internet
play

Internet Paul Down, Director EMEA. SpectorSoft Corp. 24 October - PowerPoint PPT Presentation

Monitor All Employee Activity Across PCs, Laptops & the Internet Paul Down, Director EMEA. SpectorSoft Corp. 24 October 2012 Agenda Introductions About SpectorSoft Prominent business challenges How you can address these


  1. Monitor All Employee Activity Across PCs, Laptops & the Internet Paul Down, Director EMEA. SpectorSoft Corp. 24 October 2012

  2. Agenda • Introductions • About SpectorSoft • Prominent business challenges • How you can address these challenges? • User Activity Monitoring • Legal aspects of Monitoring • Summary • Questions 2 spectorsoft.com

  3. Introductions • SpectorSoft & Frontier technology 3 spectorsoft.com

  4. About SpectorSoft The Most Comprehensive Computer, Internet and smartphone monitoring solutions for corporate, government, education and home users. 4 spectorsoft.com

  5. About SpectorSoft The Most Comprehensive Computer, Internet and smartphone monitoring solutions for corporate, government, education and home users. • Established 1998 with 110+ employees • HQ in Vero Beach, Florida • Offices in West Palm Beach, Florida, USA and Guildford, Surrey, UK • Investors: SpectorSoft is privately held by individual investors and VC’s. • Over 550,000 consumer customers & 60,000 corporate customers 5 spectorsoft.com

  6. Our Customers Corporate / Government / Education Royal Society of Chemistry 6 spectorsoft.com

  7. Prominent Business Challenges • Security & Data Loss Prevention (DLP) • Productivity & Bandwidth Usage 7 spectorsoft.com

  8. Security & DLP Challenges CISO & Analyst forum 2012, London. The top 5 issues: CISOs have said that: Bring your own device (BYOD) You can’t stop the persistent intruders getting in Big data You can’t stop the data leaving your organisation External threats Only 15% of their companies data is truly secure Data Loss Prevention (DLP) >80% of staff take data with them when they leave. Negative PR Cost of breach = Fines + Company value impact 8 spectorsoft.com

  9. Security & DLP Challenges “ As long as data is collected, there will be people who will lose it, or be willing to break the law to obtain it. “ – Andrew Jaquith, Forrester Research • Economic recession drives data breaches as fraud increases • Not just a public sector problem – largest ever breach 45m+ credit card records in 2005. Estimated cost £2.63m • New laws – serious breaches can land executives with huge fines or even a prison sentence • Serious negative PR resulting in major damage to reputation • CISOs under pressure to reduce or contain the number of incidents 9 spectorsoft.com

  10. Productivity & Bandwidth Challenges “According to employment law firm Peninsula, 233 million hours are lost every month as a result of employees „wasting time‟ on social networking”. BBC News • Social Networking – striking the balance between flexibility and over- regulation • „Logged in‟ doesn‟t necessarily mean „active‟ • Abuse potential for chat / IM services • Bandwidth pressures due to unauthorised streaming / download activity • Google is now a business critical tool, but it is also a major distraction • Mobile devices offer many of the same capabilities as PCs • Homeworking – reduces costs ONLY if the employee is productive. 10 spectorsoft.com

  11. The Need to Monitor Any company that needs to: Improve productivity, utilise network bandwidth more effectively, reduce the risk of IP theft /leakage of confidential information & protect it’s Brand and reputation. Examples of how needs can vary across industries include: Healthcare • Compliance requirements for patient privacy, legal accountability & liability Banking/financial • Heavily regulated, requires monitoring of communications & transactions Law Enforcement • Identify PC/Internet abuse, corruption, monitor probationers & sex offenders Education • Monitor student IM, webmail, Internet use and use of proxy servers to bypass security Telecommunications • Excessive use of Internet for non-work related purposes, social network & streaming abuse, monitoring remote workers and usage of confidential information 11 spectorsoft.com

  12. How you can address these challenges? 12 spectorsoft.com

  13. Monitor & Manage with SPECTOR 360 Manage Monitor Quickly identify & react Data loss Legislation compliance Ensure & prove compliance Work ethic & attitude – good/bad Reward & educate work ethics Productivity Drive behaviour & increase output Bandwidth usage Manage valuable bandwidth Inappropriate /illegal activity Proof in disciplinary actions Personal chat/email/IM abuse Discourage inappropriate IM usage Best practice Streamline processes & procedures Remote workers Encourage homeworking, but set expectations & review productivity 13 spectorsoft.com

  14. Monitor & Manage with SPECTOR 360 Business Benefits Manage Minimise financial loss Quickly identify & react to data loss Ensure & prove compliance Reduce risk for senior management Reward & educate work ethics Motivation & retention Drive behaviour & increase output Increased productivity Manage valuable bandwidth Sweating your assets Proof in disciplinary actions Speeds up disciplinary processes Discourage inappropriate IM usage Better Productivity / less HR issues Streamline processes & procedures Improved business efficiency Encourage homeworking, but set Reduced costs & staff retention expectations & review productivity 14 spectorsoft.com

  15. Product Portfolio 15 spectorsoft.com

  16. Product portfolio – corporate • SPECTOR 360 Company-Wide Monitoring and Surveillance Software • SPECTOR CNE Individual investigation tool for suspected cases of abuse • eBLASTER Mobile Remote monitoring of smartphone location, text, call & web activity 16 spectorsoft.com

  17. SPECTOR 360 The Most Advanced Monitoring Software Discreet snapshot or sequential recording of all employee screen activities, files touched & Monitor keystrokes typed Centralised Management Identify trends and patterns of behavior across Analyse company, department, group or individual Find anything , including files touched, emails sent or Search received, websites visited, IM chats and keywords Forensic level investigation. What, who and when? Investigate What’s happening now? What’s already happened? Contextual recording – before, during and after. Set-up automatic alerts, fully customisable and Report powerful reporting functionality, automatic management reporting

  18. SPECTOR 360 Company-Wide Monitoring and Surveillance Software Monitor All User and User Group Activity Across PCs, Macs, Laptops, and the Internet. Email sent/received Online searches Document tracking Chat & IM File transfers Websites visited & Web Filtering Network usage Keystrokes typed Applications used Screen activity / inactivity User activity

  19. Typical SPECTOR 360 Deployment

  20. Legal Aspects of Monitoring 20 spectorsoft.com

  21. Is user monitoring legal? Yes, provided it is clearly outlined in the Corporate Acceptable Use Policy* Free template policies are available to download, customise and use from: http://www.businesslink.gov.uk *Statement correct in the United Kingdom, check local laws

  22. Summary Data leakage occurs on corporate-owned equipment (email/webmail/IM/USB/Print...) Traditional DLP solutions are rarely implemented company-wide to lock down devices. Monitoring activity on your devices removes any doubt and provides forensic level-evidence of a leak.

  23. Questions?

  24. Monitor All Employee Activity Across PCs, Laptops & the Internet Paul Down, Director EMEA. SpectorSoft Corp. 24 October 2012

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend