Featuring Research by
Increasing Security and Productivity
Through Insider Intelligence.
Spector 360 User Monitoring Software
We provide visibility. You receive timely, actionable information.
Unwelcome Guests On Your Network?
Watch this talk on the methods imposters use to gain access to enterprise networks.
When you suspect an employee of wrongdoing, you need to begin discrete investigations quickly. Securely collect, review, and report on the online and communications activity and the context in which it occurred.Learn more
Detect Insider Threats
77% of IT Pros believe insiders are the biggest threat to security. 50% of breaches are a result of employee behavior. Insider Threats require advanced detection to provide early warning, with informed and rapid response in the event of an incident.Learn more
August 4, 2015 — Working for a company that makes behavioral analytics software for insider threat detection and user activity monitoring software for response and investigation, I naturally read a lot about specific insider attack instances and about risk and threats in general. Rarely does anything surprise me anymore.Read more →
JuLY 17, 2015 — In March 2014 the theft and leaking of payroll data on 100,000 employees for Morrisons was made public. The data taken included back account details, and was published online and sent via disc to at least one newspaper.Read more →
June 24, 2015 — In our most recent post we identified that only a small number (21%) of organizations are continuously monitoring the behavior of their users. Further, we say that the most common method for gaining visibility into user behavior with core applications is the review of server logs.Read more →