+44 (0)845 230 9590

Desktop Monitoring

CensorNet Desktop Monitoring is a client-server solution for monitoring, recording and analysing user activity on the desktop, virtual desktop, terminal services and remote desktop sessions.

Overview

There is no substitute for video evidence and CensorNet Desktop Monitoring will record all user activity as a video together with meta data that adds context to the recording such as time, username, application name and key strokes.

The meta data helps to quickly search for activity across all recordings and can also be used to trigger alerts. The solution uses advanced compression and a sophisticated communication protocol to reduce network traffic and storage.

CensorNet Desktop Monitoring is compatible with all versions of Windows, numerous remote access tools, devices with multiple-monitors and can also record Linux-based command line activity. In addition to reviewing video, the administrator can also view activity as a live video stream, export snippets of video and continue to record devices even when they leave the network.

CensorNet Desktop Monitoring can be used for a variety of tasks including privileged user monitoring, terminal services activity monitoring, data loss prevention, helpdesk and application training.

Security – Records all user activity as video and search based on meta-data to quickly find relevant recordings across all monitored devices.

Management – Disallows generic usernames so that all users can be identified.

Reporting – Monitors exactly what users are doing; applications used, files accessed, key words typed. Engine instantly notifies the IT department of potential violations or suspicious activity.

Deployment – Agent can be deployed automatically by installation wizard, manually via USB stick or via network share Optimised for low network throughput and minimum storage requirements.

Download a full feature list

Increase security – Records all user activity as video for future evidence in case of security breach as a result of inappropriate employee activity or privileged user access. Video playback can be used as part of legal action or to avoid it altogether.

Identify privileged user access – Knows the real username that has logged in as “administrator”.

Prevent data loss – Instant notification if key words are entered that are considered suspicious or applications are accessed that are considered highly confidential.

Improve training – Session recordings can be used to train staff on best practice use of applications, for helpdesk troubleshooting and behaviour analysis.

Incident investigation – Allows quick access to video recording as part of an investigation into a specific action and search by username, time, application, key words and then replay the video.

Low total cost of ownership – A simple licensing model based on the number of devices to record with simple installation and deployment.

Screenshots

_r2_c2 _r2_c4

The platform consists of the following main components.

DM

CensorNet Desktop Monitoring works with any network protocol and any type of remote access – Citrix, Terminal Server, Remote Desktop, VNC, etc.

The solution also supports any Windows-based operating system (both server and workstation). The product creates a video recording of user actions; mouse moves, interface element selection, media materials playback, text input, etc. Recording is performed regardless of active application and the supplied Player application can be used for play back and analysis from any computer.

What is Desktop Monitoring?

CensorNet Desktop Monitoring is a network based monitoring system for desktop, virtual, remote and terminal services clients. Desktop Monitoring consists of an agent, which records activity on the computer (multiple monitors supported), a server which stores the video for later review and a viewer for analyzing investigated data. The server also manages installation of the agents and policies for video recording. The viewer allows you to search your video archive based on event, application, window title, time stamp, user and computer.

How is the initial cost of my requirements calculated and are there any ongoing costs?

The price is based on the number of agents that are allowed to connect to the server at any one time. For example, if you have 100 computers, you can install the agent on all 100 computers. If you then buy a license for 50 agents, then you can select up to 50 of the 100 agents to be actively recording at any one time. You can move a license from one agent to another with a few clicks of the mouse. The more licenses you buy the lower the price-per-license becomes.

Is Desktop Monitoring suitable for schools?

Yes, it is suitable for any organisation that wishes to monitor computer activity on their network.

Do you provide discounts for education or non-profit organisations?

Yes, we provide a site license for schools to allow them to install an unlimited number of agents. We also provide discounts for education and non-profit use.

Is it legal to use Desktop Monitoring software on my network?

The answer to this question varies between countries and the laws that govern surveillance, workplace monitoring and privacy. In the UK, companies seeking to use surveillance software are required by the Information Commissioner to consult staff and make their policy clear to everyone. Employers should also include statements in their employment contracts regarding acceptable usage of the Internet and their computer systems. The company privacy policy should clearly state that that the company intends to use network surveillance software to monitor computer use, for the purposes of recording evidence of transactions, regulatory compliance, detecting crime or misuse, safe guarding the integrity of infrastructure and all users of the computer network should be made aware of this. You should consult your legal counsel, HR department and the Information Commissioner for further information. The following links may be useful:

• UK Regulation of Investigatory Powers Act (RIPA)
• UK Telecommunications Regulations 2000
• US “Spy Act” 2004

Is there a “try before you buy” version?

Yes, you can access an evaluation version via the Download a trail button.

Will Desktop Monitoring continue to record if the device is off the network or the network is unavailable?

Yes, if configured to do so, it will record the video locally on the device (in a hidden location) and when a connection with the server is established again it will synchronise the video. The agent can be configured to stop recording or overlap old recordings if a specific disk space threshold is reached.

CensorNet for Education

Schools have a duty of care to provide a safe Internet experience for all their pupils and staff and need to demonstrate reasonable and effective measures to control access to the Internet.

Find out more