SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
Features Spector 360 – User Masking + Selective URL Recording




Spector 360                                                          ®



User Masking For Advanced Security & Privacy Protection
Spector 360’s ‘User Masking’ feature allows organizations to monitor employee or student PC and
Internet activity while maintaining a computer user’s personal privacy.


‘User Masking’ hides the identities of individuals by replacing          More Advances
‘user login’ and ‘computer name’ with asterisks – ***** – for
everyday monitoring. This feature can be turned off when                 Another Spector 360 advanced security feature is the ability to
an organization determines probable cause for investigation              ‘Enable Selective Recording of URLs.’ When recording of specific
and needs to know exactly which person may be engaged in                 URLs is disabled, employees can conduct company-approved
inappropriate or illegal activity.                                       personal activities like Internet banking or online management
                                                                         of healthcare issues without concern that anyone will be able to
For Example                                                              review even as much as a single keystroke.

Spector 360 ‘User Masking’ has been successful in parts of               Enabling ‘User Masking’
the world where viewing a specific individual’s computer
and Internet activities is either prohibited or considered               Masking can be turned off and on only by logging into the
unacceptable management policy.                                          Master System Administrator account. To enable the ‘User
                                                                         Masking’ feature, open the Spector 360 Dashboard using the
In parts of the European Union, for example, viewing recorded            System Administrator Account.
PC and Internet activity requires a joint decision between
management and a union representative. In this case of dual              Click on the Management button in the lower left corner, then
authentication, the required System Administrator “Master                click on “Dashboard Logins” in the upper left – see Figure 1
Account” password can be split into two pieces, one each held by         below – to display users who have access to a Dashboard login.
management and the union. With the two combined, the team                Modify a user by double-clicking the user’s name, then uncheck
attains Spector 360 Master Access, and ‘User Masking’ can be             the box that says “Display user’s name in event data.”
turned off temporarily. Having done so, viewing the computer
and Internet activities of the specific individual is accomplished
within specified guidelines. Following the procedure, ‘User
                                                                             Figure 1. The Spector 360 Management Folders and
Masking’ can be turned back on.                                              Dashboard Logins Management is the starting point for
                                                                             implementation of ‘User Masking.’
Even for organizations without overriding legal issues or
sensitive cultural considerations, ‘User Masking’ can balance
security with privacy. With ‘User Masking’ turned on, an
organization can obtain all the security and peace of mind
Spector 360 monitoring provides, without revealing user-specific
PC and Internet activity. However, if a high-level Spector 360
chart or graph reveals frivolous or inappropriate activity, ‘User
Masking’ can be turned off so granular details are revealed.



                                ®
Features Spector 360 – User Masking + Selective URL Recording

Ensure Employee Privacy with Spector 360 ‘User Masking’ and ‘Selective Recording’ of URLs
Figures 2 through 5a depict actual Spector 360 screen snapshots, showing what is seen – and unseen – when implementing
‘User Masking’ as well as ‘Selective Recording of URLs.’




      Figure 2. With ‘User Masking’ on,
      the Spector 360 Dashboard Login
      displays asterisks where specific
      user names previously appeared.




                                                                                                        Masking OFF
                                                                                                        Checked by default,
                                                                                                        this option displays
                                                                                                        the user’s name in all
                                                                                                        Event Data.

                                          Masking ON
                                          With the option unchecked, all user
                                          names are masked by asterisks.




     Figure 3. Spector 360 charts and
     graphs provide valuable trend data
     with or without user specificity.




                                                                                       Masking OFF




                                          Masking ON




                                   ®
Features Spector 360 – User Masking + Selective URL Recording

            Figure 4. Where law or
            culture dictates protection
            of computer user identities,
            Spector 360 ‘User Masking’
            will still provide all the Events
            necessary to detect frivolous
            or inappropriate activity.




                                                                                                                                                                         Masking OFF




                                                                                 Masking ON




            Figure 5. The ability to enable
            ‘Selective Recording’ of URLs
            is just one of many advanced
            security features in Spector 360.
            When recording of specific URLs is
            disabled, employees can conduct
            company-approved personal
            activities – such as Internet
            banking or online management
            of healthcare issues – confident in
            the knowledge that nobody will be
            able to review even as much as a
            single keystroke.




            Figure 5a. With ‘Selective                                             Program Instance              Active Time Focus Time Total Time Window Caption
            Recording’ of URLs enabled,
            Program Activity is noted but
            URL titles are not recorded, and
            neither is any activity occurring
            during the URL visit.


