Email has become a major form of electronic communications. You
can contact your employees and co workers via email from just about
any place on earth that has an internet connection. Email has become
so integrated with the business world to the point that it is no
longer an option, it is a necessity.
It has been reported that Microsoft Exchange alone generates 3 million
emails a day through business servers. It is estimated that email
attachments are growing 35% a year.
Considering the amount of emails that can be sent on a daily basis
from any given organization, it is imperative that companies track
these emails effectively and routinely.
What are the benefits of email tracking?
Investigations on Employees Suspected of Inappropriate Activity
• Increase Employee Productivity
by Reducing Frivolous and Inappropriate Activity
• Eliminate Leaking of Confidential
Recover Lost Crucial Communications (Email, Chat & Instant Messages)
• Assist Help Desk Staff With
• Meet or Exceed Federal, Industry or Agency
• Monitor Ongoing Employee
Performance and PC Proficiency
• Obtain Proof to Support Accusations
• Reduce Security Breaches
• Detect the Use of Company
Resources to Engage in Illegal or Unethical Activities
• Limit Legal Liability (including
Sexual and Racial Harassment)
• Enforce PC and Internet Acceptable
Spectorsoft Corporation has
been making email tracking software for Employers since 1998 and
its products have twice been selected
to receive the coveted
PC Magazine Editors' Choice Award, first in 2002 and then again in 2004.
We understand that companies of any size can be subject to legal liability
in regards to email communication and that is why we have created Spector
Spector CNE will stamp out abuse and keep you within legal ramification
with cutting-edge email tracking capabilities designed to ensure that
you have a
clear record of all email being sent and received from company premises.
In addition to recording business standard MS Exchange and Outlook email,
Spector CNE includes industry-first web mail tracking. This includes
web mail services
such as Hotmail, Yahoo Mail and AOL Internet Email.
Whenever an email is sent or received, Spector CNE creates a hidden duplicate
(including file attachments) and stores it away for later review. Spector CNE
also keeps a copy of deleted email.
Spector CNE automates the process of archiving and protecting your tracked
emails by including a tool called the Data Vault that will securely store
all of your retained emails on a network server(s).
Using Multiple Servers allows you to organize your retained email by
department, office floor, location or any other category you choose.
This provides you with control over where the email is stored on your
network and offers a method for compartmentalizing Spector CNE data email
server runs an independent copy of the Data Vault. Groups of PCs are then assigned
to this server group and will automatically upload their email to the Data
The recordings in each server group can be automatically retrieved and
reviewed across the network – eliminating the need to physically
visit each PC.
Regular backup of your Spector CNE recordings will ensure you have a
complete tracked record of every email that is occurring on your company
The Data Vault makes backup simple and uncomplicated by compiling all
of your Spector CNE recordings in one place. Recordings are all archived
into a single
folder that is organized into subfolders for each computer that is being recorded.
Any backup made to Tape, CD, DVD or other storage media can be easily opened
and viewed with any Spector CNE viewer.
Spector CNE implements two primary security standards to prevent unauthorized
access to the saved emails: encryption and password protection.
All emails are encrypted the moment they are captured. No matter where
your emails are archived (in the Data Vault, on CD or Tape backup, etc...)
they are always
protected. Only Spector CNE can decrypt and open the saved email for viewing.
Additionally, IT administrators can assign a protection password to all
recordings. Users are required to enter this password prior to viewing
the data files.
What is the bottom
The result provides you with the most advanced email tracking
software suite ever offered.
From the convienence of one location, you will have a complete record of
every kind of computer activity with Spector CNE.
You will have the flexibility and control to conduct any type
of investigation that you can imagine.
That’s Not all.
Email tracking is only one of the powerful recording features
incorporated in to Spector CNE.
You will have the flexibility and control to track any type of
data that you can imagine.
and Instant Messaging is another major concern that companies have to
contend with. Since the Enron/Arthur Anderson scandal, Federal Regulations
have imposed severe penalties for the destruction of data, including
electronic data. Other recent legislation establishes a compelling obligation
for businesses to preserve electronic data that may be relevant to an
audit or legal matter.
Spector CNE ensures that all Chat and Instant
Messages are automatically tracked to provide you with an information
trail of every computer-based conversation that is taking place within
your company or with your customers. Spector CNE records the name of
all parties involved in a Chat/IM session and saves a complete copy
of the conversation.
most popular sites surfed at work closely mirror the most popular sites
surfed at home and include: pornographic web sites, financial web sites,
shopping sites, and chat sites.
