Alternatives to CurrentWare

Compare CurrentWare alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to CurrentWare in 2024. Compare features, ratings, user reviews, pricing, and more from CurrentWare competitors and alternatives in order to make an informed decision for your business.

  • 1
    Cisco Umbrella
    Cisco Umbrella is a cloud-delivered security service that secures internet access and controls cloud application usage across networks, branch offices, and roaming users. The DNS-layer security packages provide protection from malware, phishing, ransomware, and more by analyzing and learning from internet activity patterns to automatically uncover current and emerging threats. It proactively blocks malicious requests before they reach a customer’s network or endpoints.
    Compare vs. CurrentWare View Software
    Visit Website
  • 2
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can be deployed in the cloud (Public or Private), on-premise (Including Air-Gapped Networks or your Homelab), or in a hybrid configuration.
    Leader badge
    Partner badge
    Compare vs. CurrentWare View Software
    Visit Website
  • 3
    SafeDNS

    SafeDNS

    SafeDNS

    At SafeDNS, we are committed to creating a safer and more secure online environment for SMBs, enterprises, ISPs, MSPs, OEMs, and Education. We have a global footprint, making the internet safer for millions of users in over 60 countries. With years of experience in the field of cybersecurity and DNS filtering, we offer cutting-edge solutions to safeguard your digital life. At present, SafeDNS serves more than 4000 businesses and institutions, and tens of thousands of home users worldwide. We do: -Web content filtering. We help you block all dangerous or unwanted websites such as pornography, violence, child sexual abuse and similar categories. -Malware protection. We also have your back against malicious sites trying to breach user devices either with viruses or information theft intent. -Cloud service. Additionally, we provide you with a cloud filtering service that requires no additional hardware purchase or software installation.
    Leader badge
    Partner badge
    Compare vs. CurrentWare View Software
    Visit Website
  • 4
    Teramind

    Teramind

    Teramind

    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live & recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.
    Starting Price: $12/month/user
  • 5
    AccessPatrol

    AccessPatrol

    CurrentWare Inc.

    AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers. AccessPatrol controls a variety of peripherals, including… - Storage devices such as USB flash drives and external hard drives - Wireless Devices such as Bluetooth, Infrared, and WiFi - Communication Ports such as Serial and Parallel ports - Imaging Devices such as Scanners or Cameras, and… - Other Devices such as network share drives, printers, and mobile phones File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users. The security policies are enforced by a software agent that is installed on your user’s computers. This keeps devices restricted and monitored even when the computers are taken off of the network.
    Starting Price: $3.99 PUPM
  • 6
    Risk Monitor

    Risk Monitor

    SearchInform

    SearchInform Risk Monitor controls your maximum quantity of information channels as well as featuring built-in analytical tools. Provides your business with multifaceted protection against financial losses caused by internal threats in several stages: •Detecting incidents involving corporate fraud and profiteering •Controlling the human factor and predicting HR risks •Protecting confidential data from leaks during its storage, use and transfer •Facilitating regulatory compliance and investigation processes The system operates on two levels. It keeps track of the data leaving the network while at the same time monitors employee activities on computers. SearchInform Risk Monitor keeps an eye on the company’s assets 24/7 even if the employees are outside the office (field work, WFH or while on the business trip) but using corporate devices.
  • 7
    WFilter Enterprise

    WFilter Enterprise

    IMFirewall Software

    WFilter is an Internet filtering software that can help organizations to monitor and manage all Internet behaviors on their networks.You only need to install WFilter in one computer to monitor your whole network. Monitor and archive all Internet activities including web surfing, Email contents, chatting contents, transferred files and so on. Filter certain websites, emails, messengers and file transfers. Block P2P software, online stream, Internet games, stock software and others. Real time monitor of online messengers, web surfing, file transfers and all Internet links. Various kinds of graphics statistics of chatting, web surfing, email...
  • 8
    Webroot DNS Protection
    Protective filtering for security, visibility, privacy and control. Minimize risks, maximize safety and productivity on the web. Today’s businesses need secure, private, manageable and visible control over internet traffic. The current domain name system (DNS) simply resolves internet requests through a global system of servers, then translates those requests into their unique Internet Protocol (IP) addresses. But this vital service was not designed with security in mind and many DNS exploits and vulnerabilities now exist. By using a protective DNS service like Webroot® DNS Protection organizations control their networks and maintain the security, privacy and visibility they need to protect IT infrastructure and users, even those working remotely. Its primary aim is to create a highly secure, private, resilient and manageable connection to the internet. Automated filtering uses Webroot BrightCloud® Internet Threat Intelligence to automatically block requests.
  • 9
    Acronis DeviceLock DLP
    Acronis DeviceLock DLP provides comprehensive endpoint DLP (endpoint data loss prevention) – discovering and protecting sensitive data while monitoring the operations involving that information. Prevent data leakage due to employee negligence or malicious insiders by blocking any unauthorized attempt to access or transfer data, discovering and protecting sensitive data-at-rest. Reduce the complexity of data protection and cut reporting times with a single DLP solution for thorough visibility over data flows and user behavior. Reduce information security risks and comply with IT security standards and regulations by enforcing data use and handling policies that users can’t avoid following. Save the time and hassle associated with managing a DLP solution. Acronis DeviceLock DLP is easily deployable through Active Directory (AD) and offers various central management consoles, based on your organization’s requirements.
    Starting Price: $615 one-time payment
  • 10
    Smoothwall Filter

