spectorsoft spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
TRANSCRIPT
spectorsoft.com
PP Standard Marketing Product Description
spectorsoft.com
SpectorSoft creates software that protects businesses and families by monitoring and reporting on computer activity, providing you with detailed, timely, and actionable activity information.
Founded in 1998, SpectorSoft is headquartered in Vero Beach, Florida, with offices in West Palm Beach, FL, Park City, UT, and Surrey in the UK.
Our 36,000 corporate customers, and over 900,000 home users must be on to something, as SpectorSoft has been recognized again and again for innovation, quality, and growth by leading industry publications.
Our work solutions let companies address the most serious and pervasive security issues: Insider Threats, while helping IT admins address these issues in less time. From focused investigations to powerful intelligence, we’ve got you covered.
Our home solutions allow concerned parents to keep an eye on their children in the virtual world…just as they do in the real world. And because those worlds are increasingly interconnected, our customers' share stories about “real world” problems they were able to solve because of our “virtual world” help.
Introduction
Spector 360 collects detailed data on the employee digital activities taking place of Windows and Mac computers, using fully configurable options as to what data is collected, and who is able to review that data. The data is available for review, retention, and reporting from a secure, on premises database. A powerful alerting engine highlights potentially problematic behaviors, and the reporting and screen playback capabilities can be used a range of use cases. Organizations use Spector 360 to reduce risk, improve productivity and efficiency, and to conduct rapid, effective investigations. Nothing provides visibility like Spector 360 does.
Spector 360
Spector 360 Recon logs employee digital activity, stores the logs discreetly in a “black box,” and alerts on indicators of potential or actual insider threats so that company resources can address them. Spector 360 Recon detects known indicators of otherwise unknown threats like employee fraud, IP theft, and other violations of company policy by scanning the online and communications chatter within an organization. Because Spector 360 Recon keeps the underlying employee activity data secured until company policy dictates it be accessed, customers are able to balance security and employee privacy like never before. There are no other solutions like it.
Spector 360 RECON
Spector CNE Investigator offers businesses an affordable employee investigation solution that is easy to deploy and configure. Recording of all employee computer and internet related activities, from websites visited, emails sent/received, chats, keystrokes typed, screen snapshots and more can be captured and remotely reviewed to identify potential issues which can end up saving the business thousands of dollars a year. CNE Investigator can identify issues with employee productivity, data theft, illegal activity involving company resources, violations of company and compliance regulations that can expose the business to risk, loss of critical information and untold financial losses.
Spector CNE Investigator
SpectorSoft Server Manager is a versatile, easy-to-use software package that allows automatic, real-time monitoring of security/event logs, Syslog and text logs. Log consolidation and management along with detailed event correlation and flexible response options provides IT personnel with a powerful tool to monitor critical network events. Server Manager can also provide documentation for regulatory compliance such as PCI-DSS, HIPAA, etc., saving Network Administrators valuable time and effort. Server Manager’s remote monitoring and management gives the IT team flexibility in managing server resources, Windows services and web applications across the organization. While Server Manager’s ability to monitor and manage free disk space, SMART predictive disk failures, and directory sizes ensures potential disk issues are mitigated.
Server Manager
SpectorSoft Log Manager provides event log management plus network and application security monitoring. It’s the right product at the right price.
Reviewing event logs is a daunting task. Wading through unwieldy amounts of data to isolate issues requires time and effort that can be better used elsewhere. Log Manager provides robust Security and Event Log Management for Windows, Unix, switches, routers, hubs and more… Consolidate all of your event logs in one place, then use data filters and multi-level criteria to create powerful reporting options.
Server Manager – Log Management
FEATURES COMPARED
| SpectorSoft Employee Monitoring SoftwareComparison Guide
AUTOMATICALLY RECORDS
BLOCK
REVIEW
INSTALL & MANAGE
Screen Snapshots
Chats / Instant Messages
Keystrokes Typed
Online Searches
Web Sites Visited
Email (Sent & Received)
Programs Launched
Keywords Detected
Files Transferred
User Activity
Document Tracking
Network Activity
Operating Systems
Chat / Instant Messages (by Contact Name)
Access To Specific Websites
Internet Access (on a Schedule)
Category-Based Web Filtering
Keyword Alerts Via Email
From Remote Computer
Top 10 Summary Reports
Scheduled Activity Reports Via Email
Graphical Charts Of Trends & Totals
Analyze By Groups Or Departments
Install Remotely Over Network / Internet
Manage Remotely Over Network / Internet
Data Storage
Backup & Archive Recordings
Task and Role-Based Access
Uses RDBMS (SQL Server)
Keywords
Document Tracking
Keystrokes Typed
File Transfers
1 Passive Monitoring provides activity alerts on collected data but is unavailable for review, reporting or retention unless unlocked for cause.2 Active Monitoring provides alerts to review, report and retain recorded employee activity and communications.
