Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

SpectorSoft Launches New Insider Threat Detection Solution

SpectorSoft, a provider of employee monitoring solutions, today announced the launch of Spector 360 Recon, a new solution designed to detect insider threats and provide warnings to organizations when policy violations, fraud, data theft, and illegal and inappropriate activities could be occurring.

SpectorSoft, a provider of employee monitoring solutions, today announced the launch of Spector 360 Recon, a new solution designed to detect insider threats and provide warnings to organizations when policy violations, fraud, data theft, and illegal and inappropriate activities could be occurring.

“Spector 360 Recon performs continuous surveillance of employee digital activities, encrypts the recorded data and stores it in a ‘black box’ on users’ local PCs and Macs,” the company explained in an announcement. “Organizations can appoint appropriate personnel to unlock and review this intelligence and make decisions on when to access it based on early-warning alerts.”

Accoring to the company, Spector 360 Recon allows customers to record, store and encrypt employees’ activity data on their local PCs and Macs, detects suspicious activities and then generates early-warning alerts. If it is determined that a threat exists, customers can quickly and easily decide who should have access to the data, unlock it, review it and then take action to neutralize threats.

Spector 360 Recon also allows customers to delete all stored information after a predetermined time, further preserving the privacy of employees who have not given their organizations reason to believe they are a threat.

According to the results of a recent survey conducted by Spectorsoft, 23 percent of enterprises have suffered from an insider-driven data breach, and 27 percent of employees are using personal cloud email, file-sharing accounts and USB devices to transfer corporate data. Intellectual property (IP) is among the most frequently breached data types, the survey said.

Based on the company’s Spector 360 platform, Spector 360 Recon offers features and benefits including:

• Early Warning: Alerts based on keywords that are detected in email and instant messaging (IM), files copied to USB, files uploaded via FTP, and applications in use serve as a powerful early-warning system for signs of corporate fraud and other insider threats, as well as for violations of company policies.

• Local Storage: Recording and storing data on employees’ PCs and Macs eliminates bandwidth, performance and storage burdens on customers’ networks, while ensuring that the data is securely logged in a “black box” for 30 days, in the event it is needed.

Advertisement. Scroll to continue reading.

• Role-based Access: Customers can determine who within their organization will have the ability to unlock and review employee activity intelligence, and can enforce those decisions through permissions set within the solution.

• Intelligence: Granular recording of all user activity, coupled with video-like screen captures, provides absolute proof of any and all security and compliance violations.

• Policy Enforcement: The option to have automated notifications sent to employees violating security and compliance policies improves awareness and makes it easier for them to comply with corporate standards.

Spector 360 Recon is available immediately. 

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...