SlideShare a Scribd company logo
1 of 2
Download to read offline
Don’t Leave the
Digital Playground
Unattended
Identify and Manage Threats
Shared on Social Media
802-861-1361 | www.socialsentinel.com
SM
SM
SM
SM
SM
Put Social Media to Work
Do you have a way to gather and examine threats shared on social media
easily and efficiently?
Built for K12 officials, the Social
Sentinel®
service enables you
to access critical information
to identify risks, assess threats,
and manage events being
shared–publicly–right now.
Access near real-time alerts,
analyze those alerts in context,
and assign them for follow up–
and better protect students.
Actionable Results
•	 Identify and evaluate the severity of a threat against a person,
a group of people, or a school
•	 Intervene when a student discusses self-directed harm, suicide,
or shows signs of psychological distress
•	 Track ongoing cyberbullying cases to protect students and staff
•	 Coordinate police presence to maintain order when negative sentiment
indicates potential for violence on campus
•	 Assess alerts and assign to local authorities for further analysis
and action–via SMS or email
•	 Monitor sporting events and school sponsored social events
for potentially dangerous activity
•	 Translate posts using acronyms or foreign languages with one-click
•	 Perform post-incident evaluations to assist investigations
Key Features
Fully Hosted and
Managed SaaS
No additional hardware
or software required
Location-Based, Near
Real-Time Monitoring
Public posts monitored
globally or within a
geo-targeted zone
Multiple Social Media
Sources Monitored
Manage all alerts from
one interface
Preloaded Keywords
Created and updated by
school security experts
User-Controlled
Filter Creation
Add local knowledge
and expertise–in
advance or on-the-fly
Anonymous
Investigations
Research privately
One-Click Translation
Hundreds of languages
and thousands of
acronyms available
User Roles and Rights
Map keywords,
functionality, and over
site to the right users
Responsive Design
Use from any device
Initial and Ongoing
Training
Your team will be up
and running quickly
Superior Support
We’re here 24/7 to help
Monitor Specific Locations
With Geo-Fences
Help your team bring the dynamic
voice of social media into strategic,
operational, and tactical decision
making and response.
© 2015 Social Sentinel, Inc. All rights reserved. Social Sentinel, Assess
Alert Avert, and the design mark are trademarks of Social Sentinel, Inc.802-861-1361 | www.socialsentinel.com

More Related Content

What's hot

Pen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurityPen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurityTestingXperts
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced ThreatsHannah Jenney
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 Best Practice Next-Generation Vulnerability Management to Identify Threats, ... Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...Skybox Security
 

What's hot (6)

Pen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurityPen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurity
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Srikanth
SrikanthSrikanth
Srikanth
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 Best Practice Next-Generation Vulnerability Management to Identify Threats, ... Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 

Viewers also liked

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingdfdancer08
 
Counter-terrorism and Security Act 2015: What schools need to know - Hayley R...
Counter-terrorism and Security Act 2015: What schools need to know - Hayley R...Counter-terrorism and Security Act 2015: What schools need to know - Hayley R...
Counter-terrorism and Security Act 2015: What schools need to know - Hayley R...Browne Jacobson LLP
 
Analysis of Cyberbullying Tweets in Trending World Events
Analysis of Cyberbullying Tweets in Trending World EventsAnalysis of Cyberbullying Tweets in Trending World Events
Analysis of Cyberbullying Tweets in Trending World Eventskcortis
 
Building Community Resilience to Violent Extremism – Government approaches”
Building Community Resilience to Violent Extremism – Government approaches”Building Community Resilience to Violent Extremism – Government approaches”
Building Community Resilience to Violent Extremism – Government approaches”FRSA Communications
 
Radicalisation and Countering Violent Extremism (CVE) in Georgia
Radicalisation and Countering Violent Extremism (CVE) in GeorgiaRadicalisation and Countering Violent Extremism (CVE) in Georgia
Radicalisation and Countering Violent Extremism (CVE) in GeorgiaOneworld Multimedia
 
Understanding Cyberbullying
Understanding CyberbullyingUnderstanding Cyberbullying
Understanding CyberbullyingJames Penstone
 
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsRumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsYTH
 

Viewers also liked (9)

El rei carnestoltes
El rei carnestoltesEl rei carnestoltes
El rei carnestoltes
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Counter-terrorism and Security Act 2015: What schools need to know - Hayley R...
Counter-terrorism and Security Act 2015: What schools need to know - Hayley R...Counter-terrorism and Security Act 2015: What schools need to know - Hayley R...
Counter-terrorism and Security Act 2015: What schools need to know - Hayley R...
 
