enhancement of information security, timely detection of insider threats;
- employee computer remote control.
We position Kickidler as a b2b product, though it does not mean it can’t be used for private purposes. For instance, it is a great tool for parental control on the home computer, for remote access to the desktop, for remote monitoring of personal computers – but only if the persons under monitoring are notified. Kickidler is also used at computer classes at schools.
Range of employee computer monitoring programs
Our company is certainly not the only employee monitoring software developer on the market. Among our competitors we should definitely name Teramind, HubStaff, ActivTrack, Time Doctor, Toggl, Skype Time, Activity Monitor.
We recommend to check the rating of monitoring software in order to compare their features and functional scope.
DLP systems for corporate data security provision
Although spyware programs have many useful functions, they do not provide for in-depth network traffic analysis for data leaks prevention. So, that’s where DLP systems step onto the scene.
DLP systems, short for Data Leak Prevention systems, are powerful and expensive software solutions and true IT-security keystones in every sense of the word. DLP solutions may include computer time-tracking features as an option, but primarily they are not designed for simple employee computer monitoring. They are intended for complex inbound/outbound traffic analysis aimed at detection of any insider information leaks. That is, in other words, data traffic control.
The key DLP system developers of today are Symantec Corp., Verdasys Inc, Forcepoint (previously known as Websense), Intel Security and InfoWatch. Their client base mainly consists of international banks, public institutes, industrial and power enterprises all over the world.
DLP systems analyze data traffic using formal and content-based methods. The first one implies recognition of specific tags or labels the documents are marked with, and hash functions. Content analysis feature is monitoring all the scope of inbound/outbound traffic using a number of data filters. Combining these methods means a higher level of data security, but does not give 100% guaranteed protection. We recommend using both DLP system and employee monitoring software.
GPS-tracking bracelets and other tracking systems
Such devices are designed for GPS-tracking of the personnel at the employer’s premises. They allow to prevent unauthorized access of the employees with no with admittance permission to certain zones of the employer’s premises. Some employee monitoring programs, e.g. Hubstaff, provide for personnel GPS-tracking as an option.
GPS vehicle locators are installed onto corporate cars in order to track their location remotely. They help to prevent idling of corporate vehicles, breaches of work duties and negligent performance. Thus, some corporate driver will have to explain to the manager how come that while on a business trip he hit the hottest night spots of the city driving a corporate car.
Today many IT-companies introduce their GPS-tracking bracelets to the market. Among the most known GPS-tracking manufacturers we may mention NetcorpGPS of Australia.
All GPS-bracelets designed for corporate purposes are actually analogues of iconic GPS-tracking Kid SmartWatch created for parents to track their kids’ location in real-time. GPS-tracking data from these devices is sent to the central server, to the boss’s PC or smartphone.
Navigation solutions are often combined with an option of biometric scanners or access cards. But this is a much higher level of data security, which is used, for example, at military bases, nuclear plants, and other objects of strategic importance. In corporate companies which have nothing to do with strategic importance status, Boss Control system and those alike are installed. They are scanning the employees’ fingerprints on their entering and leaving the office for the purpose of check-in and check-out time records. Boss Control stands out of the crowd as its data processing center is located in the cloud.