    Smoothwall Filter

    Smoothwall

    Enabling a safer, digital learning environment with real-time, content-aware and granular control web filtering. Keeps users safe by categorizing new and existing content in real-time by analyzing the content, context and construction of each page. Build web filtering policies based on user group, content category, location IP and time. Offer appropriate internet access to guest mobile devices securely on your network across all platforms. Allow read-only access and remove inappropriate content across social media sites. The challenge for any educational organization is to protect students from harmful content while providing the freedom to learn without limits. Preventing over blocking and unreasonable restrictions is critical. Categorizes new and existing web content appropriately in real-time by analyzing the content, context and construction of each page.
  • 11
    Netsweeper

    Netsweeper

    Netsweeper

    Netsweeper enables organizations to protect internet users from harmful online content and provides web filtering, digital monitoring, and online activity reporting solutions to ensure digital safety on-premise and in remote environments. The leading web filtering platform with the lowest total cost of ownership, Netsweeper delivers advanced intelligence and management solutions for service provider networks, governments, and enterprises. Capable of being onboarded in cloud and on-premise deployments, Netsweeper works across multiple devices and systems to ensure a high level of protection from any location. The most advanced content filtering platform to manage internet access and activity to protect users from illicit content and web threats. Netsweeper’s dynamic categorization engine scans and sorts the content of billions of websites and adds this information to a database of categorized sites maintained on the Netsweeper Category Name Server (CNS).
    Starting Price: $1 per month
  • 12
    Canopy

    Canopy

    Canopy

    Canopy is the only digital parenting app that detects and blocks pornography on every single website on the internet. It’s also the only one that alerts parents immediately when it detects sexting, so they address it in a conversation with their kids. With Canopy, parents can rest easy knowing their children are safe, no matter where their online adventures take them. Canopy uses advanced computing technology, including artificial intelligence and machine learning, to instantly recognize and filter out pornographic content online and on your child’s smartphone camera. Protects two million devices around the world. Keeps kids at thousands of schools safe online. Helps US law enforcement prevent digital crimes against children. Filter out inappropriate content on your kid’s smartphone, schedule breaks from screen time, and know if your kid has left home or school. And that’s just the beginning. Canopy gives families everything they need to thrive in the digital world.
    Starting Price: $7.99 per month
  • 13
    HomeGuard Activity Monitor

    HomeGuard Activity Monitor

    Veridium Software

    HomeGuard is an advanced parental control and activity monitoring tool for family and child safety online and offline. Once installed HomeGuard will silently and automatically block all pornographic and inappropriate content online and record detailed website activity including time of visit and time spent on each website. Plus a built in keylogger, activity based screenshots, chat and email monitoring and filtering, program/games blocking and time restrictions, Internet and computer usage time restrictions, email notifications and more. HomeGuard is virtually impossible to tamper with, it cannot be bypassed using proxy servers and is unclosable and uninstallable unless the administrative password (provided during installation) is used.
  • 14
    Best Free Keylogger

    Best Free Keylogger

    BestX Software

    Best Free Keylogger (BFK) is a feature rich Windows Monitoring System, intended for employee monitoring and school/parental control. Monitoring Options: Keystroke recording Internet activity recording Application monitoring Clipboard monitoring Chats and password logging Screen capturing App Features: Invisible mode Auto uninstall (silent mode) Automatic log clear Log file encryption Advanced filter options We currently offer 2 versions: a "lite version" for free with all the above listed functionality and a paid "pro version" with remote monitoring and premium tech support. More details at https://bestxsoftware.com
  • 15
    CleanBrowsing

