spector 360

60
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity Exit Spector 360 Spector 360 is the Corporate Network Edition of Spector Pro – winner of the PC Magazine Editor’s Choice Award for Best Activity Monitoring Software

Upload: ethan-goff

Post on 03-Jan-2016

41 views

Category:

Documents


1 download

DESCRIPTION

Spector 360. Spector 360 is the Corporate Network Edition of Spector Pro – winner of the PC Magazine Editor’s Choice Award for Best Activity Monitoring Software. Reporting. Websites Visited Email/Webmail Chat/Instant Message Program Activity Network Activity. Keystrokes Downloads/uploads - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Spector 360

Spector 360 is the Corporate Network Edition of Spector Pro – winner of the PC Magazine Editor’s Choice Award for Best Activity Monitoring Software

Page 2: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

ReportingReporting

• Websites Visited

• Email/Webmail

• Chat/Instant

Message

• Program Activity

• Network Activity

• Keystrokes

• Downloads/uploads

• Snapshots

• Bandwidth Usage

• Document Tracking

Page 3: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Website ActivityReporting

Page 4: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Website Activity ViewsReporting

Page 5: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

User Website DetailReporting

Page 6: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Network Bandwidth UseReporting

Internet Radio being played

Page 7: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Network Bandwidth DetailReporting

Page 8: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Network Bandwidth SnapshotReporting

This snapshot details adjusting the volume of Internet radio while working on PowerPoint.

Page 9: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

User Activity DetailReporting

See an interactive demo at http://www.spector360.com/screenshots/UserExplorer/overview.htm

Each tab displays a different type of activity

Page 10: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Keyword AlertsReporting

Page 11: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Sample Reports

These reports represent only a sampling

More can be seen at

http://www.spector360.com/overview/report.htm

Reporting

Page 12: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Additional Features

• Automated email report delivery

• Monitor files deleted, created, renamed, printed, transferred (includes files written to CD, DVD or USB devices)

• Alerts if specified documents are accessed

Reporting

Page 13: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Activity Overview

• Red flag irregularities

• See probable cause at a glance

• Hyperlink to details

“Quick View reports let you know what’s happening REAL FAST….For example,…the Quick View charts are showing me EXACTLY how many hits websites are getting. …If you see a website that shouldn’t be popular, all you have to do is click the bar on the chart to find out what’s going on.”

Robert Haviland, Hickman County Schools

Centerville, Tennessee

Page 14: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Miss nothing reporting Easily spot trends and irregularities.

e.g., Who seems to be using the most network bandwidth and why?

Music consuming bandwidth

Activity Overview

“Spector also enabled us to monitor the time and date students were on computers as well as all actions they undertook.”

Greb Gebhardt, Lowanna CollegeVictoria, Australia

Page 15: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Miss nothing reportingWhat websites are being visited most frequently and who is spending the most time browsing the web? In this example, mlb.com is a baseball site.

You can drill down to find the baseball enthusiasts and exactly how much time they’ve spent.

“The number of students now engaged in non educational work on computers is almost nil.”

Greb Gebhardt, Lowanna College

Victoria, Australia

Productivity

Activity Overview

User

Active

Time

Page 16: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Miss nothing reportingWho is transferring the most files?

What exactly are they sending out?

To whom are they sending it to?

“The software…enabled us to monitor the use of USB drives and other external devices that previously we did not have access to.

Students trying to use other students or staff accounts has…reduced considerably.”

Greb Gebhardt, Lowanna CollegeVictoria, Australia

Productivity

Confidential information

Activity Overview

Page 17: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Miss nothing reportingWho are the top violators of those keywords that indicate abuse (e.g., sex, bomb, gambling)?

Productivity

Confidential information

Keyword Alerts

Curse word

Curse word

Activity Overview

“Using key word alerts, we were able to set flags on files…and web searching and web sites…which …would send notification…that there may be a breach of…usage policy.

The alert list…includes flags for things like remote desktop, administrator and other key staff login codes.”

Greg Gebhardt, Lowanna CollegeVictoria, Australia

Page 18: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Spot trends What are the top online search terms being used and do they look suspicious?

Productivity

Confidential information

Keyword Alerts

Online search terms

Activity Overview

“We discovered…searches by…students in Google for keywords such as sex, porn, etc.”

