SlideShare a Scribd company logo
Monitor your Employees Internet & Desktop Activity Company-Wide Product Overview Presentation Spector 360 will automatically capture all employee Internet and desktop activity whether they are in the office, traveling or working remotely on both Windows or Mac OS. Spector 360 records: Email/Webmail Application/Program Use User Activity File Transfers Network Activity Chat/Instant Messages Online Searches Document Tracking Web Sites Visited Keystrokes Typed
Product Overview Spector 360 is the most complete solution available for company-wide monitoring of employee PC and Internet activities.
Product Overview Many employees waste time EVERY DAY surfing personal web sites at work.  Spector 360 helps you determine who is crossing the line.
Product Overview Are your employees using company computers to engage in inappropriate or illegal activities?  Spector 360 lets you find out today, with more than 50 built-in reports and detailed search and investigation features
Product Overview Do you suspect that sensitive information is leaking from your business, but you can’t put your finger on the culprit?  Spector 360 helps you identify the leaks, discourages them from occurring in the first place, and presents the evidence needed to punish intentional offenders.
Product Overview Are you looking to identify the hardest-working departments in your company and set standards for the others?  Spector 360 lets you determine successful business practices and use this data to set employee benchmarks.
Product Overview Spector 360’s unmatched recording capabilities capture every detail of what your employees do on company computers, including the web sites they visit, what they search for online, their chats and emails, and much more.
Product Overview This detailed recorded information is then stored in a centralized database, where it can be viewed and managed with an easy-to-use dashboard and Control Center
Product Overview The Spector 360 Dashboard provides Quick View charts so you can visualize trends and patterns of use and abuse across your entire company.
Product Overview Spector 360 also includes a number of tools to help you investigate suspect employees or activities. For example, all Quick View Charts and Reports can be customized to zero in on suspected problems. The Spector 360 Search tool lets you look for words or phrases in all employee activities, as you might do when investigating who has been accessing a sensitive document. Use the Data Explorer to drill into specific types of events, such as employees copying proprietary files to removable media. And, the User Explorer tool can be used to see all the activities of any single employee, such as excessive personal web surfing.
Product Overview You can even drill down into screenshot surveillance video to see not only WHAT they do, but the EXACT order in which they do it, step by step, each and every second.
Product Overview And with more than 50 built-in customizable reports, you can FINALLY answer the tough questions about how your employees are using company PCs and the Internet.
Product Overview Many companies are using Spector 360 to prevent, reduce or eliminate inappropriate activities.
Product Overview Now let’s look at a few examples of how Spector 360 can be used in your company.  One method of utilizing Spector 360 is observing its company-wide views to quickly see trends and patterns of use and abuse, like excessive web surfing.  You can also perform a focused investigation of a specific employee or activity, such as monitoring someone that you suspect is sending out sensitive company information.  Let’s use these methods to solve a few typical problems that many businesses have.
Product Overview This first scenario shows how Spector 360’s company-wide views let you monitor employee activities across your entire company, to quickly find the trouble spots.  For example, there are many different types of inappropriate web surfing that you might want to identify in your organization.  In this case, you’ll use Spector 360’s company-wide views to quickly spot employees wasting time shopping online.
Product Overview Spector 360 provides several different charts that can be used to reveal inappropriate web surfing.  For example, this chart shows that employees are spending a lot of time on eBay and other shopping web sites.
Product Overview To find out which employees are shopping excessively, you can simply filter the chart showing employees who web surf the most to display activity ONLY for shopping web sites.  This immediately reveals several employees shopping on company time – and one shopping for hours.
Product Overview You can now drill into the EXACT details and view step-by-step screen snapshots to PROVE that this employee was engaged in personal shopping for several hours on company time.
Product Overview This scenario shows how you can use Spector 360 to proactively investigate specific employees or activities when you suspect a problem.  In this case, you’ll investigate a key employee that you believe is about to leave the company for a competitor.
Product Overview Spector 360 lets you instantly filter all charts and reports to focus your investigation on a single department, computer, or individual employee.  Let’s focus on our suspect employee– Peter, in Accounting.  Now Spector 360 shows ONLY the activities of this employee.
Product Overview A number of inappropriate activities immediately stand out, such as: The job search web sites he is surfing on company time. Keyword alerts for this employee regarding leaving the company, and the possible sharing of inside information. A huge number of documents he is printing out and transferring to removable media. And finally, the employee’s webmail activities to and from our top competitor.  You can drill into any of these charts for more details …
Product Overview Spector 360 is the most complete employee monitoring solution available. Its unmatched recording capabilities capture every detail of what your employees do on company computers. The centralized database enables easier management and company-wide visibility into user activities. Spector 360 is also built on a scalable architecture that can expand with your company’s needs. End-to-end communications security and role-based access ensure both data security and integrity. And its familiar interface and use of Microsoft’s MMC snap-in technology make Spector 360 easy to deploy and use.
Product Overview Top 5 Reasons Companies Turn To Spector 360 Increase Productivity Significantly reduce the amount of goofing off that has grown common in most workplaces. Spector 360 will cut this huge productivity drain by at least 75%. Conduct Investigations and Document Violations Any employee suspected of engaging in inappropriate, illegal, or unapproved conduct can be investigated with Spector 360. Enforce Acceptable Use Policy Employees often believe that rules can be bent if no one is watching. Spector 360 ensures adherence to your policy for computer and Internet use. Lower the incidence and risks of sexual and racial harassment and occurrences of online gambling and surfing of pornography. “Insider” Theft Protection One in five employees will copy or print company-owned materials in the days leading up to their resignation. Others will routinely leak sensitive and confidential information, accidentally, intentionally, or otherwise. Spector 360 allows you to look back in time to detect this behavior. Compliance Requirements Meet or exceed Federal, Industry, or Agency compliance requirements with Spector 360 by seamlessly maintaining records of communications and transactions – a requirement for many companies
Product Overview System Requirements: ,[object Object]