    CleanBrowsing

    CleanBrowsing

    A modernized approach to DNS-based content filtering and security. Easily decide what should, and should not, be allowed on your internet. Effective for our kids, powerful for our business. CleanBrowsing is a DNS-based content filtering service that offers a safe way to browse the web without surprises. It intercepts domain requests and filter sites that should be blocked, based on your filtering needs. Our, free, family filter, for example, blocks porn, obscene, and adult content, while still allowing Google, Youtube, Bing, DuckDuckGo and the rest of the web to load safely. Our free filters are comprised of three predefined filters for global consumption (Security, Adult, and Family). The Family filter blocks adult / obscene content and applies Safe Search filters to Google, Bing, Yandex, etc. The security filter, however, only focuses on restricting access to malicious activity.
    Starting Price: $59.99
  • 16
    SecureTower

    SecureTower

    falcongaze

    Our DLP system helps companies protect against leaks of confidential information, as well as monitor the work of employees. Leaks of confidential information. Fraud schemes within the company. Insider activity, ineffective employees, control, actions on employees’ computers. Efficiency and loyalty of staff, employee communications, data channels, blocking, malicious actions of employees. Access to web resources (including by category), launching applications (including by category), saving data to the clipboard, connecting USB devices. Analysis, content of uploaded files (text, images, audio), employee efficiency, risk activity of employees. Statistical indicators of employee performance, investigation, information security incidents. Causes of safety violations, the reasons for the ineffective work of employees, fraud schemes within the company.
  • 17
    NetVizor

    NetVizor

    NetVizor

    Are you having problems with employee productivity? NetVizor employee monitoring software will help keep your employees on task, on schedule, and it will let you know if there is a serious issue within a day of use! Now fully Windows 10 compatible! Wondering how your staff is using their time at the workplace? NetVizor will show you, in full detail, how they are using the computer and Internet. If you need to block access to distracting social media, news or other sites that violate your terms of employment, you can! If you need to block applications like games, chat services and music, just set them in your NetVizor preferences and they will be blocked. NetVizor gives you the power to see exactly how employees are using their work time allowing easy elimination of unwanted behaviors and time-wasting activities.
    Starting Price: $295 one-time payment
  • 18
    Next DLP

    Next DLP

    Next DLP

    Discover risks, educate employees, enforce policies and prevent data loss with Reveal. Your people, users and data are dynamic: constantly changing and moving. In the hybrid world of work people create, manipulate and share data dynamically, across endless channels. The opportunities for data leaks are infinite and your people are the main target— securing your organization starts with securing your people. Reveal Cloud is cloud-native, so it is simple to buy, install, and use. You get automated protection from day 1 with out-of-the-box policies and machine learning, with smart remediation that works even if computers are disconnected from the network. The lightweight agent makes sure your data and employees are protected at all times without slowing you down. Continuous monitoring provides visibility into user behavior, data access, and system use. Security operators can search on file, USB device, connection, browser, application events, and more.
  • 19
    BrowseControl

    BrowseControl

    CurrentWare Inc.

    BrowseControl is an easy-to-use web filter that helps organizations enforce policies, improve productivity, reduce bandwidth consumption, and meet compliance requirements - no matter where their users are located. With BrowseControl you can… - Ensure a safe and productive environment by blocking high-risk, distracting, or inappropriate websites - Improve network performance by blocking bandwidth hogs, and... - Prevent users from using unsanctioned applications and software-as-a-service providers BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site. The Category Filtering feature is regularly updated with new websites; it allows you to block millions of websites across over 100 content categories including pornography, social media, and virus-infected sites.
    Starting Price: $3.99 PUPM
  • 20
    Pearl Echo.Suite

    Pearl Echo.Suite

    Pearl Software

    Looking for a way to control, monitor and filter activity on personal computers, thin clients and a full range of mobile devices all from a central location? Our enterprise-class cybersecurity software will do that and more. Pearl Echo.Suite is an Internet management software that can be used across multiple areas including e-mail, web surfing, file transfers, news resource access, Skype instant messaging and chat. Pearl Echo.Suite will meet your organizational needs whether for single or multiple locations or for the monitoring of roaming and mobile Internet users. For peer-to-peer, server-centric and client-server computing environments, you'll be able to set user-level policies for monitoring usage and controlling Internet access across your network. By using Pearl Echo.Suite web monitoring software, administrators can filter and monitor a variety of activities including e-mail, IM, chat, news, the transferring of files and browsing the Internet.
  • 21
    ContentProtect

