InterGuard

interguard_logo_header

InterGuard

InterGuard defends your business from all insider threats. Deployed at the endpoint, clients can access 4 technologies including DLP, Web Filtering, Employee Monitoring and Laptop Recovery, through one agent download and one User Interface.It’s offered as both a complete suite and as four individual modules.

InterGuard defends your business from all insider threats. Deployed at the endpoint, clients can access 4 technologies including DLP, Web Filtering, Employee Monitoring and Laptop Recovery, through one agent download and one User Interface.It’s offered as both a complete suite and as four individual modules:
Click Here to watch our overview video.
The only solution with NO Hardware Required
10,000 clients of all sizes have selected InterGuard in just 3 short years in large part because of our ease of use. Unlike other competitive solutions, our unique architecture allows you to be up and running in minutes with just a few mouse clicks, and there is never any hardware to buy or manage. Our solution is provided in a Software-as-a-Service (SaaS) model so all you have to do is download our software to your desktops and laptops. This process takes only a few minutes and our technical support team is available to help you get set up if you need it. It is worth noting that our solution is flexible enough that you can use your own hardware and host your own data if you prefer. The choice is yours.
What exactly can InterGuard do for you?”
InterGuard has four modules: employee monitoring, website filtering, data loss prevention, and laptop recovery
employee monitoring, sonar
  • Works invisibly and undetectably at each desktop (and now Smartphones), without impacting central network computer resources
  • Records all employee communications – Email (including webmail) & Instant Messaging
  • Monitors and filters Internet use on and off the network (even on laptops) – see Web Filtering below
  • Blocks or limits applications like P2P, IM
  • Records and analyzes all keystroke activity, regardless of the application used
  • Formats all data into easy-to-read reports, making it easy to find and evaluate critical security lapses
  • Screenshots taken whenever an alert word is typed or read on a webpage
  • Conclusive, actionable data hard-linked to a specific employee’s actions, with full individualized reporting on an employee’s computer activity
data loss prevention, datalock
  • Screen all email (work and personal) and attachments for sensitive data and block if desired on both computers and now Smartphones 
  • Protect from misuse or misappropriation of trade secrets, Non-Public Personal Information Control or stop use of removable media
  • Block files, based on their content, from being copied to removable media
  • Protect and enforce policies governing each employee’s computer use, including those that never connect to a network (even laptops)
  • Easy, intuitive policy creation
  • Coach and educate employees to adopt protocol and best practices for protecting company data
  • Reports back to secure server over standard HTTPS protocols, instead of network
  • Identify, track, and control who accesses your data, what data they access, and what they can and cannot do with that data
web filtering, web filter, sonar web
  • Monitors and filters Internet use on and off the network (even on laptops)
  • Blocks or limits applications like P2P, IM
  • Screenshots taken whenever an alert word is typed or read on a webpage
  • All Search Terms captured
  • Works on and off network
laptop recovery, laptop cop
  • Remotely retrieve important files invisibly, using any internet connection
  • Remotely delete files or an entire hard drive
  • Secure and confirm deletion to the highest Pentagon standard of unrecoverability
  • Geo-locate the stolen laptop, in real-time over any internet connection, often with greater accuracy than GPS
  • Monitor and control everything a thief does – every keystroke they type and file they access will be visable
  • Lock down laptop after disappearance so files can’t be accessed
how InterGuard installs and works in four steps
unbeatable single agent saas architecture
InterGuard product overview videoAll four share both a common, single agent architecture and a centralized Management Console that eliminate the complexity of conventional singlepoint security solutions
Since InterGuard is deployed at the endpoint, you can enforce policy on every computer, even on laptops that never connect to the network. Delivered in a software-as-a-service format, hardware is not required such that trials and deployments are only a mouse-click away.
InterGuard product suite software overview
InterGuard vs the competition. Complete, endpoint, saas-based architecture
InterGuard vs the competition. Complete, endpoint, saas-based architecture
 