                                                                                                                                                                    Selective Recording
                                                                                                                                                                    ENABLED


                                                                                 Program Activity




                                                         ®
                                                                                                                                1.888.598.2788 toll-free               www.spector360.com
© 1998-2010 SpectorSoft® Corporation. All rights reserved. All other trademarks are the property of their respective owners.                                                              072010

Más contenido relacionado

Similar a ISS SA: Spector360 Funcionalidad para Mantener la privacidad

Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cSecurity Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cTroy Kitch
 
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...VMware Tanzu
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap securityyektek
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox ConfigureSamsung Business USA
 
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Ranjan Jain
 
DevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 SecurityDevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 SecurityGeorgi Kodinov
 
bioLock SAP ID CHECK - Granular Function Protection Simulation System -
bioLock SAP ID CHECK - Granular Function Protection Simulation System - bioLock SAP ID CHECK - Granular Function Protection Simulation System -
bioLock SAP ID CHECK - Granular Function Protection Simulation System - tneudenb
 
How to add your own OpenSocial Gadgets to IBM Connections
How to add your own OpenSocial Gadgets to IBM ConnectionsHow to add your own OpenSocial Gadgets to IBM Connections
How to add your own OpenSocial Gadgets to IBM ConnectionsIBM Connections Developers
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365Joanne Klein
 
Federate User Identity from Azure Active Directory
Federate User Identity from Azure Active DirectoryFederate User Identity from Azure Active Directory
Federate User Identity from Azure Active DirectorySeclore
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteBitglass
 
Secure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesSecure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesBiBoard.Org
 
Chromium OS - User Accounts and Management
Chromium OS - User Accounts and ManagementChromium OS - User Accounts and Management
Chromium OS - User Accounts and ManagementPicker Weng
 
GWAVACon 2013: DSGuardian
GWAVACon 2013: DSGuardianGWAVACon 2013: DSGuardian
GWAVACon 2013: DSGuardianGWAVA
 
How to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris ZulloHow to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris ZulloSalesforce Admins
 
Improve Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and MaskingImprove Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and MaskingPatric Dahse
 

Similar a ISS SA: Spector360 Funcionalidad para Mantener la privacidad (20)

Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cSecurity Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12c
 
Database User Anonymization
  Database User Anonymization  Database User Anonymization
Database User Anonymization
 
Sap basis and_security_administration
Sap basis and_security_administrationSap basis and_security_administration
Sap basis and_security_administration
 
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap security
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure
 
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
 
DevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 SecurityDevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 Security
 
Productivity Suite
Productivity SuiteProductivity Suite
Productivity Suite
 
bioLock SAP ID CHECK - Granular Function Protection Simulation System -
bioLock SAP ID CHECK - Granular Function Protection Simulation System - bioLock SAP ID CHECK - Granular Function Protection Simulation System -
bioLock SAP ID CHECK - Granular Function Protection Simulation System -
 
How to add your own OpenSocial Gadgets to IBM Connections
How to add your own OpenSocial Gadgets to IBM ConnectionsHow to add your own OpenSocial Gadgets to IBM Connections
How to add your own OpenSocial Gadgets to IBM Connections
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
 
Federate User Identity from Azure Active Directory
Federate User Identity from Azure Active DirectoryFederate User Identity from Azure Active Directory
Federate User Identity from Azure Active Directory
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
Secure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesSecure Mobile BI on Apple devices
Secure Mobile BI on Apple devices
 
Chromium OS - User Accounts and Management
Chromium OS - User Accounts and ManagementChromium OS - User Accounts and Management
Chromium OS - User Accounts and Management
 
GWAVACon 2013: DSGuardian
GWAVACon 2013: DSGuardianGWAVACon 2013: DSGuardian
GWAVACon 2013: DSGuardian
 
How to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris ZulloHow to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris Zullo
 
Improve Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and MaskingImprove Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and Masking
 

Más de Information Security Services SA

ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustInformation Security Services SA
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustInformation Security Services SA
 

Más de Information Security Services SA (14)

Catalogo DMS
Catalogo DMSCatalogo DMS
Catalogo DMS
 
ISS SA Protección de la Información e Identidad
ISS SA Protección de la Información e IdentidadISS SA Protección de la Información e Identidad
ISS SA Protección de la Información e Identidad
 
ISS SA Comunicado de Prensa sobre Entrust
ISS SA Comunicado de Prensa sobre EntrustISS SA Comunicado de Prensa sobre Entrust
ISS SA Comunicado de Prensa sobre Entrust
 
ISS SA Reseña de sus Soluciones Julio 2011
ISS SA Reseña de sus Soluciones Julio 2011ISS SA Reseña de sus Soluciones Julio 2011
ISS SA Reseña de sus Soluciones Julio 2011
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
ISS S.A: le presenta Spector Pro de SpectorSoft
ISS S.A: le presenta Spector Pro de SpectorSoftISS S.A: le presenta Spector Pro de SpectorSoft
ISS S.A: le presenta Spector Pro de SpectorSoft
 
ISS S.A. le presenta Spector 360 de SpectorSoft
ISS S.A. le presenta Spector 360 de SpectorSoftISS S.A. le presenta Spector 360 de SpectorSoft
ISS S.A. le presenta Spector 360 de SpectorSoft
 
ISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de EntrustISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de Entrust
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
ISS SA: Autenticación de dos Factores para Consumidores
ISS SA: Autenticación de dos Factores para ConsumidoresISS SA: Autenticación de dos Factores para Consumidores
ISS SA: Autenticación de dos Factores para Consumidores
 
