Spector 360
Spector 360 is the Corporate
Network Edition of Spector Pro –
winner of the PC Magazine
Editor’s Choice Award for Best
Activity Monitoring Software
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Reporting
• Websites Visited
• Keystrokes
• Email/Webmail
• Downloads/uploads
• Chat/Instant
Message
• Snapshots
• Program Activity
• Network Activity
• Bandwidth Usage
• Document Tracking
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Reporting
Website Activity
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Website Activity Views
Reporting
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
User Website Detail
Reporting
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Reporting
Network Bandwidth Use
Internet Radio being played
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Network Bandwidth Detail
Reporting
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Network Bandwidth Snapshot
Reporting
This snapshot details adjusting the volume of
Internet radio while working on PowerPoint.
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
User Activity Detail
Reporting
See an interactive demo at http://www.spector360.com/screenshots/UserExplorer/overview.htm
Each tab displays a different type of activity
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Reporting
Keyword Alerts
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Reporting
Sample Reports
These reports represent only a sampling
More can be seen at
http://www.spector360.com/overview/report.htm
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Reporting
Additional Features
• Automated email report delivery
• Monitor files deleted, created, renamed,
printed, transferred (includes files written to CD, DVD or
USB devices)
• Alerts if specified documents are accessed
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Activity Overview
• Red flag irregularities
• See probable cause at a
glance
• Hyperlink to details
“Quick View reports let you
know what’s happening REAL
FAST….For example,…the
Quick View charts are showing
me EXACTLY how many hits
websites are getting. …If you
see a website that shouldn’t be
popular, all you have to do is
click the bar on the chart to find
out what’s going on.”
Robert Haviland, Hickman County Schools
Centerville, Tennessee
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Activity Overview
Miss nothing reporting
Easily spot trends and
irregularities.
e.g., Who seems to be using the
most network bandwidth and why?
“Spector also enabled us to monitor
the time and date students were on
computers as well as all actions
they undertook.”
Music
consuming
bandwidth
Greb Gebhardt, Lowanna College
Victoria, Australia
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Activity Overview
Miss nothing reporting
Productivity
What websites are being visited
most frequently and who is
spending the most time browsing
the web? In this example, mlb.com
is a baseball site.
You can drill down to find the
baseball enthusiasts and exactly
how much time they’ve spent.
“The number of students now
engaged in non educational work
on computers is almost nil.”
Greb Gebhardt, Lowanna College
Victoria, Australia
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Activity Overview
Miss nothing reporting
Who is transferring the most files?
Productivity
What exactly are they sending out?
Confidential information
To whom are they sending it to?
“The software…enabled us to
monitor the use of USB drives and
other external devices that
previously we did not have access
to.
Students trying to use other
students or staff accounts
has…reduced considerably.”
Greb Gebhardt, Lowanna College
Victoria, Australia
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Activity Overview
Miss nothing reporting
Who are the top violators of those
keywords that indicate abuse (e.g.,
sex, bomb, gambling)?
Productivity
Confidential information
Keyword Alerts
“Using key word alerts, we were
able to set flags on files…and
web searching and web
sites…which …would send
notification…that there may be
a breach of…usage policy.
Curse word
The alert list…includes flags for
things like remote desktop,
administrator and other key
staff login codes.”
Curse word
Greg Gebhardt, Lowanna College
Victoria, Australia
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Activity Overview
Spot trends
Productivity
Confidential information
What are the top online search
terms being used and do they look
suspicious?
Keyword Alerts
“We discovered…searches
by…students in Google for
keywords such as sex, porn, etc.”
Online search terms
Greg Gebhardt, Lowanna College
Victoria, Australia
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Activity Overview
Miss nothing reporting
Productivity
Confidential information
Search for a word/phrase across
the entire user base. e.g., a racial
epithet or sexual term in an
anonymous email.
Keyword Alerts
Online search terms
Lawsuit protection
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Activity Overview
Miss nothing reporting
Productivity
Confidential information
Keyword Alerts
Online search terms
Lawsuit protection
User activity
Who is arriving at work late and
leaving early?
Who is taking frequent breaks and
just how long are they?
