StaffCop StandardPC monitoring and corporate data security software
StaffCop Standard Features
- Screenshot recording
- Application monitoring
- E-mail correspondence monitoring
- Web site monitoring
- Chats/IM activity recording
- USB device monitoring
- Clipboard monitoring
- Social Networks Monitoring
- Search Term Tracking
- File and Folder tracking
- Keystroke recording
- System Event Monitoring
- Whitelists and Blacklists
- PC activities reporting
- Stealth mode installation and monitoring
- Strong security
- Alert notifications
- Remote Install / Uninstall
- Terminal Server Support
StaffCop software allows you to run surveillance of the company network by taking periodic snapshots of computer screens. You can access computer desktops remotely in real time, and view screenshots from different time intervals. When it's time to generate reports, the Report Wizard will download all screenshots to the admin's computer.
You can access the screenshots in real-time from a remote PC, or generate an illustrated report that contains the screen captures. The report is fully customizable, and can contain screenshots for a specified period of time for selected users (click to see a sample report). You can set the interval at which the images of a computer desktop will be captured, as well as specify the maximum size of data copied to the hard drive.
The screenshots are securely stored on the users’ computers and can be accessed only by the authorized IT staff. StaffCop software allows you to download recorded screenshots to the administrator’s PC at the time when the report is generated.
Screenshot Capturing Features
StaffCop screenshot capturing features include the following:
- You can set up time intervals when screenshots are recorded.
- Eliminate duplicate screenshots when users are inactive.
- Exclude computer inactivity time.
- Screenshot on the fly compression.
- Export data to .JPEG or .BMP file formats.
Why Capture Remote Screenshots
Periodic screen captures are essential while investigating various security related issues. The screenshots can be used as an evidence of an activity performed on a computer during a specific period of time. StaffCop can be used as a sophisticated computer surveillance system that helps business owners to optimize employee productivity.
View the list of applications run in the network or on a particular PC. StaffCop creates performance reports that track many hours are spent in different applications. Thus, you can easily learn more about company performance and also optimize your resources. StaffCop tracking software calculates the total time spent on using every program and provides detailed reports.
StaffCop gives you the ability to monitor and record applications launched by the computer users. This allows you to view the list of programs that are currently running or terminated providing comprehensive usage statistics for each application. You can generate various types of reports specifying required time intervals and users.
Why Track Application Usage?
Instant control and periodic checks of user activities provide valuable information when analyzing employee performance and optimizing company's workflow. Application tracking feature helps you to investigate possible productivity and security issues and can be used to prevent misuse of proprietary information.
StaffCop Report Wizard generates detailed statistics displaying how long the employees spent working with different types of applications including e-mail, Office applications such as Word and Excel, and if they used their work time playing computer games.
The reports generated by StaffCop are easy to read. You can create employee groups and track activities of different departments in your organization.
Applications Tracking Features
StaffCop Application Monitoring features include the following:
- Ability to record every program launched by the user and by the operating system.
- Analyze the time spent with each application.
- Create employee groups and make custom reports.
Email Correspondence Monitoring
The feature allows you to establish control over the life cycle of corporate correspondence, preventing leaks of sensitive data. StaffCop records the time a message was sent, from whom and to whom, and includes, the message's contents and attachments. Attachments can be saved if necessary. All types of email clients are supported.
This feature allows you to control the flow of sensitive data in the corporate e-mail environment by recording who the messages were sent to, from, when, as well as the contents of the e-mail including attachments. You can generate a comprehensive report of e-mail traffic for any period of time. The report is fully customizable and includes only specified information.
Why E-mail Monitoring?
E-mail messaging is one of the most vulnerable corporate communication channels. The implementation of e-mail correspondence control feature provides the appropriate corporate officers with a tool to be alerted and prevent all possible inside threats related to information loss and neutralize them in time.
