Workpuls Teramind ActivTrak Hubstaff DeskTime Time Doctor RescueTime Kickidler Veriato Work Examiner
OVERVIEW
Price $6/user/month $6/user/month $7.20/user/month $7/user/month $7/user/month $9.99/user/month $6/user/month $9.99/user/month $150/licence/year $60/licence (lifetime)
Free trial 7 days 7 days No 14 days 14 days 14 days 30 days 7 days Yes 30 days
Ease of use Very easy Difficult Very easy Easy Easy Very easy Very easy Very easy Very difficult Easy
TRACKING METHODS
Unlimited (tracker working 24/7)
Fixed (defined working hours)
Automatic (when computer is connected to a specified network)
Manual (start/stop)
Project based (track time only on projects)
GENERAL MONITORING FEATURES
Stealth mode
App and website usage
Real-time monitoring
Offline time tracking
Attendance
Activity levels
Keylogger
Geolocation
Remote desktop control
Website/activity blocking
SCREENSHOTS AND RECORDING
Screenshots
Screenshots on demand
Screen recording
PRODUCTIVITY FEATURES
Productivity trends
Websites and apps labeling
Category labeling
Productivity alerts
ADVANCED SECURITY FEATURES
User behavior analytics
Data loss prevention
Advanced file and web monitoring
REPORTING
Productivity reports
Team reports
Timelines
Email reports
Access management
PLATFORMS
Web
Mac desktop app
Windows desktop app
Linux desktop app
Mobile app iOS, Android iOS, Android iOS, Android iOS, Android iOS, Android Android
Browser extension Chrome Chrome Chrome
Other Citrix, VMware Chrome OS
OTHER
Support Phone, email, online Phone, email, online Phone, email, online Email, online Phone, email, online, in-person Online Phone, email, online Email, online, Viber, Whatsapp Phone, email, online, support ticket Phone, email, online
Knowledge base
Video tutorials
Integrations comming soon
API
Deployment cloud, on-premise cloud, on-premise, AWS, Azure cloud cloud cloud cloud cloud on-premise cloud, on-premise on-premise
Kronos Humanity Timeclockplus Tsheets Wheniwork Deputy Replicon Jibble EbilityTimeTracker OnTheClock BeeBole
OVERVIEW
Price(per month)Available upon requestFrom $2 per userAvailable upon requestFrom $6.40 per user+$16Free for up to 75 usersFrom $2.50 per userBasic plan:$30 for 5 users+$5 per additional userFrom $1.50 per employeeFrom $4 per user+$8From $2.20 per user$5.99 per user per month
Free trial30 days14 daysYes14 days14 days14 days30 days30 days,no credit card required
Ease of useDifficultEasyDifficultVery easyEasyEasyDifficultVery easyEasyEasyEasy
FEATURES
Timecard management
Scheduling
Shift Trading
Timesheets
Break time management
Real-time tracking
PTO Management
Payroll
Invoicing
Client billing
GPS tracking
Clock out reminders
Alerts
Manual time
PUNCH-IN METHODS
Web app
Mobile app
Time clock device
Time clock kiosk
Facial recognition
Fingerprint scanning
Geofencing
Group punch-in
REPORTING
Visual reports
Email reports
Time rounding
MANAGEMENT
Permissions
Manager approvals
Add time for others
Integrations
PLATFORMS
Web
Android app
iOS app
Mac desktop app
Windows desktop app
Linux desktop app
OTHER
SupportPhone and onlinePhone and onlinePhone,chat and onlinePhone and chatEmail and onlineChat and phonePhone,email,chat and onlinePhone and onlinePhone,email,chat and onlinePhone and onlineOnline chat and video support in English,French,and Spanish
Knowledge base
Video tutorials
Community forum
API

Over the years, computer monitoring technology has evolved from a simple time clock software to a powerful tool that can detect and record almost everything that each individual employee does on their computer. The change was fast and drastic but necessary - with the rise in remote work, number of employees and digital storage of important documents and data, an all-encompassing automatic computer activity surveillance solution was needed.


Today, there are many types of computer usage software, each with its own set of different features and functionalities. Here, we’re going to focus on one of the more advanced features that some of the best computer monitoring software have - screenshots.