More Related Content

Similar to Spector 360 Product Overview

SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
Cheer Chain Enterprise Co., Ltd.
 
Support your business objects GDPR project with 360suite
Support your business objects GDPR project with 360suiteSupport your business objects GDPR project with 360suite
Support your business objects GDPR project with 360suite
Sebastien Goiffon
 
Partnership Program
Partnership ProgramPartnership Program
Partnership Program
AnupriyaSundrani1
 
SharePoint and GDPR Compliance
SharePoint and GDPR Compliance SharePoint and GDPR Compliance
SharePoint and GDPR Compliance
SysKit Ltd
 
Age of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide DiscoveryAge of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide Discovery
Inside Analysis
 
SplunkLive! Paris 2018: Splunk Overview
SplunkLive! Paris 2018: Splunk OverviewSplunkLive! Paris 2018: Splunk Overview
SplunkLive! Paris 2018: Splunk Overview
Splunk
 
eTrax Employees Monitoring System
eTrax Employees Monitoring SystemeTrax Employees Monitoring System
eTrax Employees Monitoring System
Authentic Venture Sdn Bhd
 
Web CRM One 2.0
Web CRM One 2.0Web CRM One 2.0
Web CRM One 2.0
Run Time Solutions
 
Future Proofing Your Office 365 & SharePoint Strategy
Future Proofing Your Office 365 & SharePoint StrategyFuture Proofing Your Office 365 & SharePoint Strategy
Future Proofing Your Office 365 & SharePoint Strategy
Richard Harbridge
 
Safetica Endpoint Security Datasheet by Safetica Benelux - EN
Safetica Endpoint Security Datasheet by Safetica Benelux - ENSafetica Endpoint Security Datasheet by Safetica Benelux - EN
Safetica Endpoint Security Datasheet by Safetica Benelux - EN
Safetica Benelux
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
Proxies Rent
 
The Future of Productive Teams_ Staff Tracking Software Uncovered.pdf
The Future of Productive Teams_ Staff Tracking Software Uncovered.pdfThe Future of Productive Teams_ Staff Tracking Software Uncovered.pdf
The Future of Productive Teams_ Staff Tracking Software Uncovered.pdf
Flowace.ai
 
We360.ai PPT.pptx
We360.ai PPT.pptxWe360.ai PPT.pptx
We360.ai PPT.pptx
Lovely Devada
 
White Paper- Know Your Data
White Paper- Know Your Data White Paper- Know Your Data
White Paper- Know Your Data
MetaVis Technologies
 
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038suvadeep Kundu
 
7 steps to business success on the Internet of Things
7 steps to business success on the Internet of Things7 steps to business success on the Internet of Things
7 steps to business success on the Internet of ThingsThe Marketing Distillery
 
Employee monitoring-solutions-from-refog
Employee monitoring-solutions-from-refogEmployee monitoring-solutions-from-refog
Employee monitoring-solutions-from-refogRefogCom
 
Employee monitoring solutions from Refog
Employee monitoring solutions from RefogEmployee monitoring solutions from Refog
Employee monitoring solutions from Refog
RefogCom
 
Employee Monitoring
Employee MonitoringEmployee Monitoring
Employee Monitoring
AnupriyaSundrani1
 

Similar to Spector 360 Product Overview (20)

SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
 
Support your business objects GDPR project with 360suite
Support your business objects GDPR project with 360suiteSupport your business objects GDPR project with 360suite
Support your business objects GDPR project with 360suite
 
Partnership Program
Partnership ProgramPartnership Program
Partnership Program
 
SharePoint and GDPR Compliance
SharePoint and GDPR Compliance SharePoint and GDPR Compliance
SharePoint and GDPR Compliance
 
Age of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide DiscoveryAge of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide Discovery
 
SplunkLive! Paris 2018: Splunk Overview
SplunkLive! Paris 2018: Splunk OverviewSplunkLive! Paris 2018: Splunk Overview
SplunkLive! Paris 2018: Splunk Overview
 
eTrax Employees Monitoring System
eTrax Employees Monitoring SystemeTrax Employees Monitoring System
eTrax Employees Monitoring System
 
Web CRM One 2.0
Web CRM One 2.0Web CRM One 2.0
Web CRM One 2.0
 
Future Proofing Your Office 365 & SharePoint Strategy
Future Proofing Your Office 365 & SharePoint StrategyFuture Proofing Your Office 365 & SharePoint Strategy
Future Proofing Your Office 365 & SharePoint Strategy
 
Safetica Endpoint Security Datasheet by Safetica Benelux - EN
Safetica Endpoint Security Datasheet by Safetica Benelux - ENSafetica Endpoint Security Datasheet by Safetica Benelux - EN
Safetica Endpoint Security Datasheet by Safetica Benelux - EN
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
Final Report_213110090
Final Report_213110090Final Report_213110090
Final Report_213110090
 
The Future of Productive Teams_ Staff Tracking Software Uncovered.pdf
The Future of Productive Teams_ Staff Tracking Software Uncovered.pdfThe Future of Productive Teams_ Staff Tracking Software Uncovered.pdf
The Future of Productive Teams_ Staff Tracking Software Uncovered.pdf
 
We360.ai PPT.pptx
We360.ai PPT.pptxWe360.ai PPT.pptx
We360.ai PPT.pptx
 
White Paper- Know Your Data
White Paper- Know Your Data White Paper- Know Your Data
White Paper- Know Your Data
 
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
Xively io t_wp-708003f0d106c3f576cf63e87cbd9038
 
7 steps to business success on the Internet of Things
7 steps to business success on the Internet of Things7 steps to business success on the Internet of Things
7 steps to business success on the Internet of Things
 
Employee monitoring-solutions-from-refog
Employee monitoring-solutions-from-refogEmployee monitoring-solutions-from-refog
Employee monitoring-solutions-from-refog
 
Employee monitoring solutions from Refog
Employee monitoring solutions from RefogEmployee monitoring solutions from Refog
Employee monitoring solutions from Refog
 
