1 / 58

Menu

Menu. Reports Network Configuration (Technical) Managing Risk Day To Day Monitoring Methods Outcomes of using Spector CNE Resolve Technical Problems Who Uses Spector CNE Return on Investment. Click on each item to go to that section. Reporting. Reporting. Keystrokes

hagop
Download Presentation

Menu

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Menu • Reports • Network Configuration (Technical) • Managing Risk • Day To Day Monitoring Methods • Outcomes of using Spector CNE • Resolve Technical Problems • Who Uses Spector CNE • Return on Investment Click on each item to go to that section

  2. Reporting Reporting • Keystrokes • Downloads/uploads • Snapshots • Bandwidth usage • File usage • Web Sites • Email • Chat/Instant Message • Programs

  3. Reporting Viewer Simple to view activity reports

  4. Reporting Websites

  5. Reporting Email

  6. Reporting Chat/Instant Message

  7. Reporting Program Activity

  8. Reporting Downloads

  9. Reporting Keystrokes

  10. Reporting Additional Features • Monitor files deleted, created, and renamed(includes files written to CD, DVD or USB devices) • Record printing of documents • Capture files uploaded and downloaded • Track network traffic and bandwidth usage • View events by login

  11. Network Configuration End of this section

  12. Network Configuration Network Configuration

  13. Network Configuration • Install the Spector CNE Viewer on any number of computers • Activities are identified by computer name and username • Spector CNE uses little bandwidth

  14. Network Configuration Data Vault • 10 MB disk space per computer per day • Older information automatically overwritten • Automated archiving or Windows backup • One or more Data Vaults

  15. Network Configuration STANDARD NETWORK CONFIGURATION

  16. Network Configuration MULTI-SERVER CONFIGURATION

  17. Network Configuration Manage Computers • Remote install and uninstall • Installation completely undetectable • Remotely turn recording on/off and change settings

  18. Network Configuration Control Center

  19. Network Configuration End of this section

  20. Risk Management

  21. Theft of confidential information Sexual or racial harassment Discrimination claims Fraud & embezzlement Illegal downloads Litigation by employees and outside companies Risk Management Stop these Activities

  22. Deterrence Levels of Use “When the word about monitoring got out…non-work activities went down about 98 to 99 percent….” Keith Becker Illinois Wholesale Cash Register Corporation Hoffman Estates, Illinois “The threat of being caught red-handed is powerful. That is what the law does. And to some degree, this software lays down the law.” Chuck Benedon Ashton Financial Brookfield, Wisconsin

  23. Deterrence Detection Levels of Use “We found out… that a large number of our staff were playing computer games and chatting on the Internet while on company time.” Robert Elliott RCS Communications Louisville, Kentucky

  24. Deterrence Detection Investigation Levels of Use “…watching and noticing variations in employee habits indicated a problem … enough so to warrant an investigation…with (Spector CNE).” Chuck Benedon Ashton Financial Brookfield, Wisconsin

  25. Deterrence Detection Investigation Prosecution Levels of Use “If you have to get up in front of a judge and say this and this was going on, you better have something to back it up.” Edgar Huite Jackson Hewitt Foley, Alabama “The reports Spector CNE provides are such a huge piece of evidence. Spector CNE gives you the ability to go to court with evidence of EXACTLY what happened.” -- Jeff Tirpak, Lonkar Services Ltd. Red Deer, AB, Canada

  26. End of this section

  27. Random monitoring Upon request Formal investigations Keyword alerts How Companies Monitor (Little time is spent on review)

  28. How Companies Monitor Random monitoring Weekly review of an employee’s computer use Only 10 minutes to review a day’s activities

  29. How Companies Monitor Random monitoring Upon request • When a supervisor suspects inappropriate behavior • Examples: • Not getting work done • Switching screens when you walk by • Complaints by coworkers

  30. How Companies Monitor Random monitoring Upon request Formal Investigations • Serious misuse of computers • Fraud • Sexual harassment • Confidential information loss • Employee or external lawsuits

  31. How Companies Monitor Random monitoring Upon request Formal Investigations Keyword Alerts • Receive immediate email notification of words and phrases detected in: • Email • Instant Messages • Websites • Keystrokes

  32. End of this section

  33. Who Uses SpectorSoft Products?

  34. Who Uses SpectorSoft Products? “One of my employees was sending emails to his former employer - who also happens to be my competition. Spector captured those emails and everything he sent with his correspondence, including my vendor lists, item codes and serial numbers of every item sold! The Spector recordings were legal proof of his harmful activities.” James G. Farnes, President Farnes Computer Systems Coconut Creek, Florida Corporations & Small/Mid-Size Business • Increase Employee Productivity • Enforce Internet Acceptable Use Policies • Reduce the Spread of Confidential Company Information • Reduce Potential Legal Liability

