Upload
andris-soroka
View
482
Download
0
Tags:
Embed Size (px)
Citation preview
Enterprise Health Financial
Spector360 – Surveillance as a management tool
Sally Pigott – Territory Manager Central & Eastern Europe
Damian Hallmark – Systems Engineer
2
PC and Internet Monitoring Software
Agenda
• About SpectorSoft
• SpectorSoft Channel Model
• Employee Monitoring and Security – Who & Why?
• Insider Threats & Employee Productivity
• Building a case for Employee Monitoring
• Common Objections
• Q&A
3
PC and Internet Monitoring Software
About SpectorSoft
• Established 1998
• Strong Growth Year After Year
• Inc. 500/5000 List – 7 Times
• Market Leader
• More than 50,000 Businesses
• More than 300,000 Consumers
• Five Star Partner Program Winner
• 24/7 U.S. Based Customer Support
GOLD AWARD!
Rated #1 Product 2007 Monitoring
Software Report
EDITORS’ CHOICE
PC Magazine THREE Time
Award Winner!
1ST PLACE
“The Best of the Best” 2005 & 2008 Monitoring
Software Review
FIVE
5-STAR AWARDS
Gold Star
Partner Program
Best in
Surveillance
Featured In:
4
PC and Internet Monitoring Software
Our Customers
Corporate / Government / Education
5
PC and Internet Monitoring Software
Channel-Only Sales model
SpectorSoft will not sell Direct
– Two-Tier Distribution model (Head Technology)
• Pricing
• Project registration
• Licensing support
• Technical assistance
• Liaison with SpectorSoft
5
6
PC and Internet Monitoring Software
What is monitoring?
‘the ability to record, report and be alerted on employee activity’
• Application Usage
• Internet behaviour
• File protection and data movement
• Work patterns
• Identifying the good and the bad behavioral traits.
6
7
PC and Internet Monitoring Software
Who wants to know this information?
• Business owners
• Executives
• Shareholders
• IT
• Fellow employee’s.
7
8
PC and Internet Monitoring Software
Who is already doing it and how?
ALL organisations currently perform some form of employee monitoring and security… FACT!
• Privilege and rights Management
• DLP (USB Lock down etc)
• Centralised Anti-Virus / Malware protection / Anti-Spam / Firewall
• Policy driven internet and application restrictions
• Archiving and encryption
• Password protection and Two Factor Authentication
8
9
PC and Internet Monitoring Software
Insider threats manifest in many different ways…
9
Insider Threats
• IP Theft
• Fraud
• Sabotage
• Cust. Data Theft
Deliberate Misconduct
• Web Surfing
• Chat
• Webmail
• Auctions
• Social Media
Lost Productivity
• Ethnic/Racial slurs
• Sexual harassment
• Bullying
• Discrimination
Hostile Environment
• Ignorance
• Negligence
• Process Failure
• Technical Failure
Accidental Disclosure
Privilege Abuse
• Snooping
• Rights Escalation
• Hacking
•Technical Arrogance
10
PC and Internet Monitoring Software
Spector 360… Key Features
Why Employee Monitoring…..?
• Increase employee productivity
• Conduct investigations and document violations
• Ensure adherence to Internet Acceptable Use Policies
• Provide “insider” theft protection
• Reduce bandwidth consumption and help desk calls
• Meet compliance requirements
11
PC and Internet Monitoring Software
SPECTOR 360 – Solution Components
Open Architecture
Fast & easy installation
Scales with network servers & desktop volume
Remote configuration, installation and administration
Centralized data archiving
Supports Citrix XenDesktop / Server
Will record and report on satellite offices and remote -workers
Create multiple Desktops and views for different managers, HR, IT, etc.
12
PC and Internet Monitoring Software
12
Spector 360
• Enables organizations to visually analyze employee behavior over time
• Alerts internal resources on suspected activity across a comprehensive range of user related activities
• Configurable and adaptable to changing environment
• Permits the extraction of historical event data for external analysis and reporting
13
PC and Internet Monitoring Software
See what happened……..and how?
• See the details of every event, both simple and complex
• See a time-line for every event
• Discover all information across all systems
• Analyse each event in context • What happened before, during and after an event?
14
PC and Internet Monitoring Software
14
Active Monitoring approach: • Always on and vigilant to deal with the unpredictability of users
• Provides contextual visibility into user behavior and activities
• Alerting of suspected threat activity across a range of user activity
• Captures intent
• Offloads event data; preserves historical evidence to support subsequent forensic investigations
If you don’t know it happened, how do you prevent it…..?
15
PC and Internet Monitoring Software
15
Building a Case for Employee Monitoring
• Businesses are still challenged to identify, track and stop insider threats
• Traditional DLP solutions, only identify when the breach actually occurs.
• Almost all insiders give themselves away before the breach by testing their environment for vulnerabilities and access. This early testing is very difficult to identify.
• Traditional DLP solutions generate a wealth of false positives requiring extensive reconciliation.
• When DLP identifies a threat, forensic data must be collected before it is lost.
• DLP solutions often require specialist forensic teams to analyze the pertinent data.
16
PC and Internet Monitoring Software
16
Non-DLP Threats to business
• Unauthorized access to a systems or data
• Unwanted disruption or denial of service
• Sexual harassment in the work place
• Physical/ Verbal threats via instant messenger or email
• Unauthorized use of a system for the processing, storage of data or personal use
• Unauthorized changes to system hardware, firmware, or software
17
PC and Internet Monitoring Software
Is it Legal……………..?
It depends…
• Data Protection Act
• Data Privacy laws
• European Employee Councils
• Adequately informing employees
17
18
PC and Internet Monitoring Software
18
In Summary……….
Active Monitoring enables:
• Near-real time alerting
• Remote rapid deployment of the recorder
• Support for remote-workers, Central-Branch architectures including international sites
• Client recorder: extremely small, untraceable foot print
• Detailed, web and secure document based reports for business managers
• Detailed evidence of violations including supportive video
• Identify how & when and all involved parties
19
PC and Internet Monitoring Software
19
Questions?
Enterprise Health Financial
Thank You!