These applications are mostly used in a business environment. They can log network traffic passively, or examine the logs of proxies etc... These programs are not installed on the individual computers. They are designed to run on a central server. They can only log things that pass through the network, not local things like entered passwords, keystrokes or screenshots.
Comment
- Monitoring the active tasks list
- Handling the critical programs list
- Sending SMS alerts to the security administrator's mobile phone
- Receiving control commands from the security administrator's mobile phone
- Protection from unauthorized external access
- Protection from unauthorized physical access
With control commands you can remotely administer your computer via mobile phone. Just send the SMS from your mobile and one of the following actions can be performed:
Displaying messages sent from a mobile phone
Disabling a user's account and forcing system restart
Termination of the active process
Termination of all active processes from the monitored processes list
Locking the active process
Locking all active processes from the monitored processes list
Dismounting all protected drives
Tracing the route of a stolen or lost notebook or desktop PC
Sending to a mobile phone the confirmation of command execution status