1 / 60

Spector 360

Spector 360. Spector 360 is the Corporate Network Edition of Spector Pro – winner of the PC Magazine Editor’s Choice Award for Best Activity Monitoring Software. Reporting. Websites Visited Email/Webmail Chat/Instant Message Program Activity Network Activity. Keystrokes Downloads/uploads

ethan-goff
Download Presentation

Spector 360

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Spector 360 Spector 360 is the Corporate Network Edition of Spector Pro – winner of the PC Magazine Editor’s Choice Award for Best Activity Monitoring Software

  2. Reporting • Websites Visited • Email/Webmail • Chat/Instant Message • Program Activity • Network Activity • Keystrokes • Downloads/uploads • Snapshots • Bandwidth Usage • Document Tracking

  3. Website Activity Reporting

  4. Website Activity Views Reporting

  5. User Website Detail Reporting

  6. Network Bandwidth Use Reporting Internet Radio being played

  7. Network Bandwidth Detail Reporting

  8. Network Bandwidth Snapshot Reporting This snapshot details adjusting the volume of Internet radio while working on PowerPoint.

  9. User Activity Detail Reporting See an interactive demo at http://www.spector360.com/screenshots/UserExplorer/overview.htm Each tab displays a different type of activity

  10. Keyword Alerts Reporting

  11. These reports represent only a sampling More can be seen at http://www.spector360.com/overview/report.htm Sample Reports Reporting

  12. Automated email report delivery Monitor files deleted, created, renamed, printed, transferred (includes files written to CD, DVD or USB devices) Alerts if specified documents are accessed Additional Features Reporting

  13. Red flag irregularities See probable cause at a glance Hyperlink to details Activity Overview “Quick View reports let you know what’s happening REAL FAST….For example,…the Quick View charts are showing me EXACTLY how many hits websites are getting. …If you see a website that shouldn’t be popular, all you have to do is click the bar on the chart to find out what’s going on.” Robert Haviland, Hickman County SchoolsCenterville, Tennessee

  14. Activity Overview Easily spot trends and irregularities. e.g., Who seems to be using the most network bandwidth and why? Miss nothing reporting “Spector also enabled us to monitor the time and date students were on computers as well as all actions they undertook.” Greb Gebhardt, Lowanna College Victoria, Australia Music consuming bandwidth

  15. Activity Overview What websites are being visited most frequently and who is spending the most time browsing the web? In this example, mlb.com is a baseball site. You can drill down to find the baseball enthusiasts and exactly how much time they’ve spent. “The number of students now engaged in non educational work on computers is almost nil.” Greb Gebhardt, Lowanna College Victoria, Australia Productivity Miss nothing reporting User Active Time

  16. Activity Overview Who is transferring the most files? What exactly are they sending out? To whom are they sending it to? “The software…enabled us to monitor the use of USB drives and other external devices that previously we did not have access to. Students trying to use other students or staff accounts has…reduced considerably.” Greb Gebhardt, Lowanna College Victoria, Australia Productivity Miss nothing reporting Confidential information

  17. Activity Overview Who are the top violators of those keywords that indicate abuse (e.g., sex, bomb, gambling)? Productivity Miss nothing reporting Confidential information “Using key word alerts, we were able to set flags on files…and web searching and web sites…which …would send notification…that there may be a breach of…usage policy. The alert list…includes flags for things like remote desktop, administrator and other key staff login codes.” Greg Gebhardt, Lowanna College Victoria, Australia Keyword Alerts Curse word Curse word

  18. Activity Overview Productivity What are the top online search terms being used and do they look suspicious? Spot trends Confidential information Keyword Alerts “We discovered…searches by…students in Google for keywords such as sex, porn, etc.” Greg Gebhardt, Lowanna College Victoria, Australia Online search terms

  19. Activity Overview Search for a word/phrase across the entire user base. e.g., a racial epithet or sexual term in an anonymous email. Productivity Miss nothing reporting Confidential information Keyword Alerts Online search terms Lawsuit protection

  20. Activity Overview Productivity Miss nothing reporting Confidential information Keyword Alerts Online search terms Lawsuit protection User activity Who is arriving at work late and leaving early? Who is taking frequent breaks and just how long are they?