Data Loss Prevention Software, Datalock
The only solution with NO hardware required
InterGuard Data Loss Prevention Software Overview
InterGuard provides Data Loss Prevention for your organization - regardless of where your employees or your critical information reside. It can scan every file on every PC in your organization to uncover where confidential Data At Rest resides as well as prevent confidential Data In Motion from leaking out (via email / attachments, USB devices, web postings, etc.). In today's increasingly mobile world, where employees and contractors alike demand instant access to corporate assets and confidential information from remote locations, protecting that information can be extremely difficult. Traditional network-based solutions have porous perimeters. Removable media? Webmail? Instant Messaging? All these escape the control of many of our competitors. Thus, they offer only limited "data loss prevention".
InterGuard Data Loss Prevention is superior because it can identify and protect sensitive information no matter where it's being accessed. It operates preemptively to keep your organization continuously ahead of today's constantly evolving threat landscape. InterGuard is installed at the desktop level and reports back over encrypted HTTPS protocols, instead of over the network. This is crucial since it streamlines the process of detecting and blocking any unauthorized attempts to move data outside the organization. Simply put, InteGuard builds a protective circumference around each computer in your organization, rather than just network traffic. This means InterGuard is more effective and comprehensive in securing your confidential data than network-based solutions.
InterGuard uncovers your risks by scanning all of the PCs in your organization to show you where confidential information resides (Data At Rest).
InterGuard prevents confidential Data In Motion from leaking out of your organization via webmail, attachments, web postings or USB devices.
How InterGuard Data Loss Prevention (DLP) Works
How Data at Rest Works
Single Agent Architecture
InterGuard's patented Single Agent architecture allow you to identify, track, and control who accesses your data, what data they access, and what they can and cannot do with that data. Most importantly, all of this is done with an application that can be deployed and configured in a matter of minutes with a minimum of allocated resources. Other DLP solutions? They can take weeks or months to install, require training courses for policy creation and create significant strains (financial and operational) on the organization.
Confidential data is often lost through errors and oversights, rather than malicious intent. For example, the wrong recipient is mistakenly added to a group email containing sensitive company financial data or customer credit card information. InterGuard not only blocks the email from getting into the wrong hands, it is also configured to “coach and educate” employees to adopt due care and best practices, as set by your company. It lets users and administrators choose the appropriate tradeoff between a high detection rate on one hand and a low level of false positives on the other.
Removable Media Monitoring & Control
InterGuard's integrated Removable Media Monitoring and Control strikes the ideal balance between protection of a business’s assets and the efficiency of day-to-day operations. InterGuard blocks the copying of any file to removable media (USB drive, iPod, external hard drive) based on the file's content, and the employee’s job function. So, an employee’s computer or user profile can be set, using InterGuard, to allow copying of email, attachments and attempts to write to removable media, but not spreadsheets with confidential company financials. This is much more targeted and so more effective than competitive solutions, which frequently employ an “all or nothing” approach when it comes to removable media.
Easy to use and Install
InterGuard’s patented software architecture runs on computers across the organization, even those computers that never connect to the corporate network. InterGuard can be installed in minutes, without the need for dedicated hardware, and managed centrally from any web browser. It is flexible and scalable. It can operate as on-demand Software as Service, or behind your company’s firewall. InterGuard makes real-time security decisions to detect and prevent threats to the confidential data inside your organization.
 
InterGuard Web Filtering
The only solution with NO hardware required
Web Filtering Overview
Blocking inappropriate web surfing is critical not only to ensuring the security of your organization, but also to ensuring that your employees are productive, but web surfing is only a part of how employees spend their time. InterGuard Web Filtering is designed to extend your visibility beyond a simple list of URLs and give you a true understanding of whether or not your employees are acting in a safe and productive manner.
While other web filtering applications are simply designed to enforce acceptable use policies, InterGuard Web Filtering helps define the policies that it enforces by giving you total transparency into how your employees spend their time. With InterGuard, you wi’ll see everything from everywhere. No exceptions.
See everything with InterGuard Web Filtering
traditional solutions work only on a corporate network
InterGuard works on and off networks
saas ready – let us do the work for you
Traditional solutions require you to set up and support the infrastructure necessary to run a network-based solution. InterGuard on the other hand does not require any hardware, sets up in minutes and allows you to provide your organization with a superior solution at a fraction of the total cost of ownership of a network-based solution - and without the IT headaches.
 
