While the employers can use this software to protect their business from damage, to prevent data leakage, and to improve the productivity of employees.
The program records nearly any user activities: keystrokes, copied text, launched applications, Web navigation, chats in social networks and Instant Messengers, operations with Files and USB devices.
It also captures the screen, makes webcam snapshots, and even records a sound. * Choose particular user accounts for monitoring. The program can send logs to your email, FTP folder, LAN folder and even Dropbox storage.
You can create your own quick invisible installer, with pre-configured settings.