PRODUCT BRIEF. Product Brief ON-CLOUD / IN-PREMISES BASED STAFF TRACKING SOFTWARE

Size: px
Start display at page:

Download "PRODUCT BRIEF. Product Brief ON-CLOUD / IN-PREMISES BASED STAFF TRACKING SOFTWARE"

Transcription

1 PRODUCT BRIEF Product Brief ON-CLOUD / IN-PREMISES BASED STAFF TRACKING SOFTWARE

2 PRODUCT BRIEF 2 EPM Enhancing Productivity Metrics Enhancing Productivity Metrics - EPM is a simple, lightweight and easy to install cloudbased employee monitoring software which is designed to analyze and capture data such as internet usage, application usage and active time vs idle time of a user. EPM helps you increase the efficiency and performance of your workforce by giving you the firsthand information reports on various aspects which determine the efficiency of the workforce. EPM can track your on-site employees plus the employees on-field in a single portal dashboard. How does EPM work? EPM uses a tracking software application called Cloud-Agent or EPM- Agent which is custom built for each registered account. This cloud-agent is required to run in each and every computer which is to be monitored. For in-house deployments this cloud agent is replaced with EPM-agent. Once installed in a computer, the agent application will automatically start sending reports such as details of the websites opened, applications usage, idle time and screenshots (optional) to the secure cloud servers of EPM. End to end secure communication via HTTPS 128bit SSL is used to transfer the data from client to cloud server. The monitoring agent application runs in the background and cannot be terminated or uninstalled by end user. It can be uninstalled only using the uninstall program which can be downloaded from the EPM account login.

3 PRODUCT BRIEF 3 ONE CLICK REPORTS Simple representation of reports showing the login/logout time of the employees using which one can know who comes late to work or logs in late within a matter of few seconds. EPM gives you the option to know what is happening at your workforce! Most accessed websites? You can easily find out which were the most visited websites in your company in a second. Power of reporting is at your fingertips. How can EPM help you? EPM can help you in overall improvement of team efficiency. connection resumes back the data will be sent to EPM s cloud server. Increase the teams' productivity by counting each individual s input. It can save a lot in administrative costs and money spent on IT resources. EPM can also help you in identifying the misuse of internet resource. Who was wasting time? A simple graph explains who spent the time idling away and who was working. You get to know if your employees work actively during morning hours or afternoon. Your window to analyze the productivity. FAST FACTS 25% Up to 25% increase in employee productivity after installing EPM can be expected. 60% More than 60% decrease in idle time and waste of resources can be expected by the use of EPM. It can help you identify inside threat if there is any, by letting you know if anyone in your company is accessing your competitor s website or . EPM can be used to block websites or applications which are not relevant to your line of business. Simply by blocking applications such as VLC player, Windows media player and Quicktime along with websites such as Youtube and Vimeo you can actually cutdown complete access to employees who waste time on entertainment. EPM can work on off-line mode also. If there is a connection issue between EPM s cloud service and your end user s computer then the data is stored locally in that system in an encrypted form. Once the

4 PRODUCT BRIEF SECURITY EPM s cloud agent or in-premises agent does not monitor or record keyboard strokes, collect passwords or access any stored personal profile data. EPM s monitoring agent passes through toughest of security scanners and is qualified as safe application from every top internet security companies. EPM s cloud portal passes through tough screening test every 24hours from McAfee for safety and vulnerabilities. EPM s monitoring agent files are signed, verified, timestamped and authenticated by certified security certificates issuer Starfield USA. EPM ensures your data is secure and encrypted from end to end. We take data security very seriously and we know how precious it is! Consolidated Dashboard For On-Site employees + On-Field employees How does EPM work?