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Reduce Computer Misuse
Stop PC and Internet abuse
Provide proof of student identity and activity
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Computer Misuse
Detect & Stop
These Activities
• Offensive chat/email
• Game playing
• Bullying
• Bypassing web filters
• Threats to students,
teachers, and school
• Student hacking
• Illegal downloads
• Bandwidth abuse
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Computer Misuse
Offensive chat and email
“First we put the keyword (alert)
list (of inappropriate words) on
the library PCs….The very first
day…the first hour…we had 10
alerts. And there are only 31
PCs in the library, so 1/3 of the
PCs sent alerts the first day.”
Larry Koby, New Castle Community School
New Castle, Indiana
“Several students…managed to
use a bypass proxy web site to
access MSN Messenger.”
Greg Gebhardt, Lowanna College
Victoria, Australia
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Computer Misuse
Offensive chat & email
“At one time, the site (at which
one can insert a person’s name
and it creates a violent image
of that person “destroyed”)
attracted quite a few, but once
a student tried it with Spector in
place, the outcome of the
prank was decidedly different.”
Bullying
Jeff Hunt, Park Rapids Area School District
Park Rapids, Minnesota
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Computer Misuse
Offensive chat & email
“An uncomplimentary
anonymous web email was
sent to the assistant principal
from a PC within the school
system network.
Bullying
Threats to students,
teachers, school
(A threatening) note (was)
found, (which) was composed
on a PC and printed out.”
Larry Koby, New Castle Community School
New Castle, Indiana
(Note: Spector detects these
activities and identifies the user.)
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Computer Misuse
Offensive chat & email
“Students were using an ‘antiproxy’ program, bypassing the
content filter by bouncing off
another server. With Spector,
now we can monitor even that.”
Bullying
Threat to students,
teachers, school
Larry Koby, New Castle Community School
New Castle, Indiana
Bypass web filters
“We were seeing sexual sites
visited. But since the
introduction of Spector, we rarely
see anything like that.”
Jeff Hunt, Park Rapids Area School District
Park Rapids, Minnesota
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Computer Misuse
Offensive chat & email
“We were subject to some
hacking attacks that almost
shut our network down.
Spector allowed us to discover
who the culprits were.
Bullying
Threat to students,
teachers, school
The student body is running
scared because the word is out
that the IT department is now
mysteriously able to find out
which students are causing
havoc in the computer
systems.”
Bypass web filters
Student hacking
Robert Frost, Highland School of Technology
Gaston County, North Carolina
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Computer Misuse
Offensive chat & email
Bullying
“Students were storing mpeg's
and games on the server and
renaming them to hide them
from being seen in their profiles.
Threats to students,
teachers, school
Bypass web filters
The word spread like wildfire
and it has stopped that kind of
behavior cold.”
Student hacking
Robert Frost, Highland School of Technology
Gaston County, North Carolina
Illegal downloads
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Computer Misuse
Offensive chat & email
“A keystroke logger (was
found) on a library PC. It was
downloaded off the
Internet…(and) capturing
passwords….very frightening
for us.
Bullying
Threats to students,
teachers, school
Bypass web filters
I felt we were protected from
the outside, but were we
protected from ourselves?
Spector showed us we needed
to do more.”
Student hacking
Illegal downloads
Larry Koby, New Castle Community School
New Castle, Indiana
Risk in general
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Resolve Technical Problems
• View error Messages
• Identify malware sources
• Document Procedures
• Save staff time
• Reduce Bandwidth
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Resolve Technical Problems
“The screenshots show
me error messages and
exactly what led up to a
problem.”
View error messages
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Resolve Technical Problems
View error messages
Identify malware sources
“(Students) go to websites and
cookies get placed that change
the behavior of Internet
Explorer. I can discover the
website that caused the
problem and block it for
everyone.”
“I can discover how a virus was
introduced.”
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Resolve Technical Problems
View error messages
Identify malware sources
Document Procedures
“I use the screenshots to
document installations and
configuration changes for later
review.”
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Resolve Technical Problems
Error Messages
Identify malware sources
“The incidents are few and far
between now. And that alone
saves us work. We don’t have
to ‘clean’ the machines as often
as before.”
Jeff Hunt, Park Rapids Area School District
Park Rapids, Minnesota
Document procedures
Save staff time
“We have found that our
support workload is reduced
because the kids don’t try to
crash the PCs any more, and
if a machine does fail, we can
see from the log what was
happening when it failed. This
makes it much easier to fix.”
