194 Reviews and Ratings
1 Reviews and Ratings
No answers on this topic
We have a hybrid environment for a few departments so we use ActivTrak to track their productivity on their work-from-home days and it provides a clear analysis between the productive vs non-productive times during their work days. We have less than 10 people that we monitor so I'm not sure how well-suited the system is or if there are any better options for larger companies. It certainly suits our needs though.Incentivized
It is a fundamental software nowadays that there are so many cyber threats, sensitive data, hacker attacks, outdated software, email threats. There are infinite things that are on the internet that can affect the internal network through users and FortiInsight has helped us to greatly reduce this type of problem of preventive analysis on the user's terminal and analyze the data later.Incentivized
Detailed listings of actions at times. done by the second in many cases, very useful.the productive/unproductive listings allow managers at a glance to see their employees use of timeSnapshots ( when properly utilized) are very helpful in troubleshooting, strange, occurrences, as well as they're used by Human resources.The IT help desk is very efficient. log in to your portal, bottom right, and in minutes your talking to someone.Incentivized
We have visibility and tracking of users' files and transfers through a collector installed on the device.Recording users and their activities.Forensic report.Detection of various types of threats.High standard technical support from Fortinet.Incentivized
Automatic time zones using the time zone of the device, to remove the constant need to change time zone per report.Would be useful if you could define websites/applications directly from the top websites/application page instead of being redirected.There have been problems with the monitoring application showing as not installed or detected on a machine that has it installed which is fixed by uninstalling and reinstalling the software. However, it is hard to identify user machines that have stopped working. We used to receive emails about PCs that have stopped reporting but not anymore.Incentivized
The interface can still be improved to make it simpler to be structured and configured.Support is a little expensive.Incentivized
We are in agreement that the tool is very handy as a security companion. The system collects and retain relevant historical data to be queried when you desire e.g. in security reviews once a week.Incentivized
ActivTrak is a great product that just keeps growing. Having used it for quite some time, we have been able to see ActivTrak grow and evolve as a product. The ActivTrak webinars are also helpful to get to know and learn the product. ActivTrak really just works with little effort needed after the initial installation Incentivized
It's never been down.Incentivized
Have not received any issues with Activtrak's performance in regard to loading pages, reports, or other systems.Incentivized
Support is always fast and the agents are ready at all times to help when an issue arises, if the tier 1 agent isn't able to provide a solution to the issue they're asked about they quickly escalate the issue to tier 2 or 3 to ensure that the appropriate support is given to the issue at hand to have it quickly solved. No issue we've had so far has taken more than two days to be solved.Incentivized
There should be a way to automatically implement the system without giving users the opportunity to accept or deny the program on their computers.Incentivized
We selected ActivTrak for the features we were looking for. One of the main reasons was the deployment for Chromebook's and of course the price. During our demo held with each party, we were impressed with presentation from ActivTrak. One thing we would've liked is for ActivTrak to also be available for deployment to Android phones.Incentivized
The product's overall scalability is good as our team grows. We would like to see updates to meet market demands.Incentivized
Defensive capabilities immediately avoided data exfiltration from an outgoing employee.Trends for underperforming or underdeveloping users can be spotted, analyzed by managers, and used within their overall development management to help staff reach their best potential.Costing for targeted use is relatively low and therefore a "no brainer."Incentivized
Increased security of data within the data network.More agility to act when a threat is detected.Inhibit external attacks.Incentivized