Spector 360
Publisher: SpectorSoft Corporation
Version: 7.3
License: Freeware
Trial Limitations: 15 day free trial, monitors up to 10 machines
Price: $0.00
Operating Systems: WinXP,WinVista,WinVista x64,Win7 x32,Win7 x64,Win2000,WinOther,Mac OS X,Windows2000,Windows2003,WinServer,Windows Vista Ultimate,Windows Vista Ultimate x64,Windows CE,Win98,WinME,WinNT 3.x,WinNT 4.x
System Requirements: Spector 360 is a client-server product and requires a server to run.
File Size: 316.26 MB
Total Views: 377
Total Downloads: 1
Rating: Spector 360 not yet rated. [Submit Review] [Award Rating]
Release Date: 11/1/2011
Last Update Date: 10/14/2017
Spector 360 Short Description:
SPECTOR 360 User Activity Monitoring software monitors computer user activity.
Spector 360 Long Description:
SPECTOR 360 User Activity Monitoring software allows organizations to monitor, record, replay, and analyze all user, user group, department, and division electronic activ­ity. Organizations use SPECTOR 360 to protect assets, improve productivity, ensure optimal use of online processes, systems, and tools, protect employee privacy, and review adherence to industry and government regulations and laws.
SPECTOR 360 monitors email sent and received, chat/IM, websites visited, applications/programs accessed, web searches, file transfers, and data printed or saved to removable devices. In addition, SPECTOR 360 captures screen snapshots, enabling raw data to be threaded to a visual record that can be replayed DVR-style.
With SPECTOR 360, you can quickly & easily:
TRACK & ENFORCE ELECTRONIC ACCEPTABLE USE POLICIES
Highlight unexpected or unsanctioned events and trends. Focus on those areas to determine if one person or a group of persons was involved, if the events were accidental or on purpose, a result of good or bad behavior, poor training, or outdated or inefficient process.
PROTECT VALUABLE INTELLECTUAL PROPERTY
Identify Intellectual Property theft and the loss of Company Confidential information. Using easy-to-read charts and graphs or instant alerts, see if users access, transfer, or print source code, product designs, customer lists, or contact information.
IDENTIFY SECURITY BREACHES & RISKS
Review security risk surrounding use of removable media, peer-to-peer ap­plications, surfing inappropriate or malicious websites, and downloading suspect or copyrighted files.
MONITOR & AUDIT COMPLIANCE REQUIREMENTS
Meet or exceed compliance requirements stipulated by Rule 17a-4, SOX, HIPAA, SEC, NASD, or CIPA by seamlessly maintaining records of communications and transactions.
BENCHMARK USER PRODUCTIVITY
Improve efficiency and productivity by seeing if users are properly trained, have access to the right tools, and are following the best processes and procedures.
Submit Your Review
Your Name:
Rating:
(Please click on one of the stars to indicate your rating.)
One Line Summary:
Review:
No html tags are allowed.
Submit Review
Copyright © 2025, Ivertech. All rights reserved.