5 PRODUCT BRIEF 5 TWO VARIANTS of EPM Cloud based Solution & In-House based Solution ONE CLICK REPORTS Cloud Based EPM This mode of EPM securely sends the acquired data such as website usage statistics, application usage, system idle time vs active time, screenshots (optional) and internet usage patterns to the secure cloud servers hosted by EPM in Tier4 data centers. The transfer of data from client computer to our cloud servers is highly encrypted using 128-bit SSL standards and uses random salt for key encryption. The data thus transferred to the cloud servers reside in a secure database in an encrypted format which is unreadable unless until it is read through the portal using the relevant username and password combination. The screenshot images are stored in secure format under UNIX file system permission standards which are unlocked and shown when the user requests to view. Cloud mode of EPM is highly effective when you have many distributed offices and remotely located offices. This mode of EPM is required when you have on-field personnel also as a part of your team. In-Premises based EPM This mode is opted for companies and businesses whose IT policy and norms instruct the data collected by EPM to stay with-in its networks. In this mode EPM does not transfer any data to cloud network instead it interacts and sends the collected data to server / system running the EPM Server application in house. The EPM server requires a static IP or a DNS name to work in the LAN of the customer. The monitoring agent performs similar actions in the client side as that of cloud agent except that it does not send any data outside the network. The EPM server requires a license key to operate and is normally supplied with the number of hosts it is destined to handle. The EPM server is designed to run on Windows and can work on following Windows versions. Windows 7/8/8.1/10 32bit/64bit Windows server 2012 Active time vs Idle time A simple pie chart can give you an insight of your team s active time vs idle time. This report can be generated for months for whole team as well as one particular employee. On-Field user tracking EPM gives you the option to track your onfield employees also. You can track your onfield employee s whereabouts, the time spent on each place, travelled distance in Km. Alright... we even tell you the battery percentage. Attendance Chart Attendance chart gives you the granular idea of the time spent by an employee in a day at work. For an in-house employee the clock ticks from the time the system was turned on till it is turned off. For an on-field employee the working hours start from the time he signs-in and until he signs-out.

6 PRODUCT BRIEF 6 FEATURES IN A GLANCE Active and Idle Time tracking A system to track and report the details of the time spent by the employees will make your business productivity more efficient. EPM provides active/idle time spent in a system not only by an individual user but also gives the complete picture of productive usage of time by multiple users as a team. Website Usage Monitoring Employee Productivity Metrics (EPM) can also give you detailed analytics of the websites accessed by your employees and the time spent on each one of them. EPM does this by recording the usage patterns in the background and transfers the details to a secure cloud server. The reports are then built instantly as you access them in real time. Being a manager or a boss of a company, you can always have a firsthand view of what your employees are using the internet resources for! Application Usage Monitoring Employee Productivity Metrics (EPM) tracks the applications which are actively run by your team in their computers. About 1000* screenshots are stored per user in the cloud storage. Old screenshots get auto deleted to provide space for the new ones. Website & Application Blocking Employee Productivity Metrics (EPM) gives you the ability to decide which website needs to be blocked and which application is not allowed to run. You can add/remove any listed website or application to the block list in the cloud portal. In case, any end user tries to open a blocked website/application, it will be closed instantly. Every change made in the cloud server is communicated to end computers automatically within a minute. Attendance Monitoring Employee Productivity Metrics (EPM) also has the feature to perform attendance monitoring by giving a report of the in- and out-time of the user. The in-time/out-time is calculated on the basis of what time a computer is switched on and switched off. Using this report, you can easily estimate the overall in-time and out-time of each user as well as your entire company.if your pie chart report shows too many employees coming late, then you do have a reason to panic! EPM can track and report the usage patterns of multiple applications, record their usage times, classification of the application etc. For example, if yours is a law consultation firm and you notice too many of your users are using irrelevant applications like Photoshop, then you have a reason to praise EPM! Screenshot Captures Employee Productivity Metrics (EPM) can capture screenshots of your user's desktop and sends them to our safe cloud servers from where you can view what your user was doing at any given point of time. On-Field Employee Tracking GPS Location mapped attendance marking. Location update every 5 minutes. Client visit log with GPS and time mapping. Assign tasks to field users from cloud portal. Task completion update from app. Field user travelled distance in KMs.(approximated to ~5% accuracy) Monthly attendance report at a glance. Customizable with your logo which can be uploaded to portal. EPM takes screenshots at defined intervals by which you can review the work being done in the individual systems. Though this feature is optional you can enable or disable this based on your preference.

