Spector 360 Product Overview

24
Monitor your Employees Internet & Desktop Activity Company-Wide Product Overview Presentation Spector 360 will automatically capture all employee Internet and desktop activity whether they are in the office, traveling or working remotely on both Windows or Mac OS. Spector 360 records: Email/Webmail Chat/Instant Messages Web Sites Visited Application/Program Use Online Searches Keystrokes Typed User Activity File Transfers Document Tracking Network Activity

description

Spector 360 is the most comprehensive PC and Employee Monitoring Tool on the market.

Transcript of Spector 360 Product Overview

Page 1: Spector 360 Product Overview

Monitor your Employees Internet & Desktop Activity Company-Wide

Product Overview Presentation

Spector 360 will automatically capture all employee Internet and desktop activity whether they are in the office, traveling or working remotely on both Windows or Mac OS. Spector 360 records:

Email/Webmail

Chat/Instant Messages

Web Sites Visited

Application/Program Use

Online Searches

Keystrokes Typed

User Activity

File Transfers

Document Tracking

Network Activity

Page 2: Spector 360 Product Overview

Spector 360 is the most complete solution available for company-wide monitoring of employee PC and Internet activities.

Product Overview

Page 3: Spector 360 Product Overview

Many employees waste time EVERY DAY surfing personal web sites at work. Spector 360 helps you determine who is crossing the line.

Product Overview

Page 4: Spector 360 Product Overview

Are your employees using company computers to engage in inappropriate or illegal activities? Spector 360 lets you find out today, with more than 50 built-in reports and detailed search and

investigation features

Product Overview

Page 5: Spector 360 Product Overview

Do you suspect that sensitive information is leaking from your business, but you can’t put your finger on the culprit? Spector 360 helps you identify the leaks, discourages them from occurring

in the first place, and presents the evidence needed to punish intentional offenders.

Product Overview

Page 6: Spector 360 Product Overview

Are you looking to identify the hardest-working departments in your company and set standards for the others? Spector 360 lets you determine successful business practices and use this data to

set employee benchmarks.

Product Overview

Page 7: Spector 360 Product Overview

Spector 360’s unmatched recording capabilities capture every detail of what your employees do on company computers, including the web sites they visit, what they search for online, their chats

and emails, and much more.

Product Overview

Page 8: Spector 360 Product Overview

This detailed recorded information is then stored in a centralized database, where it can be viewed and managed with an easy-to-use dashboard and Control Center

Product Overview

Page 9: Spector 360 Product Overview

The Spector 360 Dashboard provides Quick View charts so you can visualize trends and patterns of use and abuse across your entire company.

Product Overview

Page 10: Spector 360 Product Overview

Spector 360 also includes a number of tools to help you investigate suspect employees or activities. For example, all Quick View Charts and Reports can be customized to zero in on suspected problems. The Spector 360 Search tool lets you look for words or phrases in all

employee activities, as you might do when investigating who has been accessing a sensitive document. Use the Data Explorer to drill into specific types of events, such as employees copying

proprietary files to removable media. And, the User Explorer tool can be used to see all the activities of any single employee, such as excessive personal web surfing.

Product Overview

Page 11: Spector 360 Product Overview

You can even drill down into screenshot surveillance video to see not only WHAT they do, but the EXACT order in which they do it, step by step, each and every second.

Product Overview

Page 12: Spector 360 Product Overview

And with more than 50 built-in customizable reports, you can FINALLY answer the tough questions about how your employees are using company PCs and the Internet.

Product Overview

Page 13: Spector 360 Product Overview

Many companies are using Spector 360 to prevent, reduce or eliminate inappropriate activities.

Product Overview

Page 14: Spector 360 Product Overview

Now let’s look at a few examples of how Spector 360 can be used in your company. One method of utilizing Spector 360 is observing its company-wide views to quickly see trends and patterns of

use and abuse, like excessive web surfing. You can also perform a focused investigation of a specific employee or activity, such as monitoring someone that you suspect is sending out

sensitive company information. Let’s use these methods to solve a few typical problems that many businesses have.

