Monitor All Employee Activity Across PCs, Laptops & the Internet Paul Down, Director EMEA. SpectorSoft Corp. 24 October 2012
Agenda • Introductions • About SpectorSoft • Prominent business challenges • How you can address these challenges? • User Activity Monitoring • Legal aspects of Monitoring • Summary • Questions 2 spectorsoft.com
Introductions • SpectorSoft & Frontier technology 3 spectorsoft.com
About SpectorSoft The Most Comprehensive Computer, Internet and smartphone monitoring solutions for corporate, government, education and home users. 4 spectorsoft.com
About SpectorSoft The Most Comprehensive Computer, Internet and smartphone monitoring solutions for corporate, government, education and home users. • Established 1998 with 110+ employees • HQ in Vero Beach, Florida • Offices in West Palm Beach, Florida, USA and Guildford, Surrey, UK • Investors: SpectorSoft is privately held by individual investors and VC’s. • Over 550,000 consumer customers & 60,000 corporate customers 5 spectorsoft.com
Our Customers Corporate / Government / Education Royal Society of Chemistry 6 spectorsoft.com
Prominent Business Challenges • Security & Data Loss Prevention (DLP) • Productivity & Bandwidth Usage 7 spectorsoft.com
Security & DLP Challenges CISO & Analyst forum 2012, London. The top 5 issues: CISOs have said that: Bring your own device (BYOD) You can’t stop the persistent intruders getting in Big data You can’t stop the data leaving your organisation External threats Only 15% of their companies data is truly secure Data Loss Prevention (DLP) >80% of staff take data with them when they leave. Negative PR Cost of breach = Fines + Company value impact 8 spectorsoft.com
Security & DLP Challenges “ As long as data is collected, there will be people who will lose it, or be willing to break the law to obtain it. “ – Andrew Jaquith, Forrester Research • Economic recession drives data breaches as fraud increases • Not just a public sector problem – largest ever breach 45m+ credit card records in 2005. Estimated cost £2.63m • New laws – serious breaches can land executives with huge fines or even a prison sentence • Serious negative PR resulting in major damage to reputation • CISOs under pressure to reduce or contain the number of incidents 9 spectorsoft.com
Productivity & Bandwidth Challenges “According to employment law firm Peninsula, 233 million hours are lost every month as a result of employees „wasting time‟ on social networking”. BBC News • Social Networking – striking the balance between flexibility and over- regulation • „Logged in‟ doesn‟t necessarily mean „active‟ • Abuse potential for chat / IM services • Bandwidth pressures due to unauthorised streaming / download activity • Google is now a business critical tool, but it is also a major distraction • Mobile devices offer many of the same capabilities as PCs • Homeworking – reduces costs ONLY if the employee is productive. 10 spectorsoft.com
The Need to Monitor Any company that needs to: Improve productivity, utilise network bandwidth more effectively, reduce the risk of IP theft /leakage of confidential information & protect it’s Brand and reputation. Examples of how needs can vary across industries include: Healthcare • Compliance requirements for patient privacy, legal accountability & liability Banking/financial • Heavily regulated, requires monitoring of communications & transactions Law Enforcement • Identify PC/Internet abuse, corruption, monitor probationers & sex offenders Education • Monitor student IM, webmail, Internet use and use of proxy servers to bypass security Telecommunications • Excessive use of Internet for non-work related purposes, social network & streaming abuse, monitoring remote workers and usage of confidential information 11 spectorsoft.com
How you can address these challenges? 12 spectorsoft.com
Monitor & Manage with SPECTOR 360 Manage Monitor Quickly identify & react Data loss Legislation compliance Ensure & prove compliance Work ethic & attitude – good/bad Reward & educate work ethics Productivity Drive behaviour & increase output Bandwidth usage Manage valuable bandwidth Inappropriate /illegal activity Proof in disciplinary actions Personal chat/email/IM abuse Discourage inappropriate IM usage Best practice Streamline processes & procedures Remote workers Encourage homeworking, but set expectations & review productivity 13 spectorsoft.com
Monitor & Manage with SPECTOR 360 Business Benefits Manage Minimise financial loss Quickly identify & react to data loss Ensure & prove compliance Reduce risk for senior management Reward & educate work ethics Motivation & retention Drive behaviour & increase output Increased productivity Manage valuable bandwidth Sweating your assets Proof in disciplinary actions Speeds up disciplinary processes Discourage inappropriate IM usage Better Productivity / less HR issues Streamline processes & procedures Improved business efficiency Encourage homeworking, but set Reduced costs & staff retention expectations & review productivity 14 spectorsoft.com
Product Portfolio 15 spectorsoft.com
Product portfolio – corporate • SPECTOR 360 Company-Wide Monitoring and Surveillance Software • SPECTOR CNE Individual investigation tool for suspected cases of abuse • eBLASTER Mobile Remote monitoring of smartphone location, text, call & web activity 16 spectorsoft.com
SPECTOR 360 The Most Advanced Monitoring Software Discreet snapshot or sequential recording of all employee screen activities, files touched & Monitor keystrokes typed Centralised Management Identify trends and patterns of behavior across Analyse company, department, group or individual Find anything , including files touched, emails sent or Search received, websites visited, IM chats and keywords Forensic level investigation. What, who and when? Investigate What’s happening now? What’s already happened? Contextual recording – before, during and after. Set-up automatic alerts, fully customisable and Report powerful reporting functionality, automatic management reporting
SPECTOR 360 Company-Wide Monitoring and Surveillance Software Monitor All User and User Group Activity Across PCs, Macs, Laptops, and the Internet. Email sent/received Online searches Document tracking Chat & IM File transfers Websites visited & Web Filtering Network usage Keystrokes typed Applications used Screen activity / inactivity User activity
Typical SPECTOR 360 Deployment
Legal Aspects of Monitoring 20 spectorsoft.com
Is user monitoring legal? Yes, provided it is clearly outlined in the Corporate Acceptable Use Policy* Free template policies are available to download, customise and use from: http://www.businesslink.gov.uk *Statement correct in the United Kingdom, check local laws
Summary Data leakage occurs on corporate-owned equipment (email/webmail/IM/USB/Print...) Traditional DLP solutions are rarely implemented company-wide to lock down devices. Monitoring activity on your devices removes any doubt and provides forensic level-evidence of a leak.
Questions?
Monitor All Employee Activity Across PCs, Laptops & the Internet Paul Down, Director EMEA. SpectorSoft Corp. 24 October 2012
Recommend
More recommend