As you’ll soon discover, this is a very powerful feature, the one that has the potential to provide some of the answers that other functionalities can’t but also the one that lies in the gray zone between securing company’s data and assets on one end, and annihilating employees’ privacy and trust on the other end of the spectrum.


So, our aim is to introduce you to this amazing functionality of computer monitoring and show you how to use it to benefit your company without hurting your employees in the process.


How It Works


Let’s start by providing a quick overview of how the screenshot feature works and what it can do.


We all know what screenshots are - taking a picture of a computer screen, in this case of your employees’ computers, in order to see what’s going on on their desktops. You take these screenshots completely remotely from your dashboard and the employees won’t notice a thing.


Computer monitoring that has this functionality typically gives you two options. You can either take a screenshot manually at any given time and on any active computer in the network, or you can set automatic screenshots.


In the latter scenario, you can, for example, set your time tracking software with screenshots to activate five times every hour on computers X, Y and Z. This means that every hour, you’ll get five still images taken at random intervals showing what these three desktop screens looked like and what exactly those employees were doing.


All of these images are stored on the cloud and you get to freely view, save or delete them.


Obviously, this is a powerful weapon to wield, so it’s of utmost importance to use it well and only for a good enough reason. So let’s see what those reasons might be.


Using Screenshots for Data Protection


The primary function of computer monitoring with screenshots is to provide an additional layer of protection for sensitive company data or client information.


Say you have an important document that should remain secure and you have a couple of employees working on it. Of course, trust is great, but you can never be too sure and plus sometimes clients want additional insurance that their information is protected. Fair enough.


Computer monitoring software lets you detect what those employees are working on and you can take a screenshot when they’re working on that task to make sure they’re not copying the document or sharing it with anyone. Even better, if you happen to have automatic time tracking software with screenshots and activity levels, you’ll be able to know which exact file each employee is accessing and activate screenshots when you see them working on a confidential document.


Keeping Track of Workflow


Another situation where screenshots can be used is tracking someone’s progress on a particular task. Keep in mind, though, that just your regular online project time tracking software that detects how much time an employee spends on a certain task is going to be sufficient in most cases and screenshots should be used only as a last resort.


So let’s say that you see that one of your employees spends a lot more time on a particular kind of task than their colleagues. You want to know whether that’s because they’re super detailed, they do more than expected or they just don’t know how to use that platform or finish that process efficiently enough.


While you could certainly approach them and ask, using a couple of remote screenshots can give you the same information without interrupting the employee. Besides, a worker might be hesitant to admit that they’re struggling with getting things done. But PC desktop monitoring software isn’t.


When You Shouldn’t Use Screenshots


By now, it’s clear that this feature is indeed very powerful. So you should be extremely careful when and how you use it.


For instance, when it comes to data security, you might be tempted to set automatic ongoing screenshots for individuals that you suspect are for some reason a threat. But if you go down this road, you have to be completely and objectively justified in your suspicions, otherwise you’re just targeting random individuals, which might even end up resulting in a lawsuit. So if you’re protecting your data from potential insider threats, do so indiscriminately.


Another important piece of advice is to never take or save screenshots of employees’ computers taken when they were using it for private matters, such as taking a quick look at their personal email inbox or logging into Facebook while on a break or, even worse yet, checking their bank account balance. Collecting this data is forbidden by law in many countries and it alienates employees and negatively impacts your company culture anyways.


And finally, always use screenshot feature of computer activity software when you absolutely have a good reason to.


Conclusion


Computer monitoring is more advanced than ever before and screenshot feature can help you with information security and tracking workflow. But precisely because it’s so powerful, you should use it responsibly. At the end of the day, tweaking these couple of things means nothing if you end up hurting your most valuable assets - employees.

We’ve reserved a 7-day free trial for you….

Want your hybrid or remote team to be more productive?

Claim your free 7-Day full feature trial of Insightful today. Insightful’s actionable work insights make your team more productive, efficient and accountable.

Ready to Take Full Control Of Your Workplace?

