Veriato 360
Veriato 360 Monitoring Software

Employee Monitoring Software

Veriato 360

Get A Quote Request a Demo

Veriato employee monitoring software provides unmatched visibility into the online and communications activity of employees and contractors.

Employee Monitoring Data Sets
Employee Monitoring Dashboard
Employee Monitoring Visibility Screens


Purpose-built to collect and monitor full fidelity data on the activity of employees who interact with your IT resources and information.


You control what data is collected and when employees are monitored. You control what you can access and review. Granular control provides the flexibility you need.


DVR-like playback plus powerful alerts, intuitive search, quick view panels and scheduled reports minimize time spent getting accurate answers to support good decisions.

85% of employees admitted to taking company documents and information they had created, when they left.

See exactly what occurred, in context

Screen Capture

Veriato 360’s screen capture records everything on a monitored employee's computer screen. You define how frequently you wish to capture the screen, from the default of every 30 seconds to as often as every second.

In addition to regularly defined intervals, triggers can be used to initiate screen capture or to accelerate the interval at which captures occur.

Play it back, like your DVR

Video playback of screen activity let’s you see exactly what happened, in context. No gray areas; nothing is more effective than pictures.

Veriato 360 employee monitoring software


Screen snapshots can be exported as individual BMP or JPG graphic files. Multiple snapshots can be exported together as an AVI video file.

Alert, Report, and review detailed employee activity using robust monitoring tools that provide actionable intelligence.

Veriato 360 monitors:

List of employee monitoring criteria
5/5 based on 10 reviews


Designed to deliver the visibility and context you need to monitor and track employee activity.


Powerful activity alerting keeps you informed about potential security and policy violations, and can serve as a trigger to accelerate data capture when events you define occur.

Screen Capture

Records everything that occurs on a monitored computers screens, with a range of configuration options and leading compression capability to minimize storage requirements.

Video Playback & Export

Veriato computer monitoring software uses a screen recorder that allows you to see the context of an event by watching the playback of the screen activity exactly as it occurred.

File & Document Tracking

Track activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed.

Email Recording

Capture communications activity in traditional email clients as well as many popular webmail services, and have a searchable system of record that can be alerted and reported on.

Web Activity

Significantly more sophisticated than browser history, Veriato employee monitoring software records and maintains information about web activity, including how long a user was engaged or active on a site.

Keystroke Logging

When needed, the option to record every keystroke, including “hidden” characters and combinations, insures you have the visibility you need into the activity of highly privileged users. With the Veriato keylogger feature, all keystrokes can be recorded.

Application Activity

Captures all application usage to provide true reporting on what applications are being used, by who, and for how long.

Network Activity

Automatically captures connections made by applications, including ports used and bandwidth consumed as well as time and location of connection.

Chat & IM Activity

Capture, scan, alert and report on communications activity occurring on commonly used messaging apps; creates a definitive record for compliance and investigative uses.

User Status

Produces an accurate record of session time and activity. Tracks logon and logoff, but does not rely on logoff to identify when session activity ends.

3rd Party Integrations

Veriato employee monitoring software Integrates with leading SIEMs like Splunk and Arcsight, plus an array of additional integration options to support getting the data you need where you need it

Quick View Panels

Action-oriented charts that provide a high level view of aggregated data, and allow for click and drill-down exploration of events.


Find all instances of your search criteria located anywhere in the 360 database with one-click access detailed data or screenshots related to the selected event.


Produce management reports that provide high-level insight into user activity on an ad-hoc or scheduled basis; ships with 50+ prepackaged reports plus ability to create custom.

Get the information needed for decisions makers


See Veriato 360 Overview

Veriato 360 provides unmatched visibility into the online and communications activity of employees and contractors.

See Veriato 360 v9.02

Accelerated Screen Snapshots Feature

Frequently Asked Questions

How do Veriato 360 and Veriato Recon work together?

The two solutions are designed to work together seamlessly. Operating from one console, you can deploy both User Behavior Analytics via Veriato Recon and User Activity Monitoring via Veriato 360.

This tight integration enables a proper coverage model – insuring lower risk employees behavior is baselined and analyzed, while higher risk employees activity is more closely monitored.

In addition, when Veriato Recon detects a meaningful anomaly in behavior, it’s a simple process to engage the power of Veriato 360 to quickly review the underlying user activity data – so you get the intelligence you need to act quickly and appropriately.

Does Veriato 360 work with Citrix® XenApp™ or Microsoft® Terminal Services?