E-mail correspondence monitoring features:
- Control of all sent and received messages
- Monitoring messages in both plain and HTML format
- Support of all e-mail clients
StaffCop records the page address (URL), title, time of access and time spent on the web site. All types of Web browsers are supported. You can see a list of open Web sites when needed, or access a report of all sites visited by users in a specified time range.
The advantage of StaffCop tracker is that it doesn't use the easily forged browser history to collect information about user web traffic.
StaffCop allows you to create logs and reports of all Web sites and individual Web pages visited by the computer user. Advanced logging mechanisms detect Web pages visited with any Web browser of any version including commonly used such as Internet Explorer, Mozilla, Opera. StaffCop effectively records URL addresses and page titles of every visited resource.
StaffCop provides you with the ability to view the list of open Web resources in real-time or generate comprehensive reports about all sites and pages visited by the users within a specified period of time.
Why Track Web Sites and Online Activities?
Tracking employees' online activities is necessary if Internet access privileges is a part of their workflow. Web site tracking allows you to effectively analyze how much time your employees spend performing business tasks, and how much time is used on reading news and browsing entertainment Web sites.
Control Viruses and Spyware
Having the ability to record visited web sites helps to improve employees' productivity as well as detect and resolve important security issues. Viruses and spyware often open certain Web pages in the background. And these activities are difficult to detect. StaffCop allows you to record suspicious online activities, alert you about them, then detect and prevent the intrusion quickly.
Computer user can delete browser history to eliminate a list of visited web sites. StaffCop software has a sophisticated mechanism that allows you to recreate a history based on visited URLs and accurately generate a required report.
StaffCop web monitoring features include the following:
- Capture of URL addresses, page titles, time of access.
- Monitor sites visited using Internet Explorer, FireFox, Opera and other types of browsers.
- Generate detailed reports about visited web sites.
Chats/IM activity monitoring
StaffCop user module logs all chats in popular instant messengers, such as SKYPE, MSN Messenger, ICQ and AOL Instant Messenger.
StaffCop records both incoming and outgoing messages (most IM loggers can only detect outgoing messages). In the reports, you may sort chat history by contact,time of day, length of time spent chatting, etc
StaffCop enables you to capture and record chats of many popular instant messaging tools such as SKYPE, MSN Messenger, ICQ, Yahoo Messenger and AOL Instant Messenger tracking both incoming and outgoing messages. Advanced reporting mechanisms generate reports of chat correspondence including user names of all participants.
The reporting feature allows you to view a complete list of chats for each user, as well as the time spent chatting.
Why Track Online Chats?
The purpose of tracking employees’ activities including personal communication serves as a reliable data for productivity evaluation. The chat tracking feature can help you to analyze employees' performance and how it may be affected by conducting of personal matters during business hours.
Another benefit of using StaffCop messenger tracker is to control information leaks or prevention of data loss. The IM tracking mechanizm allows you to detect and analyze possible sources of security bridges and prevent unauthorized distribution of proprietary information.
IM Chats Monitoring
Clearing or disabling of chat message history is one of the standard options available in any online messaging application. StaffCop uses a sophisticated technology that allows you to track and record instant messages on a computer without references to other party tools. You can collect chat logs and generate comprehensive reporting regardless of user configuration set up for personal messaging.
Chat Recording Features
- StaffCop records all the Skype correspondence and logs all the calls
- StaffCop records both incoming and outgoing messages.
- Messages can be viewed in sequence for each contact.
- All popular messengers such as Skype, MSN Messenger, Yahoo! Messenger, AIM, ICQ are supported.
USB Device Monitoring
StaffCop logs the use of USB devices, recording the device name and the time of connection or disconnection.
All types of USB devices (Flash drives, MP3 players, iPods, iPhones, cameras, etc.) are supported.
StaffCop performs monitoring of removable data devices, such as USBs, flash memory drives, and memory cards. StaffCop allows you to track the names of devices and their connection and disconnection times.
