Security Curator

box (1)

Security Curator

Security Curator – is the next generation corporate data security and data loss prevention system, which provides activity monitoring, logging, employee control and application – access blocking solutions.

Download Trial

Security Curator is a software product designed to provide information security for your company, including monitoring and control of personnel to improve business efficiency.
Security Curator is the next generation corporate data security and data loss prevention system, that provides activity monitoring, logging, employee control and application/access blocking solutions.
Main Features of Security Curator:
  • Main Features of Security Curator:.
  • Employee performance and main information leakage channel control. Allows the turning off or blocking of any kind of application, process, file/folder activity, website or instant messenger. Each violation will be reported to the administrator.
Security Curator allows highly efficient employee monitoring. Almost all staff PC activity can be exposed by logging:
Журнал Событий
  • Website visits
  • Downloaded files from the Internet
  • Corporate and personal e-mail correspondence
  • Correspondence in instant messengers (ICQ/MSN, Skype, etc.)
  • All key strokes for a given application (including passwords: text beyond *****, system keys, etc.)
  • Running applications
  • Software installation/de-installation
  • User actions within files: for example, creating, deleting, editing, copying
  • Printed documents and files
Activity logging allows you to evaluate the effectiveness of personnel, measure the duration of inappropriate use of time and identify potential sources of confidential information leakage.
Security Curator provides online monitoring of almost all employee activity at a work computer: Фильтрация данных по часам и дням недели
  • Updates activity information in real time
  • Performs network surveillance by taking periodic snapshots of computer screens
  • Provides opportunity to monitor user’s desktop online
  • Backs up files from USB devices
  • Offers storage of e-mail attachments in the database
  • Takes application screen shots, allowing for the reading and recording of correspondence
With Security Curator you can keep your company’s confidential information under control. The start of any activity, application or process may be denied or canceled, including:
  • Blocking the launch of a program
  • Restriction of access to all or certain websites
  • Denial of access to certain files and operations (deleting, editing, copying)
  • Blocking correspondence with certain contacts in ICQ/MSN, etc.
  • Notification of any violation of security policy
  • Monitoring and blocking of network connections (by port or IP address)
Implementing Security Curator allows you to restrict access to undesirable websites, programs and applications for a certain period of time or permanently.
Simple  review and analysis of statistical data via a system of records. This system allows you to see where and how much time employees spend at work on the computer, in both absolute figures and percentages. 
  • Detailed statistical reports that track the start and stop of programs’ launch and times that they are modified
  • Easy-to-understand data charts greatly improve the understanding of statistical information
  • Powerful filtering of data system
  • Ability to search data by keyword
  • The possibility of agents grouping

Features of Security Curator

 
Security Curator - The software is designed to provide security to corporate information and DLP, as well as monitor and control personnel in order to improve efficiency.
Main features of the programm:
Monitoring Logging
  • Desktop monitoring
  • E-mail correspondence
  • Correspondence in ICQ / MSN, Skype, etc.
  • Running processes
  • Installation/de-installation of programs, as well as startup and shutdown
  • Sites visited
  • Keystroke recording
  • Screenshot recording
  • Backup of files from USB-devices and e-mail attachments
Control Statistics and reporting
  • Block of processes and actions
  • Security policy violation notification
  • Monitoring and blocking network connections (by port or IP address)
  • Detailed statistical reports track the launch and closure of programs
  • The ability to search data by keyword and filter
  • The option to group agent monitoring
 