7 PRODUCT BRIEF Product Brief Enhancing Productivity Metrics is a product of Stanzatek Solutions LLP sales@epmetrics.com +91 (0)

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Six Ways to Protect your Business in a Mobile World

Six Ways to Protect your Business in a Mobile World Six Ways to Protect your Business in a Mobile World Mobile technology promises big rewards In a study of how mobility benefits businesses 1 77% say it helps drive business growth 61% say it boosts productivity

More information

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client.

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client. Introduction: Intended Audience The StrideLinx Remote Access Solution is designed to offer safe and secure remote access to industrial equipment worldwide for efficient remote troubleshooting, programming

More information

E-Registers Classroom Use

E-Registers Classroom Use E-Registers Classroom Use The following instructions are to assist teachers in completing their registers in the classroom. Class attendance is recorded in Today s Registers. You can navigate to the correct

More information

Virtual Office. Virtual Office Analytics An Overview. Version 1.0. Revision 1.0

Virtual Office. Virtual Office Analytics An Overview. Version 1.0. Revision 1.0 Virtual Office Virtual Office Analytics An Overview Version 1.0 Revision 1.0 Copyright 2015, 8x8, Inc. All rights reserved. This document is provided for information purposes only and the contents hereof

More information

Configuration examples for the D-Link NetDefend Firewall series DFL-260/860

Configuration examples for the D-Link NetDefend Firewall series DFL-260/860 Configuration examples for the D-Link NetDefend Firewall series DFL-260/860 Scenario: How to configure User Authentication for multiple groups Last update: 2008-04-29 Overview In this document, the notation

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

Here is a screenshot of the log in screen you will see at the above address:

Here is a screenshot of the log in screen you will see at the above address: BWM Client Portal Our portal address is: https://bwm.clientspace.co.uk Here is a screenshot of the log in screen you will see at the above address: Here is an example of how your portal will look on screen

More information

Helping you to be GDPR compliant

Helping you to be GDPR compliant Helping you to be GDPR compliant Helping you to be GDPR compliant 01 Privacy Compliance Dashboard Your campaign Privacy Compliance Dashboard is a transparent view where you identify the contact information

More information

MinutePad FAQs. Effective Meeting Software by. Tel: +44 (0)

MinutePad FAQs. Effective Meeting Software by. Tel: +44 (0) MinutePad FAQs GENERAL What is MinutePad? A secure cloud based, paperless meeting management solution that improves meeting effectiveness and facilitates better decision making. Who uses MinutePad? Anyone

More information

VMware Workspace ONE Intelligence. VMware Workspace ONE

VMware Workspace ONE Intelligence. VMware Workspace ONE VMware Workspace ONE Intelligence VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Sophos Mobile Control Administrator guide. Product version: 5.1

Sophos Mobile Control Administrator guide. Product version: 5.1 Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this

More information

Joomla User Guide Ver 3

Joomla User Guide Ver 3 LiveHelp Server Joomla User Guide Ver 3 Introduction The process of configuration and implementation of the LiveHelp server is divided into four stages, which are detailed below. The approximate time of

More information

Using the Portal. The Overview tab displays your Quick Links, announcements from your agency, recent documents, and a list of your agency contacts.