The only solution with NO hardware requiredThe only solution with NO hardware required
Sonar records and controls all employee computer activity, increasing staff productivity, decreasing exposure to litigation and meeting compliance requirements related to privacy laws and regulations. Unique in the industry, Sonar does not require you to purchase any hardware.
The InterGuard Employee Monitoring Software application monitoring and blocking suite allows schedules to be set that control which software applications can be used and when. Time wasters such as Windows Media Player or iTunes can be blocked during work hours and allowed during off hours as desired. Dangerous applications, including FTP uploading or peer-to-peer programs like BitTorrent, can be permanently blocked. And of course, all activity is recorded and available to you in your online account.
Recognizing that a lot of work now gets done on mobile devices, InterGuard now offers MobileMonitor so you can monitor Smartphone emails and text messages from the same client interface you are using to monitor desktops. 
Block and record all employee computer activity
how sonar installs and works in four steps
Get activity reports instantly
InterGuard is the best laptop protection software in the industry. It protects organizations from financial and operational impacts of laptop theft by making the contents on a lost or stolen laptop accessible to the laptop owner, but not to the thief. InterGuard allows you to identify, track, and control who accesses data on a stolen laptop, what data is accessed, and what can and cannot be done with that data. InterGuard's single agent can be installed either at the time of laptop purchase or anytime afterward. It deploys and operates invisibly. When a laptop is lost or stolen, the InterGuard agent can be activated instantaneously by the rightful owner using any web browser.
The contents on the missing laptop can now be visualized and managed remotely in real time, on that web browser, without alerting the thief. This allows the owner to retrieve any and all files from the laptop, where they can be stored centrally or downloaded to another computer. Files, or the entire hard drive, can also be deleted. The data is deleted to the U.S. government’s 5220.22-M standard featuring multiple overwrites, random characters, and write verification. Laptop Cop sends back a confirmation that the files were deleted successfully.
InterGuard also provides real-time geo-location based on wi-fi hotspot tracking, which gives a higher degree of accuracy than GPS in most urban and suburban locations.. This evidence assists law enforcement in the recovery of a lost or stolen laptop, and is a far superior recovery method to simply trying to track by a computer’s IP address, which is fraught with problems. Because the IP address’ physical location can only be known by the ISP, it can take weeks or months in some cases to locate an address by this method. By that time, the computer is often in a totally different location.
Recent research shows the majority of lost or stolen laptops contain confidential company communications and information. Recent research has shown that laptop theft is now judged by CTOs to be the highest risk area for the loss of valuable company data. There are many partial solutions, including encryption and mapping data on laptops. None can restore lost data to its rightful owner. InterGuard can.
 
InterGuard Mobile Monitor for BlackBerry and Android
Monitor Cell Phone Messages & Know What's Leaving Your Organization with Mobile Monitor
Logging into your secure online account is all it takes to see a full record of messages sent & received from your employees' smartphone.
Mobile Monitor has an easy-to-use interface that can be viewed along with any other InterGuard module.
Interface - 
Mobile Monitor has an easy-to-use interface that can be viewed along with any other InterGuard module
Phone Call Tracking
Track all phone calls sent & received. See if calls were made, received, missed, or a conference along with duration and participant phone number details.
Email & Text Messages
MobileMonitor shows you the date, time, subject, sender and receiver of every email and text message sent from your organization
Geolocation - 
This feature pin-points where your tracked mobile phone currently is, and where it has been, using the on-board GPS tracking as other location-based services.
Photos - 
Capture and save all pictures taken and saved to the mobile phone or SD card. Plus, see additional details, like when the photo was taken, and its current filename for easy reference and locating on the device.
Alerts - 
MobileMonitor highlights alert words in the body of all recorded e-mails and text messages
Get Notified When You Need To Using Alert Words
Set custom alerts for any word that is important to you. Mobile Monitor will then scan all messages and highlight them directly for easy reviewing. Alert Words are set in an online account, eliminating the need to access the monitored phone once Mobile Monitor has been installed.
Easy Download, Install, & Review
Download & Install Mobile Monitor begins running in 2 simple steps:
 
1. Visit a secure InterGuard site from the target Smartphone
2. Select the license in your account to download and install
Mobile Monitor will immediately begin monitoring and recording messaging activity on the device, transmitting activity directly to your online account.
Review 
The data is transmitted immediately for review. Just log into your secure online account from any device to see a full record of messages - sent or received - from the mobile device. Activity reports and alert words can be accessed and managed from this single central location.
Remotely Protect Your Organization in 3 Easy Steps
Mobile Monitor for BlackBerry and Android Features

