Download Perwatch app and start monitoring your employees' performance




Today, with the digitalization of every system in companies, the workload of IT managers is increasing day by day. Growing servers, operating system problems, security concerns, backup system and network topologies already occupy most of the day. In addition, the maintenance and installation processes of software that are constantly added to the system can sometimes increase the pressure on the team. We know this because there are many IT executives among Perwatch founders and directors. For this reason, while developing our application, we have added many features and methods aimed at making your work easier. While producing the necessary data for HR, we will continue to develop tools for the needs of the IT team.
Native AD integration. This is the way. You install the Agent and if an Active Directory user logs into the computer, it instantly integrates into Perwatch. That's it. This is possible because Perwatch connects to user sessions. For Perwatch, the user's session becomes active for tracking and licensing operations instead of the computer hostname. In this way, even if the user logs in from another computer, the follow-up chain of that person continues without interruption. Even if the computer is formatted, it is not a problem. Joining the system to the AD structure and reinstalling the Perwatch tracking application is enough to start the tracking from where it left off.
Most of the time, we may need to restart computers, log off or turn off the device completely for different reasons. Perwatch can provide you with quick solutions at this point. You can simply take the necessary action from the user interface in a few seconds and help the user who is having trouble. Yes, we cannot convince users, but restarting the system can still solve many problems.
Sometimes we may need the specs of user computers. It may be necessary to create an inventory or update the staff's computer. With Perwatch, you can access the basic hardware information of computers and access local and wan ip addresses. You can see whether computers are on or off and you can perform basic IT inventory management operations. We will be offering a much larger inventory report in the near future. A lot of features that we have included in our development plan and that we believe you will like are about to arrive.
With the file activity tracking and alert rules modules in Perwatch, you can take quick actions for possible risks. You can both keep logs and generate instant alerts when there is a change in a file or in the process of deletion, copying. If the user's actions triggered an alert rule, the module can send you the generated alert rule number via email, in-app or telegram message. Managers can review the created alert rules any time with the help of date or event id. Early detection of possible system intrusions or internal threat management offers a very low cost solution within ISO 27001 requirements.
In some cases, it may be necessary to prevent users from performing operations on the computer. You can use the computer locking feature to take quick action at points where users' access to the computer needs to be permanently or temporarily restricted. On remotely locked computers, keyboard and mouse operations blocked and a message appears on the screen that only you want to see.
We always come across situations where an urgent message needs to be delivered to users. Being able to send a quick message to the user screens for an update or system maintenance can save us a lot of time and protect us from unnecessary negative words that will come to us when the users are in danger of losing their work. Perwatch has a fast alert sending feature. After entering the title and your message, you can provide fast delivery by choosing to whom the message will be forwarded. The system will also quickly inform you who received the message.
Streamline your IT operations with comprehensive infrastructure management tools, automated security monitoring, and centralized control systems designed to optimize IT resource utilization and enhance organizational security posture.
Instant access to information such as file deletion, modification and moving on company computers and shares.
Lock your computers and prevent unauthorized operations wherever they are in the world.
Send instant alert messages to your employees' computers. Track who the messages reach.
Get notified immediately when an action you have set is triggered and create automatic proof with screenshots.
Support your employees with keyboard and mouse control. Solve software problems faster.
By providing you with general computer hardware information, we enable you to create an inventory more easily.