Employee Monitoring
Employee MonitoringEmployee Monitoring
Employee Monitoring
 

Spector 360 Product Overview

  • 1. Monitor your Employees Internet & Desktop Activity Company-Wide Product Overview Presentation Spector 360 will automatically capture all employee Internet and desktop activity whether they are in the office, traveling or working remotely on both Windows or Mac OS. Spector 360 records: Email/Webmail Application/Program Use User Activity File Transfers Network Activity Chat/Instant Messages Online Searches Document Tracking Web Sites Visited Keystrokes Typed
  • 2. Product Overview Spector 360 is the most complete solution available for company-wide monitoring of employee PC and Internet activities.
  • 3. Product Overview Many employees waste time EVERY DAY surfing personal web sites at work. Spector 360 helps you determine who is crossing the line.
  • 4. Product Overview Are your employees using company computers to engage in inappropriate or illegal activities? Spector 360 lets you find out today, with more than 50 built-in reports and detailed search and investigation features
  • 5. Product Overview Do you suspect that sensitive information is leaking from your business, but you can’t put your finger on the culprit? Spector 360 helps you identify the leaks, discourages them from occurring in the first place, and presents the evidence needed to punish intentional offenders.
  • 6. Product Overview Are you looking to identify the hardest-working departments in your company and set standards for the others? Spector 360 lets you determine successful business practices and use this data to set employee benchmarks.
  • 7. Product Overview Spector 360’s unmatched recording capabilities capture every detail of what your employees do on company computers, including the web sites they visit, what they search for online, their chats and emails, and much more.
  • 8. Product Overview This detailed recorded information is then stored in a centralized database, where it can be viewed and managed with an easy-to-use dashboard and Control Center
  • 9. Product Overview The Spector 360 Dashboard provides Quick View charts so you can visualize trends and patterns of use and abuse across your entire company.
  • 10. Product Overview Spector 360 also includes a number of tools to help you investigate suspect employees or activities. For example, all Quick View Charts and Reports can be customized to zero in on suspected problems. The Spector 360 Search tool lets you look for words or phrases in all employee activities, as you might do when investigating who has been accessing a sensitive document. Use the Data Explorer to drill into specific types of events, such as employees copying proprietary files to removable media. And, the User Explorer tool can be used to see all the activities of any single employee, such as excessive personal web surfing.
  • 11. Product Overview You can even drill down into screenshot surveillance video to see not only WHAT they do, but the EXACT order in which they do it, step by step, each and every second.
  • 12. Product Overview And with more than 50 built-in customizable reports, you can FINALLY answer the tough questions about how your employees are using company PCs and the Internet.
  • 13. Product Overview Many companies are using Spector 360 to prevent, reduce or eliminate inappropriate activities.
  • 14. Product Overview Now let’s look at a few examples of how Spector 360 can be used in your company. One method of utilizing Spector 360 is observing its company-wide views to quickly see trends and patterns of use and abuse, like excessive web surfing. You can also perform a focused investigation of a specific employee or activity, such as monitoring someone that you suspect is sending out sensitive company information. Let’s use these methods to solve a few typical problems that many businesses have.
  • 15. Product Overview This first scenario shows how Spector 360’s company-wide views let you monitor employee activities across your entire company, to quickly find the trouble spots. For example, there are many different types of inappropriate web surfing that you might want to identify in your organization. In this case, you’ll use Spector 360’s company-wide views to quickly spot employees wasting time shopping online.
  • 16. Product Overview Spector 360 provides several different charts that can be used to reveal inappropriate web surfing. For example, this chart shows that employees are spending a lot of time on eBay and other shopping web sites.
  • 17. Product Overview To find out which employees are shopping excessively, you can simply filter the chart showing employees who web surf the most to display activity ONLY for shopping web sites. This immediately reveals several employees shopping on company time – and one shopping for hours.
  • 18. Product Overview You can now drill into the EXACT details and view step-by-step screen snapshots to PROVE that this employee was engaged in personal shopping for several hours on company time.
  • 19. Product Overview This scenario shows how you can use Spector 360 to proactively investigate specific employees or activities when you suspect a problem. In this case, you’ll investigate a key employee that you believe is about to leave the company for a competitor.
  • 20. Product Overview Spector 360 lets you instantly filter all charts and reports to focus your investigation on a single department, computer, or individual employee. Let’s focus on our suspect employee– Peter, in Accounting. Now Spector 360 shows ONLY the activities of this employee.
  • 21. Product Overview A number of inappropriate activities immediately stand out, such as: The job search web sites he is surfing on company time. Keyword alerts for this employee regarding leaving the company, and the possible sharing of inside information. A huge number of documents he is printing out and transferring to removable media. And finally, the employee’s webmail activities to and from our top competitor. You can drill into any of these charts for more details …
  • 22. Product Overview Spector 360 is the most complete employee monitoring solution available. Its unmatched recording capabilities capture every detail of what your employees do on company computers. The centralized database enables easier management and company-wide visibility into user activities. Spector 360 is also built on a scalable architecture that can expand with your company’s needs. End-to-end communications security and role-based access ensure both data security and integrity. And its familiar interface and use of Microsoft’s MMC snap-in technology make Spector 360 easy to deploy and use.
  • 23. Product Overview Top 5 Reasons Companies Turn To Spector 360 Increase Productivity Significantly reduce the amount of goofing off that has grown common in most workplaces. Spector 360 will cut this huge productivity drain by at least 75%. Conduct Investigations and Document Violations Any employee suspected of engaging in inappropriate, illegal, or unapproved conduct can be investigated with Spector 360. Enforce Acceptable Use Policy Employees often believe that rules can be bent if no one is watching. Spector 360 ensures adherence to your policy for computer and Internet use. Lower the incidence and risks of sexual and racial harassment and occurrences of online gambling and surfing of pornography. “Insider” Theft Protection One in five employees will copy or print company-owned materials in the days leading up to their resignation. Others will routinely leak sensitive and confidential information, accidentally, intentionally, or otherwise. Spector 360 allows you to look back in time to detect this behavior. Compliance Requirements Meet or exceed Federal, Industry, or Agency compliance requirements with Spector 360 by seamlessly maintaining records of communications and transactions – a requirement for many companies
  • 24.
  • 25. Server OS – The following systems are supported for Server Components: Windows 2000, Vista, XP Professional, System 7, Server 2003, Server 2008, and 64-bit systems
  • 26. Recorder OS - The following systems are supported for the Client Recorder:
  • 27. Windows - 2000, Vista, XP, System 7, Server 2003, 64-bit systems
  • 28.
  • 30.