Contact us to arrange a free presentation

Monitoring of computers LP2024-08-21T08:18:59+02:00

Monitoring of computers

Monitoring
computers

FULL a control and security – monitoring employee computers
has never been so easy.

PFULLa controla and security – monitoring employee computers has never been so easy.

Computer monitoring

Main functions

Automated IT inventory

Software inventory and monitoring

Open Sessions and Users

Devices
USB

Key IT security indicators (SOC)

Streamline management and secure your computers with eAuditor

Benefits

  • Data protection and increasing IT security

  • Automatic monitoring of resources

  • Optimization efectefficiency

  • Audit automation

Monitorowanie komputerów
  • Ensure compliance with rules and regulations

  • Improving labor standards

  • Zdditional supporte technical support

  • Cost reduction

Monitor computers remotely and outside your local IT network with eAuditor
– full visibility and data protection, even behind NAT

Monitor computers remotely and outside your local IT network with eAuditor – full visibility and data protection, even behind NAT

FAQ

What does computer monitoring include?2024-08-09T08:12:03+02:00

Monitoring of computers in the eAuditor system includes inventory of technical parameters, configuration, installed software, files, monitoring of user activity, such as logging in, launching applications, visiting a website, printed documents, connected devices, opened files. Monitoring also includes analysis of parameters affecting IT security: disk encryption, status of patches and updates, creating, modifying and deleting files, sending files to clouds, etc.

Is it legal to monitor computers?2024-08-09T08:12:53+02:00

Yes, it is legal to monitor computers as long as the employer informs employees about the monitoring while complying with relevant privacy laws.

Are employees informed about monitoring?2024-08-09T08:13:43+02:00

Yes, employees must be effectively informed about monitoring. Effective information is one where the Employer will ensure accountability of the process (i.e., preferably in writing). An employee may refuse to sign an information document, but this does not affect the Employer’s authority to monitor. It is recommended that Employers specify the scope and purpose of monitoring when informing.

What are the benefits of computer monitoring?2024-08-09T08:14:44+02:00

Benefits include improved data security, optimized productivity, regulatory compliance, IT asset management and early threat detection.

Can the eAuditor system operate outside the local network?2024-08-09T08:16:23+02:00

Yes, the eAuditor system can inventory and monitor computers on the local network, VPN and computers outside the local IT network (behind NAT). The monitored computers do not need to be permanently connected to the eAuditor system server – periodic access to the Internet is sufficient.

Is it possible to adjust the level of monitoring?2024-08-09T08:17:25+02:00

Yes, the eAuditor system allows you to customize the level of inventory and monitoring according to the needs of the entity, allowing you to configure monitoring policies for different roles and departments and users.

What security measures protect the data collected?2024-08-09T08:18:37+02:00

Collected data is secured by means of encryption, access control (a multi-level system of access to the eAuditor application and its various options) and advanced security mechanisms in the system itself. The eAuditor system is subject to regular vulnerability tests performed by specialized and independent entities.

Does computer monitoring affect system performance?2024-08-09T08:19:30+02:00

The eAuditor system does not adversely affect computer performance, running in the background (transparently to users) without noticeable slowdowns.

Contact us

    Contact information
    Indicate the subject of your message