We have released new version 11.6 of SoftActivity Monitor, a leading user monitoring solution that helps to protect organizations from insider threats.
Product name has now been changed to SoftActivity Monitor from Activity Monitor, in order to be more recognizable and include our brand. It’s a maintenance release that includes a number of important optimizations and fixes. Upgrade is recommended to all users.
What’s new in version 11.6:
performance improvements and optimizations in Agent
view attachment names on Email tab in real time monitoring window in the console app;
TS Monitor 5.6 update also released
We are also announcing the release of new version 5.6 of SoftActivity TS Monitor, our user monitoring solution for terminal servers. It’s a maintenance release with performance optimizations and fixes.
According to theGlassdoor, the average company in the United States spends almost $4,000 to hire a new employee and about 24 days to fill the position.
The costs are many including sourcing candidates (job boards, career fairs, website postings, referral rewards, external recruiters, etc.), screening candidates by telephone and in person, testing (hard and soft skills) plus negotiating an acceptable offer. Add to that the cost of training which is estimated at $1,075 per learner according to the2017 Training Industry Report and you are looking at a tidy sum to attract, train and retain top talent. If they leave for any reason, you are tasked with repeating this process (and cost) all over again.
Employee monitoring is an incredibly useful tool for any company. Not only is it handy to make sure that your employees are doing the work that they’re supposed to be doing, but it can provide useful stats regarding their work habits and how they spend their time.
Yet, with all this data, it can be difficult to figure out how to best utilize this information to help boost your employees’ productivity. While there is limitless potential with the data you collect, there are a few key things you can start with that should give you good results right off the bat.Read More
In the old days, protecting trade secrets was relatively straightforward. You kept many of these items on paper, locked up in special spots. Today’s environment is so different, it’s hard to know where to begin.
Companies worry a great deal about insider threats – the idea that any disgruntled employee or someone infiltrating the company’s physical or digital space is going to get their hands on trade secrets, customer information, financial details or anything else that can have a negative impact on the company’s operations and reputation.
Are you concerned about government employee fraud (cheating for profit) and embezzlement (misappropriation of funds)? After all… it’s your tax dollars!
Insider threats are a part of any organization in government and industry. According to Transparency International in their latest Corruption Perceptions Index report on public sector corruption – over 68% of 180 countries failed a passing grade. The USA performed reasonably well (75/100 score), but is not without its own challenges.Read More
According to CIO DIVE “Insider Threats” are the #1 cybersecurity concern in 2018.
By definition, insider threats include any malicious attack on an organization from current or past employees, business associates or anyone with access to the company’s proprietary data that could be used against them in a detrimental way. Read More
Consider this scenario: Jane owns a profitable trading company of clothing lines imported from choice locations around the world. She has 23 employees and has been in business since 2002. Since her office staff of 10 are sitting at their computer all day conducting research and completing sales or customer service activity to keep production moving, so they are busy at their desk (or are they?). It’s a highly competitive industry that requires everyone make a full contribution in order for the company to prosper.Read More