Internet Paul Down, Director EMEA. SpectorSoft Corp. 24 October - - PowerPoint PPT Presentation

internet
SMART_READER_LITE
LIVE PREVIEW

Internet Paul Down, Director EMEA. SpectorSoft Corp. 24 October - - PowerPoint PPT Presentation

Monitor All Employee Activity Across PCs, Laptops & the Internet Paul Down, Director EMEA. SpectorSoft Corp. 24 October 2012 Agenda Introductions About SpectorSoft Prominent business challenges How you can address these


slide-1
SLIDE 1

Monitor All Employee Activity Across PCs, Laptops & the Internet

Paul Down, Director EMEA. SpectorSoft Corp.

24 October 2012

slide-2
SLIDE 2

spectorsoft.com 2

  • Introductions
  • About SpectorSoft
  • Prominent business challenges
  • How you can address these challenges?
  • User Activity Monitoring
  • Legal aspects of Monitoring
  • Summary
  • Questions

Agenda

slide-3
SLIDE 3

spectorsoft.com 3

  • SpectorSoft & Frontier technology

Introductions

slide-4
SLIDE 4

spectorsoft.com 4

The Most Comprehensive Computer, Internet and smartphone monitoring solutions for corporate, government, education and home users.

About SpectorSoft

slide-5
SLIDE 5

spectorsoft.com 5

The Most Comprehensive Computer, Internet and smartphone monitoring solutions for corporate, government, education and home users.

  • Established 1998 with 110+ employees
  • HQ in Vero Beach, Florida
  • Offices in West Palm Beach, Florida, USA and Guildford, Surrey, UK
  • Investors: SpectorSoft is privately held by individual investors and

VC’s.

  • Over 550,000 consumer customers & 60,000 corporate customers

About SpectorSoft

slide-6
SLIDE 6

spectorsoft.com 6

Corporate / Government / Education

Royal Society of Chemistry

Our Customers

slide-7
SLIDE 7

spectorsoft.com 7

  • Security & Data Loss Prevention (DLP)
  • Productivity & Bandwidth Usage

Prominent Business Challenges

slide-8
SLIDE 8

spectorsoft.com 8

The top 5 issues:

Bring your own device (BYOD) Big data External threats Data Loss Prevention (DLP) Negative PR

CISOs have said that:

You can’t stop the persistent intruders getting in You can’t stop the data leaving your organisation Only 15% of their companies data is truly secure >80% of staff take data with them when they leave. Cost of breach = Fines + Company value impact

Security & DLP Challenges

CISO & Analyst forum 2012, London.

slide-9
SLIDE 9

spectorsoft.com 9

“As long as data is collected, there will be people who will lose it, or be willing to break the law to obtain it. “ – Andrew Jaquith, Forrester Research

  • Economic recession drives data breaches as fraud increases
  • Not just a public sector problem

– largest ever breach 45m+ credit card records in 2005. Estimated cost £2.63m

  • New laws

– serious breaches can land executives with huge fines or even a prison sentence

  • Serious negative PR resulting in major damage to reputation
  • CISOs under pressure to reduce or contain the number of incidents

Security & DLP Challenges

slide-10
SLIDE 10

spectorsoft.com 10

“According to employment law firm Peninsula, 233 million hours are lost every month as a result of employees „wasting time‟ on social networking”. BBC News

  • Social Networking – striking the balance between flexibility and over-

regulation

  • „Logged in‟ doesn‟t necessarily mean „active‟
  • Abuse potential for chat / IM services
  • Bandwidth pressures due to unauthorised streaming / download activity
  • Google is now a business critical tool, but it is also a major distraction
  • Mobile devices offer many of the same capabilities as PCs
  • Homeworking – reduces costs ONLY if the employee is productive.