  21. Reduce Computer Misuse Stop PC and Internet abuse Provide proof of student identity and activity

  22. Offensive chat/email Bullying Threats to students, teachers, and school Bandwidth abuse Game playing Bypassing web filters Student hacking Illegal downloads Detect & Stop These Activities Computer Misuse

  23. Computer Misuse “First we put the keyword (alert) list (of inappropriate words) on the library PCs….The very first day…the first hour…we had 10 alerts. And there are only 31 PCs in the library, so 1/3 of the PCs sent alerts the first day.” Larry Koby, New Castle Community School New Castle, Indiana Offensive chat and email “Several students…managed to use a bypass proxy web site to access MSN Messenger.” Greg Gebhardt, Lowanna College Victoria, Australia

  24. Computer Misuse “At one time, the site (at which one can insert a person’s name and it creates a violent image of that person “destroyed”) attracted quite a few, but once a student tried it with Spector in place, the outcome of the prank was decidedly different.” Jeff Hunt, Park Rapids Area School District Park Rapids, Minnesota Offensive chat & email Bullying

  25. Computer Misuse “An uncomplimentary anonymous web email was sent to the assistant principal from a PC within the school system network. (A threatening) note (was) found, (which) was composed on a PC and printed out.” Larry Koby, New Castle Community School New Castle, Indiana (Note: Spector detects these activities and identifies the user.) Offensive chat & email Bullying Threats to students, teachers, school

  26. Computer Misuse “Students were using an ‘anti-proxy’ program, bypassing the content filter by bouncing off another server. With Spector, now we can monitor even that.” Larry Koby, New Castle Community School New Castle, Indiana “We were seeing sexual sites visited. But since the introduction of Spector, we rarely see anything like that.” Jeff Hunt, Park Rapids Area School District Park Rapids, Minnesota Offensive chat & email Bullying Threat to students, teachers, school Bypass web filters

  27. Computer Misuse “We were subject to some hacking attacks that almost shut our network down. Spector allowed us to discover who the culprits were. The student body is running scared because the word is out that the IT department is now mysteriously able to find out which students are causing havoc in the computer systems.” Robert Frost, Highland School of Technology Gaston County, North Carolina Offensive chat & email Bullying Threat to students, teachers, school Bypass web filters Student hacking

  28. Computer Misuse Offensive chat & email Bullying Threats to students, teachers, school Bypass web filters Student hacking Illegal downloads “Students were storing mpeg's and games on the server and renaming them to hide them from being seen in their profiles. The word spread like wildfire and it has stopped that kind of behavior cold.” Robert Frost, Highland School of Technology Gaston County, North Carolina

  29. Computer Misuse “A keystroke logger (was found) on a library PC. It was downloaded off the Internet…(and) capturing passwords….very frightening for us. I felt we were protected from the outside, but were we protected from ourselves? Spector showed us we needed to do more.” Larry Koby, New Castle Community School New Castle, Indiana Offensive chat & email Bullying Threats to students, teachers, school Bypass web filters Student hacking Illegal downloads Risk in general

  30. Resolve Technical Problems • View error Messages • Identify malware sources • Document Procedures • Save staff time • Reduce Bandwidth

  31. Resolve Technical Problems “The screenshots show me error messages and exactly what led up to a problem.” View error messages

  32. Resolve Technical Problems View error messages Identify malware sources “(Students) go to websites and cookies get placed that change the behavior of Internet Explorer. I can discover the website that caused the problem and block it for everyone.” “I can discover how a virus was introduced.”

  33. Resolve Technical Problems View error messages Identify malware sources Document Procedures “I use the screenshots to document installations and configuration changes for later review.”

  34. Resolve Technical Problems “The incidents are few and far between now. And that alone saves us work. We don’t have to ‘clean’ the machines as often as before.” Jeff Hunt, Park Rapids Area School District Park Rapids, Minnesota Error Messages Identify malware sources Document procedures Save staff time “We have found that our support workload is reduced because the kids don’t try to crash the PCs any more, and if a machine does fail, we can see from the log what was happening when it failed. This makes it much easier to fix.” Fungai Chawira, St Augustine’s High School London, England

  35. Resolve Technical Problems “It only takes a moment to see who’s hogging bandwidth. Right now, on the bandwidth chart, I see one user bringing down large amounts of data…. It looks like lots of music.” Robert Haviland, Hickman County SchoolsCenterville, Tennessee “We found a folder with 60-80 songs in it on one of our file servers … way down deep. We wouldn’t have found the songs without Spector.” Todd Kumpola, Rapids Area School District Park Rapids, Minnesota View error messages Identify malware sources Document Procedures Save staff time Reduce Bandwidth