Veriato 360 will record all Windows users that log in to the server using Terminal Services or Citrix software. When reviewing the data, simply set the criteria to view the information by user, instead of by computer, and you will be able to review the information from each Terminal Services or Citrix user.

Can Veriato 360 be used in a Windows Workgroup Environment?

Yes. This works as long as each computer has one Administrator User Account with the exact same username and password (case sensitivity rules apply). You can then enter this Administrator account when the Management Console asks you to enter credentials with permission to install or update the Recorder.

Won't Veriato 360 fill up our hard drives with data?

A Veriato Recorder maintains contact with its Veriato Server and uploads recorded activity every 4 minutes so that almost no recorded data is retained locally. If a recorded device leaves the network, the Recorder continues recording, retaining its data locally up to a maximum size or time threshold. As soon as the device is back on a network where it can contact the server, the Recorder uploads all of the stored data.

For data storage at the server, disk space required for each recorded device ranges from 2 to 20 megabytes per day, depending on intensity of user activity and the types of events being recorded. Some types of recording cost more. For example, if you choose not to record screen snapshots, you can reduce storage requirements to as low as 1 MB per device, per day.

Won’t all those devices contacting the server cause a lot of traffic on our network ?

The low impact on your network will surprise you. Any traffic Veriato 360 generates is automatically managed to minimize bottlenecks. By default, every 4 minutes, each computer automatically transfers recorded information securely over https to the application server for processing. Transactions are no longer than 30 seconds. If a computer is idle for 3 minutes, recording pauses, and nothing is sent across the network.

In the worst-case scenario, where a computer is in constant use and in continual interaction for a full 8-hour day, data transfers would occur approximately 120 times (every 4 minutes). Divide 10 MB (the day’s total) by 120 transmissions, and you see that each transmission is only about 83 KB.

Do I have to worry about permissions for the folder where Veriato 360 stores its screen snapshots and email attachments?

That depends on where the folder is located. All captured screen snapshot and email attachments are saved in a single “File Storage” folder, usually on a drive local to the Veriato Recon/360 Server.

Only the Veriato Service needs access to this folder. Users can view contents of the files (as their login accounts permit), as long as the service can “serve them” to the Veriato Management Console.

During Veriato installation, if you accept the default File Storage folder (C:\VeriatoData) or request a custom, local folder (C:\MyData), the install automatically sets the necessary permissions. Only when you request a network path to a folder (\\server20\DataFiles) are you prompted to enter account credentials with permissions at the location. Because these credentials must allow the Veriato Service to logon as a service with permissions both at the File Storage location and at the Veriato Server location, you may want to set up a special service account for Veriato to use at this point in the installation.

Can I install the software to multiple computers at the same time?

Yes, the Veriato Management Console allows you to find and select devices from Active Directory, Network Discovery, or an imported list. You may configure as many as you like (up to about 1,000) for a single, simultaneous Recorder installation. The devices are added to your selected Recorder groups, where you can follow their installation progress and manage licensing, recording policy, and version updates en masse.

Will Veriato 360 record laptops that are not always connected to the network?

When a recorded laptop is on the network, the Recorder uploads recorded events regularly to the Veriato Server. When the laptop leaves the network (because the user is traveling), recording doesn’t stop. Any time the laptop is on and being used, events are captured and stored on the local drive. As soon as the laptop re-connects to the network (via local network, VPN, etc.), it “checks in” with the Veriato Server and uploads all stored recordings.

Can I re-configure the Veriato 360 Recorder (Client) installation on several computers at the same time?

Yes. The Management Console allows you to apply configuration changes to all computers in a Recorder group at once, even when computers are turned off.

In the News


Blog Posts

Press Releases


To Get Started

Recorder (for computers & laptops being monitored)

  • Windows® 10, Windows® 8, Windows® 7, Windows Server 2012, Windows Server® 2008
  • Mac OS X 10.10 Yosemite, 10.11 El Capitan, 10.12 Sierra, or 10.13 High Sierra running on a 64-bit Intel processor
  • Mobile devices running Android 5.0 Lollipop, 6.0 Marshmallow, 7.0 Nougat and 8.0 Oreo
  • Network Access (Networked on a Windows Domain or Workgroup)
  • Administrator share level access to computer for remote installation from the Management Console

Server (management console and data retention)

  • 64-bit Windows Operating System
  • Windows 10, Windows Server 2012 or Server 2016
  • Business-class Desktop (Quad Core I7 with 8 GB RAM)
  • 40 GB minimum free disk space (60 GB recommended)

Trusted by thousands of companies in more than 110 countries around the world.