SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
Features Spector 360 – User Masking + Selective URL Recording




Spector 360                                                          ®



User Masking For Advanced Security & Privacy Protection
Spector 360’s ‘User Masking’ feature allows organizations to monitor employee or student PC and
Internet activity while maintaining a computer user’s personal privacy.


‘User Masking’ hides the identities of individuals by replacing          More Advances
‘user login’ and ‘computer name’ with asterisks – ***** – for
everyday monitoring. This feature can be turned off when                 Another Spector 360 advanced security feature is the ability to
an organization determines probable cause for investigation              ‘Enable Selective Recording of URLs.’ When recording of specific
and needs to know exactly which person may be engaged in                 URLs is disabled, employees can conduct company-approved
inappropriate or illegal activity.                                       personal activities like Internet banking or online management
                                                                         of healthcare issues without concern that anyone will be able to
For Example                                                              review even as much as a single keystroke.

Spector 360 ‘User Masking’ has been successful in parts of               Enabling ‘User Masking’
the world where viewing a specific individual’s computer
and Internet activities is either prohibited or considered               Masking can be turned off and on only by logging into the
unacceptable management policy.                                          Master System Administrator account. To enable the ‘User
                                                                         Masking’ feature, open the Spector 360 Dashboard using the
In parts of the European Union, for example, viewing recorded            System Administrator Account.
PC and Internet activity requires a joint decision between
management and a union representative. In this case of dual              Click on the Management button in the lower left corner, then
authentication, the required System Administrator “Master                click on “Dashboard Logins” in the upper left – see Figure 1
Account” password can be split into two pieces, one each held by         below – to display users who have access to a Dashboard login.
management and the union. With the two combined, the team                Modify a user by double-clicking the user’s name, then uncheck
attains Spector 360 Master Access, and ‘User Masking’ can be             the box that says “Display user’s name in event data.”
turned off temporarily. Having done so, viewing the computer
and Internet activities of the specific individual is accomplished
within specified guidelines. Following the procedure, ‘User
                                                                             Figure 1. The Spector 360 Management Folders and
Masking’ can be turned back on.                                              Dashboard Logins Management is the starting point for
                                                                             implementation of ‘User Masking.’
Even for organizations without overriding legal issues or
sensitive cultural considerations, ‘User Masking’ can balance
security with privacy. With ‘User Masking’ turned on, an
organization can obtain all the security and peace of mind
Spector 360 monitoring provides, without revealing user-specific
PC and Internet activity. However, if a high-level Spector 360
chart or graph reveals frivolous or inappropriate activity, ‘User
Masking’ can be turned off so granular details are revealed.



                                ®
Features Spector 360 – User Masking + Selective URL Recording

Ensure Employee Privacy with Spector 360 ‘User Masking’ and ‘Selective Recording’ of URLs
Figures 2 through 5a depict actual Spector 360 screen snapshots, showing what is seen – and unseen – when implementing
‘User Masking’ as well as ‘Selective Recording of URLs.’




      Figure 2. With ‘User Masking’ on,
      the Spector 360 Dashboard Login
      displays asterisks where specific
      user names previously appeared.




                                                                                                        Masking OFF
                                                                                                        Checked by default,
                                                                                                        this option displays
                                                                                                        the user’s name in all
                                                                                                        Event Data.

                                          Masking ON
                                          With the option unchecked, all user
                                          names are masked by asterisks.




     Figure 3. Spector 360 charts and
     graphs provide valuable trend data
     with or without user specificity.




                                                                                       Masking OFF




                                          Masking ON




                                   ®
Features Spector 360 – User Masking + Selective URL Recording

            Figure 4. Where law or
            culture dictates protection
            of computer user identities,
            Spector 360 ‘User Masking’
            will still provide all the Events
            necessary to detect frivolous
            or inappropriate activity.




                                                                                                                                                                         Masking OFF




                                                                                 Masking ON




            Figure 5. The ability to enable
            ‘Selective Recording’ of URLs
            is just one of many advanced
            security features in Spector 360.
            When recording of specific URLs is
            disabled, employees can conduct
            company-approved personal
            activities – such as Internet
            banking or online management
            of healthcare issues – confident in
            the knowledge that nobody will be
            able to review even as much as a
            single keystroke.




            Figure 5a. With ‘Selective                                             Program Instance              Active Time Focus Time Total Time Window Caption
            Recording’ of URLs enabled,
            Program Activity is noted but
            URL titles are not recorded, and
            neither is any activity occurring
            during the URL visit.


