Archive for the ‘Uncategorized’ Category

Customer Review

Posted on August 21st, 2014 in Uncategorized | Comments Off on Customer Review

satisfaction
Customers’ satisfaction is our motive power!
“One of my distributors seemed take longer than the rest to make their deliveries. Hence, I decided to use EAM to track. EAM not only enhanced work efficiency but also told me who was late and early going while I was not in the office. ”
“My company information is vital for me.This is Why every employee who has access to important information receives a phone with iMonitor Phone Spy installed. So far nothing has happened, but I do not take risks.”

These words make me happy :)

Visitor Satisfaction Rating Result

Posted on August 15th, 2014 in Uncategorized | 17 Comments »

Live chat visitor satisfaction rating result in July comes out.
Lynn and Kevin have done a really good job. They have 100% good rate! Lynn is always kind and gentle to clients, taking feelings of client into consideration. Kevin’s strong point is to solve problems in shortest time. Many clients complimented him for his efficient response. You two are indeed excellent! Chocolate as prize for you and congratulations!
On the contrary, one guy received a dozen of bad rate. Oh, come on, we know your technical knowledge comes on top and all you need is only one thing – patience. Yes, patience is significant. If you could be a little bit more patient to your clients you would be perfect!
Cathy and Tina, I am really glad that you both made a great improvement.
Finally, a big thank you to everyone for your hard working!

Website Updating

Posted on August 12th, 2014 in Uncategorized | 7 Comments »

The page of iMonitor EAM has been updated.
Recently many users claim that they feel lost after they download EAM installation package. They don’t know which program should be installed on which computer. I think the installation manual is clear enough for user to finish the installation but it seems that some users just feel troublesome to read it, so we draw a picture showing structure of EAM program. Indeed, the installation is very easy. Have server program and console program installed on manager’s PC and agent program on employees’ PC, that is all, nothing difficult, yeah?
Another column added on the EAM page is feature list, we have tried our best to give detailed description of all major functions. We hope this column could help our customers get an idea of what this software can do. The list is made according to EAM professional if you want to know features of EAM Standard please hit the “features” button which will lead you to page of EAM Pro. and Std. comparison.
If you have any suggestion about what content we should add on our website please leave it in the comment. We would be very grateful.

IMonitor EAM Ver.8.3 Release Soon!

Posted on August 11th, 2014 in Uncategorized | 7 Comments »

We are now doing the final testing of EAM Ver.8.3 which will be released in days!
In this version we fixed some issues such as Japanese e-mail Garbled characters and now EAM works even more smoothly and stable than before. According to important feedback from our clients, this new version has added many marvelous new features!
A very useful feature is “auto file back up”. With this feature, you can have important files backed up automatically. Once the file is accessed/modified/removed/moved on client PC EAM will back up it on the server PC. When the staff delete important document by miss, searching for help in tears, you can tell him never mind every thing will be OK and give him the original document.
Another new feature is “multi-window live desktop”, with which you can view up to 30 live desktops at one time, to grasp what is going on on each computer in real time! By double clicking a window, the window will be enlarged so you can see the detail and take control on that PC.
The last good news. With all these great new features added, the pricing will keep still! Yes, iMonitorSoft will always provide customers with best cost-performance product.

A Nice Company Outing

Posted on August 8th, 2014 in Uncategorized | 13 Comments »

This is a yearly summer company outing of all iMonitorSoft Employees. The boss has always believed that one should balance work with play and this makes the work environment have a healthier atmosphere. I can’t agree with that more.
We had many games such as several relay games, a tug of war, and a sack race. However, my favorite was the cheering competition! It was so fun to see everyone out-dance, out-scream and out-cheer each other. My partner Cathy is always in charge of our company events and she really outdid herself this year in organizing one of the best company outings we’ve ever had.
Today was a really nice day. I love all my “family members”!

IMonitor EAM Needs Your Help to Get Better!

Posted on August 8th, 2014 in Uncategorized | 5 Comments »

IMonitor EAM needs your help to get better. We really want to know what our customers need. Our dream is to make the most satisfactory software for our customers. We would be very glad if you could give us your feedback. Please kindly advise which is the feature you want most to be added in EAM.