Using the Portal. The Overview tab displays your Quick Links, announcements from your agency, recent documents, and a list of your agency contacts. Using the Portal We are happy to provide you with access to your insurance information anytime via the web. By now you should have received an invitation email with information to activate your Portal

More information

Comodo SecureBox Management Console Software Version 1.9

Comodo SecureBox Management Console Software Version 1.9 6. Comodo SecureBox Management Console Software Version 1.9 Administrator Guide Guide Version 1.9.032817 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to

More information

McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention McAfee Total Protection for Data Loss Prevention Protect data leaks. Stay ahead of threats. Manage with ease. Key Advantages As regulations and corporate standards place increasing demands on IT to ensure

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation

More information

Get started with ReVirt

Get started with ReVirt Get started with ReVirt Index ReVirt 4 Key benefits 4 any.cloud and Veeam 4 Handling your data 4 Payment and upgrades 5 Trial subscription 5 Terms for resellers 5 Veeam licenses 5 Safety with Veeam Cloud

More information

Black Diamond Investor Experience - Frequently Asked Questions

Black Diamond Investor Experience - Frequently Asked Questions Black Diamond Investor Experience - Frequently Asked Questions Document Storage/Document Vault How much document storage is available? Each advisor (firm user) has one (1) GB of storage available, per

More information

Xerox Mobile Print Solution

Xerox Mobile Print Solution Software Version 2.5 Version 1.3 Xerox Mobile Print Solution Information Assurance Disclosure Xerox Mobile Print Solution Copyright 2012 Xerox Corporation. All rights reserved. Includes Material Copyright

More information

Community Edition Getting Started Guide. July 25, 2018

Community Edition Getting Started Guide. July 25, 2018 Community Edition Getting Started Guide July 25, 2018 Copyright 2018 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the

More information

Accessing CharityMaster data from another location

Accessing CharityMaster data from another location Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto

More information

3CX Mobile Device Manager

3CX Mobile Device Manager 3CX Mobile Device Manager Manual 1 Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples

More information

Cloud Security Whitepaper

Cloud Security Whitepaper Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4

More information

Want to make it. your. own device? OFFICE PRODUCTS

Want to make it. your. own device? OFFICE PRODUCTS Want to make it your own device? OFFICE PRODUCTS Choose Develop Every industry faces diferent challenges. Every business has diferent needs. Yours is no exception. At Develop we are focused on meeting

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS

More information

Business Insights Dashboard

Business Insights Dashboard Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks

More information

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

SECURITY AND DATA REDUNDANCY. A White Paper

SECURITY AND DATA REDUNDANCY. A White Paper SECURITY AND DATA REDUNDANCY A White Paper Security and Data Redundancy Whitepaper 2 At MyCase, Security is Our Top Priority. Here at MyCase, we understand how important it is to keep our customer s data

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

User Guide Site Administrator User Guide

User Guide Site Administrator User Guide Site Administrator User Guide TABLE OF CONTENTS COVER PAGE... 1 TABLE OF CONTENTS... 2 Welcome to Workplace Management Systems Inc. Online Training Program... 3 Workplace Management Home Page... 4 Information

More information

EASY TIME & ATTENDANCE POWERED BY THE CLOUD

EASY TIME & ATTENDANCE POWERED BY THE CLOUD EASY TIME & ATTENDANCE POWERED BY THE CLOUD TIME & ATTENDANCE SOLUTIONS 3 SIMPLIFY EMPLOYEE MANAGEMENT Looking for a single, easy-to-use system that can handle all your timesheet, scheduling and reporting

More information

MobileIron Quick Installation Guide

MobileIron Quick Installation Guide For Goose Workforce Management System Copyright 2018 FieldLogix 1 By FieldLogix Version 1.0.2 February 2018 Copyright 2018 FieldLogix Permission is granted to copy, distribute and/or modify this document

More information

Mobile Security using IBM Endpoint Manager Mobile Device Management

Mobile Security using IBM Endpoint Manager Mobile Device Management Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?

