Veriato employee investigation software automatically records all computer activity, creating a record that can be used as evidence in civil and criminal litigation.
Veriato Investigator’s invisible agent is deployed silently and managed from a remote console, so the target of the investigation is not alerted.
Recordings are centrally encrypted, stored and password protected, ensuring only appropriate eyes access and view the data.
Veriato Investigator automatically records all computer activity, creating a record that can be used as evidence in civil and criminal litigation.
Capture website visits, searches performed, and social media activity, all with categorization and detailed time tracking.
Archive every email sent and received from both corporate email and webmail services such as Gmail and Yahoo.
Record a complete copy of both sides of chat and instant messaging conversations.
Watch for files being printed, edited on a network drive, or copied to an external device.
Track activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed.
Know exactly when an application was used, what was done while open and how long was the application in use.
Capture communications activity in traditional email clients as well as many popular webmail services, and have a searchable system of record that can be alerted and reported on.
Investigator Cloud allows you to store all recorded data in the cloud and access your cloud based management dashboard from anywhere. No server or database required
Investigator On Premise is designed for companies in regulated industries that want to keep their recorded data “on premise” at their facility.
Investigator Cloud allows you to store all recorded data in the cloud and access your cloud based management dashboard from anywhere. No server or database required
Investigator On Premise is designed for companies in regulated industries that want to keep their recorded data “on premise” at their facility.
See who is accessing customer lists, financial records or other high value business documents and know exactly what is done with them.
Determine exactly what an employee is or is not doing while on the clock and quickly review his or her day in a matter of minutes..
Audit compliance policies and procedures by watching employee actions. Should a problem occur, be notified in real-time and know, with certainty, the extent of the problem..
Yes, by default, Veriato Investigator’s agent is deployed silently to either your Windows or Mac clients.
Yes. Veriato Investigator allows you to configure the recording settings and disable the recording of any of the activity types you desire.
Not all features are available on both platforms.
Veriato Investigator Recorder will work on Mac machines with Mac OS® 10.9, 10.10 and 10.11 using a 64-bit Intel processor.
No. By default Veriato Investigator runs silently, but can be configured to run openly, if desired.
You can configure the recordings to remain on the computer being recorded and review the recordings remotely using Veriato Investigator’s Remote Viewer. Alternately, recordings can be configured to be stored on a central Data Vault computer, reviewing those recordings either from the Data Vault computer or remotely using the Remote Viewer.
If managed, no. The amount of daily disk storage required for each computer being recorded will generally only range from between 2 and 20 megabytes per day, depending upon the types of events being recorded. Should you choose to centrally store this data on the Data Vault computer, you have the option to Archive the data older than a specified age and delete the original data, preserving disk space.