<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: It’s 10 O’clock; Do You Know What Your Employees Are Doing on the Web?</title>
	<atom:link href="http://www.gfi.com/blog/web-monitoring-solution/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/web-monitoring-solution/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=web-monitoring-solution</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Carter Rubens</title>
		<link>http://www.gfi.com/blog/web-monitoring-solution/comment-page-1/#comment-29360</link>
		<dc:creator>Carter Rubens</dc:creator>
		<pubDate>Mon, 11 Jul 2011 17:47:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3305#comment-29360</guid>
		<description><![CDATA[I would add to what Jean says that it also matters WHO can access the collected information - the admins, the top managers, the HR department, etc. Sometimes managers use the collected information against employees who do no wrong but the managers want to sabotage this employee - for instance because the employee is pretty smart and would make a better boss than the present manager.]]></description>
		<content:encoded><![CDATA[<p>I would add to what Jean says that it also matters WHO can access the collected information &#8211; the admins, the top managers, the HR department, etc. Sometimes managers use the collected information against employees who do no wrong but the managers want to sabotage this employee &#8211; for instance because the employee is pretty smart and would make a better boss than the present manager.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anonymouse_Cat</title>
		<link>http://www.gfi.com/blog/web-monitoring-solution/comment-page-1/#comment-29250</link>
		<dc:creator>Anonymouse_Cat</dc:creator>
		<pubDate>Tue, 14 Jun 2011 07:27:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3305#comment-29250</guid>
		<description><![CDATA[Do you know what your employees are doing on the web?

As a former office manager, this question is difficult to answer. Speaking on my own experience, most of my former employees are hesitant toward web monitoring software. And I agree. Privacy can be breached when using such tool.

However, on the management and business sides, web monitoring solutions are heaven sent. For me, it made my job easier. After installing it within 2 weeks, I noticed my employees&#039; productivity doubled. It&#039;s because they are more focused to the given tasks.]]></description>
		<content:encoded><![CDATA[<p>Do you know what your employees are doing on the web?</p>
<p>As a former office manager, this question is difficult to answer. Speaking on my own experience, most of my former employees are hesitant toward web monitoring software. And I agree. Privacy can be breached when using such tool.</p>
<p>However, on the management and business sides, web monitoring solutions are heaven sent. For me, it made my job easier. After installing it within 2 weeks, I noticed my employees&#8217; productivity doubled. It&#8217;s because they are more focused to the given tasks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jean Loyens</title>
		<link>http://www.gfi.com/blog/web-monitoring-solution/comment-page-1/#comment-29235</link>
		<dc:creator>Jean Loyens</dc:creator>
		<pubDate>Thu, 09 Jun 2011 09:12:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3305#comment-29235</guid>
		<description><![CDATA[Just like the coin, a web monitoring solution has two faces. There&#039;s the employee-employer perspective and the security-privacy viewpoint. 

The key features mentioned above are the basic tools a web monitoring solution should have. However, what Ed failed to mention is that this kind of IT management platform should have a control that lets two opposing standpoints meet in between. 

For instance, when it comes to security-privacy, a web monitoring solution should have a limit to what data and activities are monitored, stored, and reported. This way, a win-win scenario can be achieved.]]></description>
		<content:encoded><![CDATA[<p>Just like the coin, a web monitoring solution has two faces. There&#8217;s the employee-employer perspective and the security-privacy viewpoint. </p>
<p>The key features mentioned above are the basic tools a web monitoring solution should have. However, what Ed failed to mention is that this kind of IT management platform should have a control that lets two opposing standpoints meet in between. </p>
<p>For instance, when it comes to security-privacy, a web monitoring solution should have a limit to what data and activities are monitored, stored, and reported. This way, a win-win scenario can be achieved.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: David Broussard</title>
		<link>http://www.gfi.com/blog/web-monitoring-solution/comment-page-1/#comment-29228</link>
		<dc:creator>David Broussard</dc:creator>
		<pubDate>Tue, 07 Jun 2011 11:09:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3305#comment-29228</guid>
		<description><![CDATA[I think most bottom-line employees feel like web monitoring is more of a Big Brother issue rather than protecting their jobs and the company network&#039;s health and security. The use of automated systems rather than somebody peering over logs looking for that &quot;gotcha&quot; moment goes a long way to rectify that misunderstanding. It&#039;s not about trying to find where people screw up, it&#039;s about preventing serious or long-term damage as a consequence of supposedly harmless action.]]></description>
		<content:encoded><![CDATA[<p>I think most bottom-line employees feel like web monitoring is more of a Big Brother issue rather than protecting their jobs and the company network&#8217;s health and security. The use of automated systems rather than somebody peering over logs looking for that &#8220;gotcha&#8221; moment goes a long way to rectify that misunderstanding. It&#8217;s not about trying to find where people screw up, it&#8217;s about preventing serious or long-term damage as a consequence of supposedly harmless action.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 05:55:25 by W3 Total Cache --