SlideShare a Scribd company logo
1 of 19
Security CuratorIn-house Security and Monitoring solution AtomPark Software Inc.
AtomParkSoftware AtomPark Software Inc. is founded in 2001. Main niches are in-house security and Internet marketing software. Our team counts about 50 specialists within more than 50 countries.
Why Security Curator? More than 3 years of successful activity. Product is integrated in banking, financial, educational and management industries. It is full all-in-one security and monitoring solution that are flexible in making technical changes for big clients.
Because it’s easy! Simple and intuitive interface. Easy-to-use administrator’s control.
Security Curatoris massive Security Curator works on tens, hundreds or thousands computers. Security Curator do not charge network with any extra activities.
Our solution consists of 3 parts: User modules Administrative modules  Server
Security Curator features:
Screenshot Recording Periodic snapshots of the computer screen. Remote desktop access to any user computer. Report Wizard downloads all screenshots to the admin’s computer.
Application Monitoring View the list of application run in the network or on a particular PC. View performance reports on how many hours are spent in different applications. Tracking software calculates the total time spent on using every program.
E-mail Correspondence Control Security Curator records who the message was sent to/from, when, its content, including attachments. Attachments can be saved if necessary. All types of email clients are supported.
Web Site Monitoring Security Curator records: The page address (URL) and title Time of access and time spent on the web site. All types of Web browsers are supported.  You can see a list of opened Web sites  You can access a report about all sites visited by users in a specified time range. Security Curator doesn’t use Browser History, but makes it’s own
Keylogger All keystrokes are recorded  You can see the key logger reports in real-time Security Curator captures passwords and system keys
File and Folder Tracking Security Curator detects all file operations on PCs in the network. You can easily customize the report by tracking particular file types and events only Security Curator tracks opening, copying, modifying and deleting of all documents and files
Instant Messenger/ Chats recording Security Curator records MSN Messenger, ICQ and AOL Instant Messenger chats Security Curator records both incoming and outgoing messages. Chat history can be accessed in Reports and can be sorted by contact, day, time
Monitoring USB Devices Security Curator logs the use of USB devices Security Curator records the device name and the time of connection or disconnection. All types of USB devices are supported.
Recording User Login and Logout Security Curator logs user sessions by recording the time of computer turning on or off. Security Curator records user login and logout operations. This type of report allows to analyze students’ count being present at the exams or tests.
Analysis of activities on PCs with Report Wizard Report Wizard is an integral part of Security Curator that helps to analyze the performance of the whole class or each and every student for a defined time range. You can view the applications launched and used, the time spent, and get reports on any PC's activities Security Curator creates time sheet reports organized by application or any other kind activity
Strong Protection Security Curator module runs as a Windows system service.  Quite impossible for students to unauthorizedly manage, turn off or uninstall the agent
Sending Alert Messages Security Curator allows to send instant messages from the administrative module to any user module.  It makes simple to communicate with your students

More Related Content

What's hot

Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportAjit Gaddam
 
Operating System Security
Operating System SecurityOperating System Security
Operating System SecurityRamesh Upadhaya
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMfaraz hussain
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 
Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application SecuritySunipa Bera
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The SystemSteven Cahill
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 
It security
It securityIt security
It securityavi2607
 
Security on android
Security on androidSecurity on android
Security on androidpk464312
 
Goals of protection
Goals of protectionGoals of protection
Goals of protectionveena ali
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidyaSuraj Vaidya
 

What's hot (20)

Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Security
SecuritySecurity
Security
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 
System security
System securitySystem security
System security
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
It security
It securityIt security
It security
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Security on android
Security on androidSecurity on android
Security on android
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Goals of protection
Goals of protectionGoals of protection
Goals of protection
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidya
 
Os security issues
Os security issuesOs security issues
Os security issues
 
NetGains Infrastructure Security
NetGains Infrastructure SecurityNetGains Infrastructure Security
NetGains Infrastructure Security
 

Similar to Security curator presentation_eng

Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheetIS Decisions
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!Cireson
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlSymantec
 
Symantec Antivirus Management.pptx
Symantec Antivirus Management.pptxSymantec Antivirus Management.pptx
Symantec Antivirus Management.pptxbemnitekalegn
 
