SPECTOR 360 empowers you to quickly and easily:
- Track Internet and Application usage
- See if your employees are working or not
- Monitor every employee action on the computer
- Highlight illegal or inappropriate behavior
SPECTOR 360 showed us that not only were our suspicions accurate, misuse was more widespread than we thought. – Fredrick Smith, Florida Commission on Human Relations
SPECTOR 360 captures employee activities performed on Windows, Mac and BlackBerry devices automatically storing the activity data centrally for further auditing.
Receive scheduled reports on desired activity to provide an overview of what’s going on in your organization. Instant Alerts are also sent based on specific keywords, program activity, printing and more.
Drill down and see the individual activities in question. Replay computer activities with Screen Playback.
Because SPECTOR 360 runs on your Mac and Windows clients, you capture every single screen, keystroke, file transfer, Facebook entry, etc. You name it, SPECTOR 360 captures it.
SPECTOR 360 differentiates application usage into Active, Focused and Total Time to tell exactly how the user was interacting with each program. Active when it’s open, Focused when they are working with it and Total being the sum of the two.
Scheduled reports via email help you keep track of activity trends so you can see your top producers, top offenders and everything in between.
SPECTOR 360 has over 90 individual activity types to alert you via email to exactly who is copying sensitive files, surfing Facebook, printing documents, downloading files and more.
Video playback of screen captures tells the story around the actions in question, providing context where lists of actions alone fall short.
SPECTOR 360 uses dashboards and Event views to help you navigate to the user, activity or specific action to identify exactly what is happening in your organization.
Because the reviewing needs of HR, IT and management are all different, SPECTOR 360 allows you to restrict which users, groups and activities are visible. Usernames can even be obfuscated to allow for reviewing of trends without exposing specific users’ activities.