    ContentProtect

    Content Watch

    ContentProtect helps increase productivity by blocking inappropriate or time wasting web content. With the powerful cloud-based administration tools you can make changes and see reports anywhere and anytime. ContentProtect Professional is the perfect solution for managing the Internet use of your employees, both in and out of the office, with a powerful and real-time content analysis engine to categorize web content in real-time. This engine can accurately filter out the content and websites you don’t want your employees viewing. ContentProtect Professional makes managing the settings for all your users easy and accessible anywhere. The web based administration console “in the cloud” allows Administrators to view reports, manage, and make changes to Internet policies, and permit or terminate Internet access, anywhere and at any time. Administrators have actionable data via the web based administration console.
    Starting Price: $39.99
  • 22
    SpyAgent

    SpyAgent

    Spytech

    Operating invisibly, record everything your child or your employee does with SpyAgent's expansive set of 30+ computer monitoring tools. Remotely monitor with scheduled and on-demand email reports and real-time remote log viewing. Remotely uninstall or update settings from the cloud! Invisibly record all user activities on your computer without users knowing. Invisible program and log files; Password protected so only you can control monitoring and view logs. Generate comprehensive top-10 activity reports detailing user activities, search logs for keywords, and archive logs for future viewing and review. Block unwanted websites, applications, chat clients, and keywords. Receive instant alerts via email or text/SMS when unwanted activities occur. SpyAgent has been on the market for over 21 years, which means we have had lots of time and feedback to make an extremely refined computer monitoring solution.
    Starting Price: $69.95 one-time payment
  • 23
    Barracuda Content Shield
    Make web browsing safe for business. 18.5 million websites are infected with malware at any given time. Protect your users and business from malicious links, websites and downloads. Protect local and remote users from accessing malicious websites and files. 40% of internet activity is non-work related. Stop unproductive or inappropriate web browsing with granular access policies. Get started in minutes with no client software to install. Barracuda Content Shield Plus is a cloud-based service that combines robust content filtering, file-based protection, granular policy enforcement and reporting, simple centralized management, and real-time threat intelligence to protect your users, your organization, and your brand. Its proxy-free architecture ensures minimal latency. Barracuda Content Shield delivers advanced web security with a more limited feature-set. Content Shield provides advanced DNS filtering and URL filtering that’s always up to date, and uses agent-based filtering.
  • 24
    Zorus Archon Web Filtering
    A complete web filtering platform, engineered for managed service providers. Archon filters traffic through a proxy system, allowing you to grant access to some parts of a site while blocking others. Centrally managed and deployed with a single click, Archon eliminates the need to maintain costly hardware. Capable of learning from each new deployment and scanned site, Archon self optimizes. Traditional UTM systems only protect devices inside their networks. Archon protection travels with the device. Protect your clients everywhere they’re doing business. According to Gartner, 50% of employees will continue to work remotely, even after COVID-19 ends. Traditional security platforms like corporate firewalls and VPNs don’t take into consideration new work trends, like hybrid work from home. Employees can access services like e-mail and cloud storage from multiple devices, including from their personal endpoints. Archon was built with geographic diversity in mind.
  • 25
    OsMonitor

    OsMonitor

    Wangya Computer

    OsMonitor is a powerful employee monitoring software designed for companies. It adopts client-server mode with one server monitoring all employee computers through local area network or Internet. OsMonitor employee monitoring software records and tracks computer activities such as IM conversation and visited websites. You can see if your employees are working or not on the boss’s computer. OsMonitor also blocks undesirable actions such as specific websites, games, external drives and USB disk. All monitoring data from employee computers is stored in the server database. OsMonitor server will generate professional high-quality management reports on how your employees are using their computers. All the monitoring data are stored in the OsMonitor server computer. The data will not be lost even if the employees deleted the history on their own computers. Bandwidth usage/Networking download and upload speed in real-time.
  • 26
    Activeye

    Activeye

    Activeye

    Activeye is a leading global employee monitoring, user behavior analytics, insider threat detection, forensics and data loss prevention software solutions provider in India. Organizations in finance, legal, retail, manufacturing, energy, technology, healthcare and government verticals across the globe trust Activeye platform to detect, record, and prevent malicious user behavior in addition to helping teams drive productivity and efficiency. Main functions of the Activeye employee monitoring software are online (real-time) monitoring of working computers, automated accounting of employees' working hours, analysis of personnel's efficiency in workplaces, keystroke monitoring and also overseeing violations and remote control of the personal computer. Start Receiving Reports And Screenshots Screenshots and PC usage data takes only 4-5 minutes to appear on your dashboard. Install Agent On The Monitored Computers It only takes seconds to install, requiring no further effort.
  • 27
    Trellix DLP Endpoint
    Extend on-premises data loss prevention policies to the cloud for consistent data loss detection. Protect sensitive data such as PCI, PII, and PHI wherever it lives—on premises, in the cloud, or at the endpoints. Monitor and address day-to-day risky actions such as emailing, web posting, printing, screen capturing, uploading to the cloud, and more. Safeguard personal data and comply to regulatory compliance with automated reporting. Allow users to run endpoint discovery scans and perform self-remediation actions. With the support of DLP Endpoint on Trellix ePO, deployment, policies and incident management can be managed in the Cloud. Empower users to manually classify documents, increase employee data protection awareness, and reduce administrative burden. Includes enhanced content-aware protection and data loss prevention for Mac users. Integration with Threat Intelligence Exchange and Data Exchange Layer (DXL) helps block sensitive data in applications identified as malicious.
  • 28
    ERS Watchdog

