Group1's Inside View...

This Florida based manufacturer offers the most scalable and secure Employee Monitoring suite in the industry. All data is collected, stored and reported-on 100% internally, eliminating any concern about sensitive information leaving the organization. Sophisticated reporting makes it easy for large organizations to focus quickly on problem areas and drill-down into the details of specific security and employee productivity issues.

Their technology is currently protecting over 30,000 organizations worldwide, including some of the largest financial institutions.


Is SpectorSoft the right choice for you?

We will be happy to discuss your current computing environment, your employee monitoring goals, and share our real world experience with SpectorSoft's product line.

Please give us a call at (800)738-3570, or drop a quick email to .


Detailed SpectorSoft info...
(provided by the manufacturer)



Spector 360 is SpectorSoft's flagship product for advanced Employee Monitoring


Click on this image to see a brief video introduction...


Employee Monitoring Software for the Enterprise

Protect your business by monitoring employee activity on their work computers. Instantly detect insider threats like data theft, employee fraud, data breaches, and productivity loss. Track employee actions and get real-time alerts about dangerous or inappropriate behavior. Review individual and aggregate employee actions as if you were sitting there with video-style screen playback.


Spector 360 monitors employee computer usage to protect you from a variety of problems, including:

  • Data Theft
    Identify those insiders with access to valuable corporate data that obtain copies or send data out through email, cloud-based storage or webmail.

  • Data Loss
    Know when data is inappropriately copied to a USB drive or laptop that could be lost or stolen.

  • Data Corruption/Deletion
    Have proof and context when data is maliciously destroyed or altered.

  • Employee Fraud
    Be alerted to actions that can be associated to corruption, asset misappropriation, and financial statement fraud committed by one or more employees.

  • Identity Theft
    Distinguish multiple logons indicating employees utilizing credentials of other employees to gain access and participate in one of the previous Insider Threat forms.

  • Productivity Loss
    See which employees are wasting time on personal activities on the Internet. While not a threat that would take a business down, productivity loss can be material.

SPECTOR 360 monitors, captures, and analyzes ALL user and user group activity including: email sent and received, chat/IM/BBM, websites visited, applications/programs accessed, web searches, phone calls, file transfers, and data printed or saved to removable devices.

SPECTOR 360 features automated, remote installation of the Windows and Mac clients and requires no client installation on BlackBerry devices.


Email Recorder

Spector 360 will stamp out abuse with cutting-edge email recording capabilities designed to ensure that you have a clear record of all email being sent and received from company premises. In addition to recording business standard MS Exchange and Outlook email, Spector 360 includes industry-first web mail capturing. This includes web mail services such as Hotmail, Yahoo Mail and AOL Internet Email.

Whenever an email is sent or received, Spector 360 creates a hidden duplicate (including file attachments) and stores it away for later review. Spector 360 also keeps a copy of deleted email.

Recorded email attachments can be securely transferred to the Data Vault using data encryption.

If you want to limit the amount of email recorded, this tool has a filtering capability so emails can be captured when they are sent or received or if there is a particular pattern detected in the To/From/Subject/Body. Other controls allow you to filter email based on the format used or if attachments are detected. In addition, there are granular settings to filter based on attachment characteristics such as size. If you only want to capture email from a specific source you can filter the emails received from designated account types such as MS Outlook, Hotmail, AOL, MS Exchange, or IMAP.

Click on this image to view the Email Recorder in action...   



Web Site Recorder

The Web Site Recording tool in Spector 360 will continually monitor every web page that is accessed by the computers on your network and save a record of those URLs and domain names.

Spector 360 will also track every file and program download that occurs over the Internet (such as file/music swapping services, software download sites, pornographic images, etc. …)

Spector 360 is significantly more sophisticated than the History feature of your web browser, providing you with important details including: Time of Last Visit, Duration of Time on the Web Site, Active Time on Web Site, Total Number of Visits to the Web Site, Page Title and more!