Greg Gebhardt, Lowanna CollegeVictoria, Australia

Page 19: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Miss nothing reportingSearch for a word/phrase across the entire user base. e.g., a racial epithet or sexual term in an anonymous email.

Productivity

Confidential information

Keyword Alerts

Online search terms

Lawsuit protection

Activity Overview

Page 20: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Miss nothing reporting

Who is arriving at work late and leaving early?

Who is taking frequent breaks and just how long are they?

Productivity

Confidential information

Keyword Alerts

Online search terms

Lawsuit protection

User activity

Activity Overview

Page 21: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Reduce Computer Misuse

Stop PC and Internet abuse

Provide proof of student identity and activity

Page 22: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Detect & Stop These Activities

• Offensive chat/email

• Bullying

• Threats to students,

teachers, and school

• Bandwidth abuse

• Game playing

• Bypassing web filters

• Student hacking

• Illegal downloads

Computer Misuse

Page 23: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Offensive chat and email“First we put the keyword (alert) list (of inappropriate words) on the library PCs….The very first day…the first hour…we had 10 alerts. And there are only 31 PCs in the library, so 1/3 of the PCs sent alerts the first day.”

Larry Koby, New Castle Community SchoolNew Castle, Indiana

Computer Misuse

“Several students…managed to use a bypass proxy web site to access MSN Messenger.”

Greg Gebhardt, Lowanna CollegeVictoria, Australia

Page 24: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Offensive chat & email

Bullying “At one time, the site (at which one can insert a person’s name and it creates a violent image of that person “destroyed”) attracted quite a few, but once a student tried it with Spector in place, the outcome of the prank was decidedly different.”

Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota

Computer Misuse

Page 25: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Offensive chat & email

Bullying

Threats to students, teachers, school

“An uncomplimentary anonymous web email was sent to the assistant principal from a PC within the school system network.

(A threatening) note (was) found, (which) was composed on a PC and printed out.”

Larry Koby, New Castle Community SchoolNew Castle, Indiana

(Note: Spector detects these activities and identifies the user.)

Computer Misuse

Page 26: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Offensive chat & email

Bullying

Threat to students, teachers, school

Bypass web filters

“Students were using an ‘anti-proxy’ program, bypassing the content filter by bouncing off another server. With Spector, now we can monitor even that.”

Larry Koby, New Castle Community SchoolNew Castle, Indiana

“We were seeing sexual sites visited. But since the introduction of Spector, we rarely see anything like that.”

Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota

Computer Misuse

Page 27: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Offensive chat & email

Bullying

Threat to students, teachers, school

Bypass web filters

Student hacking

“We were subject to some hacking attacks that almost shut our network down. Spector allowed us to discover who the culprits were.

The student body is running scared because the word is out that the IT department is now mysteriously able to find out which students are causing havoc in the computer systems.”

Robert Frost, Highland School of TechnologyGaston County, North Carolina

Computer Misuse

Page 28: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Offensive chat & email

Bullying

Threats to students, teachers, school

Bypass web filters

Student hacking

Illegal downloads

“Students were storing mpeg's and games on the server and renaming them to hide them from being seen in their profiles.

The word spread like wildfire and it has stopped that kind of behavior cold.”

Robert Frost, Highland School of TechnologyGaston County, North Carolina

Computer Misuse

Page 29: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Offensive chat & email

Bullying

Threats to students, teachers, school

Bypass web filters

Student hacking

Illegal downloads

Risk in general

“A keystroke logger (was found) on a library PC. It was downloaded off the Internet…(and) capturing passwords….very frightening for us.

I felt we were protected from the outside, but were we protected from ourselves? Spector showed us we needed to do more.”

Larry Koby, New Castle Community SchoolNew Castle, Indiana

Computer Misuse

Page 30: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Resolve Technical Problems

• View error Messages

• Identify malware sources

• Document Procedures

• Save staff time

• Reduce Bandwidth

Page 31: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

View error messages “The screenshots show me error messages and exactly what led up to a problem.”

Resolve Technical Problems

Page 32: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

View error messages

Identify malware sources

“(Students) go to websites and cookies get placed that change the behavior of Internet Explorer. I can discover the website that caused the problem and block it for everyone.”

“I can discover how a virus was introduced.”

