DriveStrike
DriveStrike is simple to use, implement, and manage. DriveStrike allows you to perform remote wipe, remote lock, or remote locate commands on any platform. Mobile device management MDM for mobile platforms. Integrated drive encryption support. Our support team is available to answer any questions, help you install our services, or manage your account. It's never been easier to protect your data and devices. We are happy to answer any questions you may have or help you understand how to best protect your data. Protect your business with a device- and data protection platform that keeps all devices protected with a single solution. Your Workstations, iPads and iPads, Smartphones as well as Tablets, Tablets, Tablets, and Laptops will be protected, organized, secure, & protected.
Learn more
ESET PROTECT Advanced
ESET Protect Advanced offers a comprehensive cybersecurity solution for businesses of any size. It offers advanced endpoint security against ransomware and zero-day threats. It also includes full disk encryption to ensure legal compliance and data security. The solution uses adaptive scanning, cloud sandboxing and behavioral analysis for proactive cloud-based threats defense. Mobile threat protection secures Android and iOS with anti-malware and anti-theft. It also offers cloud app security, mail server protection, vulnerability and patch management, and cloud app protection. Multi-factor authentication and extended detection and reaction (XDR) improve threat detection and response. The solution provides a single pane of glass remote management to provide visibility into threats and users. It also offers advanced reporting and customized notifications.
Learn more
pcInformant
Software for computer monitoring that captures real-time screenshots and records user activity. Remotely monitor a computer. Track internet activity, keystrokes, applications and keystrokes. Get HTML reporting via email. Spy software for Windows.
Monitoring Options
Keylogger
Screenshots
Internet Logs
Application logs
HTML Reporting
Log files can be emailed
Special Features
Application is invisible
Logs can be automatically cleared
You can toggle between on- and off-screen features
Full range of options
Application is not listed under Add / Remove Programs
Security Features: The application is invisible, the database is encrypted, and emails sent via encrypted zip files protected by passwords are encrypted. pcInformant doesn't store any data in the Cloud. Your data is safe because it is all stored on your computer.
Requirements: Windows 7, 8, 9 or 10
Learn more
Spytector
Spytector, the ultimate invisible keylogger (keystroke logger) that is completely undetectable, meets all your surveillance and PC monitoring requirements. Spytector keylogger runs in total stealth and is undetectable by even advanced users. This makes it ideal for monitoring how your PC is being used. Spytector tracks all activities of PC users (visited sites, keystrokes, chat conversations, etc.). The logs are sent to you via Email and/or FTP. The logs include the local passwords (for FireFox and Opera, Google Chrome, Internet Explorer Safari, Outlook, Google Talk, Windows Live Messenger, Google Chrome, Google Chrome, Internet Explorer, Safari, Outlook, Google Talk, Google Chrome, Internet Explorer, Safari and Google Chrome). URL history (visited sites). Spytector is invisible on the user's desktop. It cannot be seen in task manager. Spytector is injected into startup system processes and sent secretly through the default browser and email client (to bypass firewalls).
Learn more