Crystalkeen logo Crystalkeen header
validsafe Validsafe

Crystal Reports Schedulers, Viewers, and other Tools for Crystal Reports Systems. Money-back Guarantee.

Basket Empty  

Crystal Reports viewers
Crystal Reports viewers allow people without a Crystal Reports license to view . rpt files with full drilldown and live data. No concurrent user licensing required. Easy to use.
See Viewers
Crystal Reports schedulers
Crystal Reports schedulers let you send specific reports to specific people at specific times. We offer five Crystal Reports schedulers; they come in Windows application and Windows Service versions.
See Schedulers
Graphics enhancement tools for Crystal Reports
Enhance the visual impact of your reports. cViewIMAGE dynamically includes images. CR Chart enhances graphing abilities. Other image tools also make your reports stand out.
See Image Tools
Data analysis tools
Use analysis tools to keep your information system working properly. Find data items with Find it EZ. Use Report Analyzer to detect and document potential performance issues.
See Analysis Tools

Why Viewers?

With a Crystal Reports viewer, you can share your .rpt files with someone who does not have a Crystal Reports license. That could be a critical customer or supplier outside your company (not just a department within your company).

We were the first to offer a viewer that refreshes against live data, enabling users to get pretty much the same thing as a report on demand. Our viewers still have innovations not yet implemented by competitors. But why buy a Crystal Reports viewer when a free one comes with Crystal Reports? That viewer is quite limited, and it likely does not meet your needs if you are truly making use of your Crystal Reports system.

Why Schedulers?

A Crystal Reports scheduler allows you to send reports out on a predetermined time, day, etc. Most schedulers allow you to set up individual distribution lists. Our schedulers give you the flexibility you really need, by allowing you to schedule any report to any distribution list.

You can schedule as many reports as you want, set up as many distribution lists as you want, and send the same report to different lists or different reports to the same list. In short, we built it based on how administrators actually work.

Because you can "set it and forget it," your reports get distributed automatically when you want, to whom you want. A great benefit of using a scheduler is once you schedule a report, users won't be interrupting you asking you to manually send it out.

Simple scheduler page, quick overview of Crystal Reports schedulers

Why Graphics Tools?

The graphics display capabilities of Crystal Reports is respectable, but limited. But for all sorts of critical information, they can easily leave your report design falling flat. We offer tools that fix that problem.

If your goal is to present information clearly so that decision-makers can easily make sense of it, you want these tools in your arsenal. A great side benefit is these not only make your reports look good, they make you look good as a report designer.

Why Analyzers?

You probably don't have time to squander manually searching for where a "lost" data item is or where all instances of a report anomally or formual are. These analysis tools give you the power to quickly find important objects and other items not just in Crystal Reports but in any data source.


Using our Crystal Reports viewers and other tools will help you make your Crystal Reports system more efficient and more useful. But what about making it more safe from hostile actions? These security tips will help you protect your Crystal Reports system.

  • Define the report distribution parameters. Who needs a given report? Who doesn't? Why?
  • Control passwords strictly. Educate end-users on the password policy. Stress to them that writing passwords on the bottom of coffee cups, making passwords all alpha, and other careless measures can some jobs. Some experts suggest it's a good idea to set passwords to expire every X days. End-users really hate this. To cope with it, they write passwords down where they can find them. Nobody wants to memorize a new password every week. So nobody does. Consider the actual consequences of such a policy, rather than its intentions.
  • Educate end-users to log out if they leave their workstations. This is a security measure. It's also a way of conserving user seats when a license provides a limited number of seats.
  • Educate end-users to clear out their caches and temporary folders after viewing sensitive files. Does this step seems a bit like spitting into the wind? Ask your network admin to set up the system so those folders reside on a central server. Or are deleted upon logout. It is also possible to have those folders purge at boot-up, but that means slow boot-ups.
  • Educate end-users not to print their reports unless they really need to. Paper reports are a huge security risk. Not to mention a waste of resources.
  • Educate end-users to shred paper reports they no longer need. They must lock up unattended paper reports, too.
  • Put a security disclaimer on reports that have sensitive information. Ask your operations manager for instructions on what that text should be.
  • Develop a concise written security policy. Get your operations manager's approval. Distribute it to all end-users.
  • Do random security checks. The idea isn't to "bust" violators. It's to identify and correct problems. Submit a detailed report of these checks to your operations manager. Include absolute and relative data (number and kinds of violations, and the trends). Also include a summary of the severity and specific risks. Your operations manager may ask you to step up training or to "turn in" violators.
SecurityPrivacy Payment Methods
©Mindconnection, LLC