UserLock Datasheet
UserLock DatasheetUserLock Datasheet
UserLock DatasheetIS Decisions
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone pptLaxman Puri
 
unistal in-Protegent Security - Home Business 1
unistal in-Protegent Security - Home  Business 1unistal in-Protegent Security - Home  Business 1
unistal in-Protegent Security - Home Business 1Vijay Kumar
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfadinathfashion1
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfsagaraccura
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentationtsteh
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfableelectronics
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Trusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionTrusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionIBM Security
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 

Similar to Security curator presentation_eng (20)

Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheet
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
 
Symantec Antivirus Management.pptx
Symantec Antivirus Management.pptxSymantec Antivirus Management.pptx
Symantec Antivirus Management.pptx
 
UserLock Datasheet
UserLock DatasheetUserLock Datasheet
UserLock Datasheet
 
AGSL brochure
AGSL brochureAGSL brochure
AGSL brochure
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
 
unistal in-Protegent Security - Home Business 1
unistal in-Protegent Security - Home  Business 1unistal in-Protegent Security - Home  Business 1
unistal in-Protegent Security - Home Business 1
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdf
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentation
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Trusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionTrusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware Protection
 
Cyber-Security Package.pptx
Cyber-Security Package.pptxCyber-Security Package.pptx
Cyber-Security Package.pptx
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Security curator presentation_eng

  • 1. Security CuratorIn-house Security and Monitoring solution AtomPark Software Inc.
  • 2. AtomParkSoftware AtomPark Software Inc. is founded in 2001. Main niches are in-house security and Internet marketing software. Our team counts about 50 specialists within more than 50 countries.
  • 3. Why Security Curator? More than 3 years of successful activity. Product is integrated in banking, financial, educational and management industries. It is full all-in-one security and monitoring solution that are flexible in making technical changes for big clients.
  • 4. Because it’s easy! Simple and intuitive interface. Easy-to-use administrator’s control.
  • 5. Security Curatoris massive Security Curator works on tens, hundreds or thousands computers. Security Curator do not charge network with any extra activities.
  • 6. Our solution consists of 3 parts: User modules Administrative modules  Server
  • 8. Screenshot Recording Periodic snapshots of the computer screen. Remote desktop access to any user computer. Report Wizard downloads all screenshots to the admin’s computer.
  • 9. Application Monitoring View the list of application run in the network or on a particular PC. View performance reports on how many hours are spent in different applications. Tracking software calculates the total time spent on using every program.
  • 10. E-mail Correspondence Control Security Curator records who the message was sent to/from, when, its content, including attachments. Attachments can be saved if necessary. All types of email clients are supported.
  • 11. Web Site Monitoring Security Curator records: The page address (URL) and title Time of access and time spent on the web site. All types of Web browsers are supported. You can see a list of opened Web sites You can access a report about all sites visited by users in a specified time range. Security Curator doesn’t use Browser History, but makes it’s own
  • 12. Keylogger All keystrokes are recorded You can see the key logger reports in real-time Security Curator captures passwords and system keys
  • 13. File and Folder Tracking Security Curator detects all file operations on PCs in the network. You can easily customize the report by tracking particular file types and events only Security Curator tracks opening, copying, modifying and deleting of all documents and files
  • 14. Instant Messenger/ Chats recording Security Curator records MSN Messenger, ICQ and AOL Instant Messenger chats Security Curator records both incoming and outgoing messages. Chat history can be accessed in Reports and can be sorted by contact, day, time
  • 15. Monitoring USB Devices Security Curator logs the use of USB devices Security Curator records the device name and the time of connection or disconnection. All types of USB devices are supported.
  • 16. Recording User Login and Logout Security Curator logs user sessions by recording the time of computer turning on or off. Security Curator records user login and logout operations. This type of report allows to analyze students’ count being present at the exams or tests.
  • 17. Analysis of activities on PCs with Report Wizard Report Wizard is an integral part of Security Curator that helps to analyze the performance of the whole class or each and every student for a defined time range. You can view the applications launched and used, the time spent, and get reports on any PC's activities Security Curator creates time sheet reports organized by application or any other kind activity
  • 18. Strong Protection Security Curator module runs as a Windows system service. Quite impossible for students to unauthorizedly manage, turn off or uninstall the agent
  • 19. Sending Alert Messages Security Curator allows to send instant messages from the administrative module to any user module. It makes simple to communicate with your students