TimeInformer informs you of employees’ productivity.
The software keeps track of user activity and their work with applications.
TimeInformer protects your business from inefficient work and financial loss caused by a staff.
The system detects:
Memorizes the time of arriving at and leaving from work, long smoke breaks, being late and absent
Collects data about application and website usage, records time employees spend using them
Identifies employees on the verge of a burnout due to working overtime
Detects valuable employees who look for a new workplace – spend time searching for a job
Being late and absent
Memorizes the time of arriving at and leaving from work, long smoke breaks, being late and absent
Entertainment during work hours
Collects data about application and website usage, records time employees spend using them
Overloaded employees
Identifies employees on the verge of a burnout due to working overtime
Disloyal employees
Detects valuable employees who look for a new workplace – spend time searching for a job
Determine whether an application was only launched or actively used
Memorise all the visited websites and time which was spent on them
Automatically sort out productive, unproductive activities and those not related to the tasks
Collect necessary evidence for investigation – screenshots, pressed keys, audio recordings
Create detailed reports on employee activities and corporate regulations violation
Control the company’s PCs even when employees are outside the corporate network
On the employee’s side
On the specialist’s side
ProgramController
Collects data on user activity and time spent working with applications and websites. Automatically determines if an employee is keeping an app launched or is actually working with it.
MonitorController
Takes screenshots demonstrating activity on employee workstations. Each screenshot captures additional information that helps to register all the details of a violation. LiveView function allows you to connect to the monitor in real time.
Installation of the software
The solution can be installed on a company’s server or in the cloud:
1. TimeInformer installation at the client’s facilities takes half an hour and doesn’t require specific software and knowledge
2. The solution implementation and launch on a cloud server saves customer’s money required for purchase, implementation, servicing and maintenance
The solution runs on Windows. Thanks to its user-friendly interface, even a beginner can work with it.
Server
The minimum TimeInformer server configuration is shown below:
up to 1000 agents | 1000-2500 agents | |
---|---|---|
CPU | 2-core 2,4 GHz | Intel Core i5 3,2 GHz |
RAM | at least 4 GB | 12 GB |
HDD | per month - up to 600 GB |
per month - up to 1 TB (preferably RAID storage) |
NIC | 1 GB/sec | 1 GB/sec |
Workstations for endpoint monitoring
The minimum requirements for a PC are shown in the table
requirements | |
---|---|
CPU | 1-core at least 2 GHz |
RAM | at least 1 GB |
HDD |
250 GB (disk space on system partition - at least 50 GB) |
NIC | 100 MB/sec |
Allows you to build detailed reports on captured information. Suspicious activity notification algorithm can be configured and a security specialist can be alerted automatically via email.
Company’s losses due to employees’ performance issues decrease on average by 30% after the solution is installed
Perpetual license
If you purchase TimeInformer you get a time tracking and performance monitoring instrument for permanent use.
The ability to “see” the employee’s screen and “hear” it
The software helps to monitor a suspicious employee: monitor what is happening on the desktop in real time and listen to a conversation via a PC microphone.
Can’t be uninstalled
Unscrupulous employees will not be able to remove the software from a PC. The system will alert to such attempts.
Remote employee control
The software monitors the activity of users, even when they work remotely, for example, when on a business trip – the team is under control, even when the manager is away.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!