The comprehensive reporting feature enables you to view and track the connection of USB flash drives, MP3 players, printers, scanners, and other devices to networked computers. You can generate reports detailing any files that have been copied to removable data devices.
Why Monitor Removable Data Devices?
Monitoring of USB devices allows you to track the information being transferred from company computers. This advanced data transfer tracking option is particularly beneficial if it is implemented in conjunction with monitoring of online channels. StaffCop helps you to close any gaps in your network security, allowing to trace possible sources of information loss.
For security reasons most organizations do not allow personal MP3 players and digital cameras to be connected to company's computers. StaffCop device monitoring feature gives you the ability to record any cases of personal media connections during business hours.
StaffCop Standard allows you to monitor the user's clipboard. If a user copies any kind of the information to the clipboard (CTRL+C, Copy), you will be able to track this information in logs and reports.
When user copies something to his or her clipboard, StaffCop saves a shadow copy of the copied file or item so it is possible to track these actions.
It is possible to set a limit for the maximum size of a copied file, and to set a memory limit for file storage.
In addition, the agent's settings allow you to turn clipboard monitoring on or off.
Why monitor the clipboard?
This function gives the additional control to the employer and allows him to see what exactly was copied. It prevents the cases when employees just copy the information from one place to another, or it was something that employee did not to save. StaffCop detects such activity and save it to logs and reports.
Social Network Monitoring
In today's world, people spend more time on social networks. This becomes a significant part of their lives. It is important to monitor work visits to social networks so that employees do not spend their work time socializing. It also important to ensure that children do not spend too much time on social networks and do not communicate with potentially dangerous strangers.
Thanks to software StaffCop problem of monitoring social networks is solved. You are able to see private messages, photos and other material seen, uploaded, liked, commented by a user in social networks.
All action in following social networks are tracked and analyzed:
Search Term Tracking
A separate type of monitoring is Search Term Tracking. All queries made by users in search engines are available in a separate tab of the event log, so you can see what interests the user and what information he is looking for. Search Term Tracking supports most popular search engines, such as: Google, Yahoo, Bing, Ask, Yandex, etc.
Search engine probably is the most useful type of websites. Search engines daily are used at work – it helps to gather all significant data, monitor your competitors, etc. And you probably can’t block the access to search engines. But you can monitor all the search terms and see if your employee really
StaffCop Standard shows what exactly was searched by your employees, and you will be able to detect such activities:
- Employees search the information that are not job-related.
- Employees search for a new job, check the vacancies.
- Employee has a serious health or private problems
It is always good to know what bothers your employees – so you will be able to prevent incidents that may harm your company.
File and Folder Tracking
StaffCop detects all file operations on PCs in the network. You can easily customize the report by tracking particular file types and events only, e.g. accessing Word or Excel files in My Documents or executing files in Program Files.
When files are created, copied, opened or deleted, this information is tracked by StaffCop.
StaffCop detects all transactions related to file access on a user's computer. You can generate customized reports reflecting the history of work activities with different types of documents including Word, Excel or access executables in the Program Files.
StaffCop Document Monitoring Features
- StaffCop records access to any types of files including the ones that are hidden or a part of the system.
- StaffCop detects the name of the program that gains access to files.
- You can create filters tracking only specific types of files.
- StaffCop Standard tracks and monitors all the files copied to USB devices and shadow-copy them.
- You can detect and record the files that are copied to USB drives and to other media.
All keystrokes are recorded to prevent possible data leaks. You can see the key logger reports in real-time as well as access them through a schedule.
StaffCop also captures passwords and system keys (CTRL, SHIFT, ALT, CAPS LOCK, etc), increasing the level of information protection.
StaffCop allows you to track and record every key typed on the keyboard by the user. You can generate a report showing a list of all characters including keys such as SHIFT, CTRL, F1-F12, and PRINT SCREEN. StaffCop keylogger feature makes it possible to identify and save different types of passwords typed on the keyboard including password masked with asterisks.
