58
Menu Exit

MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Embed Size (px)

Citation preview

Page 1: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Page 2: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Menu• Reports• Network Configuration (Technical)

• Managing Risk

• Day To Day Monitoring Methods

• Outcomes of using Spector CNE

• Resolve Technical Problems

• Who Uses Spector CNE

• Return on Investment

Click on each item to go to that section

Page 3: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

ReportingReporting

Reporting

• Web Sites

• Email

• Chat/Instant Message

• Programs

• Keystrokes

• Downloads/uploads

• Snapshots

• Bandwidth usage

• File usage

Page 4: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Viewer

Reporting

Simple to view activity reports

Page 5: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Websites

Reporting

Page 6: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Email

Reporting

Page 7: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Chat/Instant Message

Reporting

Page 8: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Program Activity

Reporting

Page 9: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Downloads

Reporting

Page 10: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Keystrokes

Reporting

Page 11: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Additional Features

• Monitor files deleted, created, and renamed

(includes files written to CD, DVD or USB devices)

• Record printing of documents

• Capture files uploaded and downloaded

• Track network traffic and bandwidth usage

• View events by login

Reporting

Page 12: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Network Configuration

End of this section

Page 13: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Network Configuration

Network Configuration

Page 14: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

• Install the Spector CNE Viewer on any number of computers

• Activities are identified by computer name and username

• Spector CNE uses little bandwidth

Network Configuration

Page 15: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Data Vault

• 10 MB disk space per computer per day

• Older information automatically overwritten

• Automated archiving or Windows backup

• One or more Data Vaults

Network Configuration

Page 16: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

STANDARD NETWORK CONFIGURATION

  Network Configuration

Page 17: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

MULTI-SERVER CONFIGURATION

Network Configuration

Page 18: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Manage Computers

• Remote install and uninstall

• Installation completely undetectable

• Remotely turn recording on/off and change settings

Network Configuration

Page 19: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Control Center

Network Configuration

Page 20: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Network Configuration

End of this section

Page 21: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Risk ManagementRisk Management

Page 22: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Stop these Activities• Theft of confidential

information

• Sexual or racial harassment

• Discrimination claims

• Fraud & embezzlement

• Illegal downloads

• Litigation by employees and outside companies

Risk Management

Page 23: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Deterrence “When the word about monitoring got out…non-work activities went down about 98 to 99 percent….”

Keith Becker

Illinois Wholesale Cash Register Corporation

Hoffman Estates, Illinois

“The threat of being caught red-handed is powerful. That is what the law does. And to some degree, this software lays down the law.”

Chuck BenedonAshton Financial

Brookfield, Wisconsin

Levels of Use

Page 24: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Deterrence

Detection “We found out… that a large number of

our staff were playing computer games and chatting on the Internet while on company time.”

Robert ElliottRCS Communications

Louisville, Kentucky

Levels of Use

Page 25: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Deterrence

Detection

Investigation

“…watching and noticing variations in employee habits indicated a problem … enough so to warrant an investigation…with (Spector CNE).”

Chuck BenedonAshton Financial

Brookfield, Wisconsin

Levels of Use

Page 26: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Deterrence

Detection

Investigation

Prosecution

“If you have to get up in front of a judge and say this and this was going on, you better have something to back it up.”

Edgar Huite

Jackson Hewitt

Foley, Alabama

“The reports Spector CNE provides are such a huge piece of evidence. Spector CNE gives you the ability to go to court with evidence of EXACTLY what happened.”

-- Jeff Tirpak,

Lonkar Services Ltd.

Red Deer, AB, Canada

Levels of Use

Page 27: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

End of this section

Page 28: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

How Companies MonitorHow Companies Monitor

• Random monitoring

• Upon request

• Formal investigations

• Keyword alerts

(Little time is spent on review)

Page 29: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Random monitoringWeekly review of an Weekly review of an employee’s computer useemployee’s computer use

Only 10 minutes to review a Only 10 minutes to review a day’s activitiesday’s activities

How Companies Monitor

Page 30: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Random monitoring

Upon request

When a supervisor suspects When a supervisor suspects inappropriate behaviorinappropriate behavior

Examples:Examples:

• Not getting work doneNot getting work done

• Switching screens when Switching screens when you walk byyou walk by

• Complaints by coworkersComplaints by coworkers

How Companies Monitor

Page 31: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Random monitoring

Upon request

Formal Investigations

Serious misuse of computersSerious misuse of computers

• FraudFraud

• Sexual harassmentSexual harassment

• Confidential information lossConfidential information loss

• Employee or external lawsuitsEmployee or external lawsuits

How Companies Monitor

Page 32: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Random monitoring

Upon request

Formal Investigations

Keyword Alerts

Receive immediate email Receive immediate email notification of words and phrases notification of words and phrases detected in:detected in:

• EmailEmail

• Instant MessagesInstant Messages

• WebsitesWebsites

• KeystrokesKeystrokes

How Companies Monitor

Page 33: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

End of this section

Page 34: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Who Uses SpectorSoft Products?