  35. Who Uses SpectorSoft Products? Corporations & Small/Mid-Size Business • Increase Employee Productivity • Enforce Internet Acceptable Use Policies • Reduce the Spread of Confidential Company Information • Reduce Potential Legal Liability “We are a technology school in North Carolina and last fall we were subject to hacking attacks that almost shut our network down. Spector discovered who the culprits were. It is easy to use and we can see exactly what the students were doing. Now the students are running scared because word is out that we can mysteriously find out which students are causing havoc.” Robert Frost Highland School of Technology Gaston County Schools, North Carolina Education • Stop Student Hacking of School PCs & Networks • Control Inappropriate Web Surfing • Identify Students Abusing Internet Privileges

  36. Who Uses SpectorSoft Products? “Spector Pro does exactly what it says it will do and has proven useful in administrative and criminal investigations as well as off site supervision of convicted criminals.” Todd Sabins, Detective Berkeley Police Department Berkeley, California “Spector Pro is an important part of my online undercover investigations. The chat logging and screenshot captures are excellent. I never go into a chat room or instant message conversation without Spector Pro running in the background.” Mike Widner, Detective Noblesville Police Department Noblesville, Indiana Corporations & Small/Mid-Size Business • Increase Employee Productivity • Enforce Internet Acceptable Use Policies • Reduce the Spread of Confidential Company Information • Reduce Potential Legal Liability Education • Stop Student Hacking of School PCs & Networks • Control Inappropriate Web Surfing • Identify Students Abusing Internet Privileges Law Enforcement • Monitor Offenders (Sex Offenders, Pedophiles, con artists, embezzlers and other cyber-criminals) • Enforce Government Mandated Supervisory Restrictions • Monitor Government Employees

  37. Network Configuration End of this section

  38. What you will accomplish

  39. What you will accomplish “At first I thought it was expensive for a company of our size. But it paid for itself in a week. Spector CNE is priceless at double the cost. After the first week I did a spreadsheet report showing a minimum of 40 to 50 hours a week wasted, just on Internet surfing. The report easily projected savings of $50,000 a year or more.” Keith Becker Illinois Wholesale Cash Register Hoffman Estates, Illinois Improved Productivity

  40. What you will accomplish Improved Productivity Reduced Risk “One employee was getting ready to leave and was transferring files via email. This was important data, like the customer list. We caught her dead. It’s against the law. It’s company property, not the employee’s.” Chuck Benedon Ashton Financial Brookfield, Wisconsin

  41. What you will accomplish Improved Productivity Reduced Risk Regulatory Compliance Woodlands Securities and four associated financial services companies use Spector CNE to conform to regulations established by the National Association of Securities Dealers (NASD), the Securities and Exchange Commission (SEC), and the State Securities Board. Dennis McCullough Woodlands Securities The Woodlands, Texas

  42. What you will accomplish  “When employees come up for review, I check their compliance with computer use policy. I want to know how dedicated an employee is so we can compensate him or her properly. Specifically, Spector CNE allows us to determine how much personal time an employee spends on the computer.” Name Withheld “If an employee is leaving us, we’ll do a routine check. It’s a real effective tool for departure situations … expected or unexpected.” Gene O’Neal Carlile Transportation Systems Anchorage, Alaska Improved Productivity Reduced Risk Regulatory Compliance Performance Reviews

  43. What you will accomplish Improved Productivity Reduced Risk Regulatory Compliance Performance Reviews Document Recovery “It's important to our law firm that we send timely emails. Occasionally we are faulted for not having done so and asked to pay damages. Spector CNE has enabled us to retrieve these emails and prove we did indeed meet our obligation.” Name withheld

  44. What you will accomplish Improved Productivity Reduced Risk Regulatory Compliance Performance Reviews Document Recovery Training/quality control “Using the software, we now keep an eye on new employees for a couple of weeks,” said Elliott. “It helps in training … you look at the Spector CNE screen snapshots and not only can you ask why are they doing this … but why are they doing it this way?” Bob Elliott RCS Communication Louisville, Kentucky

  45. Resolve Technical Problems

  46. Resolve Technical Problems Error Messages “The screenshots show me error messages and exactly what led up to a problem.” Name Withheld

  47. Resolve Technical Problems Error Messages Malware and Viruses “(Users) go to websites and cookies get placed that change the behavior of Internet Explorer. I can discover the website that caused the problem and block it for everyone.” “I can discover how a virus was introduced.” Name Withheld

  48. Resolve Technical Problems Error Messages Malware and Viruses Documentation “I use the screenshots to document installations and configuration changes for later review.” Name Withheld

  49. Resolve Technical Problems “The incidents are few and far between now. And that alone saves us work. We don’t have to ‘clean’ the machines as often as before.” Jeff Hunt, Park Rapids Area School District Park Rapids, Minnesota Error Messages Malware and Viruses Documentation Saved staff time We have found that our support workload is reduced because the kids don’t try to crash the PCs any more, and if a machine does fail, we can see from the log what was happening when it failed. This makes it much easier to fix.” Fungai Chawira, St Augustine’s High School London, England

More Related