Veriato Investigator

Identify, Investigate And Close Internal Investigations Faster With Veriato Investigator

Installs In Minutes. Provides You With The Evidence You Need In Seconds!

Conduct Best Practice Employee Investigations

Employee Internal investigations should be quick, fair and thorough. Veriato records all employee computer activity – speeding up eDiscovery efforts, limiting the risk of relevant data being deleted and visual context into an employee incident. These recordings are critical to prove or disprove an allegation, uncover employee theft, and create bulletproof evidence for legal proceedings.

Veriato Investigator can be deployed silently and remotely in minutes. From the moment it is installed, it begins records detailed information on employee activity, and enables fast, accurate, and efficient exploration and playback of the recorded data during employee investigations. Veriato employee investigation software provides the answers you need so informed decisions get made.

Get Accurate Evidence

Veriato employee investigation software automatically records all computer activity, creating a record that can be used as evidence in civil and criminal litigation.

Centrally Managed

Veriato Investigator’s invisible agent is deployed silently and managed from a remote console, so the target of the investigation is not alerted.

Keep Your Data Secure

Recordings are centrally encrypted, stored and password protected, ensuring only appropriate eyes access and view the data.

Video Playback

Veriato Investigator automatically records all computer activity, creating a record that can be used as evidence in civil and criminal litigation.

Website Activity

Capture website visits, searches performed, and social media activity, all with categorization and detailed time tracking.

Email Recording

Archive every email sent and received from both corporate email and webmail services such as Gmail and Yahoo.

Chat & IM

When investigating employee harassment claims, you’ll have a record of both sides of chat and instant messaging conversations.

File & Document Tracking

Watch for files being printed, edited on a network drive, or copied to an external device.

Application Activity

Track activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed.

Network Activity

Know exactly when an application was used, what was done while open and how long was the application in use.

Keystroke Logging

Capture communications activity in traditional email clients as well as many popular webmail services, and have a searchable system of record that can be alerted and reported on..

AI-Driven Insider Threat Detection

Veriato protects your organization from insider threats with predictive behavior analytics and user activity monitoring.

Application Tracking

Captures all application usage to provide true reporting on what applications are being used, by who, and for how long.

Psycholinguistic Analysis

Identify and categorize email text to determine the writer’s sentiment that can point towards possible security risks.

Screenshots

Choose between three types of screenshots: Continuous, Keyword Triggered and Activity Triggered.

Email Monitoring

Capture and analyze communication activity in traditional email clients as well as many popular webmail services.

Network Activity

Autonomously capture connections made by applications, including ports used and bandwidth consumed.

File & Document Tracking

Track activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed.

What Clients Have to Say

“We were able to document two employees planning activity in direct violation of nondisclosure and non-compete agreements.”

John Marshall
Dublin Medical

FAQs

Can I deploy this internal investigations software without my employees knowing they are being investigated?
Yes, by default, Veriato Investigator’s agent is deployed silently to either your Windows or Mac clients.
Can I record only certain activities?
Yes. Veriato Investigator allows you to configure the recording settings and disable the recording of any of the activity types you desire.
Where is the recorded activity stored and reviewed?
You can configure the recordings to remain on the computer being recorded and review the recordings remotely using Veriato Investigator’s Remote Viewer. Alternately, recordings can be configured to be stored on a central Data Vault computer, reviewing those recordings either from the Data Vault computer or remotely using the Remote Viewer.
How to I deploy Veriato Employee Investigations System?
No dedicated infrastructure is required to use Veriato Employee Investigations software. Installation and configuration takes minutes, not hours. Data is presented in easy to view format, meaning no specialized expertise is required to interpret the results.