More information

Supplier Engagement (HE): Dashboard Guidance

Supplier Engagement (HE): Dashboard Guidance Supplier Engagement (HE): Dashboard Guidance Logging in To access your data, you will need to click on the About You tab and enter your username and password. These will have been supplied to you on sign-up

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 5.1 Program Overview Contents About the Program Ekran Server & Management Tool Database Management Licensing Client Installation Monitoring Parameters Client Protection Advanced User Authentication

More information

McAfee MVISION Mobile MobileIron Integration Guide

McAfee MVISION Mobile MobileIron Integration Guide McAfee MVISION Mobile MobileIron Integration Guide Administrator's guide for providing Integration with MobileIron MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

Call Centres (ACD) Manual

Call Centres (ACD) Manual Call Centres (ACD) Manual Description Use the Call Centre ACD feature if you want to allow a Site to distribute incoming calls to multiple Users from a single central phone number. TelephoneSystems.Cloud

More information

Assessment - OMS Gateway and Data Collection Machine Setup. Prerequisites

Assessment - OMS Gateway and Data Collection Machine Setup. Prerequisites Assessment - OMS Gateway and Data Collection Machine Setup Prerequisites Ensure that you have reviewed the information in the assessment s prerequisites and configuration document before continuing the

More information

Comodo One Software Version 3.3

Comodo One Software Version 3.3 rat Comodo One Software Version 3.3 Patch Management Module Administrator Guide Guide Version 2.2.101316 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1 Introduction

More information

Achieve more with 15 Productivity Tips for Office

Achieve more with 15 Productivity Tips for Office Achieve more with 15 Productivity Tips for Office Mission Worldview Strategy Ambitions How do you empower your mobile workforce? Can my employees be productive outside the office? How do we stay productive

More information

XO Stats: User Guide. Monitor your circuit performance, troubleshoot, and plan future network capacity requirements

XO Stats: User Guide. Monitor your circuit performance, troubleshoot, and plan future network capacity requirements XO Stats: User Guide Monitor your circuit performance, troubleshoot, and plan future network capacity requirements XO Stats is a web-based portal that allows you, an XO Communications data and Internet

More information

NetBackup Collection Quick Start Guide

NetBackup Collection Quick Start Guide NetBackup Collection Quick Start Guide This whitepaper is intended for IT professionals, IT managers, and IT personnel responsible for the planning, setup, and/or administration of Veritas Information

More information

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them BROTHER SECURITY WHITE PAPER NOVEMBER 2017 SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them The last decade has seen many exciting advances in connectivity

More information

2015 Mobiliya. All Rights Reserved Page 2

2015 Mobiliya. All Rights Reserved Page 2 Contents About this Guide... 3 Getting Started... 3 About Mobiliya Shoonya... 3 Key Features... 3 Add-on Features... 4 1. Sign In... 5 2. Admin Dashboard... 6 1. Licenses... 6 2. Users... 7 3. Devices...

More information

CSCDomainManager Frequently Asked Questions

CSCDomainManager Frequently Asked Questions CSCDomainManager Frequently Asked Questions What are the benefits of migrating to CSCDomainManager? CSCDomainManager SM provides you with the ability to: Manage all your digital assets through one portal,

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

incontact On-Demand User Guide for Premises 16.2

incontact On-Demand User Guide for Premises 16.2 incontact On-Demand User Guide for Premises 16.2 www.incontact.com incontact On-Demand User Guide for Premises 16.2 Version 16.2 Revision June 2016 About incontact incontact (NASDAQ: SAAS) is leader in

More information

2016 BITGLASS, INC. mobile. solution brief

2016 BITGLASS, INC. mobile. solution brief mobile solution brief BYOD Security has been a constant challenge for many enterprises. Stories of failed MDM deployments are rampant, with firms struggling achieve meaningful adoption. According to the

More information

SECURE DATA EXCHANGE

SECURE DATA EXCHANGE POLICY-DRIVEN SOLUTIONS FOR SECURE DATA EXCHANGE Sending and receiving data is a fundamental part of daily business for nearly every organization. Companies need to share financial transaction details,