    ERS Watchdog

    ERS Biometrics

    The ERS Watchdog Productivity Monitoring APP is a productivity software solution that will assist you in increasing workplace productivity by allowing you to monitor your employee’s activity on their work computers / laptops once they have clocked IN for work, giving a clear indication of which sites / applications / programs were accessed and for which period of time. It is ideal work work-from-home employees or for those in the workplace. You have full control over which programs are seen as Productive or Unproductive, and certain sites or applications can be blocked, immediately clocking the employee OUT for work, once accessed, giving you the tool needed to measure employee productivity. The employee is also clocked OUT if they have been inactive for a certain period of time. This will allow you to generate a report on exactly how many hours an employee is truly working. ERS Watchdog is online and needs no hardware to install. Once the employee is done working for the day
  • 29
    iMonitor 365

    iMonitor 365

    iMonitor Software

    We provide remote computer monitoring software for small and medium-sized enterprises. Keystrokes, screenshots, chat, web, print, file, USB storage, clipboard, live desktop... Based on cloud, iMonitor 365 can monitor employee's computer and internet activities from anywhere in real-time. The target clients of iMonitor 365 are basically small and medium enterprises. We can quickly and efficiently provide you the key information you need, and help you to increase employees' productivity. iMonitor 365 just need one agent program installed on target computer, and the installation is simple. With online console can maximumly simplify the monitoring process. No need the extra IP address setting. You can setup one account to monitor multiple computers. We provide online console which can run on any web browser, even your mobile phone's web browser.
    Starting Price: $24.95 per month
  • 30
    EmpMonitor

    EmpMonitor

    EmpMonitor

    Manage all the computers in your organization remotely from a centralized location. Your EmpMonitor account is accessible from any internet-enabled device giving you access from anywhere at any time. With our real-time computer monitoring software, you can view activities as they happen and manage instantly. Gain complete visibility & full control over your employees’ computer activities. Get detailed insights in the form of intuitive graphic reports and charts. EmpMonitor, being simple & easy to understand, helps you ditch paperwork and is 100% automatic. It provides real-time monitoring, automatic screenshots at regular intervals and save data in the cloud. Track employee activities on PC remotely from any location in 100% invisible mode.
    Leader badge
    Starting Price: $4.59 per user per month
  • 31
    WorkTime

    WorkTime

    NesterSoft

    WorkTime monitors productivity and helps boosting it. In-office, remote, work-from-home employee monitoring. WorkTime monitors: idle/active times, attendance, productive/unproductive times, software and internet usage. High performance & easy on system resources: WorkTime vs. competitors Cloud (we take care of your data) or on-premise (your data does not leave your company). No invasion to employee’s privacy. Pure productivity monitoring. No screenshots, no keystrokes, no chats/emails or documents content recording. HIPAA compliant. Employees’ productivity will be 3-20% minimum better with WorkTime. 3-20% – this is how much time employees spend on their personal needs (including poor attendance, being idle, browsing, socializing) in average. WorkTime brings productivity up, improves employees’ attendance, discipline by reducing idle and personal time. WorkTime shows you the real situation about computers and software usage.
    Leader badge
    Starting Price: $4.99 per user per month
  • 32
    pcInformant

    pcInformant

    pcInformant

    Computer monitoring software with real-time screenshots of user activity. Remotely monitor a computer. Track internet activity, applications, keystrokes, and receive HTML reporting via email. Spy Software for Windows. Monitoring Options: Keylogger Screenshots Internet Logs Application Logs HTML Reporting Log Files can be Emailed Special Features: Application is invisible Logs can be cleared automatically Features can be turned on and off Full Suite of Options Application is not listed in Add / Remove Programs Security Features: Application is invisible, database is encrypted, and emails are sent via encrypted password protected zip files. pcInformant does not store any data in the cloud. All data is stored on your computer, so your information is safe. Requirements: Windows 7, 8, 9, 10, or 11
    Starting Price: $29.99 one time fee
  • 33
    Impero Webcheck

