1 / 53

Reporting

Spector 360 is the Corporate Network Edition of Spector Pro – winner of the PC Magazine Editor’s Choice Award for Best Activity Monitoring Software. Reporting. See more at www.spector360.com/overview/report.htm. Websites Visited Email/Webmail Chat/Instant Message Program Activity

jenna
Télécharger la présentation

Reporting

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Spector 360 is the Corporate Network Edition of Spector Pro – winner of the PC Magazine Editor’s Choice Award for Best Activity Monitoring Software

  2. Reporting See more at www.spector360.com/overview/report.htm • Websites Visited • Email/Webmail • Chat/Instant Message • Program Activity • Online Searches • Keystrokes • Downloads/uploads • Snapshots • Bandwidth Usage • Document Tracking

  3. Website Activity Reporting

  4. Three Views Reporting

  5. Web Site Activity Detail Reporting

  6. Network Bandwidth Use Reporting Internet Radio being played

  7. Network Bandwidth Detail Reporting

  8. Snapshot Example Reporting

  9. User Activity Detail Reporting See http://www.spector360.com/screenshots/UserExplorer/overview.htmfor an interactive demo

  10. Additional Features Reporting • Monitor files deleted, created, and renamed(includes files written to CD, DVD or USB devices) • Record printing of documents • Capture files uploaded and downloaded • Email scheduled reports • Global search across all users or groups

  11. Global Reporting

  12. Global Reporting Easily spot trends and irregularities. e.g., Who seems to be using the most network bandwidth and why? Miss nothing reporting Music consuming bandwidth

  13. Global Reporting What websites are being visited most frequently and who is spending the most time browsing the web? In this example, mlb.com is a baseball site. Productivity Miss nothing reporting You can drill down to find the baseball enthusiasts and exactly how much time they’ve spent.

  14. Global Reporting Who is transferring the most files and what exactly are they sending out and to whom are they sending it to? Is an employee is preparing to leave and sending customer contacts to your competitor? Productivity Miss nothing reporting Confidential information

  15. Global Reporting Productivity Miss nothing reporting Confidential information Who are the top violators of those keywords that indicate abuse (e.g., sex, guns, gambling) Keyword Alerts Expletive xxx Expletive xxx

  16. Global Reporting Productivity Spot trends Confidential information Keyword Alerts What are the top online search terms being used and do they look suspicious? Online search terms

  17. Global Reporting Search for a word/phrase across the entire user base. e.g., a racial epithet or sexual term in an anonymous email. Productivity Miss nothing reporting Confidential information Keyword Alerts Online search terms Lawsuit protection

  18. Global Reporting Productivity Miss nothing reporting Confidential information Keyword Alerts Online search terms Lawsuit protection User activity Who is arriving at work late and leaving early? Who is taking frequent breaks and just how long are they?

  19. Architecture Network Configuration

  20. Network Configuration Activity Review • Remote viewing from unlimited number of computers • Activities are identified by computer name/username Manage Computers • Remote install and uninstall • Installation completely undetectable • Remotely turn recording on/off and change settings Data Vault • 10 MB/day per computer • Older information automatically overwritten • Automated archiving • Minimal bandwidth

  21. Risk Management

  22. Theft of confidential information Sexual or racial harassment Discrimination claims Fraud & embezzlement Illegal downloads Litigation by employees and outside companies Stop these Activities Risk Management

  23. Deterrence Risk Management “When the word about monitoring got out…non-work activities went down about 98 to 99 percent….” Keith Becker Illinois Wholesale Cash Register Corporation Hoffman Estates, IllinoisOK think of “The threat of being caught red-handed is powerful. That is what the law does. …This software lays down the law.” Chuck Benedon Ashton Financial Brookfield, Wisconsin

  24. Deterrence Detection Risk Management “We found out… that a large number of our staff were playing computer games and chatting on the Internet while on company time.” Robert Elliott RCS Communications Louisville, Kentucky

  25. Deterrence Detection Investigation Risk Management “…watching and noticing variations in employee habits indicated a problem … enough so to warrant an investigation…with (Spector).” Chuck Benedon Ashton Financial Brookfield, Wisconsin

  26. Deterrence Detection Investigation Prosecution Risk Management “If you have to get up in front of a judge and say this and this was going on, you better have something to back it up.” Edgar Huite Jackson Hewitt Foley, Alabama “The reports Spector provides are such a huge piece of evidence. Spector gives you the ability to go to court with evidence of EXACTLY what happened.” Jeff Tirpak, Lonkar Services Ltd. Red Deer, AB, Canada --

  27. Random monitoring Upon request Formal investigations Keyword alerts Automated reports How Companies Monitor (Little time is spent on review)

  28. How Companies Monitor Random monitoring Weekly review of an employee’s computer use Only 10 minutes to review a week’s activities

  29. How Companies Monitor Random monitoring Upon request • When a supervisor suspects inappropriate behavior • Examples: • Not getting work done • Switching screens when you walk by • Complaints by coworkers

  30. How Companies Monitor Random monitoring Upon request Formal Investigations • Serious misuse of computers • Fraud • Sexual harassment • Confidential information loss • Employee or external lawsuits

  31. How Companies Monitor Random monitoring Upon request Formal Investigations Keyword Alerts • Receive immediate email notification of words and phrases detected in: • Email • Instant Messages • Websites • Keystrokes

  32. How Companies Monitor How Companies Monitor Random monitoring Upon request Formal Investigations Keyword Alerts Automated Reports (global or department or individual)