Analysis of Cyberbullying Tweets in Trending World Events
Analysis of Cyberbullying Tweets in Trending World EventsAnalysis of Cyberbullying Tweets in Trending World Events
Analysis of Cyberbullying Tweets in Trending World Events
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Building Community Resilience to Violent Extremism – Government approaches”
Building Community Resilience to Violent Extremism – Government approaches”Building Community Resilience to Violent Extremism – Government approaches”
Building Community Resilience to Violent Extremism – Government approaches”
 
Radicalisation and Countering Violent Extremism (CVE) in Georgia
Radicalisation and Countering Violent Extremism (CVE) in GeorgiaRadicalisation and Countering Violent Extremism (CVE) in Georgia
Radicalisation and Countering Violent Extremism (CVE) in Georgia
 
Understanding Cyberbullying
Understanding CyberbullyingUnderstanding Cyberbullying
Understanding Cyberbullying
 
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsRumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
 

Similar to Identify and Manage Threats Shared on Social Media

Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital Worldcyberprosocial
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceEvan Francen
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
Efficient Management of Your Technology Devices.pdf
Efficient Management of Your Technology Devices.pdfEfficient Management of Your Technology Devices.pdf
Efficient Management of Your Technology Devices.pdfTechSoup
 
Truthsayers/Stratagem COVID-19 Assessment
Truthsayers/Stratagem COVID-19 AssessmentTruthsayers/Stratagem COVID-19 Assessment
Truthsayers/Stratagem COVID-19 AssessmentSimonStapleton2
 
Need to Know - Real Intelligence Training
Need to Know - Real Intelligence TrainingNeed to Know - Real Intelligence Training
Need to Know - Real Intelligence TrainingPaul MCLEAY
 
TeachInt -- Teacher Intelligence
TeachInt -- Teacher IntelligenceTeachInt -- Teacher Intelligence
TeachInt -- Teacher IntelligenceSpencer Coursen
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2Ron Miller
 

Similar to Identify and Manage Threats Shared on Social Media (20)

School Safety Center
School Safety CenterSchool Safety Center
School Safety Center
 
Resum
ResumResum
Resum
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Building a Social Media Analysis & Response Team (SMART)
Building a Social Media Analysis & Response Team (SMART)Building a Social Media Analysis & Response Team (SMART)
Building a Social Media Analysis & Response Team (SMART)
 
DG for Fed
DG for FedDG for Fed
DG for Fed
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Efficient Management of Your Technology Devices.pdf
Efficient Management of Your Technology Devices.pdfEfficient Management of Your Technology Devices.pdf
Efficient Management of Your Technology Devices.pdf
 
Truthsayers/Stratagem COVID-19 Assessment
Truthsayers/Stratagem COVID-19 AssessmentTruthsayers/Stratagem COVID-19 Assessment
Truthsayers/Stratagem COVID-19 Assessment
 
Need to Know - Real Intelligence Training
Need to Know - Real Intelligence TrainingNeed to Know - Real Intelligence Training
Need to Know - Real Intelligence Training
 
TeachInt -- Teacher Intelligence
TeachInt -- Teacher IntelligenceTeachInt -- Teacher Intelligence
TeachInt -- Teacher Intelligence
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2
 
Grupo 4 - TEMA II.pptx
Grupo 4  - TEMA II.pptxGrupo 4  - TEMA II.pptx
Grupo 4 - TEMA II.pptx
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Social Media’s Role in Campus Safety: What, Why, and What Now?
Social Media’s Role in Campus Safety: What, Why, and What Now?Social Media’s Role in Campus Safety: What, Why, and What Now?
Social Media’s Role in Campus Safety: What, Why, and What Now?
 

Identify and Manage Threats Shared on Social Media

  • 1. Don’t Leave the Digital Playground Unattended Identify and Manage Threats Shared on Social Media 802-861-1361 | www.socialsentinel.com SM SM SM SM SM
  • 2. Put Social Media to Work Do you have a way to gather and examine threats shared on social media easily and efficiently? Built for K12 officials, the Social Sentinel® service enables you to access critical information to identify risks, assess threats, and manage events being shared–publicly–right now. Access near real-time alerts, analyze those alerts in context, and assign them for follow up– and better protect students. Actionable Results • Identify and evaluate the severity of a threat against a person, a group of people, or a school • Intervene when a student discusses self-directed harm, suicide, or shows signs of psychological distress • Track ongoing cyberbullying cases to protect students and staff • Coordinate police presence to maintain order when negative sentiment indicates potential for violence on campus • Assess alerts and assign to local authorities for further analysis and action–via SMS or email • Monitor sporting events and school sponsored social events for potentially dangerous activity • Translate posts using acronyms or foreign languages with one-click • Perform post-incident evaluations to assist investigations Key Features Fully Hosted and Managed SaaS No additional hardware or software required Location-Based, Near Real-Time Monitoring Public posts monitored globally or within a geo-targeted zone Multiple Social Media Sources Monitored Manage all alerts from one interface Preloaded Keywords Created and updated by school security experts User-Controlled Filter Creation Add local knowledge and expertise–in advance or on-the-fly Anonymous Investigations Research privately One-Click Translation Hundreds of languages and thousands of acronyms available User Roles and Rights Map keywords, functionality, and over site to the right users Responsive Design Use from any device Initial and Ongoing Training Your team will be up and running quickly Superior Support We’re here 24/7 to help Monitor Specific Locations With Geo-Fences Help your team bring the dynamic voice of social media into strategic, operational, and tactical decision making and response. © 2015 Social Sentinel, Inc. All rights reserved. Social Sentinel, Assess Alert Avert, and the design mark are trademarks of Social Sentinel, Inc.802-861-1361 | www.socialsentinel.com