                                                                                                                                                                    Selective Recording
                                                                                                                                                                    ENABLED


                                                                                 Program Activity




                                                         ®
                                                                                                                                1.888.598.2788 toll-free               www.spector360.com
© 1998-2010 SpectorSoft® Corporation. All rights reserved. All other trademarks are the property of their respective owners.                                                              072010

Mais conteúdo relacionado

Semelhante a ISS SA: Spector360 Funcionalidad para Mantener la privacidad

Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cSecurity Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cTroy Kitch
 
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...VMware Tanzu
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap securityyektek
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox ConfigureSamsung Business USA
 
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Ranjan Jain
 
DevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 SecurityDevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 SecurityGeorgi Kodinov
 
bioLock SAP ID CHECK - Granular Function Protection Simulation System -
bioLock SAP ID CHECK - Granular Function Protection Simulation System - bioLock SAP ID CHECK - Granular Function Protection Simulation System -
bioLock SAP ID CHECK - Granular Function Protection Simulation System - tneudenb
 
How to add your own OpenSocial Gadgets to IBM Connections
How to add your own OpenSocial Gadgets to IBM ConnectionsHow to add your own OpenSocial Gadgets to IBM Connections
How to add your own OpenSocial Gadgets to IBM ConnectionsIBM Connections Developers
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365Joanne Klein
 
Federate User Identity from Azure Active Directory
Federate User Identity from Azure Active DirectoryFederate User Identity from Azure Active Directory
Federate User Identity from Azure Active DirectorySeclore
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteBitglass
 
Secure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesSecure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesBiBoard.Org
 
Chromium OS - User Accounts and Management
Chromium OS - User Accounts and ManagementChromium OS - User Accounts and Management
Chromium OS - User Accounts and ManagementPicker Weng
 
GWAVACon 2013: DSGuardian
GWAVACon 2013: DSGuardianGWAVACon 2013: DSGuardian
GWAVACon 2013: DSGuardianGWAVA
 
How to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris ZulloHow to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris ZulloSalesforce Admins
 
Improve Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and MaskingImprove Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and MaskingPatric Dahse
 

Semelhante a ISS SA: Spector360 Funcionalidad para Mantener la privacidad (20)

Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cSecurity Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12c
 
Database User Anonymization
  Database User Anonymization  Database User Anonymization
Database User Anonymization
 
Sap basis and_security_administration
Sap basis and_security_administrationSap basis and_security_administration
Sap basis and_security_administration
 
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap security
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure
 
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
 
DevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 SecurityDevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 Security
 
Productivity Suite
Productivity SuiteProductivity Suite
Productivity Suite
 
bioLock SAP ID CHECK - Granular Function Protection Simulation System -
bioLock SAP ID CHECK - Granular Function Protection Simulation System - bioLock SAP ID CHECK - Granular Function Protection Simulation System -
bioLock SAP ID CHECK - Granular Function Protection Simulation System -
 
How to add your own OpenSocial Gadgets to IBM Connections
How to add your own OpenSocial Gadgets to IBM ConnectionsHow to add your own OpenSocial Gadgets to IBM Connections
How to add your own OpenSocial Gadgets to IBM Connections
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
 
Federate User Identity from Azure Active Directory
Federate User Identity from Azure Active DirectoryFederate User Identity from Azure Active Directory
Federate User Identity from Azure Active Directory
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
Secure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesSecure Mobile BI on Apple devices
Secure Mobile BI on Apple devices
 
Chromium OS - User Accounts and Management
Chromium OS - User Accounts and ManagementChromium OS - User Accounts and Management
Chromium OS - User Accounts and Management
 
GWAVACon 2013: DSGuardian
GWAVACon 2013: DSGuardianGWAVACon 2013: DSGuardian
GWAVACon 2013: DSGuardian
 
How to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris ZulloHow to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris Zullo
 
Improve Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and MaskingImprove Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and Masking
 

Mais de Information Security Services SA

ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustInformation Security Services SA
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustInformation Security Services SA
 

Mais de Information Security Services SA (14)

Catalogo DMS
Catalogo DMSCatalogo DMS
Catalogo DMS
 
ISS SA Protección de la Información e Identidad
ISS SA Protección de la Información e IdentidadISS SA Protección de la Información e Identidad
ISS SA Protección de la Información e Identidad
 
ISS SA Comunicado de Prensa sobre Entrust
ISS SA Comunicado de Prensa sobre EntrustISS SA Comunicado de Prensa sobre Entrust
ISS SA Comunicado de Prensa sobre Entrust
 
ISS SA Reseña de sus Soluciones Julio 2011
ISS SA Reseña de sus Soluciones Julio 2011ISS SA Reseña de sus Soluciones Julio 2011
ISS SA Reseña de sus Soluciones Julio 2011
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
ISS S.A: le presenta Spector Pro de SpectorSoft
ISS S.A: le presenta Spector Pro de SpectorSoftISS S.A: le presenta Spector Pro de SpectorSoft
ISS S.A: le presenta Spector Pro de SpectorSoft
 
ISS S.A. le presenta Spector 360 de SpectorSoft
ISS S.A. le presenta Spector 360 de SpectorSoftISS S.A. le presenta Spector 360 de SpectorSoft
ISS S.A. le presenta Spector 360 de SpectorSoft
 
ISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de EntrustISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de Entrust
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
ISS SA: Autenticación de dos Factores para Consumidores
ISS SA: Autenticación de dos Factores para ConsumidoresISS SA: Autenticación de dos Factores para Consumidores
ISS SA: Autenticación de dos Factores para Consumidores
 
