Increase Productivity by Increasing Operational Efficiency: Know Who is Working And Who is Not

When addressing the issue of productivity, most organisations employ blocking techniques to try to prevent staff from going to unproductive sites or installing unproductive applications. The problem with this is that the blocking is easily circumvented on-line through the use of proxy sites, anonymisers, 3G modem plug-ins, Wi-Fi hotspots or any off-line transmission method. At the same time, the blocking can get in the way of legitimate activity, for example, Facebook may have many productive benefits for the company but it may be blocked because of potential misuse.

When off-line, staff can use DVDs, flash-based games (which do not need administrative rights to run on a PC and so are difficult to identify and block) or USB devices to get around the rules.


The Solution : Monitoring User Activity at the Source

e-Safe Compliance monitors all user activity at the end-point. e-Safe Compliance provides a clear indication, based on user/department, of the amount of time a specific user spends on productive and unproductive applications or websites and what it costs the company.
It only records time spent actively on the screen and will stop recording if there is no keyboard or mouse activity for three minutes. Using this approach, there are no excuses that people can use to avoid responsibility, for example, “Facebook was open, but minimised while I was actually doing work” or “I opened YouTube for two minutes, but then left it on while I went to attend the Monday meeting!” The system records the minimum time they must have spent on non-productive activity.
The system can give an aggregate picture of what is happening throughout the organisation or by department, displaying a pie chart to indicate the potential overall productivity loss and the cost incurred. Department heads can then drill down from the top-level view to see exactly who are the top offenders, what they have been doing, for how long and when. The reports produced are indisputable and actionable.

Enforce Filtering Policies on Mobile Users

The system is ideally suited to applying filtering policies on mobile users. As all monitoring is done at the end-point, there is no way around e-Safe Compliance as the software is not affected by how people connect to the network, for example, using external networks (3G, free Wi-Fi, home network) or whether they are offline. All information is collected and reported.

Ensure New Forms of Access such as 3G Modems or Tethering are Used for Productive Purposes and not in Order to Bypass the Central Filtering System

As new forms of connectivity take hold, corporations will need to ensure that they are for productive use and not for bypassing central firewalls to access unproductive material.

We usually find at least 1 confirmed data leak per 100 users.

Discover how much of your data is at risk, for free, within just a couple of hours!


Data security and compliance for remote users

Allow employees to work from home without compromising sensitive data