20
Enterprise Health Financial Spector360 Surveillance as a management tool Sally Pigott Territory Manager Central & Eastern Europe Damian Hallmark Systems Engineer

DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

Embed Size (px)

Citation preview

Page 1: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

Enterprise Health Financial

Spector360 – Surveillance as a management tool

Sally Pigott – Territory Manager Central & Eastern Europe

Damian Hallmark – Systems Engineer

Page 2: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

2

PC and Internet Monitoring Software

Agenda

• About SpectorSoft

• SpectorSoft Channel Model

• Employee Monitoring and Security – Who & Why?

• Insider Threats & Employee Productivity

• Building a case for Employee Monitoring

• Common Objections

• Q&A

Page 3: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

3

PC and Internet Monitoring Software

About SpectorSoft

• Established 1998

• Strong Growth Year After Year

• Inc. 500/5000 List – 7 Times

• Market Leader

• More than 50,000 Businesses

• More than 300,000 Consumers

• Five Star Partner Program Winner

• 24/7 U.S. Based Customer Support

GOLD AWARD!

Rated #1 Product 2007 Monitoring

Software Report

EDITORS’ CHOICE

PC Magazine THREE Time

Award Winner!

1ST PLACE

“The Best of the Best” 2005 & 2008 Monitoring

Software Review

FIVE

5-STAR AWARDS

Gold Star

Partner Program

Best in

Surveillance

Featured In:

Page 4: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

4

PC and Internet Monitoring Software

Our Customers

Corporate / Government / Education

Page 5: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

5

PC and Internet Monitoring Software

Channel-Only Sales model

SpectorSoft will not sell Direct

– Two-Tier Distribution model (Head Technology)

• Pricing

• Project registration

• Licensing support

• Technical assistance

• Liaison with SpectorSoft

5

Page 6: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

6

PC and Internet Monitoring Software

What is monitoring?

‘the ability to record, report and be alerted on employee activity’

• Application Usage

• Internet behaviour

• File protection and data movement

• Work patterns

• Identifying the good and the bad behavioral traits.

6

Page 7: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

7

PC and Internet Monitoring Software

Who wants to know this information?

• Business owners

• Executives

• Shareholders

• IT

• Fellow employee’s.

7

Page 8: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

8

PC and Internet Monitoring Software

Who is already doing it and how?

ALL organisations currently perform some form of employee monitoring and security… FACT!

• Privilege and rights Management

• DLP (USB Lock down etc)

• Centralised Anti-Virus / Malware protection / Anti-Spam / Firewall

• Policy driven internet and application restrictions

• Archiving and encryption

• Password protection and Two Factor Authentication

8

Page 9: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

9

PC and Internet Monitoring Software

Insider threats manifest in many different ways…

9

Insider Threats

• IP Theft

• Fraud

• Sabotage

• Cust. Data Theft

Deliberate Misconduct

• Web Surfing

• Chat

• Webmail

• Auctions

• Social Media

Lost Productivity

• Ethnic/Racial slurs

• Sexual harassment

• Bullying

• Discrimination

Hostile Environment

• Ignorance

• Negligence

• Process Failure

• Technical Failure

Accidental Disclosure

Privilege Abuse

• Snooping

• Rights Escalation

• Hacking

•Technical Arrogance

Page 10: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

10

PC and Internet Monitoring Software

Spector 360… Key Features

Why Employee Monitoring…..?

• Increase employee productivity

• Conduct investigations and document violations

• Ensure adherence to Internet Acceptable Use Policies

• Provide “insider” theft protection

• Reduce bandwidth consumption and help desk calls

• Meet compliance requirements

Page 11: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

11

PC and Internet Monitoring Software

SPECTOR 360 – Solution Components

Open Architecture

Fast & easy installation

Scales with network servers & desktop volume

Remote configuration, installation and administration

Centralized data archiving

Supports Citrix XenDesktop / Server

Will record and report on satellite offices and remote -workers

Create multiple Desktops and views for different managers, HR, IT, etc.

Page 12: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

12

PC and Internet Monitoring Software

12

Spector 360

• Enables organizations to visually analyze employee behavior over time

• Alerts internal resources on suspected activity across a comprehensive range of user related activities

• Configurable and adaptable to changing environment

• Permits the extraction of historical event data for external analysis and reporting

Page 13: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

13

PC and Internet Monitoring Software

See what happened……..and how?

• See the details of every event, both simple and complex

• See a time-line for every event

• Discover all information across all systems

• Analyse each event in context • What happened before, during and after an event?

Page 14: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

14

PC and Internet Monitoring Software

14

Active Monitoring approach: • Always on and vigilant to deal with the unpredictability of users

• Provides contextual visibility into user behavior and activities

• Alerting of suspected threat activity across a range of user activity

• Captures intent

• Offloads event data; preserves historical evidence to support subsequent forensic investigations

If you don’t know it happened, how do you prevent it…..?

Page 15: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

15

PC and Internet Monitoring Software

15

Building a Case for Employee Monitoring

• Businesses are still challenged to identify, track and stop insider threats

• Traditional DLP solutions, only identify when the breach actually occurs.

• Almost all insiders give themselves away before the breach by testing their environment for vulnerabilities and access. This early testing is very difficult to identify.

• Traditional DLP solutions generate a wealth of false positives requiring extensive reconciliation.

• When DLP identifies a threat, forensic data must be collected before it is lost.

• DLP solutions often require specialist forensic teams to analyze the pertinent data.

Page 16: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

16

PC and Internet Monitoring Software

16

Non-DLP Threats to business

• Unauthorized access to a systems or data

• Unwanted disruption or denial of service

• Sexual harassment in the work place

• Physical/ Verbal threats via instant messenger or email

• Unauthorized use of a system for the processing, storage of data or personal use

• Unauthorized changes to system hardware, firmware, or software

Page 17: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

17

PC and Internet Monitoring Software

Is it Legal……………..?

It depends…

• Data Protection Act

• Data Privacy laws

• European Employee Councils

• Adequately informing employees

17

Page 18: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

18

PC and Internet Monitoring Software

18

In Summary……….

Active Monitoring enables:

• Near-real time alerting

• Remote rapid deployment of the recorder

• Support for remote-workers, Central-Branch architectures including international sites

• Client recorder: extremely small, untraceable foot print

• Detailed, web and secure document based reports for business managers

• Detailed evidence of violations including supportive video

• Identify how & when and all involved parties

Page 19: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

19

PC and Internet Monitoring Software

19

Questions?

Page 20: DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NOV 2011

Enterprise Health Financial

Thank You!