More information

nddprint 360 White Paper - Corporate Printing

nddprint 360 White Paper - Corporate Printing White Paper - Corporate Printing nddprint 360 nddprint 360 is a complete control, optimization and discipline solution for corporate printing environments. Nowadays, there is a greater need to control

More information

FilesAnywhere Features List

FilesAnywhere Features List FilesAnywhere Feature List FilesAnywhere Page 1 of 9 Contents Basic Features... 3 Advanced Features... 7 Enterprise Features... 9 FilesAnywhere Page 2 of 9 Basic Features No File Size Limit: There is no

More information

IP Centrex Administrator Guide Release 2.0

IP Centrex Administrator Guide Release 2.0 IP Centrex Administrator Guide Release 2.0 2012 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic, mechanical,

More information

CloudHealth. AWS and Azure On-Boarding

CloudHealth. AWS and Azure On-Boarding CloudHealth AWS and Azure On-Boarding Contents 1. Enabling AWS Accounts... 3 1.1 Setup Usage & Billing Reports... 3 1.2 Setting Up a Read-Only IAM Role... 3 1.3 CloudTrail Setup... 5 1.4 Cost and Usage

More information

Barracuda NextGen Report Creator

Barracuda NextGen Report Creator The creates customized reports using statistics and logs collected on Barracuda NextGen F-Series Firewalls. Each report can be configured to use multiple appliances, custom or predefined report data templates,

More information

McAfee MVISION Mobile Threat Detection Android App Product Guide

McAfee MVISION Mobile Threat Detection Android App Product Guide McAfee MVISION Mobile Threat Detection Android App 1809.4.7.0 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Knowingo + Dashboard Manual

Knowingo + Dashboard Manual Knowingo + Dashboard Manual Introduction The purpose of this manual is to provide current Knowingo + users with references and instructions on how to utilize the Knowingo + Dashboard. The contents of this

More information

Comodo Unknown File Hunter Software Version 5.0

Comodo Unknown File Hunter Software Version 5.0 rat Comodo Unknown File Hunter Software Version 5.0 Administrator Guide Guide Version 5.0.073118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo

More information

Tableau Server - 101

Tableau Server - 101 Tableau Server - 101 Prepared By: Ojoswi Basu Certified Tableau Consultant LinkedIn: https://ca.linkedin.com/in/ojoswibasu Introduction Tableau Software was founded on the idea that data analysis and subsequent

More information

Onboarding Guide. ipointsolutions.net (800)

Onboarding Guide. ipointsolutions.net (800) Onboarding Guide ipointsolutions.net (800) 535-4101 Support@iPointSolutions.net Table of Contents Server / Hardware / Network Requirements Server Requirements... 3 Supported Operating Systems... 3 Server

More information

CAN MICROSOFT HELP MEET THE GDPR

CAN MICROSOFT HELP MEET THE GDPR CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com

More information

Mobile Android Guide for Users

Mobile Android Guide for Users Mobile Android Guide for Users Version 19.01 SP-WX-MBLAND-UG-201706--R019.01 Sage 2017. All rights reserved. This document contains information proprietary to Sage and may not be reproduced, disclosed,

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

challenge walk ms: participant Center guide 3 days. 50 miles. connect to end multiple sclerosis Join a community of spirit & Strength

challenge walk ms: participant Center guide 3 days. 50 miles. connect to end multiple sclerosis Join a community of spirit & Strength challenge walk ms: participant Center guide 3 days. 50 miles. connect to end multiple sclerosis Join a community of spirit & Strength Table of contents Why Use Online Fundraising Tools...1 Online Security...1

More information

owncloud Android App Manual

owncloud Android App Manual owncloud Android App Manual Release 2.0.0 The owncloud developers December 14, 2017 CONTENTS 1 Using the owncloud Android App 1 1.1 Getting the owncloud Android App...................................