Fungai Chawira, St Augustine’s High School
London, England
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Resolve Technical Problems
View error messages
Identify malware sources
“It only takes a moment to see
who’s hogging bandwidth. Right
now, on the bandwidth chart, I see
one user bringing down large
amounts of data…. It looks like lots
of music.”
Robert Haviland, Hickman County Schools
Centerville, Tennessee
Document Procedures
“We found a folder with 60-80
songs in it on one of our file
servers … way down deep. We
wouldn’t have found the songs
without Spector.”
Save staff time
Reduce Bandwidth
Todd Kumpola, Rapids Area School District
Park Rapids, Minnesota
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Improve Learner
Outcomes
“The ability to easily monitor, report and follow up on
misuse…has changed student practices and improved
teaching and learning.
…teachers…complained that students were now
completing work in half the time…and they would have to
create additional work for them.”
Greg Gebhardt, Lowanna College
Victoria, Australia
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Improve Learner Outcomes
Increase Time on Target
“We discovered about 30% of students
playing games, which are hidden from
teachers’ views as they walk past.”
Greg Gebhardt, Lowanna College
Victoria, Australia
“Instead of playing games, they now
listen to the teacher….
Classroom productivity has absolutely
increased using Spector. Teachers now
feel like they can talk TO the students,
as opposed to having to stand BEHIND
them.”
Jeff Hunt, Park Rapids Area School District
Park Rapids, Minnesota
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Improve Learner Outcomes
Diagnose Student Weaknesses
For example: A student has
poor web search technique
and chooses the first
search entry or paid ads.
You actually see it happen.
“If a teacher believes that a
particular child has not been
concentrating in class…he can
come to us after the lesson and
ask to see the record of the
child’s activity during the
lesson.”
Fungai Chawira, St Augustine’s High School
London, England
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Improve Learner Outcomes
Assess Understanding
Teachers can watch the learning process by reviewing
assignments, email and chat conversations.
Instant Messaging Example
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Improve Learner Outcomes
Expose Dishonesty
Review communications for suspicious activity.
Email Example
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Example of Plagiarism
Improve Learner Outcomes
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Monitoring Strategies
• Deterrence
• Detection
• Investigation
• Discipline
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Monitoring Strategies
Deterrence
In a study of high school computer use,
off-task activity immediately declined 67%
after students viewed a monitoring
announcement at each login, which
included sample reports.
After scofflaws were disciplined and word
spread, median off-task activity declined
94%.
Results demonstrated that a highly visible
detection strategy and vigorous
enforcement of Acceptable Use Policy
significantly deters unacceptable
computer activity.
“With evidence of inappropriate PC
activity, a student is confronted. Word
then spreads like wildfire, and the end
result is productivity increases and the
incidence of malicious actions drops
to near zero.”
Jeff Hunt, Park Rapids Area School District
Park Rapids, Minnesota
“It’s a lot easier to fight off temptation
when you know there are
consequences. Spector is like radar,
or an unmarked car. It keeps the good
kids good.”
South Plainfield H.S., Plainfield, Illinois
Larry Koby, New Castle Community School
New Castle, Indiana
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Monitoring Strategies
Deterrence
“The keyword alert feature is really
wonderful. the very first day … the first
hour … 1/3 of the PCs sent alerts.
These were Word documents with
inappropriate language.”
Larry Koby, New Castle Community School
New Castle, Indiana
Detection
“Two students…had staff passwords
and…used these to have unrestricted
access to parts of the internet and more.”
Greg Gebhardt, Lowanna College
Victoria, Australia
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Monitoring Strategies
Deterrence
“The Principal called us to get the
information and - with a Spector
snapshot - we did. The guilty student
was caught.”
Detection
Jeff Hunt, Park Rapids Area School District
Park Rapids, Minnesota
Investigation
“Being able to print a copy of what the
student has typed is proof enough and
amazes the student that we have the
information.”
Dean Edwards, Maxwell Adventist Academy
Kenya
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Monitoring Strategies
Deterrence
“And because Spector provides who,
what, when, and where, we were able to
go to the Assistant Principal, who started
calling students into the office.”
