Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

SpectorSoft Launches New Insider Threat Detection Solution

SpectorSoft, a provider of employee monitoring solutions, today announced the launch of Spector 360 Recon, a new solution designed to detect insider threats and provide warnings to organizations when policy violations, fraud, data theft, and illegal and inappropriate activities could be occurring.

SpectorSoft, a provider of employee monitoring solutions, today announced the launch of Spector 360 Recon, a new solution designed to detect insider threats and provide warnings to organizations when policy violations, fraud, data theft, and illegal and inappropriate activities could be occurring.

“Spector 360 Recon performs continuous surveillance of employee digital activities, encrypts the recorded data and stores it in a ‘black box’ on users’ local PCs and Macs,” the company explained in an announcement. “Organizations can appoint appropriate personnel to unlock and review this intelligence and make decisions on when to access it based on early-warning alerts.”

Accoring to the company, Spector 360 Recon allows customers to record, store and encrypt employees’ activity data on their local PCs and Macs, detects suspicious activities and then generates early-warning alerts. If it is determined that a threat exists, customers can quickly and easily decide who should have access to the data, unlock it, review it and then take action to neutralize threats.

Spector 360 Recon also allows customers to delete all stored information after a predetermined time, further preserving the privacy of employees who have not given their organizations reason to believe they are a threat.

According to the results of a recent survey conducted by Spectorsoft, 23 percent of enterprises have suffered from an insider-driven data breach, and 27 percent of employees are using personal cloud email, file-sharing accounts and USB devices to transfer corporate data. Intellectual property (IP) is among the most frequently breached data types, the survey said.

Based on the company’s Spector 360 platform, Spector 360 Recon offers features and benefits including:

• Early Warning: Alerts based on keywords that are detected in email and instant messaging (IM), files copied to USB, files uploaded via FTP, and applications in use serve as a powerful early-warning system for signs of corporate fraud and other insider threats, as well as for violations of company policies.

• Local Storage: Recording and storing data on employees’ PCs and Macs eliminates bandwidth, performance and storage burdens on customers’ networks, while ensuring that the data is securely logged in a “black box” for 30 days, in the event it is needed.

Advertisement. Scroll to continue reading.

• Role-based Access: Customers can determine who within their organization will have the ability to unlock and review employee activity intelligence, and can enforce those decisions through permissions set within the solution.

• Intelligence: Granular recording of all user activity, coupled with video-like screen captures, provides absolute proof of any and all security and compliance violations.

• Policy Enforcement: The option to have automated notifications sent to employees violating security and compliance policies improves awareness and makes it easier for them to comply with corporate standards.

Spector 360 Recon is available immediately. 

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Tabitha Craig has been named the CISO of the Congressional Budget Office (CBO).

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

Forcepoint has appointed Guy Shamilov as CISO, Bakshi Kohli as CTO and Naveen Palavalli as CPO and CMO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.