Yes, our agent can track usage of the Lotus Notes client by monitoring whether or not this executable is actively running on a machine. If the Lotus Notes client is detected as running, the agent will automatically track whether the Lotus Notes client is being looked at and whether the Lotus Notes client is being interacted with.
Yes, we do have a version of our agent that can run on iOS. The Mac version will report back on the installed inventory and the running executables. However, the way we analyze user segmentation on Mac is different than the the way we do it on Windows. For Windows users we provide segmentation to light and heavy users based on their applications actual usage while for Mac we … Read More
The SoftWatch agent (called CollectIT) is the same agent no matter which one of our services you choose. In every different service the agent will receive a new configuration package from our servers so you don’t have to worry about that, but as far as the way it works and the addresses it will connect to on the web – they … Read More
Our lightweight agent supports Internet Explorer(IE), Firefox(FF) and Google Chrome. IE and FF don’t require anything but the agent, but Google Chrome analysis requires installing a simple Chrome extension. The easiest way to accomplish this is by using a group policy that will enable you to gain control over several Chrome settings, including pushing out Extensions and making sure they … Read More
Yes. We use SSL encryption to secure the data in transit and we offer optional MD5 encryption for data at rest. Here’s how the data encryption works: To encrypt the data (username, machine name, domain name) we: 1) capitalize the data (so User and UsEr == USER) 2) MD5 the capitalized string and send that data to the system from the agent. … Read More
Yes. The agent’s unique inner topology consists of two elements. One will run on a system level, once per machine, and will provide data on all the running processes. The other will run once per logged on user, and provide data on usage, such as mouse, keyboard and focus information. This means that no matter how many users are connected … Read More
The agent has minimal interaction with the operating system. This ensures virtually no adverse effect on performance. The average report size is only 10KB once every 8 minutes. All the reports, analyses and calculations run on the server. Nothing is done on the agent side in order to keep the client as thin as possible.
The agent does not scan the registry. It reads a set of specific keys. This dramatically reduces network load. Running processes are constantly monitored and are reported on every eight minutes by default Hardware and software inventory is reported every 24 hours and only if the agent detects changes
The agent collects: Inventory of installed software Data running applications: Application name and ID CPU and memory values Mouse activity Keyboard movements (no key logging) Window focus information
On average, the thin client’s CPU’s usage is ~0.00001%.
- Page 1 of 2