Monitoring
The system provides highly efficient staff monitoring solutions. The following actions of employee PCs can be tracked, monitored and analyzed:
  • Desktop monitoring with the saving of screenshots at a given time interval
    With Security Curator, you can observe what an employee sees on the screen of his or her monitor, or choose to view periodic screenshots, which will be stored and available in reports. The program allows you to set the frequency of screenshot taking, as well as the maximum amount of disk space occupied by stored files.
  • E-mail correspondence
    You can control all sent items, including the contents of letters and applications, sender names and addresses. All types of email clients are supported. Why is this necessary? Mail is one of the main routes of data leakage—  it is easy to attach a confidential document to a letter and send it by e-mail to competitors. With Security Curator, any information leakage can be detected in a timely manner and prevented.
  • Correspondence in ICQ / MSN, Skype, etc.
    Security Curator allows you to track communication on ICQ and MSN. The program records the names of those conversing, using the UIN number for ICQ and contact name in MSN. In addition, the program records who is in contact with the user, as well as types of messages (incoming or outgoing), time of sent or received messages, and, of course, the message content. The program keeps tracks of user conversations and enables searches of correspondence data.
  • Running processes
    The software monitors the processes running on an employee’s computer. The following information about processes is shown: full file path of the process, process name, and time of launch. The data is stored for later analysis and is available in the records.
  • Installation/de-installation of programs, as well as startup and shutdown
    Security Curator allows you to track which programs have been installed on or removed from a working computer, along with the user responsible for installation and the time programs were installed. You may also monitor whether employees are running a program (such as an accounting system) outside of working hours— this helps to reveal and prevent leakage of confidential information, which can be extracted and copied only if programs are running.
  • Sites visited
    Security Curator monitors all visited websites, and makes available the URL, page title, the page’s opening time and duration of activity on the page. All types of Web browsers are supported. The data are stored for later analysis and reports.  Security Curator utilizes a different mechanism than those used by typical browser “History” functions to gather visited website statistics. Thus, employees are unable to remove this information by clearing browser history.
Logging
The system logs almost all employee computer activity:
  • Keystroke recording
    All keystrokes are recorded to prevent possible data leaks. You can see the key logger reports in real-time, as well as access them by date and time. Security Curator also captures passwords and system keystrokes (CTRL, SHIFT, ALT, CAPS LOCK, etc), further increasing the level of information protection.
  • Screenshot recording
    Security Curator software can perform network surveillance by taking periodic snapshots of computer screens. You can access computer desktops remotely in real-time and view screenshots of different time intervals. You may choose how often Security Curator takes screenshots. Times when computers are inactive can be excluded.
  • Backup of files from USB-devices and e-mail attachments
    Security Curator makes backups of e-mail attachments; all files sent via e-mail are encrypted and stored in a special folder. Security Curator also offers the function of shadow-copying files to and from USB devices (flash drives, HDD, MP3-players, phones, etc.). Copies of files are sent to the administrator or stored in a special folder.
Control
With Security Curator, you can keep your company's information under control. The start of any action may be denied or revoked, including:
  • Block of processes and actions (launching of applications, sites opening, ban of certain file operations)
    Implementing Security Curator allows you to restrict access to undesirable sites, programs and applications for a certain period of time or permanently. For example, an employer may allow employees to visit Facebook only during lunchtime, or ban access to an accounting program after the end of workdays and on weekends. You may also prevent any file operation, such as the copying of information, its removal or any changes.
  • Security policy violation notification 
    Security Curator can be configured in such a way that the program will notify the administrator of any security violation (a list of these should be provided to employees in advance). For example, the violation could be typing a particular word.
  • Monitoring and blocking network connections (by port or IP address)
    The software allows you to block access to specific IP addresses or access to certain ports. This feature can be useful for limiting access to torrents or other potentially dangerous servers. There is also an option to completely block Internet access.
Statistics and reporting
Review and analysis of statistical data is simplified through a record system. The system allows you to see applications accessed by employees and how much time they spend at work on the computer, both in absolute terms and percentages.
  • Detailed statistical reports track the launch and closure of programs
    The software records the exact time when work computer applications are launched and disabled. In addition, it can track user login/logout times, allowing you to record the working hours of employees.
  • The ability to search data by keyword and filter
    You can quickly search data reports by keywords related to confidential information, unwanted sites and programs.
  • The option to group agent monitoring
    Highly simplifies the process of monitoring employees. Employees can be grouped by any criteria or attribute. For example, forms and extent of surveillance may differ between the accounting and sales departments.
Who need Security Curator?
The decision to implement Security Curator software may be made by management or by other professionals responsible for corporate security or employee.
Management
It is crucial for management to stay informed about all actions, processes and situations within a company: i.e., how the staff’s time is spent. According to statistics, the primary source of information leakage is through negligence or staff action. This leakage may cause confidential information to be transferred to competitors or made public.
Feature
What do you get?
Monitoring of correspondence in ICQ , MSN and other IM
Information about all activities on staff member computers
List of websites visited
Desktop monitoring with a screenshot-saving feature at any given time interval
Savings, through more efficient use of employee time and optimization of business processes
Detailed statistical reports with process- and program-launch tracking
Monitoring of running processes and programs
Confidence in the safety and security of commercial corporate data
Monitoring of backup files; files copied to external devices and e-mail attachments
Often, information security specialists are responsible for compliance with trade secrets and confidential information. Any potential leakage of information must be timely detected and prevented by these specialists. But with Security Curator, you are the guardian of your corporate data, informed of and protected against potential dangers. The software has a built-in keyword search for reports, charts, and statistics. It is extremely easy to detect correspondence in ICQ, MSN and other instant messengers, letters and websites that may be related to a breach of information security policy.
Feature
What do you get?
Control of USB devices and printers function
Ability to detect printing or copying of confidential information.
Observation of employee email correspondence
Ability to identify communication with competitors, recruitment agencies and other unwanted contacts.
Monitoring of ICQ, MSN and other IM correspondence
Monitoring of all files and folders
Confidence in the safety and security of commercial corporate data
Block of any program or applicaton launching
Why Security Curator?
Security Curator is a software product designed to provide information security for your company, including monitoring and control of personnel to improve business efficiency.
The software allows you to:
  • Detect and prevent possible information leakage.
  • Find out the most time-consuming computer processes run by each and every staff member.
  • Block access to prohibited websites and files.
  • Improve the efficiency of individual departments as well as the company in general.
  • According to statistics, most information outflow occurs due to negligence of staff or through a deliberate employee leak. In order to prevent information leakage in a timely manner, employee work computer activities may be constantly monitored.
Logs can expose almost all activities performed on work computers. Activity logging allows the evaluation of personnel effectiveness. Logs record the duration of inappropriate time usage and can identify potential sources of confidential information leakage.
Information and man-hours are the main resources of modern companies. With Security Curator software, you can monitor, analyze and optimize the use of these resources in your company. With Security Curator, you can eliminate the possibility of improper employee use of time: simply block access to all objectionable sites and programs.
Productivity rises after the implementation of Security Curator. Implementation of staff monitoring increases the software’s productivity by several times.
Have you ever wondered about the effectiveness of your staff? Most people tend to think that they are working too much. They do not reflect on the fact that, according to their labor contracts, they are required to work full-time. Employees are often looking for possible ways to spend a workday doing less work: viewing entertainment and news websites, engaging in social networking and online games— all of these actions reduce staff productivity.

