This document provides an overview of the Spector 360 employee monitoring software. It summarizes the key features of Spector 360 including its ability to monitor and record all employee internet and computer activity both inside and outside the office. It describes how Spector 360 helps employers identify unproductive behaviors like excessive personal internet usage, potential data leaks, policy violations and more through customizable reports and data analysis tools. Examples are given showing how Spector 360 could be used to investigate specific issues or employees of concern.
1 of 24
Downloaded 20 times
More Related Content
Spector 360 Product Overview
1. Monitor your Employees Internet & Desktop Activity Company-WideProduct Overview PresentationSpector 360 will automatically capture all employee Internet and desktop activity whether they are in the office, traveling or working remotely on both Windows or Mac OS. Spector 360 records:Email/WebmailApplication/Program UseUser ActivityFile TransfersNetwork ActivityChat/Instant MessagesOnline SearchesDocument TrackingWeb Sites VisitedKeystrokes Typed
2. Product OverviewSpector 360 is the most complete solution available for company-wide monitoring of employee PC and Internet activities.
3. Product OverviewMany employees waste time EVERY DAY surfing personal web sites at work. Spector 360 helps you determine who is crossing the line.
4. Product OverviewAre your employees using company computers to engage in inappropriate or illegal activities? Spector 360 lets you find out today, with more than 50 built-in reports and detailed search and investigation features
5. Product OverviewDo you suspect that sensitive information is leaking from your business, but you can¨t put your finger on the culprit? Spector 360 helps you identify the leaks, discourages them from occurring in the first place, and presents the evidence needed to punish intentional offenders.
6. Product OverviewAre you looking to identify the hardest-working departments in your company and set standards for the others? Spector 360 lets you determine successful business practices and use this data to set employee benchmarks.
7. Product OverviewSpector 360¨s unmatched recording capabilities capture every detail of what your employees do on company computers, including the web sites they visit, what they search for online, their chats and emails, and much more.
8. Product OverviewThis detailed recorded information is then stored in a centralized database, where it can be viewed and managed with an easy-to-use dashboard and Control Center
9. Product OverviewThe Spector 360 Dashboard provides Quick View charts so you can visualize trends and patterns of use and abuse across your entire company.
10. Product OverviewSpector 360 also includes a number of tools to help you investigate suspect employees or activities. For example, all Quick View Charts and Reports can be customized to zero in on suspected problems. The Spector 360 Search tool lets you look for words or phrases in all employee activities, as you might do when investigating who has been accessing a sensitive document. Use the Data Explorer to drill into specific types of events, such as employees copying proprietary files to removable media. And, the User Explorer tool can be used to see all the activities of any single employee, such as excessive personal web surfing.
11. Product OverviewYou can even drill down into screenshot surveillance video to see not only WHAT they do, but the EXACT order in which they do it, step by step, each and every second.
12. Product OverviewAnd with more than 50 built-in customizable reports, you can FINALLY answer the tough questions about how your employees are using company PCs and the Internet.
14. Product OverviewNow let¨s look at a few examples of how Spector 360 can be used in your company. One method of utilizing Spector 360 is observing its company-wide views to quickly see trends and patterns of use and abuse, like excessive web surfing. You can also perform a focused investigation of a specific employee or activity, such as monitoring someone that you suspect is sending out sensitive company information. Let¨s use these methods to solve a few typical problems that many businesses have.
15. Product OverviewThis first scenario shows how Spector 360¨s company-wide views let you monitor employee activities across your entire company, to quickly find the trouble spots. For example, there are many different types of inappropriate web surfing that you might want to identify in your organization. In this case, you¨ll use Spector 360¨s company-wide views to quickly spot employees wasting time shopping online.
16. Product OverviewSpector 360 provides several different charts that can be used to reveal inappropriate web surfing. For example, this chart shows that employees are spending a lot of time on eBay and other shopping web sites.
17. Product OverviewTo find out which employees are shopping excessively, you can simply filter the chart showing employees who web surf the most to display activity ONLY for shopping web sites. This immediately reveals several employees shopping on company time C and one shopping for hours.
18. Product OverviewYou can now drill into the EXACT details and view step-by-step screen snapshots to PROVE that this employee was engaged in personal shopping for several hours on company time.
19. Product OverviewThis scenario shows how you can use Spector 360 to proactively investigate specific employees or activities when you suspect a problem. In this case, you¨ll investigate a key employee that you believe is about to leave the company for a competitor.
20. Product OverviewSpector 360 lets you instantly filter all charts and reports to focus your investigation on a single department, computer, or individual employee. Let¨s focus on our suspect employeeC Peter, in Accounting. Now Spector 360 shows ONLY the activities of this employee.
21. Product OverviewA number of inappropriate activities immediately stand out, such as: The job search web sites he is surfing on company time. Keyword alerts for this employee regarding leaving the company, and the possible sharing of inside information. A huge number of documents he is printing out and transferring to removable media. And finally, the employee¨s webmail activities to and from our top competitor. You can drill into any of these charts for more details ´
22. Product OverviewSpector 360 is the most complete employee monitoring solution available. Its unmatched recording capabilities capture every detail of what your employees do on company computers. The centralized database enables easier management and company-wide visibility into user activities. Spector 360 is also built on a scalable architecture that can expand with your company¨s needs. End-to-end communications security and role-based access ensure both data security and integrity. And its familiar interface and use of Microsoft¨s MMC snap-in technology make Spector 360 easy to deploy and use.
23. Product OverviewTop 5 Reasons Companies Turn To Spector 360Increase ProductivitySignificantly reduce the amount of goofing off that has grown common in most workplaces. Spector 360 will cut this huge productivity drain by at least 75%.Conduct Investigations and Document ViolationsAny employee suspected of engaging in inappropriate, illegal, or unapproved conduct can be investigated with Spector 360.Enforce Acceptable Use PolicyEmployees often believe that rules can be bent if no one is watching. Spector 360 ensures adherence to your policy for computer and Internet use. Lower the incidence and risks of sexual and racial harassment and occurrences of online gambling and surfing of pornography.^Insider ̄ Theft ProtectionOne in five employees will copy or print company-owned materials in the days leading up to their resignation. Others will routinely leak sensitive and confidential information, accidentally, intentionally, or otherwise. Spector 360 allows you to look back in time to detect this behavior.Compliance RequirementsMeet or exceed Federal, Industry, or Agency compliance requirements with Spector 360 by seamlessly maintaining records of communications and transactions C a requirement for many companies
25. Server OS C The following systems are supported for Server Components: Windows 2000, Vista, XP Professional, System 7, Server 2003, Server 2008, and 64-bit systems
26. Recorder OS - The following systems are supported for the Client Recorder:
27. Windows - 2000, Vista, XP, System 7, Server 2003, 64-bit systems
28. Macintosh (version 7.1) C OS X (10.5 Leopard, 10.6 Snow Leopard)Available in:Perpetual Licensing
30. Annual Lease LicensingImplementation:Installation, configuration and training for this system is all done remotely and should not exceed 1 day. Setup of multiple data vaults in different company locations may add an additional days effort. For pricing and licensing options, please contact Glonetex Technologies:solution.sales@glonetex.com |+1-917-755-1090