A. Number of keystrokes for each application. e.g. to monitor how many keystrokes an employee accomplished in Microsoft Word.
B. White list for specific web sites.
C. Monitoring of specified folder. Whenever the folder is accessed, take a screenshot and log this action.
D. Record how much time user spent on each web page.
E. Automatic evasion of antivirus.
F. Sub grade under department.
G. Record comment text submitted on web sites.
H. Send mail file attachment to the server PC.
I. Prevent specified documents from being printed.
J. Send file to all client computers at one time.
K. Other.

Security Consciousness of Employees Enhanced and Inappropriate Computer Activities Drastically Reduced

Posted on August 5th, 2014 in Uncategorized | 6 Comments »

Since the adoption of EAM Professional, we have managed to find out some inappropriate behaviors of employees, such as browsing non work related sites in working hours. We also found a large quantity of downloaded music files and video files.
After declaration of monitoring, security consciousness of employee notably enhanced and inappropriate computer activities drastically reduced. Now every body are kept on track. Some employees used to chat or do net surfing in working hours, with their tasks postponed. They are now working much more efficiently, finishing the assignment on time. What makes me really happy is that I saved plenty of overtime pay!

80% of Corporation Confidential Data Leakage Derived from Inner Crime

Posted on August 5th, 2014 in Uncategorized | 7 Comments »

A recent survey found that 80% of corporation confidential data leakage derived from inner crime.
Leakage of critical data might lead to big damage to a company. Most middle and small companies felt necessity for a counterplan but they found it was difficult to find an effective solution.
In such a situation, iMonitor EAM attracted business owners’ attention.
IMonitor EAM records every file operation including that on removable disk. With blocking features, it is also possible to completely forbid use of all removable device like USB stick, smart media, memory stick, SD card etc. IMonitor EAM can tell you who has printed confidential document or uploaded important files to online storage. You may also block any unwanted online storage site with EAM web-site filter. What’s more, every file attachment of e-mail/web-mail will be logged by the software, as well as file transfer via Skype.
Are you anxious about your business secret being sent to rival company? Do you fear client information leakage hurts company credit? For sure iMonitor EAM will be the best choice to protect your business.

According to experts, keystroke loggers pose more risk to PC users than any other tool used for committing cybercrime

Posted on March 27th, 2014 in Uncategorized | 4 Comments »

According to experts, keystroke loggers pose more risk to PC users than any other tool used for committing cybercrime. Also known as keylogger, they are small programs or hardware devices that monitor each keystroke you enter on a specific computer’s keyboard, including typos, backspacing and retyping.

Recording your every move on the Web

Although keyloggers are promoted for benign purposes like allowing parents to monitor their children’s whereabouts on the Internet, they can be used to spy on anyone. They are a form of spyware used by cybercriminals to covertly watch and record everything you type on your PC in order to harvest your log-in names, passwords, and other sensitive information, and send it on to the hackers. This may include any passwords you have asked your computer to remember for you to speed up logging in, as these are held as cookies on your machine.

Unfortunately for consumers, keyloggers are becoming very sophisticated. Once on a PC, they can track websites visited by the user and only log the keystrokes entered on the websites that are of particular interest to the cybercriminal, like online banking websites.

Types of keyloggers

Keyloggers can be one of three types:

Hardware Keyloggers: small inline devices placed between the keyboard and the computer. Because of their size they can often go undetected for a long time, but they do require physical access to the machine. These hardware devices have the power to capture hundreds of keystrokes including banking and email username and passwords.

Employee monitoring software Internet nowadays has become a real absorber

Posted on March 27th, 2014 in Uncategorized | 13 Comments »

Employee monitoring software Internet nowadays has become a real absorber, according to statistics, about 20% of the inappropriate use of working time spent on visiting s and blogs, comments on the release of a new , General Director of the company – Our company has taken into account this fact and has developed an effective system for monitoring, what exactly do the employees , the Internet, and in General computer use. Understand that the ban is not an option, all sites are close to impossible, for many employees, search engines and other websites and even reveal the place and work tool. Therefore, employers must see the statistics on the Internet for time and know exactly what you did in a particular employee. With this problem for more than 5 years successfully copes
In addition to the above functions include monitoring of e-mail correspondence and in the popular messengers like ICQ, QIP, etc. The program notes correspondence and shows which messages have been sent and to whom, saves all incoming messages and attached files oversees all operations with files and folders (copy, edit, move, etc.), and also produces shadow copying of printed files.