StaffCop and Security Curator product comparison

 
Here you can find the comparison table of DLP/Corporate Data Security and Monitoring software:
StaffCop Home Edition - Parental control and monitoring software. Made for home use on 1 PC, so there is no possibility to LAN-connect agent to admin's panel.
StaffCop Standard - PC user activity monitoring and corporate data security software. Best for small and large companies.
Security Curator - Corporate data security software with advanced application and process blocking feature. Security Curator may notificate of any violation of security policy. Designed for medium and large companies.
Probably the most frequently asked question is: "What is the difference between StaffCop Standard and Security Curator?"
Actually, StaffCop Standard is only about logging and monitoring - it tracks PC user activity - everything that's launched, opened, viewed, saved, uploaded, downloaded, visited, etc.
Security Curator - is much more powerful tool, that besides StaffCop's main monitoring and logging features, allows you to With keep your company's confidential information under control. The start of any activity, application or process may be denied or canceled - including blocking the launch of a program, restriction of access to all or certain websites, denial of access to certain files and operations (deleting, editing, copying), blocking correspondence with certain contacts in ICQ/MSN, etc. Implementing Security Curator allows you to restrict access to undesirable websites, programs and applications for a certain period of time or permanently. Also Security Curator provides administrators with the email/sms/other notifications of any violation of security policy of your company.
FEATURES STAFFCOP HOME EDITION STAFFCOP STANDARD SECURITY CURATOR
MONITORING
Desktop
Screenshots
Applications and Programs
Application and Program run time
Keylogger
Email correspondence monitoring
Copying of files attached to the email
Web Site monitoring
IM and Chat (ICQ / MSN / Mail.ru) monitoring
Skype monitoring
Social Network monitoring (Facebook, MySpace, LinkedIn, Twitter, VK, etc)
Search Term monitoring in Google, Yahoo, etc.
USB-device monitoring
Copying files from connected USB-devices
Interception of Printed files
Printed file monitoring
Installed/Uninstalled program monitoring
Work time monitoring (logging in / logging out)
Downloaded files / Uploaded files
File/Folder access monitoring
File/Folder activity monitoring
User activity monitoring
Screenshoting all activities (Skype monitoring opportunity)
FTP monitoring
Network connection monitoring (by Port and IP address)
SYSTEM FLEXIBILITY STAFFCOP HOME EDITION STAFFCOP STANDARD SECURITY CURATOR
Information Harvesting System customization
Adding more administrator modules
Terminal Server support
Monitoring customization (allows to track only necessary data)
Monitoring time settings (restrictions, customizations, sorting)
Operating on LAN (agent module connection to admin's panel via LAN connection)
SECURITY STAFFCOP HOME EDITION STAFFCOP STANDARD SECURITY CURATOR
Event Blocking (applications, websites, file activities)
Process launch blocking
USB-device connection/disconnection blocking
USB-device connection/disconnection blocking
Network connection blocking (by Port and IP)
File/Folder activity blocking
High security level for all modules
Data encryption
Password-protected Admin module
Password-protected connection with Agent
Separate encrypted information database
Stealth Mode
Alert SMS and Email notifications about all violations. User notification.
ADDITIONAL FEATURES STAFFCOP HOME EDITION STAFFCOP STANDARD SECURITY CURATOR
Report creation wizard
Visual reports (statistics, images, charts)
Application run time control
Report creation planner
Reports to email
Reports to FTP
Module remote installing/uninstalling
Agent module grouping
Sending messages from Admin module to Agents
Data search by keywords
Data filtering
36 43 47

Purchase Security Curator

 
Security Curator is licensed based on the number of users that you need to monitor (on 1 PC can be several users). Program license is perpetual. Also licensed users are qualified to receive free updates during the year. Please refer to per license pricing schedule below, and contact us at sales@unitedaddins.com for quantities above 500: 
Number of computers Price per 1 PC
1
$61
2-20
$58
21-50
$55
51-100
$52
101-300
$49
301-500
$45
500 +