RVM Tracer™

RVM Tracer Banner

It’s never easy when an employee leaves. One of the most difficult challenges is determining whether or not company information has walked out the door with that employee.Companies face this challenge every day.

RVM experience has shown that there is a cost-effective way to address these common problems without the burden of a full forensic analysis.

The RVM Tracer™ can be used as part of your exit interview strategy or as a tool to determine whether or not company documents have left with an employee. The RVM Tracer will enable you to quickly assess any situation in a cost-effective manner.

The Hypothetical

An employee leaves your company and you suspect that he/she may have walked out with a client contact list to bring to a competitor. Before launching a potentially costly forensic investigation, you can use the RVM Tracer™ to review key data from that employee’s computer.

The Findings

A review of the RVM Tracer reports finds that the employee accessed the client contact list in question on more than one occasion and used a cloud-based storage application. This provides enough information to warrant further investigation.

The Good News

It’s not always bad news. Reports often reveal that there is no need for further investigation, saving you thousands of dollars. The even better news is that the RVM Tracer™ is an easy-to-use, cost-effective way to find out.

The RVM Tracer™ provides the following reports on the computer activity of a departing employee:

Created Documents Report

Review a complete list of documents created and saved in locations like:
• A computer desktop
• Cloud-based folders
• External drives

RVM Tracer Link Access File Report

Link and Access File Reports

Review key data that is created when an employee accesses any file from:
• A computer
• Network file servers
• External drives

USB History and Drive Access Information Reports

Review network drive access and whether USB drives were used, seeing details such as:
• Drives accessed
• USB serial numbers
• Date and time of use


Browser History Reports

Review an employee’s Internet browser activity, such as:
• File sharing sites
• Online email accounts
• Social media activity


Installed Applications Report

Review a list of applications installed by an employee like:
• Cloud-based storage
• Malware
• Unauthorized applications

Request a Demo