SERVICES EMPLOYEE MONITORING

THREAT DETECTION & EMPLOYEE MONITERING

We have partnered with Veriato to deliver a whole new AI-powered security platform that allows you to review User Entity Behaviour Analytics with User Activity Monitoring, allowing rapid Data Breach Response


The ability to hunt threats by proactively recognizing signs of risk, like changes in an employee’s attitude and behavioural patterns, allows you to move your security posture from reactive to proactive.


Brightridge offer cloud and on-premise options with simple implementation. All records can be deployed and managed from the dashboard.



Contact us for a IOT & Tracking Consultation

For an insight in to how we can Enhance your Business Protection and Improve your Employee Productivity just fill out our form or book in for a discovery call below.

PHONE

0131 202 0777

HOURS

Monday - Friday
​9:00am - 5:30pm

EMAIL

sales@brightridge.co.uk

Productivity & Engagement Monitoring

Advanced Monitoring for Employees in Office or at Remote Locations

Productivity Metrics

At-a-glance reporting lets you quickly see:
  • Log in and log out times
  • Time spent actively using work and non-work related applications
  • Time spent on websites
  • Time spent on social media
  • And much more…

Employee Disengagement

The ability to identify employee disengagement is crucial. This is especially true for a distributed workforce where personal interaction is limited at best.

Cerebral’s AI utilizes psycholinguistics to continually monitor employees' written language to identify and alert you of signs of employee disengagement.

See Who's Thriving & Who's Struggling

Not everyone thrives when working from home. To effectively work from home you need self-motivation, self-direction and self-discipline. Additionally many people struggle with the isolation from their colleagues.

As a manager you need visibility and metrics to manage a dispersed workforce.

FEATURES

WEB ACTIVITY

Significantly more sophisticated than browser history, Cerebral records, and maintains information about web activity, including webmail usage, file uploads, and how long a user was engaged or active on a site.

CHAT & IM ACTIVITY

Capture, scan, alert and report on communications activity occurring on commonly used messaging apps; creates a definitive record for compliance and investigative uses.

FILE  TRACKING

Tracks activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed.

COMPROMISED CREDENTIALS

Cerebral monitors access to workstations and servers for unusual access by IP addresses, geolocation, and more.

PHYSCHOLINGUISTIC ANALYSIS

Using computational linguistic analysis, Cerebral can identify and categorize opinions expressed in email text, to determine the writer's sentiment and sentiment changes that can point towards disgruntled workers and possible security risks.

KEYSTROKE 
LOGGING

When needed, the option to record every keystroke, including “hidden” characters and combinations, insures you have the visibility you need into the activity of highly privileged users. With the Cerebral keylogger feature, all keystrokes can be recorded.

EMAIL ACTIVITY

Capture communications activity in traditional email clients as well as many popular webmail services. A searchable system of records that can be alerted and reported on.

NETWORK ACTIVITY

Autonomously captures connections made by applications, including ports used and bandwidth consumed as well as time and location of connection

APPLICATION ACTIVITY

Captures all application usage to provide true reporting on what applications are open, being actively used, by who, and for how long.

DARK WEB TRACKING

Get alerted when employees access the Dark Web using the Tor Browser

USER STATUS

Produces an accurate record of session time and activity. Tracks logon and logoff but does not rely on logoff to identify when session activity ends.

GEOLOCATION

Data on the location of an Android device can be tracked as well as configured to alert security when a user device enters a restricted location or moves outside a specified geographic area.

BASELINING

Self-learning of behavioural patterns for individuals and groups, driven by advanced machine learning, enables no-touch understanding of what normal looks like for everyone in your environment.

ANOMOLY DETECTION

Detects deviations from established patterns enabling early warning of insider threats.

RISK SCORING

Actions and activities all play a part in building a comprehensive Risk Score for each user on your network. This activity data is then used to rank risky users in a watchlist which can efficiently be used to prioritize, predict and prevent potential threats. 

GDPR Compliance

The EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 20 years – we’re here to help make sure you’re prepared​. 


Compliance with GDPR not only means following its requirements. It also means being able to demonstrate that there are policies and procedures in place to ensure the careful consideration of all points of client interaction. Then, to ensure ongoing compliance that these are reviewed on a regular basis.


Brightridge partnered with Veriato, a market leader in User Behaviour Analytics, providing the 360 visibility around your data that you need to protect sensitive information against the insider threat.