Replay detailed employee actions as if you were sitting there. See every action in context.
Capture websites visited, searches performed, and social media activity, all with detailed time tracking.
Archive every email sent and received from both corporate email and webmail services such as Gmail and Yahoo.
Watch for files being printed, edited on a network drive, or copied to an external device.
Know exactly when an application was used, what was done while open and how long was the application in use.
Record every Internet connection a computer or application makes: the target IP address, TCP port used, and bandwidth consumed.
Catch them red-handed by receiving instant alerts when keywords or phrases are typed or are contained in an email, chat, instant message or web site.
* Not all features supported on all client platforms. Click here for more details.
Spector CNE Investigator uses an invisible agent on your Windows and Mac clients to record and alert you to suspect employee activity.
Find out who is your biggest offender by seeing exactly where, when, and how much time your employees are spending on non-work activities.
Detect when customer lists, financial records or other high value business documents are accessed and know exactly what is done with them.
Be alerted in real-time when inappropriate communications or actions occur across web, email, chat, webmail, and social media.
Audit compliance policies and procedures by watching employee actions. Should a problem occur, be notified in real-time and know, with certainty, the extent of the problem.
Determine exactly what an employee is or is not doing while on the clock and quickly review his or her day in a matter of minutes.
Spector CNE Investigator automatically records all computer activity, creating a record that can be used as evidence in civil and criminal litigation.
Spector CNE Investigator’s invisible agent can be remotely deployed to your Windows and Mac clients silently.
Recordings are centrally encrypted, stored and password protected, ensuring only appropriate eyes access and view the data.
|Record Chat/ IM||Yes||Partial|
|Record Webmail||Yes||Future Release|
|Record Keystrokes Typed||Yes||Yes|
|Record Website History||Yes||Partial|
|Record Program / Application Activity||Yes||Yes|
|Record Online Searches||Yes||Partial|
|Record File Transfers||Yes||Yes|
|Record Social Media||Yes||Partial|
|Record Document Tracking||Yes||Yes|
|Record Network Activity||Yes||Yes|
|Chat Blocking||Yes||Future Release|
|Keyword Alerts||Yes||Future Release|