Productivity & Bandwidth Challenges

slide-11
SLIDE 11

spectorsoft.com 11

Any company that needs to:

Improve productivity, utilise network bandwidth more effectively, reduce the risk of IP theft /leakage of confidential information & protect it’s Brand and reputation. Examples of how needs can vary across industries include: Healthcare

  • Compliance requirements for patient privacy, legal accountability & liability

Banking/financial

  • Heavily regulated, requires monitoring of communications & transactions

Law Enforcement

  • Identify PC/Internet abuse, corruption, monitor probationers & sex offenders

Education

  • Monitor student IM, webmail, Internet use and use of proxy servers to bypass security

Telecommunications

  • Excessive use of Internet for non-work related purposes, social network & streaming

abuse, monitoring remote workers and usage of confidential information

The Need to Monitor

slide-12
SLIDE 12

spectorsoft.com 12

How you can address these challenges?

slide-13
SLIDE 13

spectorsoft.com 13

Monitor

Data loss Legislation compliance Work ethic & attitude – good/bad Productivity Bandwidth usage Inappropriate /illegal activity Personal chat/email/IM abuse Best practice Remote workers

Monitor & Manage with SPECTOR 360

Manage

Quickly identify & react Ensure & prove compliance Reward & educate work ethics Drive behaviour & increase output Manage valuable bandwidth Proof in disciplinary actions Discourage inappropriate IM usage Streamline processes & procedures Encourage homeworking, but set expectations & review productivity

slide-14
SLIDE 14

spectorsoft.com 14

Manage

Quickly identify & react to data loss Ensure & prove compliance Reward & educate work ethics Drive behaviour & increase output Manage valuable bandwidth Proof in disciplinary actions Discourage inappropriate IM usage Streamline processes & procedures Encourage homeworking, but set expectations & review productivity

Monitor & Manage with SPECTOR 360

Business Benefits

Minimise financial loss Reduce risk for senior management Motivation & retention Increased productivity Sweating your assets Speeds up disciplinary processes Better Productivity / less HR issues Improved business efficiency Reduced costs & staff retention

slide-15
SLIDE 15

spectorsoft.com 15

Product Portfolio

slide-16
SLIDE 16

spectorsoft.com 16

  • SPECTOR 360

Company-Wide Monitoring and Surveillance Software

  • SPECTOR CNE

Individual investigation tool for suspected cases of abuse

  • eBLASTER Mobile

Remote monitoring of smartphone location, text, call & web activity

Product portfolio – corporate

slide-17
SLIDE 17

SPECTOR 360

Monitor Analyse Search Investigate Report

Centralised Management

The Most Advanced Monitoring Software Discreet snapshot or sequential recording of all employee screen activities, files touched & keystrokes typed Identify trends and patterns of behavior across company, department, group or individual Find anything , including files touched, emails sent or received, websites visited, IM chats and keywords Forensic level investigation. What, who and when? What’s happening now? What’s already happened? Contextual recording – before, during and after. Set-up automatic alerts, fully customisable and powerful reporting functionality, automatic management reporting

slide-18
SLIDE 18

SPECTOR 360

Company-Wide Monitoring and Surveillance Software

Monitor All User and User Group Activity Across PCs, Macs, Laptops, and the Internet.

Email sent/received Document tracking File transfers Network usage Keystrokes typed User activity Applications used Websites visited & Web Filtering Chat & IM Online searches Screen activity / inactivity

slide-19
SLIDE 19

Typical SPECTOR 360 Deployment

slide-20
SLIDE 20

spectorsoft.com 20

Legal Aspects of Monitoring

slide-21
SLIDE 21

Yes, provided it is clearly outlined in the Corporate Acceptable Use Policy*

Free template policies are available to download, customise and use from: http://www.businesslink.gov.uk *Statement correct in the United Kingdom, check local laws

Is user monitoring legal?

slide-22
SLIDE 22

Data leakage occurs on corporate-owned equipment (email/webmail/IM/USB/Print...)

Summary

Traditional DLP solutions are rarely implemented company-wide to lock down devices. Monitoring activity on your devices removes any doubt and provides forensic level-evidence

  • f a leak.
slide-23
SLIDE 23

Questions?

slide-24
SLIDE 24

Monitor All Employee Activity Across PCs, Laptops & the Internet

Paul Down, Director EMEA. SpectorSoft Corp.

24 October 2012