This document provides an agenda and information for a presentation on employee monitoring software called Spector360. The presentation discusses how SpectorSoft is a market leader in employee monitoring, the benefits of monitoring for increasing productivity and security, and common concerns around privacy and legality. Features of Spector360 are highlighted like monitoring application usage, internet behavior, and alerting on suspicious activity while providing detailed reports and evidence of violations.
IAC 2024 - IA Fast Track to Search Focused AI Solutions
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011
1. Enterprise Health Financial
Spector360 – Surveillance as a management tool
Sally Pigott – Territory Manager Central & Eastern Europe
Damian Hallmark – Systems Engineer
2. PC and Internet Monitoring Software
Agenda
• About SpectorSoft
• SpectorSoft Channel Model
• Employee Monitoring and Security – Who & Why?
• Insider Threats & Employee Productivity
• Building a case for Employee Monitoring
• Common Objections
• Q&A
2
3. PC and Internet Monitoring Software
About SpectorSoft
Featured In:
• Established 1998
• Strong Growth Year After Year
• Inc. 500/5000 List – 7 Times
• Market Leader
• More than 50,000 Businesses
• More than 300,000 Consumers
• Five Star Partner Program Winner
• 24/7 U.S. Based Customer Support
FIVE EDITORS’ CHOICE GOLD AWARD! 1ST PLACE
5-STAR AWARDS PC Magazine Rated #1 Product “The Best of the Best”
Gold Star Best in
THREE Time 2007 Monitoring 2005 & 2008 Monitoring
Partner Program Software Review Surveillance
Award Winner! Software Report
3
4. PC and Internet Monitoring Software
Our Customers
Corporate / Government / Education
4
5. PC and Internet Monitoring Software
Channel-Only Sales model
SpectorSoft will not sell Direct
– Two-Tier Distribution model (Head Technology)
• Pricing
• Project registration
• Licensing support
• Technical assistance
• Liaison with SpectorSoft
5
5
6. PC and Internet Monitoring Software
What is monitoring?
‘the ability to record, report and be alerted on employee activity’
• Application Usage
• Internet behaviour
• File protection and data movement
• Work patterns
• Identifying the good and the bad behavioral traits.
6
6
7. PC and Internet Monitoring Software
Who wants to know this information?
• Business owners
• Executives
• Shareholders
• IT
• Fellow employee’s.
7
7
8. PC and Internet Monitoring Software
Who is already doing it and how?
ALL organisations currently perform some form of employee
monitoring and security… FACT!
• Privilege and rights Management
• DLP (USB Lock down etc)
• Centralised Anti-Virus / Malware protection / Anti-Spam / Firewall
• Policy driven internet and application restrictions
• Archiving and encryption
• Password protection and Two Factor Authentication
8
8
9. PC and Internet Monitoring Software
Insider threats manifest in many different ways…
Privilege Abuse
• Snooping
• Rights Escalation
Deliberate Misconduct • Hacking Lost Productivity
• IP Theft •Technical Arrogance • Web Surfing
• Fraud • Chat
• Sabotage • Webmail
• Cust. Data Theft • Auctions
• Social Media
Insider Threats
Accidental Disclosure Hostile Environment
• Ignorance • Ethnic/Racial slurs
• Negligence • Sexual harassment
• Process Failure • Bullying
• Technical Failure • Discrimination
9
9
10. PC and Internet Monitoring Software
Spector 360… Key Features
Why Employee Monitoring…..?
• Increase employee productivity
• Conduct investigations and document violations
• Ensure adherence to Internet Acceptable Use Policies
• Provide “insider” theft protection
• Reduce bandwidth consumption and help desk calls
• Meet compliance requirements
10
11. PC and Internet Monitoring Software
SPECTOR 360 – Solution Components
Open Architecture
Fast & easy installation
Scales with network servers &
desktop volume
Remote configuration, installation
and administration
Centralized data archiving
Supports Citrix XenDesktop / Server
Will record and report on satellite
offices and remote -workers
Create multiple Desktops and views
for different managers, HR, IT, etc.
11
12. PC and Internet Monitoring Software
Spector 360
• Enables organizations to
visually analyze employee
behavior over time
• Alerts internal resources on
suspected activity across a
comprehensive range of user
related activities
• Configurable and adaptable to
changing environment
• Permits the extraction of
historical event data for
external analysis and reporting
12
12
13. PC and Internet Monitoring Software
See what happened……..and how?
• See the details of every event, both simple and complex
• See a time-line for every event
• Discover all information across all systems
• Analyse each event in context
• What happened before, during and after an event?
13
14. PC and Internet Monitoring Software
If you don’t know it happened, how do you prevent
it…..?
Active Monitoring approach:
• Always on and vigilant to deal with the unpredictability of users
• Provides contextual visibility into user behavior and activities
• Alerting of suspected threat activity across a range of user activity
• Captures intent
• Offloads event data; preserves historical evidence to support
subsequent forensic investigations
14
14
15. PC and Internet Monitoring Software
Building a Case for Employee Monitoring
• Businesses are still challenged to identify, track and stop insider threats
• Traditional DLP solutions, only identify when the breach actually occurs.
• Almost all insiders give themselves away before the breach by testing
their environment for vulnerabilities and access. This early testing is very
difficult to identify.
• Traditional DLP solutions generate a wealth of false positives requiring
extensive reconciliation.
• When DLP identifies a threat, forensic data must be collected before it is
lost.
• DLP solutions often require specialist forensic teams to analyze the
pertinent data.
15
15
16. PC and Internet Monitoring Software
Non-DLP Threats to business
• Unauthorized access to a systems or data
• Unwanted disruption or denial of service
• Sexual harassment in the work place
• Physical/ Verbal threats via instant messenger or email
• Unauthorized use of a system for the processing, storage of data or
personal use
• Unauthorized changes to system hardware, firmware, or software
16
16
17. PC and Internet Monitoring Software
Is it Legal……………..?
It depends…
• Data Protection Act
• Data Privacy laws
• European Employee Councils
• Adequately informing employees
17
17
18. PC and Internet Monitoring Software
In Summary……….
Active Monitoring enables:
• Near-real time alerting
• Remote rapid deployment of the recorder
• Support for remote-workers, Central-Branch architectures including
international sites
• Client recorder: extremely small, untraceable foot print
• Detailed, web and secure document based reports for business
managers
• Detailed evidence of violations including supportive video
• Identify how & when and all involved parties
18
18