StaffCop keyboard monitoring provides you with the ability to access user keyboard activities in real-time, or generate detailed reports. You can create a report specifying what applications were open and what characters were typed.
StaffCop Keylogger Features
- Capture ALL keystrokes for ALL applications.
- Capture passwords and systems keys including CTRL, CAPS LOCK, SHIFT, etc.
- Associate key strokes sequences with the appropriate applications and users.
- Export data to Excel or CSV.
Benefits of Keyboard Logging
Tracking employees’ keyboard activities helps you to analyze their performance allowing comprehensive reporting and evaluation of company's processes related to information security.
Many organizations do not have comprehensive strategies related to password security to their online accounts. As a result, online passwords may be lost when the responsible employees leave the company. A lack of password recovery methods that allow you to resolve these issues effectively may be costly and time-consuming. StaffCop keyboard logging feature gives you a peace of mind by providing you with immediate access to all passwords used for your company applications.
System Event Monitoring
StaffCop tracks and analyzes data about the following system activities:
- Computer start-up and shutdown, including exact time of events.
- User login and logout, including exact time of events and the names of users.
- Software installation and removal, including names of the users performing tasks.
- Connection of USB devices and other media.
Whitelists and Blacklists
It is possible to block or allow websites and applications by adding them to blacklists or whitelists.
Blacklists allow you to prohibit access to exact websites or applications. Whitelists grant the access to websites and applications specified in the whitelist only - all the other websites and applications will be blocked and unavailable to use. Whitelists are good for strict corporate security policy, i.e. banks, where only few websites or tools are available for use at work. Blacklists are good for all other companies, which want to restrict the access to social media and social network websites, different games, etc.
PC Activities Reporting
Report Wizard is an integral part of StaffCop that helps to analyze the performance of the company, a particular department, or an individual employee for a defined time range. For any work-day, week or month, you can view the applications launched and used and calculate - the time spent effectively. StaffCop creates comprehensive time sheet reports organized by application. The same report can be compiled for websites, documents, keystrokes, and so on.
StaffCop Report Wizard helps you to analyze the performance of a particular employee or a group of employees during a specific time frame. You can view the programs that employees initiated and executed, providing details including the time of the day and duration while the program was active. You can generate a report reflecting a spreadsheet based on time intervals showing which programs were running. Create a graph that illustrates the percentage of time spent on different types of activities.
This report can include:
- List of websites
- Types of documents
- Key strokes
Stealth Mode Installation and Monitoring
StaffCop can work in an invisible or stealth mode. If launched in the visible mode, the Staffcop icon will display in the system tray and show an alert when the user logs in.
Why you may need a stealth mode?
There are situations when employer knows about data leakage but cannot prove it. Stealth mode makes it possible to gather all necessary evidences about corporate data loss. Your employees will never know they are monitored and all their PC activity is analyzed.
StaffCop detects data leakages by:
- Instant messages
- Printed files
- Copied files
StaffCop module runs as a Windows system service. If a user doesn't have administrator credentials, then it is not possible to stop, bypass or get rid of it.
Information is encrypted on the Agent side and decrypted on the Admin side, so it is impossible to intercept and view data.
As an additional feature, StaffCop allows the sending of instant messages from the administrative module to any user module. This feature simplifies communication with computer users. This also makes it possible to update the user about any violations and prevent any further company-prohibited activities.
Remote Install / Uninstall
You can install StaffCop user modules on all computers of the network or uninstall the same way if you have admin credentials.
The remote install/uninstall feature makes it possible to set up the whole system without bothering your employees – they will not even notice it. This feature becomes especially useful if your network has a large number of PCs.
Terminal Server Support
StaffCop can be installed and hosted on a terminal server.
Terminal server support brings security to a higher level, it becomes harder to attack data from the inside. This also reduces administration costs and electricity bills.