Page 35: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Who Uses SpectorSoft Products?

Corporations & Small/Mid-Size Business• Increase Employee Productivity• Enforce Internet Acceptable Use Policies• Reduce the Spread of Confidential Company Information• Reduce Potential Legal Liability

“One of my employees was sending emails to his former employer - who also happens to be my competition. Spector captured those emails and everything he sent with his correspondence, including my vendor lists, item codes and serial numbers of every item sold!

The Spector recordings were legal proof of his harmful activities.”

James G. Farnes, PresidentFarnes Computer Systems

Coconut Creek, Florida

Page 36: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Who Uses SpectorSoft Products?

Education• Stop Student Hacking of School PCs & Networks• Control Inappropriate Web Surfing• Identify Students Abusing Internet Privileges

Corporations & Small/Mid-Size Business• Increase Employee Productivity• Enforce Internet Acceptable Use Policies• Reduce the Spread of Confidential Company Information• Reduce Potential Legal Liability

“We are a technology school in North Carolina and last fall we were subject to hacking attacks that almost shut our network down.

Spector discovered who the culprits were. It is easy to use and we can see exactly what the students were doing.

Now the students are running scared because word is out that we can mysteriously find out which students are causing havoc.”

Robert Frost Highland School of Technology

Gaston County Schools, North Carolina

Page 37: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Who Uses SpectorSoft Products?

Law Enforcement• Monitor Offenders (Sex Offenders, Pedophiles, con artists, embezzlers and other cyber-criminals)• Enforce Government Mandated Supervisory Restrictions• Monitor Government Employees

Education• Stop Student Hacking of School PCs & Networks• Control Inappropriate Web Surfing• Identify Students Abusing Internet Privileges

Corporations & Small/Mid-Size Business• Increase Employee Productivity• Enforce Internet Acceptable Use Policies• Reduce the Spread of Confidential Company Information• Reduce Potential Legal Liability

“Spector Pro does exactly what it says it will do and has proven useful in administrative and criminal investigations as well as off site supervision of convicted criminals.”

Todd Sabins, DetectiveBerkeley Police Department

Berkeley, California

“Spector Pro is an important part of my online undercover investigations. The chat logging and screenshot captures are excellent. I never go into a chat room or instant message conversation without Spector Pro running in the background.”

Mike Widner, Detective Noblesville Police Department

Noblesville, Indiana

Page 38: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Network Configuration

End of this section

Page 39: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

What you will accomplish

Page 40: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Improved Productivity

What you will accomplish

“At first I thought it was expensive for a company of our size. But it paid for itself in a week. Spector CNE is priceless at double the cost.

After the first week I did a spreadsheet report showing a minimum of 40 to 50 hours a week wasted, just on Internet surfing. The report easily projected savings of $50,000 a year or more.”

Keith BeckerIllinois Wholesale Cash Register

Hoffman Estates, Illinois

Page 41: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Improved Productivity

Reduced Risk

What you will accomplish

“One employee was getting ready to leave and was transferring files via email. This was important data, like the customer list. We caught her dead. It’s against the law. It’s company property, not the employee’s.”

Chuck BenedonAshton Financial

Brookfield, Wisconsin

Page 42: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Improved Productivity

Reduced Risk

Regulatory Compliance

What you will accomplish

Woodlands Securities and four associated financial services companies use Spector CNE to conform to regulations established by the National Association of Securities Dealers (NASD), the Securities and Exchange Commission (SEC), and the State Securities Board.

Dennis McCulloughWoodlands Securities

The Woodlands, Texas

Page 43: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Improved Productivity

Reduced Risk

Regulatory Compliance

Performance Reviews

What you will accomplish

 “When employees come up for review, I check their compliance with computer use policy. I want to know how dedicated an employee is so we can compensate him or her properly. Specifically, Spector CNE allows us to determine how much personal time an employee spends on the computer.”