ISS SA le Presenta Spector 360 de SpectorSoft
ISS SA le Presenta Spector 360 de SpectorSoftISS SA le Presenta Spector 360 de SpectorSoft
ISS SA le Presenta Spector 360 de SpectorSoft
 
ISS SA: Lo nuevo en la Version 5.5 de UserLock
ISS SA: Lo nuevo en la Version 5.5 de UserLockISS SA: Lo nuevo en la Version 5.5 de UserLock
ISS SA: Lo nuevo en la Version 5.5 de UserLock
 
ISS SA le Presenta UserLock de IS Decisions
ISS SA le Presenta UserLock de IS DecisionsISS SA le Presenta UserLock de IS Decisions
ISS SA le Presenta UserLock de IS Decisions
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

ISS SA: Spector360 Funcionalidad para Mantener la privacidad

  • 1. Features Spector 360 – User Masking + Selective URL Recording Spector 360 ® User Masking For Advanced Security & Privacy Protection Spector 360’s ‘User Masking’ feature allows organizations to monitor employee or student PC and Internet activity while maintaining a computer user’s personal privacy. ‘User Masking’ hides the identities of individuals by replacing More Advances ‘user login’ and ‘computer name’ with asterisks – ***** – for everyday monitoring. This feature can be turned off when Another Spector 360 advanced security feature is the ability to an organization determines probable cause for investigation ‘Enable Selective Recording of URLs.’ When recording of specific and needs to know exactly which person may be engaged in URLs is disabled, employees can conduct company-approved inappropriate or illegal activity. personal activities like Internet banking or online management of healthcare issues without concern that anyone will be able to For Example review even as much as a single keystroke. Spector 360 ‘User Masking’ has been successful in parts of Enabling ‘User Masking’ the world where viewing a specific individual’s computer and Internet activities is either prohibited or considered Masking can be turned off and on only by logging into the unacceptable management policy. Master System Administrator account. To enable the ‘User Masking’ feature, open the Spector 360 Dashboard using the In parts of the European Union, for example, viewing recorded System Administrator Account. PC and Internet activity requires a joint decision between management and a union representative. In this case of dual Click on the Management button in the lower left corner, then authentication, the required System Administrator “Master click on “Dashboard Logins” in the upper left – see Figure 1 Account” password can be split into two pieces, one each held by below – to display users who have access to a Dashboard login. management and the union. With the two combined, the team Modify a user by double-clicking the user’s name, then uncheck attains Spector 360 Master Access, and ‘User Masking’ can be the box that says “Display user’s name in event data.” turned off temporarily. Having done so, viewing the computer and Internet activities of the specific individual is accomplished within specified guidelines. Following the procedure, ‘User Figure 1. The Spector 360 Management Folders and Masking’ can be turned back on. Dashboard Logins Management is the starting point for implementation of ‘User Masking.’ Even for organizations without overriding legal issues or sensitive cultural considerations, ‘User Masking’ can balance security with privacy. With ‘User Masking’ turned on, an organization can obtain all the security and peace of mind Spector 360 monitoring provides, without revealing user-specific PC and Internet activity. However, if a high-level Spector 360 chart or graph reveals frivolous or inappropriate activity, ‘User Masking’ can be turned off so granular details are revealed. ®
  • 2. Features Spector 360 – User Masking + Selective URL Recording Ensure Employee Privacy with Spector 360 ‘User Masking’ and ‘Selective Recording’ of URLs Figures 2 through 5a depict actual Spector 360 screen snapshots, showing what is seen – and unseen – when implementing ‘User Masking’ as well as ‘Selective Recording of URLs.’ Figure 2. With ‘User Masking’ on, the Spector 360 Dashboard Login displays asterisks where specific user names previously appeared. Masking OFF Checked by default, this option displays the user’s name in all Event Data. Masking ON With the option unchecked, all user names are masked by asterisks. Figure 3. Spector 360 charts and graphs provide valuable trend data with or without user specificity. Masking OFF Masking ON ®
  • 3. Features Spector 360 – User Masking + Selective URL Recording Figure 4. Where law or culture dictates protection of computer user identities, Spector 360 ‘User Masking’ will still provide all the Events necessary to detect frivolous or inappropriate activity. Masking OFF Masking ON Figure 5. The ability to enable ‘Selective Recording’ of URLs is just one of many advanced security features in Spector 360. When recording of specific URLs is disabled, employees can conduct company-approved personal activities – such as Internet banking or online management of healthcare issues – confident in the knowledge that nobody will be able to review even as much as a single keystroke. Figure 5a. With ‘Selective Program Instance Active Time Focus Time Total Time Window Caption Recording’ of URLs enabled, Program Activity is noted but URL titles are not recorded, and neither is any activity occurring during the URL visit. Selective Recording ENABLED Program Activity ® 1.888.598.2788 toll-free www.spector360.com © 1998-2010 SpectorSoft® Corporation. All rights reserved. All other trademarks are the property of their respective owners. 072010