Larry Koby, New Castle Community School
New Castle, Indiana
Detection
Investigation
“Some students didn’t believe the hype
and next week were amazed when they
were called into the office and shown
why we had removed them from the
network.”
Greg Gebhardt, Lowanna College
Victoria, Australia
Discipline
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Investigation Example
•
Spector 360 Quick View panels and
alerts show probable cause.
•
In-depth review of the student follows.
•
Visual evidence is sent to the assistant
principal.
•
The student is shown the evidence and
is disciplined.
•
The student spreads the word, which
deters other students from violating
Acceptable Use Policy.
Monitoring Strategies
“One student was repeatedly
trying to access porn sites,”
said Haviland. “With Spector
360 and its keyword alerts, I
received reports on it all. We
kept records, took them to
the assistant principal, and
the student went to ISS (InSchool Suspension). The
other kids heard about it and
that cut down that activity A
LOT!”
Robert Haviland, Hickman County Schools
Centerville, Tennessee
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Monitoring Methods
• Random monitoring
• Upon request
• Formal investigations
• Keyword alerts
• Automated reporting
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Monitoring Strategies
Review of a student’s
computer use
Random monitoring
Only 10 minutes to review a
week’s activity
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Monitoring Strategies
When inappropriate
behavior is suspected
Random monitoring
Examples:
Upon request
• Poorly done
assignments
• Switching screens when
you walk by
• Complaints by students
• Suspicious activity
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Monitoring Strategies
Serious violations
Random monitoring
• Cheating
Upon request
• Racial, Sexual harassment,
bullying
• School and teacher threats
Formal Investigations
“…video dumps have been used as
evidence for law enforcement in cases
of cyberbullying and…selling of illegal
goods on eBay.”
Greg Gebhardt, Lowanna College
Victoria, Australia
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Monitoring Strategies
Random monitoring
Receive immediate email
notification of words and
phrases detected in:
Upon request
• Email
Formal Investigations
• Instant Messages
• Websites
Keyword Alerts
• Keystrokes
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Monitoring Strategies
Random monitoring
Upon request
Formal Investigations
Keyword Alerts
Reports
(print, email, export, automated delivery)
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Who Reviews Activity
• IT Staff
• Teachers
• Administrators
• Parents
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Who Reviews Activity
“In this case, the Principal
called us to get the information
and - with a Spector snapshot
- we did. The guilty student
was caught.”
IT staff
Larry Koby, New Castle Community School
New Castle, Indiana
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Who Reviews Activity
“The persons in charge are able
to view the PCs they are in
charge of... They get the alerts,
they do the viewing, and they
take the appropriate action.
IT staff
Teachers
Spector has been an eye-opener
for teachers…. (they) are not
being circumvented, and they
appreciate that.”
Larry Koby, New Castle Community School
New Castle, Indiana
“I get keyword alerts emailed to me,
then I send a message to the
responsible teacher.”
Robert Haviland, Hickman County Schools
Centerville, Tennessee
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Who Reviews Activity
IT staff
“And because Spector provides
who, what, when, and where, we
were able to go to the Assistant
Principal, who started calling
students into the office.”
Teachers
Administrators
Larry Koby, New Castle Community School
New Castle, Indiana
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Who Reviews Activity
“Spector has enabled us to verify to
parents large downloads…or
printing jobs, when (students) have
made claims to their parents that
others have been using their
account.”
IT staff
Teachers
Greg Gebhardt, Lowanna College
Victoria, Australia
“(Monitoring) is much better than
having parents and students
complaining of harassment as
they have in the past.”
Administrators
Dean Edwards, Maxwell Adventist Academy
Kenya, Africa
Parents
One school automates summary
email reports to each parent.
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
As computers need anti-virus
software, so do they need
monitoring protection software.
“I believe monitoring
software is going to become
a workstation standard. If
you’re not monitoring, I’d say
you have to ask yourself
why.”
Chris Hoerske
Drexel Chemical Company
“Will the time come
when monitoring
software is as
important as anti-virus
software? The time is
here now! You need to
have a tool like
Spector in your
repertoire.”
Regional Credit Union
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity
Exit
Sample Reports
Activity Overview
Reduce Misuse
Fix Tech Issues
Learner Outcomes
Monitoring Strategies
Who Reviews Activity