Geolocation

No hardware required
Never Lose Track of Your PC Again with Geolocation
InterGuard now offers real-time geolocation as an add-on feature for Web Filtering, Employee Monitoring or Data Loss Protection licenses. This new feature is based on Wi-Fi hotspot tracking, which gives a higher degree of accuracy than GPS.
What does Geolocation do?
Once installed, InterGuard with Geolocation will immediately begin tracking the PCs whereabouts by picking up available Wi-Fi hotspots and recognizing its physical location to within 60 feet of accuracy. This information will then be sent to your secure online account for quick, easy access no matter where you are!
What do I see?
Geolocation is laid out in the way you’re used to seeing - on a map! Current and historical positions will be available in a list form and placed on the map next to it. View details about the actual location, such as address, date/time, and the option to get directions to the location of the device. Filters are also available for speedily pinpointing where the PC was on any given day.
Now you can see where your PC is anywhere at anytime!
Geolocate
Does other Computer Monitoring Software have Geolocation?
Actually, no! InterGuard is the only computer monitoring software to offer geolocation as a part of the monitoring software suite. Since InterGuard is a remote computer monitoring software, recorded activity is accessible from a secure online account no matter where you are. Other monitoring software requires you to access the monitored PC in order to view recorded activity - this would defeat the purpose of real-time geolocation, don’t ya think?
There’s no need for dedicated hardware if you choose to host your solution with us. 
Internal threats can pose far greater dangers to your organization than spam, viruses, network attacks and other risks originating from outside. Yet most organizations have inadequate or no protection from these internal threats.
InterGuard is the solution. And it’s easy to implement and value-priced. There’s no need for dedicated hardware, or to maintain software. InterGuard is an on-demand, software-as-service solution.  This means you manage your risks, we manage the software. We have over 100,000 users of our core on-demand solution.
 
InterGuard insider threat prevention solutions
 
InterGuard provides a protective perimeter around your business and employees' computer activity, enabling you to:
  • Stop theft or loss of confidential data, including customer information, credit cards, health records, and Intellectual Property
  • Increase employee productivity
  • End risks, operational and financial damage from laptop theft or loss
  • Stop employees from breaking company policies
  • Improve regulatory compliance, eliminating fines, reputation damage and losses
With InterGuard, you replace multiple pieces of software (Data Loss Prevention, Web Filtering, eForensics, Endpoint Control, Laptop Theft) and get more functionality and protection – at less than 20% of the price of buying piecemeal solutions. Result: dramatically improved ROI.
 
Internal Threats – What are they and how to protect against them:
Your employees are your most valuable resource. Yet they are also often the source of the most serious challenges to protecting your confidential data, increasing productivity and profitability and assuring regulatory compliance.
employees on the go
These internal threats can be deliberate or accidental. But each has the potential to threaten financial performance, undermine your competitiveness and impact profitability. Internal threats are pervasive, cutting across all departments, functions and work flows.
Internal threats that our clients face everyday
  • Email wrongly sent out or cc’d to wrong recipient, revealing your company’s confidential strategic plans
  • Unmanaged internet use decreases productivity and harms bottom line financials wrongly circulated before regulatory submission to the SEC
  • Employee uses P2P application BitTorrent to download pirate copies of Hollywood movies
  • Executive loses company laptop containing employee health records
Security numbers and direct deposit bank account numbers pattern of inappropriate communications with co-worker leading to litigation
  • Soon to be ex-employee downloads CRM files to USB-flash memory and provides to competitor
  • Customer credit card numbers accessed by contractor without authorization
 
Click on each of the diagrams below to see how InterGuard’s suite of products can help you solve your internal security threats.
 
Our Patented Software Architecture
InterGuard Single AgentInterGuard has a unified core architecture, built on a patented Single Desktop Agent, to provide security against the widest range of internal threats. InterGuard enables you to deploy a consistent, comprehensive level of security on every computer throughout your entire organization. Our Single Agent operates invisibly at the desktop, instead of at the network level.
 
This is important for two reasons:
First, our software is easier and less expensive to implement than competitors, with far lower total cost of ownership.
Second, it affords a higher level of protection against a range of business risks from the theft or loss of valuable intellectual property and customer data, losses in employee productivity, theft of company laptops, employee misconduct and regulatory compliance.
 
