How It Works
The 4 Steps: Calendar to Report
Connect your Google, Apple, or Outlook calendar. ProtectHire auto-detects upcoming interviews and prepares monitoring. Choose Lightweight (meeting bot) or Heavyweight (desktop agent) per interview. During the session, get real-time alerts. After the interview, receive a full integrity report with risk scores, flagged events, and PDF export.
Lightweight vs Heavyweight Protection
Lightweight mode deploys a meeting bot that joins your video call as a participant — zero candidate friction, zero downloads. It covers behavioral analysis, deepfake detection, AI/LLM response detection, and identity verification. Heavyweight mode adds a desktop agent (1-click install) with OS-level process monitoring, stealth AI tool detection, hidden overlay detection, input origin tracking, and full environment monitoring. You choose the mode per interview based on your needs.
What Happens During an Interview
Your interviewer dashboard shows live alerts as issues are detected. See real-time integrity scores update during the session. Flags include AI tool usage, suspicious gaze patterns, response timing anomalies, and identity mismatches. Each alert includes severity level, timestamp, and contextual details so your team can adjust their approach on the spot.
Sample Integrity Report
After each interview, receive a comprehensive integrity report. The report includes an overall risk score, a flagged events timeline with exact timestamps, environment details, detection method breakdowns, and severity ratings for each issue. Export the full report as a PDF for your records — everything your legal and HR teams need in one document.
Detection Methods Explained
Seven detection layers work together: (1) Stealth AI tool detection finds Cluely, Parakeet, Interview Coder, and 100+ more tools. (2) Behavioral analysis tracks gaze patterns, response timing, and typing patterns. (3) Deepfake detection identifies synthetic faces and voice manipulation. (4) AI/LLM response detection spots AI-generated answers. (5) Environment monitoring checks for suspicious network and device configurations. (6) Hidden overlay detection finds invisible screens and tools. (7) Input origin tracking verifies whether responses come from the candidate directly.