Passive Monitoring 1
Active Monitoring 2
Focused Investigations
BEST SUITED FOR
ALERTS
www.spectorsoft.com
Spector CNEInvestigtor
Data Vault
Mac OS/ Windows
Spector 360
SQL Server
Mac OS/ Windows
Locally
Mac OS/ Windows
Spector 360Recon
2
Established leader in User Activity Monitoring
Innovator in usable User Behavior AnalyticsHeadquartered in Florida
Backed by respected private equity firms Harbourvest and Westview Capital
3
USER BEHAVIOR ANALYTICS
• Detection of insider threats• Patterns of human behavior• Algorithms and statistical analysis to detect meaningful
anomalies – indications of potential threat
4
USER ACTIVITY MONITORING
• Collection of data focused on the point ofinteraction between user and resource
• Detailed and contextual user activity log• Alerts, reports, playback, and search
5
Investigate Employees
When you suspect an
employee of wrongdoing,
you need to begin discrete
investigations quickly.
Securely collect, review, and
report on the online and
communications activity and
the context
in which it occurred.
77% of IT Pros believe
insiders are the biggest
threat to security. 50% of
breaches are a result of
employee behavior. Insider
Threats require advanced
detection to provide early
warning, with informed and
rapid response in the event
of an incident.
The success of your company
relies on peak employee
performance and
productivity. Benchmark and
measure employee workflow
with accurate and easy-to-
read reports without
investing a lot of time
collecting and analyzing data.
Insider Threat Security Increase Productivity
6
Save TimeMinutes to install and review versus hours of valuable time being spent sifting through data
Increase CertaintyDecisions are only as good as the information they are based on. Making sure you have all the data, and can see the context actions were taken in, let’s you act confidently and decisively
Save MoneyOur customers tell us they see a dramatic reduction in the cost of investigations, often as much as 50%
Reduce RiskShould the investigation result in punitive action, up to and including termination, you run the risk that the impacted employee(s) may litigate. Join the thousands of companies who have relied on SpectorSoft to provide reliable, tested, and defensible results.
Employee Investigations are a Fact of Corporate Life
Get it Right, Reduce your Risk and get it over with.
7
Employee Investigations are a Fact of Corporate LifeGet it Right, Reduce your Risk and get it over With.
Beware Of The Enemy Within
Protecting an organization against insider threats is never easy.
Early DetectionShifts in behavior related to insider activity are detected and alerted on as they occur
Proper CoverageThe unique combination of UBA and UAM enable an appropriate coverage model of lower risk and higher risk positions and insiders
Informed ResponseArmed with information provided by anomaly alerting, take proactive action to prevent damage
Insurance PolicyThe presence of user activity logs enables best practices to protect intellectual property and company reputation, including the review of departing employees online activity
8
Employee Investigations are a Fact of Corporate LifeGet it Right, Reduce your Risk and get it over With.
Improve Productivity. Increase Profits.
Can you afford not to know how much lost productivity is costing your organization?
Unique and Highly Accurate Active time / Focus time / Total time approach provides true picture of how employee time is spent
Staffing IntelligenceDetermine appropriate staffing levels; understand the actual workflows inside the company to make informed decision
Raise the Top Line; Improve the BottomEnhanced resource utilization translates into better operating results and higher profitability
Increase EfficiencyStudy the processes of top performers to inform training programs; utilize video playback as teaching tool
9
Spector 360 Recon
• User Behavior Analysis
• Detection and deterrence of insider threat behaviors
• Acts as insurance policy & early warning system; advanced insider threat solution
• Covers lower risk and higher risk
10
Spector 360
• User Activity Monitoring
• Comprehensive, enterprise class
• Detailed, contextual visibility of employee activity
• Covers Higher Risk, productivity, and ongoing investigations
11
Spector CNE Investigator
• Employee investigation solution
• Fast install, reliable results –same data collector as Spector 360 without infrastructure requirements
• Appropriate for SMB User Activity Monitoring
12
Event Log Management
• Event & Security Log Management• Windows, Unix, Linux, switches, routers,
hubs, etc.• Robust reporting & alerting
• All the power of Log Manager +• Application & resource monitoring• Enterprise class disk monitoring
The SpectorSoft mission is to provide world-class software and support that enables our customers to protect their most valuable assets, reduce their risk,
and gain unparalleled visibility into their operations.