• Makes it easy to determine exactly what’s being done by the user
  • Generates screenshots of all activity
  • Captures everything that happens on the monitored computer


  • Somewhat limited because the reporting tool requires access to shared files on the monitored computer
  • Reveals personal information such as passwords and user IDs

Manufacturer’s Website