Press Release
Vigilant Applications Ltd and SeeChange Technologies announce a strategic partnership
Learn about how we are incorporating AI into our retail product LiveStore through partnership with Vision AI specialists SeeChange.
Learn about how we are incorporating AI into our retail product LiveStore through partnership with Vision AI specialists SeeChange.
Data Sheet
McDonald’s LiveStore leading-edge loss prevention solution for Retail
LiveStore harnesses existing restaurant technology, including CCTV systems, to deliver a powerful intelligence platform that massively enhances profit protection.
LiveStore harnesses existing restaurant technology, including CCTV systems, to deliver a powerful intelligence platform that massively enhances profit protection.
Blog
LiveStore® Your Remote Duty Manager, addressing loss prevention in the retail business with real-time operational intelligence
How can legacy IT systems keep pace with the quick service demanded by QSR chains and enable real-time loss prevention in the retail business?
How can legacy IT systems keep pace with the quick service demanded by QSR chains and enable real-time loss prevention in the retail business?
Data Sheet
VigilancePro – User Activity Monitoring delivering effective Insider Threat Management
By analysing user activity across the entire organisation covering office, remote worker and field-based staff and regardless of whether they are using fixed or mobile devices VigilancePro delivers highly effective insider threat management.
By analysing user activity across the entire organisation covering office, remote worker and field-based staff and regardless of whether they are using fixed or mobile devices VigilancePro delivers highly effective insider threat management.
Blog
How Employee Monitoring Software can help HR protect and retain their workforce
As pioneers in the Insider Threat space, in the early days of deploying our employee monitoring software VigilancePro, we were often faced with a conflicting rationale between commercial risk to a business and the wellbeing of the workforce.
As pioneers in the Insider Threat space, in the early days of deploying our employee monitoring software VigilancePro, we were often faced with a conflicting rationale between commercial risk to a business and the wellbeing of the workforce.
Case Study
Secure data sharing solution VigilancePro delivers tangible ROI to Essex County Council
VigilancePro was selected in a European-wide tender process to help 15 local authorities tackle fraud and recoup £3 million in incorrect and fraudulent discounts, exemptions, parking permits and benefits claims.
VigilancePro was selected in a European-wide tender process to help 15 local authorities tackle fraud and recoup £3 million in incorrect and fraudulent discounts, exemptions, parking permits and benefits claims.
Data Sheet
Proportionate User Activity Monitoring & Audit for Police and Security Agencies
VigilancePro is used extensively by Police and other security agencies for Lawful Business Monitoring (LBM) and ensuring adherence to Professional Standards Guidelines.
VigilancePro is used extensively by Police and other security agencies for Lawful Business Monitoring (LBM) and ensuring adherence to Professional Standards Guidelines.
Case Study
VigilancePro is at the Heart of NIIAS – Digital Health and Care Wales
The National Intelligent Integrated Audit Solution for NHS Wales was implemented to ensure patient confidentiality as patient records became electronically available.
The National Intelligent Integrated Audit Solution for NHS Wales was implemented to ensure patient confidentiality as patient records became electronically available.
Blog
The Insider Threat – Proportionate monitoring with a capital ‘P’
When Vigilant started on the journey to develop real-time security technology that would address the insider threat from employees, the majority of enterprise security vendors at the time were concentrating on the perimeter and external vectors.
When Vigilant started on the journey to develop real-time security technology that would address the insider threat from employees, the majority of enterprise security vendors at the time were concentrating on the perimeter and external vectors.
Put advanced user activity
monitoring into action
We’ve worked with a wide range of different companies and organisations in meeting their insider threat prevention and compliance needs.
Read more on our solutions page, or get in touch to book a discovery session.