Additionally, you can use the Spector 360 Control Center to create a Whitelist of web sites that your employees are permitted to view. Any web site not included in this list will be blocked. Alternately, you can create a Blacklist of web sites that they are not allowed to visit. If the web site is not included in this list, they will be able to access it. These policies can be customized for different employees.

With Spector 360’s advanced and intuitive Web Site recording, you will get a quick yet exact picture of each employee’s web surfing behavior, which is also used by the Dashboard to formulate trend data across your organization.

Click on this image to view the Web Site Recorder in action... 



Online Search Recorder

Spector 360 records online searches from any web site where known search techniques are used. Spector 360 looks for standard searching techniques, captures the search phrase entered by the employee, the search results URL, and other information.

Using the Dashboard, you can tell whether the employee actually accessed the web site as a result of an online search. Use the information to understand why an employee is at a web site. For example, find out whether an employee is searching a job web site for professional growth information or to find a new job.

Click on this image to view the Online Search Recorder in action...   






Chat/Instant Messaging Recorder

Spector 360 ensures that all Chat and Instant Messages are automatically recorded to provide you with an information trail of every computer-based conversation that is taking place within your company or with your customers.

Spector 360 records the name of all parties involved in a Chat/IM session and saves a complete copy of the conversation. This information is recorded for AOL, MSN, ICQ, and various other Chat/IM programs.

Click on this image to view the Chat/Instant Messaging Recorder in action...   






Keystroke Recorder

Spector 360 includes a sophisticated keystroke logger that saves keystrokes by application, date and time.

With Spector 360, you will know what was typed, where and when it was typed, and you will also know WHO typed it because Spector 360 keeps a record of who is logged into the computer.

The Spector 360 Keystroke Recording tool will document every key typed on the computer keyboard. Spector 360 not only captures standard alphanumeric keystrokes, but also records "hidden" characters and keystroke combinations, such as the Shift and Ctrl key, as well as those keystrokes that aren’t typically displayed on the screen such as when a password is typed echoing back asterisks on the screen.

Click on this image to view the Keystroke Recorder in action...   




Program Activity Recorder

Spector 360 includes a monitoring tool that provides a clear and concise overview of the programs being used on your office computers.

Spector 360 will track the day and time a program is launched and the total duration of activity in that program. Program specific information is also recorded including the window title.

Click on this image to view the Program Activity Recorder in action...   







Network Activity Recorder

Spector 360 records information about all Internet connections made on a computer. You will be able to see at a glance which applications are connecting to the Internet, when the connections are made, the Internet address they connected to, what ports are being used, and the amount of network bandwidth consumed by those connections.

This Internet connection activity can provide valuable insight into:

Which employees may be violating company policy by consuming network bandwidth with streaming media, file downloads, or other Internet activity.
Applications connecting to the Internet which you may not have been aware of and which could have security implications.
Which Internet resources are most often connected to.
Armed with this information you may decide to block access to TCP ports or Internet domains, remove offending applications from computers, or tighten your company’s Acceptable Use Policy (AUP).

Click on this image to view the Network Activity Recorder in action...   



File Transferred Recorder

There are multiple serious security concerns for businesses when employees use company computers to download files from the Internet, transfer files across the Internet and access peer-to-peer services which are loaded with pornographic images, Spyware, Adware, and pirated music, video and software.

One major concern is whether employees are sending company confidential information over the Internet.

Another concern is whether employees are placing the company at legal risk by downloading copyrighted materials, like music, movies and commercial software. In addition, there is potential risk when an employee downloads pornographic images that will reside on company computers and may be viewed by another employee who would consider such material highly offensive.

Finally, any time a file is downloaded, there is great risk that Spyware and/or Adware will be installed, especially where P2P services are involved. (Dell Computer Corporation has identified Spyware as its single biggest source of technical support incidents, because Spyware will redirect web browsers and eventually slow computers down to a crawl, not to mention the potential for security breaches. Most Spyware enters into computers via downloads from the Internet.)