Resolve Technical Problems

Page 33: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

View error messages

Identify malware sources

Document Procedures“I use the screenshots to document installations and configuration changes for later review.”

Resolve Technical Problems

Page 34: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Error Messages

Identify malware sources

Document procedures

Save staff time

“The incidents are few and far between now. And that alone saves us work. We don’t have to ‘clean’ the machines as often as before.”

Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota

“We have found that our support workload is reduced because the kids don’t try to crash the PCs any more, and if a machine does fail, we can see from the log what was happening when it failed. This makes it much easier to fix.”

Fungai Chawira, St Augustine’s High School London, England

Resolve Technical Problems

Page 35: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

View error messages

Identify malware sources

Document Procedures

Save staff time

Reduce Bandwidth

“It only takes a moment to see who’s hogging bandwidth. Right now, on the bandwidth chart, I see one user bringing down large amounts of data…. It looks like lots of music.”

Robert Haviland, Hickman County SchoolsCenterville, Tennessee

“We found a folder with 60-80 songs in it on one of our file servers … way down deep. We wouldn’t have found the songs without Spector.”

Todd Kumpola, Rapids Area School DistrictPark Rapids, Minnesota

Resolve Technical Problems

Page 36: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Improve Learner Outcomes

“The ability to easily monitor, report and follow up on misuse…has changed student practices and improved teaching and learning.

…teachers…complained that students were now completing work in half the time…and they would have

to create additional work for them.” Greg Gebhardt, Lowanna College

Victoria, Australia

Page 37: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Increase Time on Target

“We discovered about 30% of students playing games, which are hidden from teachers’ views as they walk past.”

Greg Gebhardt, Lowanna CollegeVictoria, Australia

“Instead of playing games, they now listen to the teacher….

Classroom productivity has absolutely increased using Spector. Teachers now feel like they can talk TO the students, as opposed to having to stand BEHIND them.”

Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota

Improve Learner Outcomes

Page 38: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Diagnose Student Weaknesses

For example: A student has poor web search technique and chooses the first search entry or paid ads.

You actually see it happen.

“If a teacher believes that a particular child has not been concentrating in class…he can come to us after the lesson and ask to see the record of the child’s activity during the lesson.”

Fungai Chawira, St Augustine’s High School London, England

Improve Learner Outcomes

Page 39: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Assess Understanding

Teachers can watch the learning process by reviewing assignments, email and chat conversations.

Improve Learner Outcomes

Instant Messaging Example

Page 40: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Expose Dishonesty

Review communications for suspicious activity.

Improve Learner Outcomes

Email Example

Page 41: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Example of PlagiarismImprove Learner Outcomes

Page 42: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Monitoring Strategies

• Deterrence

• Detection

• Investigation

• Discipline

Page 43: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Deterrence “With evidence of inappropriate PC activity, a student is confronted. Word then spreads like wildfire, and the end result is productivity increases and the incidence of malicious actions drops to near zero.”

Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota

“It’s a lot easier to fight off temptation when you know there are consequences. Spector is like radar, or an unmarked car. It keeps the good kids good.”

Larry Koby, New Castle Community SchoolNew Castle, Indiana

Monitoring Strategies

In a study of high school computer use, off-task activity immediately declined 67% after students viewed a monitoring announcement at each login, which included sample reports.

After scofflaws were disciplined and word spread, median off-task activity declined 94%.

Results demonstrated that a highly visible detection strategy and vigorous enforcement of Acceptable Use Policy significantly deters unacceptable computer activity.

South Plainfield H.S., Plainfield, Illinois

Page 44: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Deterrence

Detection

“The keyword alert feature is really wonderful. the very first day … the first hour … 1/3 of the PCs sent alerts. These were Word documents with inappropriate language.”

Larry Koby, New Castle Community SchoolNew Castle, Indiana

Monitoring Strategies

“Two students…had staff passwords and…used these to have unrestricted access to parts of the internet and more.”

Greg Gebhardt, Lowanna CollegeVictoria, Australia

Page 45: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Deterrence

Detection

Investigation

“The Principal called us to get the information and - with a Spector snapshot - we did. The guilty student was caught.”

Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota

“Being able to print a copy of what the student has typed is proof enough and amazes the student that we have the information.”

Dean Edwards, Maxwell Adventist Academy

Kenya

Monitoring Strategies

Page 46: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Deterrence

Detection

Investigation

Discipline

“And because Spector provides who, what, when, and where, we were able to go to the Assistant Principal, who started calling students into the office.”

Larry Koby, New Castle Community SchoolNew Castle, Indiana

“Some students didn’t believe the hype and next week were amazed when they were called into the office and shown why we had removed them from the network.”

Greg Gebhardt, Lowanna CollegeVictoria, Australia

Monitoring Strategies

Page 47: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Investigation Example• Spector 360 Quick View panels and

alerts show probable cause.

• In-depth review of the student follows.

• Visual evidence is sent to the assistant principal.

• The student is shown the evidence and is disciplined.

• The student spreads the word, which deters other students from violating Acceptable Use Policy.

Monitoring Strategies

“One student was repeatedly trying to access porn sites,” said Haviland. “With Spector 360 and its keyword alerts, I received reports on it all. We kept records, took them to the assistant principal, and the student went to ISS (In-School Suspension). The other kids heard about it and that cut down that activity A LOT!”

Robert Haviland, Hickman County Schools

Centerville, Tennessee

Page 48: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Monitoring Methods

• Random monitoring

• Upon request

• Formal investigations

• Keyword alerts

• Automated reporting

Page 49: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Random monitoringReview of a student’s computer use

Only 10 minutes to review a week’s activity

Monitoring Strategies

Page 50: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Random monitoring

Upon request

When inappropriate behavior is suspected

Examples:

• Poorly done assignments

• Switching screens when you walk by

• Complaints by students

• Suspicious activity

Monitoring Strategies

Page 51: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Random monitoring

Upon request

Formal Investigations

Serious violations

• Cheating

• Racial, Sexual harassment, bullying

• School and teacher threats

Monitoring Strategies

“…video dumps have been used as evidence for law enforcement in cases of cyberbullying and…selling of illegal goods on eBay.”

Greg Gebhardt, Lowanna CollegeVictoria, Australia

Page 52: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Random monitoring

Upon request

Formal Investigations

Keyword Alerts

Receive immediate email notification of words and phrases detected in:

• Email

• Instant Messages

• Websites

• Keystrokes

Monitoring Strategies

Page 53: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Random monitoring

Upon request

Formal Investigations

Keyword Alerts

Reports (print, email, export, automated delivery)

Monitoring Strategies

Page 54: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

Who Reviews Activity

• IT Staff

• Teachers

• Administrators

• Parents

Page 55: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

IT staff“In this case, the Principal called us to get the information and - with a Spector snapshot - we did. The guilty student was caught.”

Larry Koby, New Castle Community SchoolNew Castle, Indiana

Who Reviews Activity

Page 56: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

IT staff

Teachers

“The persons in charge are able to view the PCs they are in charge of... They get the alerts, they do the viewing, and they take the appropriate action.

Spector has been an eye-opener for teachers…. (they) are not being circumvented, and they appreciate that.”

Larry Koby, New Castle Community SchoolNew Castle, Indiana

“I get keyword alerts emailed to me, then I send a message to the responsible teacher.”

Robert Haviland, Hickman County SchoolsCenterville, Tennessee

Who Reviews Activity

Page 57: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

IT staff

Teachers

Administrators

“And because Spector provides who, what, when, and where, we were able to go to the Assistant Principal, who started calling students into the office.”

Larry Koby, New Castle Community SchoolNew Castle, Indiana

Who Reviews Activity

Page 58: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

IT staff

Teachers

Administrators

Parents

“Spector has enabled us to verify to parents large downloads…or printing jobs, when (students) have made claims to their parents that others have been using their account.”

Greg Gebhardt, Lowanna CollegeVictoria, Australia

“(Monitoring) is much better than having parents and students complaining of harassment as they have in the past.”

Dean Edwards, Maxwell Adventist AcademyKenya, Africa

One school automates summary email reports to each parent.

Who Reviews Activity

Page 59: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit

“Will the time come when monitoring software is as important as anti-virus software? The time is here now! You need to have a tool like Spector in your repertoire.”

Regional Credit Union

“I believe monitoring software is going to become a workstation standard. If you’re not monitoring, I’d say you have to ask yourself why.”

Chris HoerskeDrexel Chemical Company

As computers need anti-virus software, so do they need

monitoring protection software.

Page 60: Spector 360

Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity

Exit