23
1 PC & Internet Monitoring Software www.spector360.com The Worldwide Leader BUSINESS EDUCATION GOVERNMENT HOME Worldwide Leader PC & Internet Monitoring and Surveillance Software 2009 2008 2007 2005 2004

How we\'ve helped our clients resolve human resources, regulatory and productivity issues

Embed Size (px)

Citation preview

1

PC & Internet Monitoring Software

www.spector360.com

The Worldwide Leader

BUSINESS EDUCATION GOVERNMENT HOME

Worldwide LeaderPC & Internet Monitoring and Surveillance Software

20092008200720052004

2

PC & Internet Monitoring Software

www.spector360.com

• Established 1998 • Strong Growth Year after Year• Inc. 500/5000 List – 5 times• Over 500,000 Customers• Over 50,000 Businesses• 24/7 U.S. Based Customer Support

GOLD AWARD!

Rated #1 Product2007 MonitoringSoftware Report

EDITORS’ CHOICE

PC MagazineTHREE Time

Award Winner!

1ST PLACE“The Best of the Best”2005 & 2008 Monitoring

Software Review

FIVE 5-STAR AWARDS

Gold Star Partner Program

BEST INSURVEILLANCE

Featured In:About SpectorSoft

2009 AWARD OFEXCELLENCE

3

PC & Internet Monitoring Software

www.spector360.com

Our Customers

Corporate / Government / Education

4

PC & Internet Monitoring Software

www.spector360.com

• Established 1999 • SMB Specialist• First Certified Microsoft Small

Business Specialist in Michigan• 4 offices: Grosse Pointe Park, Royal

Oak, Livonia, Pinckney• Provide full IT services, projects, or

supplement in-house IT• MVP Award in ISA and EBS

About Harbor Computer Services

5

PC & Internet Monitoring Software

www.spector360.com

Computer Activity Monitoring & Archive Solutions

Spector CNE Investigator• Conduct focused employee investigations• Prove or disprove claims – gather evidence

Spector 360• Dashboard aggregates and reports on the entire organization• Discover Trends & Patterns• Easily drill down to investigate specific employees

6

PC & Internet Monitoring Software

www.spector360.com

Malicious fraud, theft and sabotage are often complex and use insider knowledge to circumvent existing security

Every employee presents an insider threat due to, carelessness, ignorance and users taking shortcuts

Insider Threats are REAL

Financial & Legal Costs of Internet Abuse30 to 40% of internet access is spent on non-work related browsing,

60% of all online purchases are made during working hours.

Law Violations – Copyright, Illegal software & music downloads;

Sexual Harassment - Porn Downloads & Inappropriate personal emails

Just 10 Minutes Wasted a Day = 1 FULL Week a Year of Lost Productivity!

Social “Not-Working”Facebook has over 97 million users; Adults spend, on average, over of three hours a day on Facebook. Nearly half of all online workers use Facebook at the office.

But tools like Facebook & Twitter can be useful for business and for employees to have a better Work / Life Balance. So what are you to do?

7

PC & Internet Monitoring Software

www.spector360.com

Records Everything

Chat & IM Conversation including MySpace

Websites Visited and How Long they Stayed

Keystrokes Typed with or without Passwords

Applications Launched & Time Spent

Files Transferred and To Where

Documents Edited, Deleted or Printed

User Activity When users log in, log off, or not at PC

Drives accessed and other Network Activity

Online Searches What They Search For on the Internet

Screen Snap Shots show exactly what they were doing

Keyword Alerts to Warn of Important Words & Phrases

What Can You Do?

8

PC & Internet Monitoring Software

www.spector360.com

Discover Where your Problems Areas are

Ensure adherence to Acceptable Use Policies

Deter Waste – Increase Productivity

Conduct Investigations and Document Violations

Provide “Insider” Theft Detection & Protection

Reduce Bandwidth, Printer Usage, Storage, Malware and Support Calls

Meet Compliance Requirements

Archive Communications and All Activities

How Spector 360 Can Help

“Spector 360 is the most mature surveillance

offering for business use.”