    Impero Webcheck

    Impero Software

    AI-powered internet filtering for schools. The internet, minus the harmful stuff. The internet is in an incredible resource, but not everything online is conducive to learning. Impero’s robust internet filtering for schools analyses content in real-time to ensure students are protected online, in the classroom and beyond. Our web filter for schools uses an AI categorization name service (CNS) to comb through all HTTP, HTTPS and FTP web traffic and block web content containing any pornography, substance abuse, extremism and many other categories of sensitive material. Impero Webcheck protects school networks from encrypted traffic – including virus-based threats and proxy avoidance – and ensures that every device on the network is secure.
  • 34
    Backlsh

    Backlsh

    Backlsh

    Backlsh is a time-tracking solution that works on desktops devices. This application enables employers to know what their employees are doing on their computers to ensure that they are productive while on company time. With Backlsh, businesses can save valuable financial resources as well as a lot of time by making certain that workers are making good use of the working hours to perform their tasks. The solution allows this with the aid of several tools, such as the app tracker, website tracker, and offline time tracker. Furthermore, Backlsh provides companies with an all-in-one dashboard where they can monitor daily activities, absences and overtime, and more from one place. Backlsh tracks work even when not connected to the Internet. The data will be uploaded to the server when the internet connection is restored. Backlsh has automated the basic principles needed in almost every business. Backlsh has currently users from IT Teams, Professional Services Teams, Marketing Teams, etc.
  • 35
    Cocospy

    Cocospy

    Cocospy

    Cocospy keeps tabs on what's dear to you, be it your kids or business. Track locations, messages, calls, and apps. Do it remotely and 100% discreetly. Use Cocospy to monitor Android and iOS smartphones and tablets. Get Cocospy up and running within minutes. Surveil remotely, without being detected. The internet is a dangerous place for children. Your employees make or break your business. Protect your interests with Cocospy's advanced monitoring features. If you are not satisfied with our product within 60 days, simply contact us for a refund. Cocospy is super-safe, reliable, and secure. Cocospy is used by a million people in 190+ countries. Reach out to us anytime for troubleshooting assistance. There are multiple scenarios where you might need to track someone. You might want to protect the target, keep tabs on their activities, or simple look after your personal interests. With Cocospy, you can do it remotely and discreetly.
    Starting Price: $39.99 per month
  • 36
    Diladele Web Filter
    User tries to access a web site in the Internet. Browser connects to that site either directly or using explicitly configured proxy settings. Requests and remote site responses get into Squid, are authenticated and redirected to Web Safety ICAP filter running either locally or remotely. Requests and responses are analyzed and access is allowed or denied based on configured policy settings. Information about request and response is stored in the database. Web Safety is an ICAP web filter that directly plugs into Squid proxy. This allows it to filter URLs and do deep content inspection of encrypted HTTPS traffic. Encrypted explicit content is blocked easily. Performs deep content inspection of web pages and blocks everything containing adult explicit language and links to questionable content. General purpose web sites (Google Search, Google Images, Bing or YouTube) are filtered as well and all inappropriate content is blocked.
  • 37
    friendlyway secure browser
    The friendlyway secure browser software is used to protect public Internet sites against misuse. The product prevents access to the operating system, switches off system key combinations and allows the limitation of the surfing area. The friendlyway secure browser was developed based on Microsoft Internet Explorer and allows all modern web technologies like simple or complex web pages, scripts and multimedia as well as customized navigation buttons and custom layout. In the new generation of secure browser software, the secure sending of video, image and sound emails is also integrated. If desired, a virtual keyboard for inputting address data can be displayed. The configuration of the friendlyway secure browser is very simple and requires no programming knowledge. The friendlyway secure browser software is primarily intended for use at public Internet access stations in authorities, universities, schools, hospitals, tourist facilities such as hotels, conference centers & restaurants.
  • 38
    Netspark

    Netspark

    Netspark

    Web filtering solutions that let you create an internet you want to use. Netspark’s unique approach to filtering provides access to more content, without increased risk of exposure. Multiple filtering levels as well as Custom Mode empowers users to define the Internet they want access to. We offer solutions for both network-side and on‑the‑go protection. Choose from a complete range of flexible and affordable deployment options. Netspark’s filtering solution was born from the understanding that what users really need is a content filtering tool focused on enabling access to content, not just blocking it. Our unique algorithms and machine learning engines work together to contextually understand web content and the value it offers our users, prior to filtering out any inappropriate elements.
  • 39
    Blocksi

