Veriato’s screen capture records everything on a monitored computer’s screen. You define how frequently you wish to capture the screen, from the default of every 30 seconds to as often as every second.
In addition to regularly defined intervals, triggers can be used to initiate screen capture or to accelerate the interval at which captures occur.
Screen snapshots can be exported as individual BMP or JPG graphic files. Multiple snapshots can be exported together as an AVI video file.
Reviewing activity is as easy as watching a show on a DVR. There is no more powerful, clear, and context-rich way to review activity. You may have thousands of screenshots for an individual user, but finding the one you are looking for is very easy. When viewing a recorded event you can easily navigate automatically to the screenshot that was taken closest to the time of the recorded event. Or, if you prefer, you can browse all of the screenshots in chronological order, with a navigation bar allowing you to go to any point in time quickly and easily.
Website activity – With Active/Focus/Total times recorded, you get a true understanding of not just how long a user had the website open, but how much time was spent engaged with the site. Traditional web monitors, such as proxy servers, firewalls, etc. are able to often tell how long a website was open, but aren’t able to determine how much time the user was actually on the site because they just watch the traffic itself. For example, if you opened Facebook in the morning and left it minimized all day, you’d see traffic on your firewall or proxy server all day as the feed got refreshed and so forth. However, that doesn’t mean that the user was using the site.
Significantly more sophisticated than browser history, Veriato Website Activity records and maintains information about web activity.
Having a system of record that reflects all of the communications activity in the most widely used medium is critically important when conducting an investigation. Veriato Email Recording records traditional email clients (Outlook/POP/SMTP/IMAP) as well as many popular webmail services. From, To, Subject, CC, BCC, and Web Mail Host columns are sortable, and all content is searchable (Veriato 360 allows for search across all employee emails simultaneously). Keyword and phrase alerting can be combined with email recording to ensure critical information is not being moved in an unsecure manner. Attachments are captured for traditional email client activity.
Because Veriato Investigator records at the employee’s computer, even email sent behind SSL encryption is visible, ensuring you see every email.
Veriato watches chat and instant messaging in nearly every web chat room or messaging client. It can capture everything said by each person joining the conversation. A single Chat/IM Event includes conversation segments by all participants.
Chat/IM Recording reveals:
With Document Tracking enabled, you are able to track specific USB, CD, and DVD drives. See when new files are created and when existing files are edited, renamed or deleted. You can also track print operations.
If you are not 100% sure you have the visibility you need into & Document Tracking is the answer.
File & Document Tracking is commonly used as a compliment to records needed when conducting incident response or investigations related to insider-driven leaks, breaches, or theft.
Veriato captures information about every application and every window opened by a user, every day.
Program Activity recording reveals:
This powerful option enables the capture of every keystroke, including “hidden” characters and keystroke combinations. Enabling keystroke logging on highly privileged users ensures complete visibility into the actions of those with the greatest levels of access within your organization. When used in conjunction with Keyword alerting and Screen Capture, you can quickly zero in on potential issues and see exactly what occurred, in context. Keystrokes are associated with the application that they were typed into. For instance, it would show you that the keystrokes weren’t just typed by “user”, but they were typed into Outlook or Skype.
Don't want to accidentally obtain the passwords for their employee's personal accounts? Veriato solutions can be configured to not capture passwords, enhancing employee privacy.
Network activity recording allows you to see which applications are connecting to the Internet, when and where the connections are made, the IP ports they use, and the amount of network bandwidth consumed by those connections.
Network activity reveals:
Veriato automatically watches network connections, which may be made by the user or by an application.