spectorsoft spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

16
spectorsoft.com PP Standard Marketing Product Description

Upload: cheer-chain-enterprise-co-ltd

Post on 09-Aug-2015

199 views

Category:

Software


7 download

TRANSCRIPT

Page 1: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

spectorsoft.com

PP Standard Marketing Product Description

Page 2: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

spectorsoft.com

SpectorSoft creates software that protects businesses and families by monitoring and reporting on computer activity, providing you with detailed, timely, and actionable activity information.

Founded in 1998, SpectorSoft is headquartered in Vero Beach, Florida, with offices in West Palm Beach, FL, Park City, UT, and Surrey in the UK.

Our 36,000 corporate customers, and over 900,000 home users must be on to something, as SpectorSoft has been recognized again and again for innovation, quality, and growth by leading industry publications.

Our work solutions let companies address the most serious and pervasive security issues: Insider Threats, while helping IT admins address these issues in less time. From focused investigations to powerful intelligence, we’ve got you covered.

Our home solutions allow concerned parents to keep an eye on their children in the virtual world…just as they do in the real world. And because those worlds are increasingly interconnected, our customers' share stories about “real world” problems they were able to solve because of our “virtual world” help.

Introduction

Spector 360 collects detailed data on the employee digital activities taking place of Windows and Mac computers, using fully configurable options as to what data is collected, and who is able to review that data. The data is available for review, retention, and reporting from a secure, on premises database. A powerful alerting engine highlights potentially problematic behaviors, and the reporting and screen playback capabilities can be used a range of use cases. Organizations use Spector 360 to reduce risk, improve productivity and efficiency, and to conduct rapid, effective investigations. Nothing provides visibility like Spector 360 does.

Spector 360

Spector 360 Recon logs employee digital activity, stores the logs discreetly in a “black box,” and alerts on indicators of potential or actual insider threats so that company resources can address them. Spector 360 Recon detects known indicators of otherwise unknown threats like employee fraud, IP theft, and other violations of company policy by scanning the online and communications chatter within an organization. Because Spector 360 Recon keeps the underlying employee activity data secured until company policy dictates it be accessed, customers are able to balance security and employee privacy like never before. There are no other solutions like it.

Spector 360 RECON

Spector CNE Investigator offers businesses an affordable employee investigation solution that is easy to deploy and configure. Recording of all employee computer and internet related activities, from websites visited, emails sent/received, chats, keystrokes typed, screen snapshots and more can be captured and remotely reviewed to identify potential issues which can end up saving the business thousands of dollars a year. CNE Investigator can identify issues with employee productivity, data theft, illegal activity involving company resources, violations of company and compliance regulations that can expose the business to risk, loss of critical information and untold financial losses.

Spector CNE Investigator

SpectorSoft Server Manager is a versatile, easy-to-use software package that allows automatic, real-time monitoring of security/event logs, Syslog and text logs. Log consolidation and management along with detailed event correlation and flexible response options provides IT personnel with a powerful tool to monitor critical network events. Server Manager can also provide documentation for regulatory compliance such as PCI-DSS, HIPAA, etc., saving Network Administrators valuable time and effort. Server Manager’s remote monitoring and management gives the IT team flexibility in managing server resources, Windows services and web applications across the organization. While Server Manager’s ability to monitor and manage free disk space, SMART predictive disk failures, and directory sizes ensures potential disk issues are mitigated.

Server Manager

SpectorSoft Log Manager provides event log management plus network and application security monitoring. It’s the right product at the right price.

Reviewing event logs is a daunting task. Wading through unwieldy amounts of data to isolate issues requires time and effort that can be better used elsewhere. Log Manager provides robust Security and Event Log Management for Windows, Unix, switches, routers, hubs and more… Consolidate all of your event logs in one place, then use data filters and multi-level criteria to create powerful reporting options.

Server Manager – Log Management

Page 3: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

FEATURES COMPARED

| SpectorSoft Employee Monitoring SoftwareComparison Guide

AUTOMATICALLY RECORDS

BLOCK

REVIEW

INSTALL & MANAGE

Screen Snapshots

Chats / Instant Messages

Keystrokes Typed

Online Searches

Web Sites Visited

Email (Sent & Received)

Programs Launched

Keywords Detected

Files Transferred

User Activity

Document Tracking

Network Activity

Operating Systems

Chat / Instant Messages (by Contact Name)

Access To Specific Websites

Internet Access (on a Schedule)

Category-Based Web Filtering

Keyword Alerts Via Email

From Remote Computer

Top 10 Summary Reports

Scheduled Activity Reports Via Email

Graphical Charts Of Trends & Totals

Analyze By Groups Or Departments

Install Remotely Over Network / Internet

Manage Remotely Over Network / Internet

Data Storage

Backup & Archive Recordings

Task and Role-Based Access

Uses RDBMS (SQL Server)

Keywords

Document Tracking

Keystrokes Typed

File Transfers

1 Passive Monitoring provides activity alerts on collected data but is unavailable for review, reporting or retention unless unlocked for cause.2 Active Monitoring provides alerts to review, report and retain recorded employee activity and communications.