    Blocksi

    Blocksi

    AI-adaptive YouTube and web filtering are specifically designed for K-12 teachers and students. Classroom screen monitoring system revolutionizes the 21st-century classroom experience. 24/7/365 student and school safety guarantees peace of mind through smart early threat detection. More than 500 school districts and 3 million users trust Blocksi to manage a wide range of student devices for an engaged and safe learning experience. Empower, monitor, and safeguard your students with Blocksi, an all-encompassing solution seamlessly integrating AI-powered threat detection for school and student safety, adaptive content filtering guided by AI, and a customized classroom management system designed for K-12 districts. Stay ahead of students without the need for continuous block list adjustments. Effortlessly filter the internet on school devices or BYOD with over 90 filtering categories, regular, DNS, and time-based policies, and multi-OS support.
    Starting Price: Free
  • 40
    ScoutDNS

    ScoutDNS

    ScoutDNS

    Content Filtering And Malware Protection At The DNS Layer. Organizations of all sizes depend on ScoutDNS to gain visibility, comply with content obligations, and reduce their malware exposure. Manage 67 content categories. Network wide Google and Bing restricted search filters image and video search results. Supports YouTube Strict and Moderate modes with G Suite support. Block streaming media, P2P, social networks, web proxy, games, and more. Blocks malware, ransomware, and phishing sites. Stop hidden malware and objectionable content inside embedded ads. Easy to deploy with automatic updates to latest threats. Full log reporting and system dashboard. Create and mange multiple whitelists/blacklists. Manage 67+ categories, and create multiple allow/block lists that can be assigned globally or by the policy. Add custom list entries direct from logs with a single click. Sign up for a risk free full featured trial account on a single site. There is no credit card required.
    Starting Price: $15 per month
  • 41
    NETGEAR Insight

    NETGEAR Insight

    NETGEAR Insight

    NETGEAR Insight is your gateway to easy networking and advanced services. Whether it's content filtering, business VPN or instant captive portal get the most of your network in the simplest and fastest way. Secure data traffic between work-from-home employees or between business locations, so that no unauthorized access can obtain your company’s information on Orbi Pro (SXK80, SXK50, SXK30). Insight business VPN seamlessly provides work-from-home employees the same network access and experience compared to while they are in office. For IT managers and MSPs, network management and configurations are handled easily with features including administering VPN access on a group level, managing VPN access for users or business sites and receiving reports and notifications on VPN downtime. Block access to undesirable and malicious websites may decrease work efficiency and be a threat to wired and wireless networks.
    Starting Price: $9.99 per year
  • 42
    Barracuda Web Security Gateway
    The Barracuda Web Security Gateway lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unites award-winning spyware, malware, and virus protection with a powerful policy and reporting engine. Advanced features ensure that organizations adapt to emerging requirements like social-network regulation, remote filtering, and visibility into SSL-encrypted traffic. Unlimited remote user licenses are included to enforce content and access policies for mobile devices outside of the corporate network. The Barracuda Web Security Gateway is also available as a virtual appliance. For hosted web security, see Barracuda Content Shield.
  • 43
    ContentKeeper

    ContentKeeper

    ContentKeeper Technologies

    Today's organizations require a security solution that scales for future expansion, integrates seamlessly with existing technology, centralizes policy management and provides control across remote locations and mobile users. ContentKeeper’s Secure Internet Gateway (SIG) helps prevent malware and ensures policy management on any device. Our Multi-layered Web Security Platform approach provides full visibility into web traffic and activity, without impacting network performance or adding complexity. Uses multiple layers of defense, including machine learning/predictive file analysis, behavioral analysis, cloud sandboxing and threat isolation to prevent malware and advanced persistent threats. Designed for high demand networking environments. Simplifies security and policy management and ensures safe and productive web use regardless of device or location.
  • 44
    Rawstream

    Rawstream

    Rawstream

    Enhance the cybersecurity of your business with Rawstream. Crush ransomware, malware, spyware, adware, and more! Experience a rapid deployment with real-time insights. Monitor Rawstream in action or contact our team of experts to learn how Rawstream can help your business. Collaborate with the team cost-effectively!! Save up to 90% on Microsoft Office Licenses. Drill into activity with Rawstream's Usage Analytics and identify your Excel ninjas. Get a productive team on Google For Work with consolidated data driven decisions. Access multiple deployment options for IT admins. Filter 80+ categories and enable Google Safe Search . Easy deployment with support for Windows and Linux.AD, Citrix & Terminal Services support. Cloud DNS filtering, SSL filtering. Rawstream cybersecurity starts at the network level, protecting all devices on the network from accessing malicious sites. Updates happen continuously so we don’t miss a beat.
    Starting Price: $2.00/month/user
  • 45
    Cyclope

