Lets not just call Scopd an Employee Monitoring solution, its much more than that. Scopd can improve productivity, increase revenue, improve profits and safeguard data.
Scopd can be used for Insider Threat Management, Employee Monitoring, User Behavior Analysis, Data Leak Prevention, User management, Endpoint management, Finding Disloyal Employees, Getting to know in advance who wants to leave job & most importantly Safeguard Confidential & Crucial Data.

Scopd provides essential tools for insider investigations and data leak prevention such as realtime monitoring, security alerts, activity monitoring and behaviour deviations. It will also help organizations to implement various Cyber Security Compliance like from Securities and Exchange Board of India – SEBI, Reserve Bank of India – RBI, Personal Data Protection – PDPA, GDPR, HIPPA etc.
Ministry of electronics & it (meity), CERT-In, CRAT, RBI, SEBI, IRDA, DOT, PCI-DSS, HIPPA, SANS20, OWASP, KYC protection, PDPA : somehow or other every organization – person – entity is obliged to implement robust cyber security measures which includes UBA and DLP.
SECURITY INNOVATIONS

Handwriting Recognition
Each person has their own keyboard writing style and Scopd can recognize a person by from typed text
Face ID, Face Recognition
AI recognizes the employee who most frequently use a computer and deny denies access to other people


Screen Photo Prevention
AI detects when someone takes a photo of a desktop and automatically prevent this by locking the workstation
Scopd Features:
PRODUCTIVITY REPORTS |
“Black box” Permanent recording of video from screen and audio from microphone/dynamics with encrypted storage on employees’ machines for further detailed analysis in a case of an incident investigation |
Face recognition Opportunity for periodic review of individuals employees with web camera and match it to other employee. The report is convenient for analyzing the presence of an employee or replacing it with someone else. It uses an offline “engine” of its own development based on a neural network. |
Risk and efficiency analyzer The analyzer which is customizable based on profiles and dictionaries shows an employee’s efficient, inefficient or dangerous work. |
Search by templates Variety of search criteria based on which you can create your own templates. |
Report on categories and deviations The summary report showing statistics in the context of the resource use categories and deviations from the average values of employees. |
Summary report A convenient summary report for a specific employee in the form of clickable circular charts where you can deepen to analyze a person’s productiveness. |
Summary simplified report Summary report on a group of employees in tabular form and the ability to export to Excel. |
Activity feed A graphical report which allows you to evaluate at what time intervals, what the user was doing and which extent. |
Keyboard typing style Allows to assess the employee’s condition in the workplace and to determine to some extent set the ability of another employee to work in someone else’s place. |
Machine time You can see how long employees computers have been turned on. |
Loading CPU/GPU Report allows you to see a detailed picture of CPU and video card usage over time (for controlling mining) |
User time User activity per day, absence, late arrivals, popular programs and sites, synchronization with Outlook calendar and ACS. |
Employees’ time sheets In the form of a standard time sheet with the ability to display data on computer activity or ACS data, the report displays information about absence, late arrivals, beginnings/endings of the working day and total time worked. |
Program start You will be able to see which programs and how long an employee has been working on them. |
Monitoring sites Report on sites visited by an employee. |
Input text (keylogger) All programs and websites have the ability to intercept an input text. |
Clipboard Text, files and pictures in clipboard. |
Search request Ability to see all search requests in various search engines – Google, Yandex, etc. |
Text messages in messengers Telegram Desktop, Skype, Microsoft Teams, WebSkype, Lync, Viber, Slack, Myteam – all cases. |
E-mail + attachments Interception of incoming and outgoing emails (with attachments) for: Microsoft Outlook – Exchange/IMAP/POP3/SMTP in all cases (with or without encryption); IBM Lotus Notes – all outgoing e-mail; Outlook Express, Thunderbird, Bat, Mail – POP3/SMTP (with or without encryption). |
Sending files to the Internet Files sent via the browser, email clients, Skype, Lync and popular messengers, FTP/FTPS. In all case files are intercepted and saved (with the possibility of prohibiting sending). |
File operation Intercept copying, deleting or transferring files. When there are copying files to a flash drive, shadow coping is possible. Support WebDav. |
Screenshots Taking screenshots with a lot of settings. |
Video based on screenshots Generation continuous video from screenshots for viewing via browser or media player. |
Print control + value Ability to intercept printed files in spooler format and calculate the cost depending on the set rate. |