InterGuard dashboard reportingInterGuard’s interoperable Single Agent reports back over standard HTTPS protocols, instead of over a network. This allows for real-time reporting of on or off-network activity and eliminates the need for dedicated hardware or complex network-level administration and integration. InterGuard is accessed and managed using a browser.
A central dashboard provides administrators with total visibility across their computer infrastructure, providing evidence of improper activity and highlighting potential weaknesses and areas of maximum vulnerability.
 
InterGuard Benefits
  • Reduces exposure to threats
  • Deploys quickly and easily on Windows platforms
  • Ensures consistent policy enforcement
  • Provides complete audit of each employee’s usage
  • Improves and streamlines regulatory compliance
  • Simplifies administration with a single management console for all employee computer activities
  • Scales to meet the needs of any size enterprise or government agency
  • Lowers total cost of ownership
 
InterGuard is being used by small, medium and large organizations all over the world
Here are just a few of the industries that are successfully using InterGuard to address the challenges posed by internal threats:
Education
As cyber bullying and other digital threats become more and more prevalent, schools face the difficult task of implementing a cost-effective solution that can actually protect their student bodies, and not just deliver the illusion of security. With InterGuard’s broad feature set and SaaS-based architecture, educational institutions finally have a solution that they can rely on.
Education Security Concerns
The key problem facing educational institutions is that they do not have the necessary level of visibility into the student body’s activities to secure all present vulnerabilities. From keeping underage students safe online, to protecting the credit card information on file for tuition payments in higher education, school administrators are becoming more and more aware of the need to go beyond enforcement.By gaining visibility into what sites students visit, and what they do once they are there as well as who has access to sensitive data behind the scenes, parents and administrators gain a purview into a world beyond the physical confines of the school. Since the Internet is far reaching and dynamic, school administrators need an agent-based, cloud-ready tool like InterGuard that not only deals with today’s threats, but identifies the threats of tomorrow as well.Awareness Technologies has developed solutions aimed at removing the cost and complexity of addressing the unique concerns of educational institutions of all sizes.
 
Financial Services
In today’s volatile market, ensuring the security of all sensitive data is critical to an organization’s survival. Awareness Technologies’ Unified Internal Threat Management solution allows banks of all sizes to provide uniform coverage across their entire organization, including remote and traveling employees. This architectural advantage closes the holes left by traditional internal threat solutions, and allows financial institutions to effectively address both information security and increasingly rigorous demands of regulatory compliance. 
Financial Services Compliance Requirements
Regulatory compliance is a complex and expensive endeavor, and the burden is the same for large and small institutions alike. The resources that companies have at their disposal to comply with the ever-growing demands of regulators and to defend against the myriad vulnerabilities inherent in data security, however, vary wildly. That’s why Awareness Technologies has focused its development on delivering managed solutions that lift the burden of compliance and security off of the shoulders of the organizations themselves. 
Sarbanes Oxley Act (SarbOx)
The legislation set new or enhanced standards for corporate accounting practices. The act contains 11 titles, or sections designed to increase the stringency of the guidelines that accounting practices must conform to. The act also covers issues such as auditor independence, corporate governance, internal control assessment, and enhanced financial disclosure. 
Gramm-Leach-Bliley Act (GLBA)
The "Gramm-Leach-Bliley Act" or GLBA, also know as The Financial Modernization Act of 1999, includes provisions to protect consumers’ personal financial information held by financial institutions. GLBA contains several stipulations that increase the data security requirements of all financial services institutions. The three principal parts to the privacy requirements: the Financial Privacy Rule, Safeguards Rule and pretexting provisions. 
Regulation S-P (Reg S-P)
An extension of GLBA, Regulation S-P details the rules regarding the requirements and restrictions on a financial institution's ability to disclose nonpublic personal information about consumers. The SEC is currently reviewing the rules in light of the increasing number of security breaches. In a move that demonstrates growing regulatory requirements in general, the SEC’s proposed amendments would expand the rule’s areas of coverage to include additional types of information that must be protected, and well as increasing the overall scope of who must comply. 
Federal Rules of Civil Procedure (FRCP)
The FRCP govern the court proceedings for civil trials. The rules cover elements of disclosure, and mandate that financial institutions must be able to provide electronically stored information relevant to a civil case. 
Unparalleled Solutions for Financial Services
Awareness Technologies has developed solutions aimed at removing the cost and complexity of addressing the compliance and security of financial institutions of all sizes. 
 