Passive Monitoring 1

Active Monitoring 2

Focused Investigations

BEST SUITED FOR

ALERTS

www.spectorsoft.com

Spector CNEInvestigtor

Data Vault

Mac OS/ Windows

Spector 360

SQL Server

Mac OS/ Windows

Locally

Mac OS/ Windows

Spector 360Recon

Page 4: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
Page 5: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

2

Established leader in User Activity Monitoring

Innovator in usable User Behavior AnalyticsHeadquartered in Florida

Backed by respected private equity firms Harbourvest and Westview Capital

Page 6: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

3

USER BEHAVIOR ANALYTICS

• Detection of insider threats• Patterns of human behavior• Algorithms and statistical analysis to detect meaningful

anomalies – indications of potential threat

Page 7: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

4

USER ACTIVITY MONITORING

• Collection of data focused on the point ofinteraction between user and resource

• Detailed and contextual user activity log• Alerts, reports, playback, and search

Page 8: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

5

Investigate Employees

When you suspect an

employee of wrongdoing,

you need to begin discrete

investigations quickly.

Securely collect, review, and

report on the online and

communications activity and

the context

in which it occurred.

77% of IT Pros believe

insiders are the biggest

threat to security. 50% of

breaches are a result of

employee behavior. Insider

Threats require advanced

detection to provide early

warning, with informed and

rapid response in the event

of an incident.

The success of your company

relies on peak employee

performance and

productivity. Benchmark and

measure employee workflow

with accurate and easy-to-

read reports without

investing a lot of time

collecting and analyzing data.

Insider Threat Security Increase Productivity

Page 9: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

6

Save TimeMinutes to install and review versus hours of valuable time being spent sifting through data

Increase CertaintyDecisions are only as good as the information they are based on. Making sure you have all the data, and can see the context actions were taken in, let’s you act confidently and decisively

Save MoneyOur customers tell us they see a dramatic reduction in the cost of investigations, often as much as 50%

Reduce RiskShould the investigation result in punitive action, up to and including termination, you run the risk that the impacted employee(s) may litigate. Join the thousands of companies who have relied on SpectorSoft to provide reliable, tested, and defensible results.

Employee Investigations are a Fact of Corporate Life

Get it Right, Reduce your Risk and get it over with.

Page 10: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

7

Employee Investigations are a Fact of Corporate LifeGet it Right, Reduce your Risk and get it over With.

Beware Of The Enemy Within

Protecting an organization against insider threats is never easy.

Early DetectionShifts in behavior related to insider activity are detected and alerted on as they occur

Proper CoverageThe unique combination of UBA and UAM enable an appropriate coverage model of lower risk and higher risk positions and insiders

Informed ResponseArmed with information provided by anomaly alerting, take proactive action to prevent damage

Insurance PolicyThe presence of user activity logs enables best practices to protect intellectual property and company reputation, including the review of departing employees online activity

Page 11: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

8

Employee Investigations are a Fact of Corporate LifeGet it Right, Reduce your Risk and get it over With.

Improve Productivity. Increase Profits.

Can you afford not to know how much lost productivity is costing your organization?

Unique and Highly Accurate Active time / Focus time / Total time approach provides true picture of how employee time is spent

Staffing IntelligenceDetermine appropriate staffing levels; understand the actual workflows inside the company to make informed decision

Raise the Top Line; Improve the BottomEnhanced resource utilization translates into better operating results and higher profitability

Increase EfficiencyStudy the processes of top performers to inform training programs; utilize video playback as teaching tool

Page 12: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

9

Spector 360 Recon

• User Behavior Analysis

• Detection and deterrence of insider threat behaviors

• Acts as insurance policy & early warning system; advanced insider threat solution

• Covers lower risk and higher risk

Page 13: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

10

Spector 360

• User Activity Monitoring

• Comprehensive, enterprise class

• Detailed, contextual visibility of employee activity

• Covers Higher Risk, productivity, and ongoing investigations

Page 14: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

11

Spector CNE Investigator

• Employee investigation solution

• Fast install, reliable results –same data collector as Spector 360 without infrastructure requirements

• Appropriate for SMB User Activity Monitoring

Page 15: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

12

Event Log Management

• Event & Security Log Management• Windows, Unix, Linux, switches, routers,

hubs, etc.• Robust reporting & alerting

• All the power of Log Manager +• Application & resource monitoring• Enterprise class disk monitoring

Page 16: SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析

The SpectorSoft mission is to provide world-class software and support that enables our customers to protect their most valuable assets, reduce their risk,

and gain unparalleled visibility into their operations.