-PC Magazine

9

PC & Internet Monitoring Software

www.spector360.com

Add value and “fill gaps” left by other solutions

CORE VALUE

omputer Monitoring Quantifiable productivity and cost savings

ata Loss Detection Detect and prevent data leaks

pplication Control Find out which applications are used and which

are most productive

rchive & Compliance Track all activity and communications including:

Webmail & IM

eb Filtering Monitor all computer usage, not just what goes

through the filter

esktop Management Easily discover what caused IT Issues

etwork Monitoring Save on bandwidth and storage

ecurity Event Management Logs all activity on computers

ADDITIONAL VALUE – Fills the Gaps

10

PC & Internet Monitoring Software

www.spector360.com

Spector 360 – Components Fast & easy installation

Scales with network servers & computers

Control Center enables remote configuration, installation

Centralized data archiving to included SQL Server

Supports Citrix XenDesktop / Server

Will record and report on remote offices and tele-workers

Create multiple Dashboards for different stakeholders with policy-based controls

Stealth Mode completely hides recorder from employees & users

11

PC & Internet Monitoring Software

www.spector360.com

Contact SpectorSoft 24-Hours a Day

Spector 360Demo

Contact SpectorSoft

12

PC & Internet Monitoring Software

www.spector360.com

SpectorSoft surveyed over 300 organizations that use Spector 360 and found out some very interesting information…

Results of a 2009 Customer Survey

13

PC & Internet Monitoring Software

www.spector360.com

46%

38%

12%

4%

Monitoring and filtering are equally valuable

Monitoring is MORE valuable

N/A – I don’t use Web Filtering

Filtering is more valuable

Filtering is NOT Enough

14

PC & Internet Monitoring Software

www.spector360.com

YES!Nearly ALL of the companies

surveyed confirmed their suspicions of INTERNET

ABUSE, lost productivity, and compliance violations

NO 4%

96%

Did Spector 360 Support Your Suspicions?

15

PC & Internet Monitoring Software

www.spector360.com

31%

30%

28%

11%

Detected about as muchas we expected

Detected slightly more abusethan expected

Detected FAR MORE abuse than expected

Detected less abuse than expected

Did You Detect More Abuse Than Expected?

16

PC & Internet Monitoring Software

www.spector360.com

89% Internet Abuse and Wasting Time:

50% Employees Using Too Much Bandwidth

48% Downloading Illegal or Inappropriate Material (porn, pirated music, software etc…)

24% Workers Arriving Late, Leaving Early or Taking Long Breaks

11% Stealing Confidential Files

8% Applications We Pay For That Are Not Being Used

6% Other

Other Findings

17

PC & Internet Monitoring Software

www.spector360.com

Contact SpectorSoft 24-Hours a Day

Contact SpectorSoft:

[email protected]

Contact SpectorSoft

18

PC & Internet Monitoring Software

www.spector360.com

YES!Some employees have attempted to use the Fourth Amendment of the United States Constitution to argue against monitoring, but the courts have sided with employers, stating that theemployer owns the equipment and resources beingused and they have a right to monitor both for employee productivity and to guard against theft and fraud.(Adams, Scheuing, & Feeley, 2000).

Courts have ruled that if an employee is using anemployer's equipment (even at home, after work hours)or computer network (even on their own personal computer),an employer's freedom to monitor electronic communicationsis not limited by any reasonable expectation of privacy.

Is Monitoring Legal?

19

PC & Internet Monitoring Software

www.spector360.com

Spector 360 Identifies and Ends Widespread Abuse at F&B Communications

“One employee showed no abuse at all, starting work on time and working all day long,” said Laursen. “Another logged very little non-work activity at all. But with the exception of those two, EVERYONE was abusing.”

-- Ken LaursenGeneral Manager,

F&B Communications

20

PC & Internet Monitoring Software

www.spector360.com

Tracking Secure Data

– Problem

• Client is a defense contractor

• Data must not leave the building

• Data must not be accessed by non-USA citizens

Harbor Computer Services

- Solution• Secure access to files

using BitLocker and NTFS permissions

• Monitoring with Spectorsoft we can show chain of custody and prove if necessary that the files are handled correctly by staff

21

PC & Internet Monitoring Software

www.spector360.com

Self Directed Productivity – What happens if we show them?

- Problem• Employees spending time on

personal activities• Peer complaints• Potential sexual harassment

Harbor Computer Services

Advocate for job appropriate use on IT resourcesEliminate time and effort trying to chase down problemsEmployee behavior changes

- Solution• Send every employee a

report of previous day activities

22

PC & Internet Monitoring Software

www.spector360.com

Protecting Corporate Information

- Problem• Competitors were under

bidding• Suspect employee sabotage• Employees sending quote

information to competitors

Harbor Computer Services

- Solution• Implement monitoring of

email messages and attachments whether on corporate or personal email accounts

23

PC & Internet Monitoring Software

www.spector360.com

Contact SpectorSoft 24-Hours a Day

Contact SpectorSoft:[email protected]

Contact Harbor Computer Services:Harborcomputerservices.net(248) [email protected]

Contact SpectorSoft and Harbor Computer Services