Name Withheld

“If an employee is leaving us, we’ll do a routine check. It’s a real effective tool for departure situations … expected or unexpected.”

Gene O’NealCarlile Transportation Systems

Anchorage, Alaska

Page 44: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Improved Productivity

Reduced Risk

Regulatory Compliance

Performance Reviews

Document Recovery

What you will accomplish

“It's important to our law firm that we send timely emails. Occasionally we are faulted for not having done so and asked to pay damages. Spector CNE has enabled us to retrieve these emails and prove we did indeed meet our obligation.”

Name withheld

Page 45: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Improved Productivity

Reduced Risk

Regulatory Compliance

Performance Reviews

Document Recovery

Training/quality control

What you will accomplish

“Using the software, we now keep an eye on new employees for a couple of weeks,” said Elliott. “It helps in training … you look at the Spector CNE screen snapshots and not only can you ask why are they doing this … but why are they doing it this way?”

Bob ElliottRCS CommunicationLouisville, Kentucky

Page 46: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Resolve Technical Problems

Page 47: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Error Messages

Resolve Technical Problems

“The screenshots show me error messages and exactly what led up to a problem.”

Name Withheld

Page 48: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Error Messages

Malware and Viruses

Resolve Technical Problems

“(Users) go to websites and cookies get placed that change the behavior of Internet Explorer. I can discover the website that caused the problem and block it for everyone.”

“I can discover how a virus was introduced.”

Name Withheld

Page 49: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Error Messages

Malware and Viruses

Documentation

Resolve Technical Problems

“I use the screenshots to document installations and configuration changes for later review.”

Name Withheld

Page 50: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Error Messages

Malware and Viruses

Documentation

Saved staff time

Resolve Technical Problems

“The incidents are few and far between now. And that alone saves us work. We don’t have to ‘clean’ the machines as often as before.”

Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota

We have found that our support workload is reduced because the kids don’t try to crash the PCs any more, and if a machine does fail, we can see from the log what was happening when it failed. This makes it much easier to fix.”

Fungai Chawira, St Augustine’s High School London, England

Page 51: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Error Messages

Malware and Viruses

Documentation

Save staff time

Reduce Bandwidth

Resolve Technical Problems

“We found a folder with 60-80 songs in it on one of our file servers … way down deep. We wouldn’t have found the songs without Spector CNE.”

Todd Kumpola, Rapids Area School DistrictPark Rapids, Minnesota

Page 52: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Network Configuration

End of this section

Page 53: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Return on Investment

Page 54: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

Cost Savings CalculatorSee how quickly Spector CNE recovers cost of investment.

http://www.spectorcne.com/Solutions/costsavings_calc.html

We created this calculator after hearing from our customers.

(See next page)

Return on Investment

Page 55: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

• “Spector CNE has been so effective at reducing personal time spent on the computer and increasing productivity that we’ve been able to reduce staff by 19%, saving 18% in wages and benefits ($220,000).”

Daniel Anderson, Summit CenterFlagstaff, Arizona

• “Just one employee caught at one company paid for all 65 licenses at all five companies.”

Dennis McCullough, Woodlands Securities

The Woodlands, Texas

• “The return on investment in our situation was only a few months.”

Robert Elliott, RCS Communications

Louisville, Kentucky

Return on Investment

Page 56: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

• “After the first week I compiled a spreadsheet showing a minimum of 40 to 50 hours a week wasted, just on Internet surfing. This report easily projected savings of $50,000 a year or more.”

Keith Becker, Illinois Wholesale Cash RegisterHoffman Estates, Illinois

• “With approximately 50 employees using PCs, the potential yearly bottom line savings equates to more than $180,000.”

Eric Skillingstad, Mobridge Regional HospitalMobridge, South Dakota

• “Spector CNE is saving our customers money. In one instance, productivity increased about $60,000 a year right away.”

Alex Hansen, BoldFont Communications Minneapolis, Minnesota

Return on Investment

Page 57: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit

“Will the time come when monitoring software is as important as anti-virus software? The time is here now! You need to have a tool like Spector CNE in your repertoire.”

Regional Credit Union

“I believe monitoring software is going to become a workstation standard. If you’re not monitoring, I’d say you have to ask yourself why.”

Chris HoerskeDrexel Chemical Company

Memphis, Tennessee

As computers need anti-virus software, so do they need

monitoring protection software.

Page 58: MenuExit. MenuExit Menu Reports Network Configuration (Technical)Network Configuration Managing Risk Day To Day Monitoring Methods Outcomes of using Spector

Menu Exit