Try the simplest solution today…

Start Free Trial
Employee Monitoring

Everything About the Screenshot Feature: When to Use It and How Not to Cross the Line

Written by
Kristina Valjarevic
Published on
August 30, 2019

Over the years, computer monitoring technology has evolved from a simple time clock software to a powerful tool that can detect and record almost everything that each individual employee does on their computer. The change was fast and drastic but necessary - with the rise in remote work, number of employees and digital storage of important documents and data, an all-encompassing automatic computer activity surveillance solution was needed.


Today, there are many types of computer usage software, each with its own set of different features and functionalities. Here, we’re going to focus on one of the more advanced features that some of the best computer monitoring software have - screenshots.

As you’ll soon discover, this is a very powerful feature, the one that has the potential to provide some of the answers that other functionalities can’t but also the one that lies in the gray zone between securing company’s data and assets on one end, and annihilating employees’ privacy and trust on the other end of the spectrum.


So, our aim is to introduce you to this amazing functionality of computer monitoring and show you how to use it to benefit your company without hurting your employees in the process.


How It Works


Let’s start by providing a quick overview of how the screenshot feature works and what it can do.


We all know what screenshots are - taking a picture of a computer screen, in this case of your employees’ computers, in order to see what’s going on on their desktops. You take these screenshots completely remotely from your dashboard and the employees won’t notice a thing.


Computer monitoring that has this functionality typically gives you two options. You can either take a screenshot manually at any given time and on any active computer in the network, or you can set automatic screenshots.


In the latter scenario, you can, for example, set your time tracking software with screenshots to activate five times every hour on computers X, Y and Z. This means that every hour, you’ll get five still images taken at random intervals showing what these three desktop screens looked like and what exactly those employees were doing.


All of these images are stored on the cloud and you get to freely view, save or delete them.


Obviously, this is a powerful weapon to wield, so it’s of utmost importance to use it well and only for a good enough reason. So let’s see what those reasons might be.


Using Screenshots for Data Protection


The primary function of computer monitoring with screenshots is to provide an additional layer of protection for sensitive company data or client information.


Say you have an important document that should remain secure and you have a couple of employees working on it. Of course, trust is great, but you can never be too sure and plus sometimes clients want additional insurance that their information is protected. Fair enough.


Computer monitoring software lets you detect what those employees are working on and you can take a screenshot when they’re working on that task to make sure they’re not copying the document or sharing it with anyone. Even better, if you happen to have automatic time tracking software with screenshots and activity levels, you’ll be able to know which exact file each employee is accessing and activate screenshots when you see them working on a confidential document.


Keeping Track of Workflow


Another situation where screenshots can be used is tracking someone’s progress on a particular task. Keep in mind, though, that just your regular online project time tracking software that detects how much time an employee spends on a certain task is going to be sufficient in most cases and screenshots should be used only as a last resort.


So let’s say that you see that one of your employees spends a lot more time on a particular kind of task than their colleagues. You want to know whether that’s because they’re super detailed, they do more than expected or they just don’t know how to use that platform or finish that process efficiently enough.


While you could certainly approach them and ask, using a couple of remote screenshots can give you the same information without interrupting the employee. Besides, a worker might be hesitant to admit that they’re struggling with getting things done. But PC desktop monitoring software isn’t.


When You Shouldn’t Use Screenshots


By now, it’s clear that this feature is indeed very powerful. So you should be extremely careful when and how you use it.


For instance, when it comes to data security, you might be tempted to set automatic ongoing screenshots for individuals that you suspect are for some reason a threat. But if you go down this road, you have to be completely and objectively justified in your suspicions, otherwise you’re just targeting random individuals, which might even end up resulting in a lawsuit. So if you’re protecting your data from potential insider threats, do so indiscriminately.


Another important piece of advice is to never take or save screenshots of employees’ computers taken when they were using it for private matters, such as taking a quick look at their personal email inbox or logging into Facebook while on a break or, even worse yet, checking their bank account balance. Collecting this data is forbidden by law in many countries and it alienates employees and negatively impacts your company culture anyways.


And finally, always use screenshot feature of computer activity software when you absolutely have a good reason to.


Conclusion


Computer monitoring is more advanced than ever before and screenshot feature can help you with information security and tracking workflow. But precisely because it’s so powerful, you should use it responsibly. At the end of the day, tweaking these couple of things means nothing if you end up hurting your most valuable assets - employees.