The Web Site Recording tool in Spector
CNE will continually track every web page that is accessed by the computers
on your network and save a record of those URLs and domain names.
Spector CNE will also track every file and
program download that occurs over the Internet (such as file/music
swapping services, software download sites, pornographic images,
Spector CNE is significantly more sophisticated
than the History feature of your web browser, providing you with
important details including: Time of Last Visit, Duration of Time
on the Web Site, Active Time on Web Site, Total Number of Visits
to the Web Site and more!
Additionally, you can quickly highlight any
recorded Domain Name or URL and choose to block future access – or – take
preventative action and create your own list of web sites to block.
With Spector CNE’s advanced
and intuitive Web Site tracker, you will get a quick yet exact
picture of each individual’s web surfing behavior.
are multiple serious security concerns for businesses when employees
use company computers to download files from the Internet, transfer files
across the Internet and access peer-to-peer services which are loaded
with pornographic images, spyware, adware, and pirated music, video and
One major concern is whether employees are
sending company confidential information over the Internet.
Another concern is whether employees are placing
the company at legal risk by downloading copyrighted materials, like
music, movies and commercial software. In addition, there is potential
risk when an employee downloads pornographic images that will reside
on company computers and may be viewed by another employee who would
consider such material highly offensive.
Finally, any time a file is downloaded, there
is great risk that spyware and/or adware will be installed, especially
where P2P services are involved. (Dell Computer Corporation has identified
spyware as its single biggest source of technical support incidents,
as spyware will redirect web browsers and eventually slow computers
down to a crawl, not to mention the potential for security breaches.
Most spyware comes into computers via downloads from the Internet.)
Spector CNE tracks Files Transferred over
the Internet by keeping track of HTTP, FTP and P2P file transfers.
You will be able to see who is downloading or uploading files,
what file protocol is being used, which service is being used,
of the file being transferred and the type of file being transferred
(audio, image, video, software, document).
CNE includes a sophisticated keystroke tracker that saves keystrokes
by application, by date and time.
With Spector CNE, you will know what was typed,
where and when it was typed, and you will also know WHO typed it
because Spector CNE keeps a record of who is logged into the computer.
The Spector CNE Keystroke tracking tool will document every key typed on
the PC keyboard. Spector CNE not only captures standard alphanumeric
but also records "hidden" characters and keystroke combinations,
such as the Shift and Ctrl key, as well as “true” keystrokes
which may otherwise appear differently on screen (such as an * when a
password is typed).
Property Theft and the leaking of Company Confidential information
has become an increasing security threat for companies in recent years
as technology has made it relatively easy for employees to copy files
to floppy disks, Zip disks, CDs, DVDs, USB drives, Memory sticks or
to simply print out these documents and transport them off company
Spector CNE includes a Document Tracking
feature which allows you to determine whether files/documents may
be exiting your company via removable media such as floppy, zip,
CD, DVD or USB storage devices and memory sticks. The Document
Tracking feature also allows you to track documents that are printed
and who is copying or printing potentially sensitive files or documents.
CNE includes a monitoring tool that provides a clear and concise overview
of the programs being used on your office PCs. Spector CNE will track
the day and time a program is launched and the total duration of activity
in that program.
CNE records information about all internet connections made on
a computer. You will be able to see at a glance which applications
are connecting to the internet, when the connections are made,
the internet address they connected to, what TCP ports are being
used, and the amount of network bandwidth consumed by those connections.
This internet connection activity can provide
valuable insight into:
Which users may be violating company
policy by consuming network bandwidth with streaming media, file
downloads, or other internet activity
Applications connecting to the internet which you may not have been aware of
and which could have security implications
Which internet resources are most often connected to
Armed with this information you may decide to block access to TCP ports or
internet domains, remove offending applications from computers, or tighten
your company internet use policy.
surveillance cameras pointed directly at every PC on your company network,
filming all Internet and general PC activity, and storing this in a secure
area for later review. That is the idea behind the Snapshot Recorder
tool in Spector CNE.
Spector CNE takes hundreds of snapshots every
hour on each networked PC, very much like a surveillance camera.
Snapshots are taken of whatever is on the computer screen at the
frequency you choose – as often as once per second.
That means you get detailed visual recordings
of all chat conversations, instant messages, emails typed and read,
all web sites visited, all programs run, all keystrokes typed – all
activity on all computers.
Snapshot Recording is the most powerful
way to visually record and review everything they do online and
Click here to learn more about Spector CNE