Peek and Spy lets a privileged user see exactly what is on another user's terminal and then permits him to either take control of that terminal to fix the problem from his own or let the user have control while he gives any needed instructions. If the Peek and Spy user chooses to fix it himself, his input can be displayed on the user's screen to show him/her how it was fixed. Now system managers can solve user problems (especially remote ones) without having to go to the user to solve them. Where PEEK informs users they are being watched, SPY doesn't. In addition, SPY gives system managers documented proof of security breaches and provides a tool to lock out unauthorized users.
When a system manager can see a user's screen he/she will not have to depend on that inexperienced user to determine their exact problem or describe it accurately over the phone. Nor will he waste time going to the user's terminal. He can see the screen repainted as it was before he started watching with whatever error messages were on it. The terminal attributes and characteristics are also correctly displayed. And the user gets to see the correct handling for the difficulty he/she had. Peek and Spy solves the problem of how to give personal attention to users and trainees at a distance and permits remote, interactive training and demonstrations.
Concerning security, Peek and Spy allows the privileged user to see and log everything done by another user using any one of four journaling options. Peek and Spy can log the observed user's session actions to an output file. It also permits locking out a user's keyboard in the case of a security breach. With Spy the user is not aware he/she is being observed.
||Free to try