SUPPORT
SALES
1-888-224-1288
LOGIN
Products
Employee Monitoring Software
Computer Monitoring Software
Employee Cell Phone Monitoring
Chromebook Monitoring Software
Use Cases
Remote Employee Monitoring
Track Employee Productivity
Employee Investigations
Insider Threat Detection
Industries
Features
Employee Time Tracker
Video Playback & Screenshots
Real-Time Alerts
Email Monitoring
Internet Usage Monitoring
File Activity Monitoring
Social Media Monitoring
Keylogger / Keystroke Monitoring
Pricing
Partners
Partner Application
Partner Portal
Resources
Blog
Product Overview
A 3 Minute Video
Employee Monitoring
A Definitive Guide
Monitor Employees Working From Home
An e-Book
Monitoring Remote Workers Concerns
A Case Study
Infographics
Visualize Productivity
Multi-Layer Insider Threat Program
A Strategic Guide
Company
About Us
Careers
DEMO VIDEO
Home
Icon + Title + Text
CTA Button Bar
January 28, 2020
Features – Icon + Title
February 4, 2020
Icon + Title + Text
February 3, 2020
Categories
Tags
User Activity Monitoring
Record all user activity on the endpoint – even when not connected to the network. All activity is logged, analyzed and indexed for alerts, playback, audit trails and behavioral benchmarking.
File Activity Monitoring
Track which files your insiders are interacting with by recording all document activity – even when not connected to the network. All documents are tracked for deletion, creation & modification.
User and Entity Behavior Analytics
Create a benchmark of acceptable activity and get notified when any user exceeds or does not reach your selected benchmark.
Web Filter – URL Filtering
Secure your network and enhance employee productivity with enhanced internet content filtering. Our unique agent-based endpoint solution allows you to record and filter web activity, on or off network.
Web Filter – URL Filtering
Secure your network and enhance employee productivity with enhanced internet content filtering. Our unique agent-based endpoint solution allows you to record and filter web activity, on or off network.
Exfiltration Management
Block or report on sensitive data from leaving via email, web forms and removable media, whether on or off network. Ideal for distributed and remote staff. Policies can be easily customized. InterGuard is Citrix ready.
Application & Program Control
Select which Applications & Programs can be used on your endpoints. Programs used can also be monitored to detect compliance violations as well as risky applications.
Remote File Deletion
Files on a stolen laptop are usually much more valuable than the laptop itself. InterGuard will let you remotely access a lost or stolen laptop and delete or copy any files or folders that you select.
Endpoint Lockdown
Interact with and take control of a user's PC/laptop in a potential breach situation. Remotely delete or retrieve files, or lockdown the endpoint if necessary.
Share
close this window
DEMO VIDEO