Product Overview

Page 15: Spector 360 Product Overview

This first scenario shows how Spector 360’s company-wide views let you monitor employee activities across your entire company, to quickly find the trouble spots. For example, there are

many different types of inappropriate web surfing that you might want to identify in your organization. In this case, you’ll use Spector 360’s company-wide views to quickly spot

employees wasting time shopping online.

Product Overview

Page 16: Spector 360 Product Overview

Spector 360 provides several different charts that can be used to reveal inappropriate web surfing. For example, this chart shows that employees are spending a lot of time on eBay and

other shopping web sites.

Product Overview

Page 17: Spector 360 Product Overview

To find out which employees are shopping excessively, you can simply filter the chart showing employees who web surf the most to display activity ONLY for shopping web sites. This

immediately reveals several employees shopping on company time – and one shopping for hours.

Product Overview

Page 18: Spector 360 Product Overview

You can now drill into the EXACT details and view step-by-step screen snapshots to PROVE that this employee was engaged in personal shopping for several hours on company time.

Product Overview

Page 19: Spector 360 Product Overview

This scenario shows how you can use Spector 360 to proactively investigate specific employees or activities when you suspect a problem. In this case, you’ll investigate a key employee that you

believe is about to leave the company for a competitor.

Product Overview

Page 20: Spector 360 Product Overview

Spector 360 lets you instantly filter all charts and reports to focus your investigation on a single department, computer, or individual employee. Let’s focus on our suspect employee– Peter, in

Accounting. Now Spector 360 shows ONLY the activities of this employee.

Product Overview

Page 21: Spector 360 Product Overview

A number of inappropriate activities immediately stand out, such as: The job search web sites he is surfing on company time. Keyword alerts for this employee regarding leaving the company, and

the possible sharing of inside information. A huge number of documents he is printing out and transferring to removable media. And finally, the employee’s webmail activities to and from our

top competitor. You can drill into any of these charts for more details …

Product Overview

Page 22: Spector 360 Product Overview

Spector 360 is the most complete employee monitoring solution available. Its unmatched recording capabilities capture every detail of what your employees do on company computers.

The centralized database enables easier management and company-wide visibility into user activities. Spector 360 is also built on a scalable architecture that can expand with your

company’s needs. End-to-end communications security and role-based access ensure both data security and integrity. And its familiar interface and use of Microsoft’s MMC snap-in technology

make Spector 360 easy to deploy and use.

Product Overview

Page 23: Spector 360 Product Overview

Top 5 Reasons Companies Turn To Spector 360Increase ProductivitySignificantly reduce the amount of goofing off that has grown common in most workplaces. Spector 360 will cut this huge productivity drain by at least 75%.

Conduct Investigations and Document ViolationsAny employee suspected of engaging in inappropriate, illegal, or unapproved conduct can be investigated with Spector 360.

Enforce Acceptable Use PolicyEmployees often believe that rules can be bent if no one is watching. Spector 360 ensures adherence to your policy for computer and Internet use. Lower the incidence and risks of sexual and racial harassment and occurrences of online gambling and surfing of pornography.

“Insider” Theft ProtectionOne in five employees will copy or print company-owned materials in the days leading up to their resignation. Others will routinely leak sensitive and confidential information, accidentally, intentionally, or otherwise. Spector 360 allows you to look back in time to detect this behavior.

Compliance RequirementsMeet or exceed Federal, Industry, or Agency compliance requirements with Spector 360 by seamlessly maintaining records of communications and transactions – a requirement for many companies

Product Overview

Page 24: Spector 360 Product Overview

Available in: Perpetual Licensing Concurrent User

Licensing Annual Lease Licensing

System Requirements: Spector 360 – Version 7.0,

7.1 Server OS – The following

systems are supported for Server Components: Windows 2000, Vista, XP Professional, System 7, Server 2003, Server 2008, and 64-bit systems

Recorder OS - The following systems are supported for the Client Recorder:

Windows - 2000, Vista, XP, System 7, Server 2003, 64-bit systems

Macintosh (version 7.1) – OS X (10.5 Leopard, 10.6 Snow Leopard)

Implementation: Installation,

configuration and training for this system is all done remotely and should not exceed 1 day. Setup of multiple data vaults in different company locations may add an additional days effort.

For pricing and licensing options, please contact Glonetex Technologies:[email protected] |+1-917-755-1090

Product Overview