Screen Capture & Playback

Veriato’s screen capture records everything on a monitored computer’s screen. You define how frequently you wish to capture the screen, from the default of every 30 seconds to as often as every second.

In addition to regularly defined intervals, triggers can be used to initiate screen capture or to accelerate the interval at which captures occur.

Screen snapshots can be exported as individual BMP or JPG graphic files. Multiple snapshots can be exported together as an AVI video file.

Play it back, like your DVR
Reviewing activity is as easy as watching a show on a DVR. There is no more powerful, clear, and context-rich way to review activity. You may have thousands of screenshots for an individual user, but finding the one you are looking for is very easy. When viewing a recorded event you can easily navigate automatically to the screenshot that was taken closest to the time of the recorded event. Or, if you prefer, you can browse all of the screenshots in chronological order, with a navigation bar allowing you to go to any point in time quickly and easily.


Website Activity

Website activity – With Active/Focus/Total times recorded, you get a true understanding of not just how long a user had the website open, but how much time was spent engaged with the site. Traditional web monitors, such as proxy servers, firewalls, etc. are able to often tell how long a website was open, but aren’t able to determine how much time the user was actually on the site because they just watch the traffic itself. For example, if you opened Facebook in the morning and left it minimized all day, you’d see traffic on your firewall or proxy server all day as the feed got refreshed and so forth. However, that doesn’t mean that the user was using the site.

Significantly more sophisticated than browser history, Veriato Website Activity records and maintains information about web activity.


Email Recording

Having a system of record that reflects all of the communications activity in the most widely used medium is critically important when conducting an investigation. Veriato Email Recording records traditional email clients (Outlook/POP/SMTP/IMAP) as well as many popular webmail services. From, To, Subject, CC, BCC, and Web Mail Host columns are sortable, and all content is searchable (Veriato 360 allows for search across all employee emails simultaneously). Keyword and phrase alerting can be combined with email recording to ensure critical information is not being moved in an unsecure manner. Attachments are captured for traditional email client activity.

See behind encryption
Because Veriato Investigator records at the employee’s computer, even email sent behind SSL encryption is visible, ensuring you see every email.


Chat & IM

Veriato watches chat and instant messaging in nearly every web chat room or messaging client. It can capture everything said by each person joining the conversation. A single Chat/IM Event includes conversation segments by all participants.

Chat/IM Recording reveals:

  • A trail of communication that otherwise might be lost
  • How the organization is being represented to outsiders
  • If confidential information is being leaked
  • Proof of compliance or non-compliance with regulation
  • Inappropriate behavior, harassment
  • Who spends too much time in personal conversations

File & Document Tracking

With Document Tracking enabled, you are able to track specific USB, CD, and DVD drives. See when new files are created and when existing files are edited, renamed or deleted. You can also track print operations.

If you are not 100% sure you have the visibility you need into & Document Tracking is the answer.

File & Document Tracking is commonly used as a compliment to records needed when conducting incident response or investigations related to insider-driven leaks, breaches, or theft.


Keystroke Logging

This powerful option enables the capture of every keystroke, including “hidden” characters and keystroke combinations. Enabling keystroke logging on highly privileged users ensures complete visibility into the actions of those with the greatest levels of access within your organization. When used in conjunction with Keyword alerting and Screen Capture, you can quickly zero in on potential issues and see exactly what occurred, in context. Keystrokes are associated with the application that they were typed into. For instance, it would show you that the keystrokes weren’t just typed by “user”, but they were typed into Outlook or Skype.

Passwords or not…your choice
Don't want to accidentally obtain the passwords for their employee's personal accounts? Veriato solutions can be configured to not capture passwords, enhancing employee privacy.


Application Activity

Veriato captures information about every application and every window opened by a user, every day.

Program Activity recording reveals:

  • When and how long employees are actively using productivity applications
  • Which productivity applications are preferred
  • How much time is wasted on games or frivolous applications
  • Who is using "malicious programs" that put network security at risk
  • Someone attempting to hack into secure areas using malicious tools
  • Someone using unapproved or illegally acquired applications
  • Someone gaining access to applications and files who should not



Network Activity

Network activity recording allows you to see which applications are connecting to the Internet, when and where the connections are made, the IP ports they use, and the amount of network bandwidth consumed by those connections.

Network activity reveals:

  • Who is accessing streaming audio/video, online gaming, or other resource drains
  • When connections occur, at which ports, and the bandwidth consumed
  • Violations of Acceptable Use Policy regarding media consumption and downloads
  • Which applications make unnecessary or suspicious connections to the Internet
  • Internet transactions not be captured by Files Transferred, Program Activity, or Web Sites Visited recording

Veriato automatically watches network connections, which may be made by the user or by an application.