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Comodo Dome Shield - Admin Guide

Comodo Dome Shield - Admin Guide rat Comodo Dome Shield Software Version 1.12 Administrator Guide Guide Version 1.12.111717 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo Dome

More information

Information for Business Group Administrators

Information for Business Group Administrators Information for Business Group Administrators Integrated ACD for Business Group Administrators Integrated ACD allows Business Group Administrators to see detailed statistical information on the activity

More information

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS White Paper Table of Contents Executive Summary... 3 Audience.... 3 Introduction.... 3 Architecture....

More information

Wisconsin. Fundraising Support Center: Wisconsin Chapter:

Wisconsin. Fundraising Support Center: Wisconsin Chapter: Walk MS: Wisconsin 2015 Participant Center Guide Wisconsin BE INSPIRED. Get connected. Walk MS. Fundraising Support Center: 855-372-1331 Wisconsin Chapter: 262-369-4400 Table of contents Be inspired. Get

More information

McAfee MVISION Mobile AirWatch Integration Guide

McAfee MVISION Mobile AirWatch Integration Guide McAfee MVISION Mobile AirWatch Integration Guide Administrator's guide for providing Integration with AirWatch MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and

More information

Microsoft Security Management

Microsoft Security Management Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their

More information

Come see what you re missing... Sign up for a free trial! Go to

Come see what you re missing... Sign up for a free trial! Go to Management Software What are you looking for in volunteer management software? Intuitive interface Customized volunteer profiles Desktop and mobile online volunteer portals Reporting on hours, outputs,

More information

We start by providing you with an overview of the key feature of the IBM BPM Process Portal.

We start by providing you with an overview of the key feature of the IBM BPM Process Portal. Lab 1 Process Portal 1.1 Overview This lab exercise will make you familiar with the key capabilities of the ready-to-use Process Portal included with IBM Business Process Manager (BPM). You will experience

More information

Sage 300 People & Web Self Service Technical Information & System Requirements

Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People Architecture The Sage 300 People application is a 2-tier application with the program and database residing

More information

Professional Lock Management

Professional Lock Management Professional Lock Management Benefits The industry-leading Register & Retrieve Lock Management Portal is a smart cloud-based platform for the management of all Kensington locks. Providing IT managers and

More information

HELLO! WELCOME TO UPAYCHILLI

HELLO! WELCOME TO UPAYCHILLI HELLO! WELCOME TO UPAYCHILLI LET US SHOW YOU AROUND! UpayChilli New User Guide CONTENTS WELCOME TO UPAYCHILLI PAGE 3 LOGIN PAGE 4 ACCOUNT MENU PAGES 5-7 PAYG TOP-UP PAGE 8 AUTO TOP-UP PAGE 9 TOP-UP REMINDER

More information

Administration Guide

Administration Guide Administration Guide Version 2.0 November, 2015 Biscom, Inc. 321 Billerica Rd. Chelmsford, MA 01824 tel 978-250-1800 fax 978-250-4449 CONTENTS 1. Initial Configuration and Settings...1 1.1 Application...

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

PROFITstar, PROFITability, Profitstar Suite, and PROFITstar Portfolio. Installation Guide For Clients Moving from the 2012 Version to 2018

PROFITstar, PROFITability, Profitstar Suite, and PROFITstar Portfolio. Installation Guide For Clients Moving from the 2012 Version to 2018 PROFITstar, PROFITability, Profitstar Suite, and PROFITstar Portfolio Installation Guide For Clients Moving from the 2012 Version to 2018 Before You Begin... 1 Introduction... 1 System Requirements...