Spector 360 records Files Transferred over the Internet by keeping track of HTTP, FTP and P2P file transfers. You will be able to see who is downloading or uploading files, what file protocol is being used, which service is being used, the name of the file being transferred and the type of file being transferred (audio, image, video, software, document).

Click on this image to view the File Transferred Recorder in action...   



Document Tracking Recorder

Intellectual Property Theft and the leaking of Company Confidential information has become an increasing security threat for companies in recent years as technology has made it relatively easy for employees to copy files to floppy disks, Zip disks, CDs, DVDs, USB drives, memory sticks or to simply print out these documents and transport them off company premises.

Spector 360 includes a Document Tracking feature which allows you to determine whether files/documents may be exiting your company via removable media such as floppy, zip, CD, DVD or USB storage devices and memory sticks. The Document Tracking feature also allows you to track documents that are printed and who is copying or printing potentially sensitive files or documents.

Click on this image to view the Document Tracking Recorder in action...   




Snapshot Recorder

Imagine surveillance cameras pointed directly at every computer on your company network, filming all Internet and general computer activity, and storing this in a secure area for later review. That is the idea behind the Snapshot Recorder tool in Spector 360.

Spector 360 takes hundreds of snapshots every hour on each networked computer, very much like a surveillance camera. Snapshots are taken of whatever is on the computer screen at the frequency you choose – as often as once per second.

That means you get detailed visual recordings of all chat conversations, instant messages, emails typed and read, all web sites visited, all programs run, all keystrokes typed – all activity on all computers.

Snapshot Recording is the most powerful way to visually record and review everything they do online and offline.

Click on this image to view the Snapshot Recorder in action...   




User Activity/Inactivity Recorder

This Spector 360 Recorder collects information on the activity and inactivity of the employee. Events such as when they log in, when they use the mouse and keyboard, and when they are not active on the computer are all recorded. Events that could potentially skew this information are also recorded such as an explicit clock change.

Click on this image to view the User Activity/Inactivity Recorder in action... 








Keyword Detection & Reporting

Keyword Detection & Reporting allows you to specify words or phrases that might signal an immediate threat to the safety and integrity of your network systems, intellectual property, employees or customers. Keywords can also be used to indicate when an employee might be involved in an activity that is not condoned by your company or is in direct violation of an Acceptable Use Policy (AUP).

Create a list of "on alert" words or phrases and Spector 360 will continually monitor keyboard typing, URLs, incoming and outgoing emails, chat conversations and instant messages for these terms.

When a keyword or phrase is detected, Spector 360 immediately jumps into overdrive. Snapshot frequency is automatically increased to ensure that every detail of the offender’s actions is captured as evidence. Additionally, Spector 360 collects information regarding the offense and sends an instant keyword alert via email to the specified IT administrator or appropriate compliance manager.

Each keyword alert contains the following information:

  1. The keyword that was detected
  2. The time the keyword was detected
  3. The current user logged in
  4. Additional detailed information

Spector 360 also reports on the top keyword alerts issued and the top employees violating the keyword alert policy.

Click on this image to view Keyword Detection & Reporting in action...   



In Summary — Why SPECTOR 360?


The Top 5 Reasons organizations turn to SPECTOR 360 User Activity Monitoring:

  1. Track and enforce electronic Acceptable Use Policies
  2. Protect valuable Intellectual Property and trade secrets
  3. Identify security breaches and risks
  4. Monitor and audit compliance requirements
  5. Benchmark user productivity

You can also use SPECTOR 360 to:

  • Recover lost communications such as email, chat, and IM
  • Assist Help Desk with computer recovery
  • Eliminate or minimize legal liability
  • Obtain data to support accusations of wrongdoing or provide proof of innocence
  • Eliminate or minimize security breaches
  • Detect the use of organization resources to conduct illegal or unethical activities