Meta-Spy
Award-Winning Computer Monitoring Spy Software for the Home and Small Business
Home : Network : Business : Enterprise : Parents : Files : Purchase : Docs
Enterprise
The latest solutions to protect your business from: idle and inappropriate employee behavior; stolen assets and trade secrets; data and financial loss.
Enterprise Users, What would you like to do?
  • Centrally monitor and log all user activities on our network
  • Prevent unwanted user behaviors on our network in real-time
  • Protect file assets, and monitor all web/program usage
  • Remotely monitor off-site/off-network computers
  • Scan and audit our network's security
  • Monitor all file share activity
 
NetVizor 5.30 NetVizor 5.30
Centralized Network Computer Monitoring Software
NetVizor is the latest in network monitoring software. Monitor your entire network from one centralized location! NetVizor allows you to track workstations and individual users that may use multiple PC's on a network. NetVizor records everything users do - from keystrokes typed to email activity. NetVizor can show you what everyone is doing on your network, in realtime, with a single mouse click via its visual network overview and realtime activity ticker. Combining real-time remote surveillance with complete individual user monitoring, report creation, and security auditing, NetVizor is the most comprehensive network monitoring solution available!

 
Network Enforcer 1.10 Network Enforcer 1.10
Network Enforcer monitors, responds to, and prevents unwanted behaviors from happening on your network in real-time
Revolutionary, first-of-its-kind network security software that allows you to supervise, monitor, restrict, and respond to unwanted user behaviors on your network without having to search through countless activity logs. From insecure keystroke phrases and email attachments, to inappropriate application, file, and website activity - Network Enforcer invisibly monitors, prevents, and controls unwanted network user behaviors in real-time without invading user privacy like traditional activity recording and monitoring tools, protecting your network security and assets.

 
Ascendant NFM 1.5 Ascendant NFM 1.5
Client-Free Network File, Application, and Website Monitoring and Asset Protection
While requiring absolutely no software installation on any computer on your network, you can centrally monitor and record every file action that occurs on your network. Every file opening, creation, modification, and deletion is recorded along with the user that performed the action, and when. In addition, Ascendant NFM contains essential logging tools that will log and show you every application and website used by users on your network. NFM can also protect network assets with its ability to archive files when they are altered, and alert you when specific file events occur. NFM contains essential reporting tools that will show you who the most active users on your network are. Ideal for network administrators looking to: 1)Monitor all file, web, and program usage without installing client software on any network computers; 2) Protect network assets; 3) Receive alerts when specific file events occur

 
Realtime-Spy 4.0 Realtime-Spy 4.0
Monitor and Spy on any Computer from Anywhere
Realtime-Spy is the latest in high-tech surveillance software that allows you to REMOTELY INSTALL the monitoring software and access the activity logs from ANYWHERE via your own personal Realtime-Spy Webspace! Realtime-Spy can show you what users do, and what users type in real-time. All you have to do is point your browser to your own Realtime-Spy website address to view logs from any machines you deploy Realtime-Spy on! All logs are password protected and securely stored for your eyes only. Realtime-Spy is the most robust remotely installable, remotely viewable monitoring software available.

 
Infiltrator 3.0 Infiltrator 3.0
Scan, Audit, and Secure your Network.
Infiltrator is an easy to use, intuitive network security scanner that can quickly audit your network computers for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on scanned computers - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more! All results can be generated into a sleek, easy to read report.

 
NetAware 1.20 NetAware 1.20
Log, Record, Restrict File Share Activity.
NetAware is a monitoring solution that logs and records all shared file activity on your computer or network. NetAware can log what files users access and what shares they connect to and disconnect from on your file shares. NetAware is a first of its kind solution that lets you view exactly what users are doing with your shared files, when,and from what computer they are accessing them from. NetAware also has a built in share manager tool for managing shares.

 
Kaspersky Anti-Virus 7.0 Kaspersky Anti-Virus 7.0
provides you with traditional anti-virus protection based on the latest protection technologies.
Award-winning antivirus software which protects your PC from viruses, Trojans, spyware, rootkits and other malicious programs. Reactive detection methods are combined with proactive technologies to provide balanced and effective security, while automatic updates ensure uninterrupted protection and peace of mind.


Title: Enterprise
Descr: The latest solutions to protect your business from: idle and inappropriate employee behavior; stolen assets and trade secrets; data and financial loss.
Keywords: network monitor software,remote computer monitoring software,web monitoring software,pc spy,pc spy keylogger,pc spy remover,remote pc spy,best pc spy,pc spy programs,spyanytime pc spy,computing pc spy keylogger,pc spy keylogger system,spy vs spy


Home : Contact Us : Legal Policies

(c) 2008 Meta-Spy software group