More information

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd. Securing Amazon Web Services (AWS) EC2 Instances with Dome9 A Whitepaper by Dome9 Security, Ltd. Amazon Web Services (AWS) provides business flexibility for your company as you move to the cloud, but new

More information

Genesys Administrator Extension Help. Profile Menu

Genesys Administrator Extension Help. Profile Menu Genesys Administrator Extension Help Profile Menu 11/19/2017 Contents 1 Profile Menu 1.1 User Preferences 1.2 System Preferences Genesys Administrator Extension Help 2 Profile Menu The Profile menu enables

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Unleash the Power of Secure, Real-Time Collaboration

Unleash the Power of Secure, Real-Time Collaboration White Paper Unleash the Power of Secure, Real-Time Collaboration This paper includes security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support Center and Cisco

More information

User manual of Patrol V6.0. Ⅰ. Software instruction 1 / 63

User manual of Patrol V6.0. Ⅰ. Software instruction 1 / 63 User manual of Patrol V6.0 Ⅰ. Software instruction 1 / 63 Catalog Ⅰ. SOFTWARE INSTRUCTION... 1 Ⅱ. ATTENTION... 3 Ⅲ. SOFTWARE OPERATION... 3 1. LOG IN... 3 2. NEW USER... 4 3. LOGO TITLE... 8 4. NAVIGATION

More information

Comodo SecureBox Management Console Software Version 1.9

Comodo SecureBox Management Console Software Version 1.9 6. Comodo SecureBox Management Console Software Version 1.9 Quick Start Guide Guide Version 1.9.041918 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo SecureBox Management Console

More information

CUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING &

CUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING & Table of Contents CUSTOMER CONTROL PANEL... 2 LOGGING IN... 2 RESET YOUR PASSWORD... 2 DASHBOARD... 3 HOSTING & EMAIL... 4 WEB FORWARDING... 4 WEBSITE... 5 Usage... 5 Subdomains... 5 SSH Access... 6 File

More information

Office 365 Adoption eguide

Office 365 Adoption eguide Office 365 Adoption eguide Identity and Mobility Challenges Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 info@okta.com I 1-888-722-7871 Mind the Identity Gap Executive Summary Microsoft

More information

AppPulse Point of Presence (POP)

AppPulse Point of Presence (POP) AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time

More information

The following topics provide more information on user identity. Establishing User Identity Through Passive Authentication

The following topics provide more information on user identity. Establishing User Identity Through Passive Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

February 2017 Version: 1.0. Xerox App Gallery 4.0 Information Assurance Disclosure

February 2017 Version: 1.0. Xerox App Gallery 4.0 Information Assurance Disclosure February 2017 Version: 1.0 Xerox App Gallery 4.0 Information Assurance Disclosure 2017 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey and WorkCentre are trademarks of

More information

Identity & Access Management

Identity & Access Management Identity & Access Management THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY WITHOUT COMPROMISING SECURITY? S E C U R I T Y OR P R O D U C T I V I T Y On-premises THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY

More information

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. HP JetAdvantage Insights Deployment Guide This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. 1. Overview HP JetAdvantage Insights provides

More information

DeltaV Mobile. Introduction. Product Data Sheet September DeltaV Distributed Control System

DeltaV Mobile. Introduction. Product Data Sheet September DeltaV Distributed Control System DeltaV Distributed Control System Product Data Sheet September 2017 DeltaV Mobile Make faster and better decisions with secure, read-only access to your critical operational data, whenever and wherever

More information

Comodo IT and Security Manager Software Version 5.4

Comodo IT and Security Manager Software Version 5.4 Comodo IT and Security Manager Software Version 5.4 End User Guide Guide Version 5.4.090716 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Today we ll be demonstrating Clarity's web portal where you can access all the features of Clarity s Phone System.

Today we ll be demonstrating Clarity's web portal where you can access all the features of Clarity s Phone System. Title: Introduction to Clarity Voice Phone Service Portal Hello and welcome to Clarity s Support Portal training. At Clarity Voice, we want to help you use your phones to make more sales and improve your

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide Administrator's guide for providing Integration with IBM MaaS360 MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

A10 HARMONY CONTROLLER

A10 HARMONY CONTROLLER DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for

More information