  33. Who Uses SpectorSoft Products?

  34. Who Uses SpectorSoft Products? Corporations & Small/Mid-Size Business • Increase Employee Productivity • Enforce Internet Acceptable Use Policies • Reduce the Spread of Confidential Company Information • Reduce Potential Legal Liability “One of my employees was sending emails to his former employer - my competition. Spector captured his email…correspondence, including my vendor lists, item codes and serial numbers of every item sold! The Spector recordings were legal proof of his harmful activities.” James G. Farnes, President Farnes Computer Systems Coconut Creek, Florida

  35. Who Uses SpectorSoft Products? Corporations & Small/Mid-Size Business • Increase Employee Productivity • Enforce Internet Acceptable Use Policies • Reduce the Spread of Confidential Company Information • Reduce Potential Legal Liability “We are a technology school in North Carolina and last fall we were subject to hacking attacks that almost shut our network down. Spector discovered who the culprits were. It is easy to use and we can see exactly what the students were doing. Now the students are running scared because word is out that we can mysteriously find out which students are causing havoc.” Robert Frost Highland School of Technology Gaston County Schools, North Carolina Education • Stop Student Hacking of School PCs & Networks • Control Inappropriate Web Surfing • Identify Students Abusing Internet Privileges

  36. Who Uses SpectorSoft Products? “Spector Pro is an important part of my online undercover investigations. The chat logging and screenshot captures are excellent. I never go into a chat room or instant message conversation without Spector Pro running in the background.” Mike Widner, Detective Noblesville Police Dept. Noblesville, Indiana Corporations & Small/Mid-Size Business • Increase Employee Productivity • Enforce Internet Acceptable Use Policies • Reduce the Spread of Confidential Company Information • Reduce Potential Legal Liability Education • Stop Student Hacking of School PCs & Networks • Control Inappropriate Web Surfing • Identify Students Abusing Internet Privileges “Spector Pro does exactly what it says it will do and has proven useful in administrative and criminal investigations as well as off site supervision of convicted criminals.” Todd Sabins, Detective Berkeley Police Department Berkeley, California Law Enforcement • Monitor Offenders (Sex Offenders, Pedophiles, con artists, embezzlers and other cyber-criminals) • Enforce Government Mandated Supervisory Restrictions • Monitor Government Employees

  37. What you will accomplish

  38. What you will accomplish “At first I thought it was expensive for a company of our size. But it paid for itself in a week. Spector is priceless at double the cost. After the first week I did a spreadsheet report showing a minimum of 40 to 50 hours a week wasted, just on Internet surfing. The report easily projected savings of $50,000 a year or more.” Keith Becker Illinois Wholesale Cash Register Hoffman Estates, Illinois Improved Productivity

  39. What you will accomplish Improved Productivity Reduced Risk “One employee was getting ready to leave and was transferring files via email. This was important data, like the customer list. We caught her dead. It’s against the law. It’s company property, not the employee’s.” Chuck Benedon Ashton Financial Brookfield, Wisconsin

  40. What you will accomplish Improved Productivity Reduced Risk Regulatory Compliance Woodlands Securities uses Spector to conform to regulations established by the National Association of Securities Dealers (NASD), the Securities and Exchange Commission (SEC), and the State Securities Board. Dennis McCullough Woodlands Securities The Woodlands, Texas

  41. What you will accomplish “When employees come up for review, I check their compliance with computer use policy. I want to know how dedicated an employee is so we can compensate him or her properly. Specifically, Spector allows us to determine how much personal time an employee spends on the computer.” Name Withheld “If an employee is leaving us, we’ll do a routine check. It’s a real effective tool for departure situations … expected or unexpected.” Gene O’Neal Carlile Transportation Systems Anchorage, Alaska Improved Productivity Reduced Risk Regulatory Compliance Performance Reviews

  42. What you will accomplish Improved Productivity Reduced Risk Regulatory Compliance Performance Reviews Document Recovery “It's important to our law firm that we send timely emails. Occasionally we are faulted for not having done so and asked to pay damages. Spector has enabled us to retrieve these emails and prove we did indeed meet our obligation.” Name withheld

  43. What you will accomplish Improved Productivity Reduced Risk Regulatory Compliance Performance Reviews Document Recovery Training/quality control “Using the software, we now keep an eye on new employees for a couple of weeks,” said Elliott. “It helps in training … you look at the Spector screen snapshots and not only can you ask why are they doing this … but why are they doing it this way?” Bob Elliott RCS Communication Louisville, Kentucky

  44. Resolve Technical Problems

  45. Resolve Technical Problems Error Messages “The screenshots show me error messages and exactly what led up to a problem.” Name Withheld

  46. Resolve Technical Problems “(Users) go to websites and cookies get placed that change the behavior of Internet Explorer. I can discover the website that caused the problem and block it for everyone.” “I can discover how a virus was introduced.” Name Withheld Error Messages Malware and Spyware

  47. Resolve Technical Problems Error Messages Malware and Viruses Documentation “I use the screenshots to document installations and configuration changes for later review.” Name Withheld

  48. Resolve Technical Problems “The incidents are few and far between now. And that alone saves us work. We don’t have to ‘clean’ the machines as often as before.” Jeff Hunt, Park Rapids Area School District Park Rapids, Minnesota Error Messages Malware and Viruses Documentation Saved staff time We have found that our support workload is reduced because the kids don’t try to crash the PCs any more, and if a machine does fail, we can see from the log what was happening when it failed. This makes it much easier to fix.” Fungai Chawira, St Augustine’s High School London, England

  49. Resolve Technical Problems Error Messages Malware and Viruses Documentation Save staff time Reduce Bandwidth “We found a folder with 60-80 songs in it on one of our file servers … way down deep. We wouldn’t have found the songs without Spector.” Todd Kumpola, Rapids Area School District Park Rapids, Minnesota

  50. Return on Investment

More Related