Healthcare
InterGuard’s healthcare-specific policies make it easy for healthcare providers to comply with regulatory mandates. Recognizing the burden that these unique regulations place on healthcare organizations, InterGuard was designed from the ground up to be easy to implement and use. 
Healthcare Compliance Requirements
Healthcare organizations have historically struggled to securely transition from their analog roots of pen and paper to the more agile digital world that other industries have long since adopted. The rigors of the regulatory compliance surrounding electronic Protected Health Information (ePHI) places a tremendous burden on healthcare organizations to ensure that they both understand the vulnerabilities that they face, and have a security plan to effectively address them. That’s why Awareness Technologies has focused its development on delivering managed solutions that lift the burden of compliance and security off of the shoulders of the organizations themselves. 
Health Insurance Portability and Accountability Act (HIPAA)
The Health Insurance Portability and Accountability Act, or HIPAA, was passed and finalized in 1996. The Act sets national standards for the protection of individual medical information. The act was passed by Congress as a response to the growing concern of easy accessibility to patient information.In February of 2009, President Obama signed the Health Information Technology for Economic and Clinical Health Act (HITECH). This act extends certain aspects of HIPAA regarding security and privacy requirements. It additionally mandates the federal security breach reporting requirements for compromised ePHI.Awareness Technologies has developed solutions aimed at removing the cost and complexity of addressing the compliance and security of healthcare institutions of all sizes.
 
Government, Law Enforcement
Governmental agencies face ever-increasing pressure to do more with their existing resources. InterGuard’s SaaS-based architecture allows them to do just that. InterGuard delivers 360 degree protection, no matter how the agency is structured. As the only Unified Internal Threat Management solution, InterGuard is the next generation of data protection.
By delivering technologically elegant solutions in a SaaS form factor, Awareness Technologies has positioned itself as an ally in the quest to secure both students and the sensitive data stored an in motion across the entire organization – both on and off the network. ATI solutions are trusted by over 10,000 schools and companies world wide to provide an unparalleled level of visibility and control over computer activity and sensitive data. For more information on the specific solutions that ATI offers.
You are about to log into the Test Drive user interface 
We've installed InterGuard (DLP, Employee Monitoring, Laptop Recovery) onto some test computers so you can see exactly how the software works without having to download or install anything.
 
 
Quantity
Price per license (USD)
1 to 9
$147.00
10 to 24
$99.00
25 to 99
$87.00
100+
Contact us
  • Communications Monitoring (email,IM,webmail)
  • Web Monitoring & Filtering (record/block web surfing)
  • Keystroke Monitoring (record all keystrokes typed)
  • Software Application Module (monitor/block program use)
  • Screenshot Module (take screenshots of any activity)
  • Print Tracking
Quantity
Price per license (USD)
1 to 9
$25.00
10 to 24
$20.00
25 to 99
$15.00
100+
Contact us
Includes Blocking & URL Monitoring, Searches Performed and Email Notifications
Quantity
Price per license (USD)
1 to 9
$127.00
10 to 24
$99.00
25 to 99
$87.00
100+
Contact us
Email Leak Prevention (includes Webmail)
  • Automatic policy enforcement based on scan of outgoing content
  • Prevent leakage via email bodies and email attachments
  • Be alerted to all policy violationsEndpoint (USB) Device Leak Prevention
  • Automatic policy enforcement based on scan of outgoing content
  • Prevent leakage via external and removable devices
  • Be alerted to all policy violations
Quantity
Price per license (USD)
1 to 9
$55.00
10 to 24
$49.00
25 to 99
$43.00
100+
Contact us
  • Stolen Asset Recovery
  • Remote File Retrieval
  • Remote Data Deletion
  • Geolocation Tracking
Quantity
Price per license (USD)
1 to 9
$89.00
10 to 24
$69.00
25 to 99
$57.00
100+
Contact us
Get mobile communications & activity transparency.
See emails, SMS/text messages, photos, phone calls sent & received, and geolocation.
 
Quantity
Price per license (USD)
1 to 9
$19.00
10 to 24
$17.00
25 to 99
$15.00
100+
Contact us
  • Pinpoint laptop locations, past and present, on a map.
  • Available as an add-on to Employee Monitoring, Web Filtering, and/or Data Loss Protection