Академический Документы
Профессиональный Документы
Культура Документы
Employees fail to hand over all his files and work before resignation
Important documents and data are deleted maliciously
Keeping an eye on employees all the time is too hard to put into effect
Leaking of confidential data and files causes huge loses
Our Solution
Our Solution
iMonitor EAM
is an easy-to-use surveillance
Software that provides total employee monitoring solution
to enterprises at any size-from large ones to SMES.
Surveillance software like ours is committed to catch
and record employees computer activities stealthily in 360
degrees, protecting and growing your business
by avoiding low productivity and confidential crisis.
Features
Features
Computer
Logs
Logs
Agent Property Configuration
Live Desktop
Keystrokes
Application Usage
System Events
Alerts
Keyword Detection
Emails Record
Website History
Chat Records
File Tracking
Removable & Online Storage
FTP Transfer & Print Jobs
Remote
Desktop
Remote Control
Live Desktop & Remote
Camera
Transfer Remotely
Remote File Management
Basic
Management
Agent Installation
Database
Multilingual Version
Department Management
Multiple User Setting
Process
Management
Process Management
Asset Management
Technical
Advantages
Monitor Stealthily
High Performance
360 Degrees Monitoring
Efficient Database Storage
Real-time Alert
Complex Network Environment
Features
Computer Logs 1
Logs
1.
2.
3.
4.
5.
1.
2.
3.
4.
5.
Features
Features
Computer Logs 2
1.
2.
3.
4.
Live Desktop
Free to set the period of snapshot by choosing
certain time, set the pixel of the snapshots, add
specific application to snapshot list.
Snapshots will be displayed like slide share
with speed control
Call up specific snapshots of certain time
Support one computer equipped with multiple
monitors
Keystrokes
Record keyboard details, including time, applications, keystrokes, etc.
Alerts
Once abusive activities occurred, the server /the console will get alert
in the notification bar, including start up, file downloading, printing,
USB storage device inserting, keywords, etc.
Features
Features
Computer Logs 3
E-mails Records
Outlook E-mail and attachments records Web mail records
Chat Records
Record all contents and histories on the popular social networks: Facebook, Twitter, Skype, etc.
File Tracking
Record all file operations including creating, modifying, deleting, renaming, copying, location, path, etc.
FTP Transfer
Record employees FTP / HTTP upload and download files, including time, file name file size, server, etc.
Print Jobs
Record details of each print job including printer name, user name, document name, pages, file size, paper size,
number of copies, scale, etc.
Website History
Analyzing employees internet surfing time in work time. Saving the entire visited website including URL, title, time,
keywords.
Features
Features
Features
Features
Remote Desktop
Remote Control
Remote Transfer
Admins can send files, messages, commands to the clients, Such as shutdown log out, restart, DOS command,
URL, applications.
Send files to multiple clients with one click.
Send multiple files with one click.
Manage all files on the client, including copy, paste, cut, delete, rename, create folders, send files,
upload files, etc.
Browse all clients files stealthily
Get files on client without permission
Features
Features
Basic Management
Agent
Installation
Three types of installation: Direct installation, remote installation, installation via Group Policy based on
windows Active directory on the server.
On the other way around, there are 3 ways to uninstall
Database
User can change the database path if necessary, and back up the database.
Multilingual
Version
Multilingual Versions: English, Chinese (simplified and traditional), Japanese, Spanish, Portuguese, German,
French, Italian and Korean.
Department
Management
Multiple User
Management
Features
Reporting Features
Features
Features
Process Management
System Service
Auto - run Applications
IP Management
Share Management
Features
Asset Management
Hardware Asset
Management
Software Asset
Management
View, search
software and patch
deployment to
detect asset
changes.
Features
East To Install
EXE Install
Three Ways To
Directly
Uninstall
At the same time
Install
Remotely
Centralized
Install
Via Group
Policy Based
On Windows
Server
Features
Features
Technical Advantages 1
Monitor Stealthily
iMonitor client program will run in background after the installation , no pop-ups, no desktop icons, no menu item, and the client
installation file will be hidden automatically.
No pop-ups
No desktop Icons
No menu item
Features
Technical Advantages 2
Efficient Database Storage
Private Database: iMonitor uses the file system which is similar to Apple's, completely independent, without any other third-party
database. It eliminates inevitable redundancy to remain efficient, stable, and fast on data storage, access, and search.
Real-time Alert
Certain activity alert: Get real-time alerts when employees insert an USB drive, copy file, process file on USB drive, print document,
send emails, etc.
Keywords alert: Get real-time alerts when detect preset keywords in keystrokes, clipboard, file name, website content, email, files,
etc.
Abusive activities alert: Get real-time alerts when employees try to run a blocked application or open a blocked website.
Ideally Support Multi-Platform
Support: Windows 2000/XP/Vista/7/8, 32bit & 64bit
Mac OS X 10.8, 10.9, 10.10 and newer
High performance
Features of the client: iMonitor client program is small but with high stability. It takes up low CPU occupancy, low memory space,
and low bandwidth usage. Employee will never find any trace of the agent.
Network data transmission: iMonitor uses multithreading technology to transfer log and image data, with high efficiency, stability,
and fast response. And it wont burden the ring network condition of the enterprises.
iMonitor Soft Co. Ltd., Tel:1-626-999-4601 Skype : imonitor.support
http://www.imonitorsoft.com/
Features
Technical Advantages 3
Complex Network Environment
Q1: Does iMonitor client support the computers based on domain or workgroup?
Yes, iMonitor EAM can be installed on the computers based on domain or workgroup
Q2: Does iMonitor support site-to-site VPN connections?
iMonitor EAM support site-to-site VPN connection. You can install the server program on the computer at headquarters to monitor
computers in different areas. You can also use a domain admin to install the client program remotely.
Q3: Does iMonitor support multi-segment network environment?
Yes, the same as single segment network environment.
Q4: Does iMonitor support Internet connections?
Yes, iMonitor support Internet connections. You can absolutely install the server and client programs on computers in different
countries to monitor your employees. With a static IP address for the server, you just need to enter the IP of the server computer
when install the agent exe. If without a IP address, you can install DDNS and sign up a free domain, then after that you can monitor
computers located in different places with iMonitor EAM.
Features
Multilingual Versions
English, Chinese (simplified and traditional),
Japanese, Spanish, Portuguese, German,
French, Italian and Korean.
Support Multiplatform
Ideally Support
Windows
Mac OS X
Our Clients
Our Clients
Our Honor