    Cyclope

    Amplusnet SRL

    Cyclope Computer Monitoring Software is an advanced time tracking software measuring employees’ productivity without invading their privacy. Designed from a management perspective, Cyclope is an advanced employee monitoring software that allows employers to easily track each employee’s activity on the company computer. Cyclope feature includes Internet activity monitoring, documents monitoring, applications usage, attendance – time tracking, and productivity. By using Cyclope time tracking app you will have complete transparency of the whole workflow in your organization. This gives you the possibility to track the most efficient employees as well as details related to their tasks - see exactly what tasks took too much time to be completed by some of the workers. Non-Invasive Employee Monitoring - Without sacrificing privacy, the software monitors computer usage to ensure effective, productive personnel and stricter Internet security.
    Starting Price: $3/month/user
  • 46
    SentryPC

    SentryPC

    SentryPC

    Every activity your users perform on the computer and Internet is recorded in real-time and in full detail for viewing — you will know exactly what they did and when they did it. Filter applications, games, websites, and keywords for all users — completely block content or choose specific hours of the day it is allowed/blocked for each user. Control when your users can use the computer by creating daily schedules — select what hours of each day usage is allowed and set maximum usage limits for each day or the week.
    Starting Price: $59.95 per year
  • 47
    TrackMyTime
    Monitor, track, record, and evaluate employees' work hours from anywhere, anytime. Fully customizable employee monitoring & time tracking software packed with the features you need. Track the time spent on tasks and activities, total no. of hours worked and breaks of each employee. Automatically captures screenshots of employees' screens to get an instant preview of their activities. Track, capture, record, and log the keyboard & mouse click activities of an employee. Record the activities of employees during work hours by live recording the screen. Automatically detects & logs the idle time of employees if no activities are performed for a while. Monitor and track the employee's work time even with or without an internet connection. TrackmyTime is an all-in-one solution for monitoring the productive hours of employees (Work from home, in-office, and remote) by tracking every aspect of employee activities to a meticulous degree of detail with an eye toward improving productivity.
  • 48
    REFOG Employee Monitor
    Improve employee productivity with a monitoring tool! Help employees spend less time chatting and more time working. Do you know how much time your employees spend working? Personal use of employer computers is widespread beyond imaginable. Track their computer activities and learn whose performance is exemplary and who is abusing their workplace. Small businesses have limited resources to warrant a fully-featured surveillance system. Deploy REFOG Employee Monitor to watch your employees’ activities and learn how much time they spend working, browsing or shopping during their paid working hours. Improved employee productivity means less time required to complete projects. Less time wasted means saving resources for reaching your company goals. Set up REFOG Employee Monitor and improve your bottom line! Setting up employee monitoring is quick and easy Download REFOG Employee Monitor and try it free for 7 days!
    Starting Price: $15 one-time payment
  • 49
    Employee Monitor
    Improve employee productivity with a monitoring tool! Help employees spend less time chatting and more time working. Do you know how much time your employees spend working? Personal use of employer’s computers is widespread beyond imaginable. Track their computer activities and learn whose performance is exemplary and who is abusing their workplace. Small businesses have limited resources to warrant a fully featured surveillance system. Deploy REFOG Employee Monitor to watch your employees’ activities and learn how much time they spend working, browsing or shopping during their paid working hours. Improved employee productivity means less time required to complete projects. Less time wasted means saved resources for reaching your company goals. Set up REFOG Employee Monitor and improve your bottom line!
    Starting Price: $15 per computer
  • 50
    Talon Enterprise Browser

    Talon Enterprise Browser

    Talon Cyber Security

    The first secure enterprise browser designed for the future of work. Defend against malware and prevent data loss for SaaS and web-based applications for any business user from any location or device. TalonWork, is a hardened Chromium-based browser that isolates web traffic locally on the endpoint, providing a responsive, native user experience. TalonWork integrates with popular Identity Providers to streamline user onboarding and policy enforcement. TalonWork provides comprehensive DLP to reduce cyber risk. This includes file encryption to prevent sensitive files from being shared externally or stored on endpoints. TalonWork also provides granular clipboard, printing, and screenshot restrictions. TalonWork blocks access to malicious domains and phishing websites with URL filtering and enhanced safe browsing functions. TalonWork also prevents malicious files from being uploaded/downloaded using Talon’s file scanning engine or CrowdStrike Falcon X.