Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011


Published on

Presentation from "DSS" organized ITSEC conference on 24th of November, RIga, Latvia.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

  1. 1. Enterprise Health FinancialSpector360 – Surveillance as a management toolSally Pigott – Territory Manager Central & Eastern EuropeDamian Hallmark – Systems Engineer
  2. 2. PC and Internet Monitoring SoftwareAgenda • About SpectorSoft • SpectorSoft Channel Model • Employee Monitoring and Security – Who & Why? • Insider Threats & Employee Productivity • Building a case for Employee Monitoring • Common Objections • Q&A 2
  3. 3. PC and Internet Monitoring SoftwareAbout SpectorSoft Featured In: • Established 1998 • Strong Growth Year After Year • Inc. 500/5000 List – 7 Times • Market Leader • More than 50,000 Businesses • More than 300,000 Consumers • Five Star Partner Program Winner • 24/7 U.S. Based Customer Support FIVE EDITORS’ CHOICE GOLD AWARD! 1ST PLACE 5-STAR AWARDS PC Magazine Rated #1 Product “The Best of the Best” Gold Star Best in THREE Time 2007 Monitoring 2005 & 2008 Monitoring Partner Program Software Review Surveillance Award Winner! Software Report 3
  4. 4. PC and Internet Monitoring SoftwareOur Customers Corporate / Government / Education 4
  5. 5. PC and Internet Monitoring SoftwareChannel-Only Sales model SpectorSoft will not sell Direct – Two-Tier Distribution model (Head Technology) • Pricing • Project registration • Licensing support • Technical assistance • Liaison with SpectorSoft 5 5
  6. 6. PC and Internet Monitoring SoftwareWhat is monitoring? ‘the ability to record, report and be alerted on employee activity’ • Application Usage • Internet behaviour • File protection and data movement • Work patterns • Identifying the good and the bad behavioral traits. 6 6
  7. 7. PC and Internet Monitoring SoftwareWho wants to know this information? • Business owners • Executives • Shareholders • IT • Fellow employee’s. 7 7
  8. 8. PC and Internet Monitoring SoftwareWho is already doing it and how? ALL organisations currently perform some form of employee monitoring and security… FACT! • Privilege and rights Management • DLP (USB Lock down etc) • Centralised Anti-Virus / Malware protection / Anti-Spam / Firewall • Policy driven internet and application restrictions • Archiving and encryption • Password protection and Two Factor Authentication 8 8
  9. 9. PC and Internet Monitoring SoftwareInsider threats manifest in many different ways… Privilege Abuse • Snooping • Rights Escalation Deliberate Misconduct • Hacking Lost Productivity • IP Theft •Technical Arrogance • Web Surfing • Fraud • Chat • Sabotage • Webmail • Cust. Data Theft • Auctions • Social Media Insider Threats Accidental Disclosure Hostile Environment • Ignorance • Ethnic/Racial slurs • Negligence • Sexual harassment • Process Failure • Bullying • Technical Failure • Discrimination 9 9
  10. 10. PC and Internet Monitoring Software Spector 360… Key FeaturesWhy Employee Monitoring…..?• Increase employee productivity• Conduct investigations and document violations• Ensure adherence to Internet Acceptable Use Policies• Provide “insider” theft protection• Reduce bandwidth consumption and help desk calls• Meet compliance requirements 10
  11. 11. PC and Internet Monitoring SoftwareSPECTOR 360 – Solution ComponentsOpen Architecture Fast & easy installation Scales with network servers & desktop volume Remote configuration, installation and administration Centralized data archiving Supports Citrix XenDesktop / Server Will record and report on satellite offices and remote -workers Create multiple Desktops and views for different managers, HR, IT, etc. 11
  12. 12. PC and Internet Monitoring SoftwareSpector 360• Enables organizations to visually analyze employee behavior over time• Alerts internal resources on suspected activity across a comprehensive range of user related activities• Configurable and adaptable to changing environment• Permits the extraction of historical event data for external analysis and reporting 12 12
  13. 13. PC and Internet Monitoring Software See what happened……..and how?• See the details of every event, both simple and complex• See a time-line for every event• Discover all information across all systems• Analyse each event in context • What happened before, during and after an event? 13
  14. 14. PC and Internet Monitoring SoftwareIf you don’t know it happened, how do you preventit…..? Active Monitoring approach: • Always on and vigilant to deal with the unpredictability of users • Provides contextual visibility into user behavior and activities • Alerting of suspected threat activity across a range of user activity • Captures intent • Offloads event data; preserves historical evidence to support subsequent forensic investigations 14 14
  15. 15. PC and Internet Monitoring SoftwareBuilding a Case for Employee Monitoring• Businesses are still challenged to identify, track and stop insider threats• Traditional DLP solutions, only identify when the breach actually occurs.• Almost all insiders give themselves away before the breach by testing their environment for vulnerabilities and access. This early testing is very difficult to identify.• Traditional DLP solutions generate a wealth of false positives requiring extensive reconciliation.• When DLP identifies a threat, forensic data must be collected before it is lost.• DLP solutions often require specialist forensic teams to analyze the pertinent data. 15 15
  16. 16. PC and Internet Monitoring SoftwareNon-DLP Threats to business• Unauthorized access to a systems or data• Unwanted disruption or denial of service• Sexual harassment in the work place• Physical/ Verbal threats via instant messenger or email• Unauthorized use of a system for the processing, storage of data or personal use• Unauthorized changes to system hardware, firmware, or software 16 16
  17. 17. PC and Internet Monitoring SoftwareIs it Legal……………..? It depends… • Data Protection Act • Data Privacy laws • European Employee Councils • Adequately informing employees 17 17
  18. 18. PC and Internet Monitoring SoftwareIn Summary……….Active Monitoring enables:• Near-real time alerting• Remote rapid deployment of the recorder• Support for remote-workers, Central-Branch architectures including international sites• Client recorder: extremely small, untraceable foot print• Detailed, web and secure document based reports for business managers• Detailed evidence of violations including supportive video• Identify how & when and all involved parties 18 18
  19. 19. PC and Internet Monitoring SoftwareQuestions? 19 19
  20. 20. Enterprise Health FinancialThank You!