Suspicious events Write to the report events that you can configure yourself (launching programs, websites, entering text based on the algorithm for inaccurate word comparison). |
Search for employee information Ability to search in generated report with regard to the algorithm for inaccurate word comparison. |
Webcam recording Recording of screenshots from the webcam of employees’ machines and saving on the server automatically. |
Report <<contacts>> Ability to see employee’s contact list, with whom he communicated by e-mail, Skype and in chats. |
Report <<connection Graph>> Visual display of the report “contacts” as an easy-to-view graph. |
Report <<Online users>> Allows to see visually when certain users were connected to the server. |
Geolocation Geolocation of laptop locations in Google maps. |
Control of the number of copies of installed software Ability to see the setting number of various software among the whole company to identify unlicensed software. |
Hardware and software monitoring Demonstrates changes in a part of the hardware on the machines and installed/removed software. |
Report based on SQL-requests Ability to make reports from the SQL base independently. |
ONLINE SURVILLIANCE |
Screen watching Taking single current screenshots or in a form of video stream. Ability to save as a video file. |
Webcam watching Taking single current photo or in a form of video stream. Ability to save as a video file. |
List of processes and windows Obtaining a list of active processes and opened windows of users. |
Pause monitoring You can always pause and remove the monitoring from the pause. |
Reaction to suspicious events Notification outputting of important events for users in the tray system and the browser window with sound. Ability to get SMS or e-mail notifications. |
Integration with Telegram Ability to send notifications about important events in personal chat of Telegram messenger. |
Sending messages Ability to send instant messages to users. |
Managing Realization a number of administrative functions online. Performing a number of administrative functions online. |
DLP FEATURES |
StopPhoto Protection against taking photos of the PC screen with smartphone while critical apps or websites are running. |
DLP in documents Opening, sending to the Internet, coping to a flash card, to clipboard of a document with keywords or phrases is accompanied by an event (or prohibition). Support .docx, .xlsx, .odt, .ods, .sxw formats. Ability to use an inaccurate text search, search by templates: credit cards, contacts, custom regular expression (RegExp PCRE). |
Prohibition of full or partial sending of files Ability to prohibit sending files via file sharing sites, email sites and programs, chats and social networks. |
Face recognition, fact of employee replacement If an employee is replaced at workplace by another third-party person or another employee, a security officer will immediately receive a notification of this situation in the form of event. An offline “engine” of our own development based on neural network is used for face recognition from web cameras. |
Protection of the sealing web cameras If an employee closes or seals web camera, the system will block screen and issue a notification (when face recognition is active). |
Protection of workplace from an outsider If the face recognition machine detects that another person is at an employee’s workplace, computer will be blocked until an employee’s username/ password is entered for the next time. |
Reporting of atypical user behavior The system will notify leader, if it detects atypical user behavior such as coping, sending or deleting files, coping of symbols in clipboard, opening browser tabs, etc. The number is set by administrator. |
Digital fingerprint of files Support for digital fingerprints of files by search and DLP-operations. |
Text recognition in screenshots (OCR) Prohibition of coping screenshots in clipboard (if it has an important text data). Inaccurate text search is possible. Support for the built-in offline engine OCR and online Abbyy OCR. |
Ability to prohibit clipboard Full prohibition or prohibition of PrintScreen button. |
Ability to prohibit web-sites Prevent browsers from visiting selected sites. |
Ability to prohibit FTP Full prohibition of transferring/receiving via FTP-protocol. |
Ability to prohibit WiFi/Bluetooth/USB-modem Ability to prohibit network connection via WiFi/Bluetooth/USB-modem |
“Black” and “white” list of programs Ability to prohibit start of programs in accordance with “black” and “white” lists. |
Ability to prohibit flash drive Ability to prohibit recording or full access to removable media. |
OTHER FEATURES |
Hidden and open watching You choose how to monitor employees. |
Working in the “outsourcing” mode In this mode an employee enables or disables self-monitoring. |
“Alarm button” Ability to turn off or lock all the computers quickly or make script on the server at the command via Telegram messenger. |
Sending reports to employees Ability for employees to receive reports of their work to their personal e-mail every day on a schedule. |
Sending reports to chiefs Ability to generate reports of employees on a schedule and send it to chiefs (by e-mail, FTP, DropBox and other ways) automatically. |