  36. Improve Learner Outcomes “The ability to easily monitor, report and follow up on misuse…has changed student practices and improved teaching and learning. …teachers…complained that students were now completing work in half the time…and they would have to create additional work for them.” Greg Gebhardt, Lowanna College Victoria, Australia

  37. Increase Time on Target Improve Learner Outcomes “We discovered about 30% of students playing games, which are hidden from teachers’ views as they walk past.” Greg Gebhardt, Lowanna College Victoria, Australia “Instead of playing games, they now listen to the teacher…. Classroom productivity has absolutely increased using Spector. Teachers now feel like they can talk TO the students, as opposed to having to stand BEHIND them.” Jeff Hunt, Park Rapids Area School District Park Rapids, Minnesota

  38. Diagnose Student Weaknesses Improve Learner Outcomes For example: A student has poor web search technique and chooses the first search entry or paid ads. You actually see it happen. “If a teacher believes that a particular child has not been concentrating in class…he can come to us after the lesson and ask to see the record of the child’s activity during the lesson.” Fungai Chawira, St Augustine’s High School London, England

  39. Assess Understanding Improve Learner Outcomes Teachers can watch the learning process by reviewing assignments, email and chat conversations. Instant Messaging Example

  40. Expose Dishonesty Improve Learner Outcomes Review communications for suspicious activity. Email Example

  41. Example of Plagiarism Improve Learner Outcomes

  42. Deterrence Detection Investigation Discipline Monitoring Strategies

  43. Monitoring Strategies Deterrence “With evidence of inappropriate PC activity, a student is confronted. Word then spreads like wildfire, and the end result is productivity increases and the incidence of malicious actions drops to near zero.” Jeff Hunt, Park Rapids Area School District Park Rapids, Minnesota “It’s a lot easier to fight off temptation when you know there are consequences. Spector is like radar, or an unmarked car. It keeps the good kids good.” Larry Koby, New Castle Community School New Castle, Indiana In a study of high school computer use, off-task activity immediately declined 67% after students viewed a monitoring announcement at each login, which included sample reports. After scofflaws were disciplined and word spread, median off-task activity declined 94%. Results demonstrated that a highly visible detection strategy and vigorous enforcement of Acceptable Use Policy significantly deters unacceptable computer activity. South Plainfield H.S., Plainfield, Illinois

  44. Deterrence Detection Monitoring Strategies “The keyword alert feature is really wonderful. the very first day … the first hour … 1/3 of the PCs sent alerts. These were Word documents with inappropriate language.” Larry Koby, New Castle Community School New Castle, Indiana “Two students…had staff passwords and…used these to have unrestricted access to parts of the internet and more.” Greg Gebhardt, Lowanna College Victoria, Australia

  45. Deterrence Detection Investigation Monitoring Strategies “The Principal called us to get the information and - with a Spector snapshot - we did. The guilty student was caught.” Jeff Hunt, Park Rapids Area School District Park Rapids, Minnesota “Being able to print a copy of what the student has typed is proof enough and amazes the student that we have the information.” Dean Edwards, Maxwell Adventist Academy Kenya

  46. Deterrence Detection Investigation Discipline Monitoring Strategies “And because Spector provides who, what, when, and where, we were able to go to the Assistant Principal, who started calling students into the office.” Larry Koby, New Castle Community School New Castle, Indiana “Some students didn’t believe the hype and next week were amazed when they were called into the office and shown why we had removed them from the network.” Greg Gebhardt, Lowanna College Victoria, Australia

  47. Spector 360 Quick View panels and alerts show probable cause. In-depth review of the student follows. Visual evidence is sent to the assistant principal. The student is shown the evidence and is disciplined. The student spreads the word, which deters other students from violating Acceptable Use Policy. Investigation Example Monitoring Strategies “One student was repeatedly trying to access porn sites,” said Haviland. “With Spector 360 and its keyword alerts, I received reports on it all. We kept records, took them to the assistant principal, and the student went to ISS (In-School Suspension). The other kids heard about it and that cut down that activity A LOT!” Robert Haviland, Hickman County SchoolsCenterville, Tennessee

  48. Random monitoring Upon request Formal investigations Keyword alerts Automated reporting Monitoring Methods

  49. Monitoring Strategies Random monitoring Review of a student’s computer use Only 10 minutes to review a week’s activity

  50. Monitoring Strategies • When inappropriate behavior is suspected • Examples: • Poorly done assignments • Switching screens when you walk by • Complaints by students • Suspicious activity Random monitoring Upon request

More Related