ISS SA le Presenta Spector 360 de SpectorSoft
ISS SA le Presenta Spector 360 de SpectorSoftISS SA le Presenta Spector 360 de SpectorSoft
ISS SA le Presenta Spector 360 de SpectorSoft
 
ISS SA: Lo nuevo en la Version 5.5 de UserLock
ISS SA: Lo nuevo en la Version 5.5 de UserLockISS SA: Lo nuevo en la Version 5.5 de UserLock
ISS SA: Lo nuevo en la Version 5.5 de UserLock
 
ISS SA le Presenta UserLock de IS Decisions
ISS SA le Presenta UserLock de IS DecisionsISS SA le Presenta UserLock de IS Decisions
ISS SA le Presenta UserLock de IS Decisions
 

Último

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Último (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

ISS SA: Spector360 Funcionalidad para Mantener la privacidad

  • 1. Features Spector 360 – User Masking + Selective URL Recording Spector 360 ® User Masking For Advanced Security & Privacy Protection Spector 360’s ‘User Masking’ feature allows organizations to monitor employee or student PC and Internet activity while maintaining a computer user’s personal privacy. ‘User Masking’ hides the identities of individuals by replacing More Advances ‘user login’ and ‘computer name’ with asterisks – ***** – for everyday monitoring. This feature can be turned off when Another Spector 360 advanced security feature is the ability to an organization determines probable cause for investigation ‘Enable Selective Recording of URLs.’ When recording of specific and needs to know exactly which person may be engaged in URLs is disabled, employees can conduct company-approved inappropriate or illegal activity. personal activities like Internet banking or online management of healthcare issues without concern that anyone will be able to For Example review even as much as a single keystroke. Spector 360 ‘User Masking’ has been successful in parts of Enabling ‘User Masking’ the world where viewing a specific individual’s computer and Internet activities is either prohibited or considered Masking can be turned off and on only by logging into the unacceptable management policy. Master System Administrator account. To enable the ‘User Masking’ feature, open the Spector 360 Dashboard using the In parts of the European Union, for example, viewing recorded System Administrator Account. PC and Internet activity requires a joint decision between management and a union representative. In this case of dual Click on the Management button in the lower left corner, then authentication, the required System Administrator “Master click on “Dashboard Logins” in the upper left – see Figure 1 Account” password can be split into two pieces, one each held by below – to display users who have access to a Dashboard login. management and the union. With the two combined, the team Modify a user by double-clicking the user’s name, then uncheck attains Spector 360 Master Access, and ‘User Masking’ can be the box that says “Display user’s name in event data.” turned off temporarily. Having done so, viewing the computer and Internet activities of the specific individual is accomplished within specified guidelines. Following the procedure, ‘User Figure 1. The Spector 360 Management Folders and Masking’ can be turned back on. Dashboard Logins Management is the starting point for implementation of ‘User Masking.’ Even for organizations without overriding legal issues or sensitive cultural considerations, ‘User Masking’ can balance security with privacy. With ‘User Masking’ turned on, an organization can obtain all the security and peace of mind Spector 360 monitoring provides, without revealing user-specific PC and Internet activity. However, if a high-level Spector 360 chart or graph reveals frivolous or inappropriate activity, ‘User Masking’ can be turned off so granular details are revealed. ®
  • 2. Features Spector 360 – User Masking + Selective URL Recording Ensure Employee Privacy with Spector 360 ‘User Masking’ and ‘Selective Recording’ of URLs Figures 2 through 5a depict actual Spector 360 screen snapshots, showing what is seen – and unseen – when implementing ‘User Masking’ as well as ‘Selective Recording of URLs.’ Figure 2. With ‘User Masking’ on, the Spector 360 Dashboard Login displays asterisks where specific user names previously appeared. Masking OFF Checked by default, this option displays the user’s name in all Event Data. Masking ON With the option unchecked, all user names are masked by asterisks. Figure 3. Spector 360 charts and graphs provide valuable trend data with or without user specificity. Masking OFF Masking ON ®
  • 3. Features Spector 360 – User Masking + Selective URL Recording Figure 4. Where law or culture dictates protection of computer user identities, Spector 360 ‘User Masking’ will still provide all the Events necessary to detect frivolous or inappropriate activity. Masking OFF Masking ON Figure 5. The ability to enable ‘Selective Recording’ of URLs is just one of many advanced security features in Spector 360. When recording of specific URLs is disabled, employees can conduct company-approved personal activities – such as Internet banking or online management of healthcare issues – confident in the knowledge that nobody will be able to review even as much as a single keystroke. Figure 5a. With ‘Selective Program Instance Active Time Focus Time Total Time Window Caption Recording’ of URLs enabled, Program Activity is noted but URL titles are not recorded, and neither is any activity occurring during the URL visit. Selective Recording ENABLED Program Activity ® 1.888.598.2788 toll-free www.spector360.com © 1998-2010 SpectorSoft® Corporation. All rights reserved. All other trademarks are the property of their respective owners. 072010