SpectorSoft expands monitoring to include BlackBerry devices

SpectorSoft announced a new release of Spector 360, which includes the ability to keep tabs on BlackBerry mobile devices.

Although BlackBerry has plummeted in overall smartphone market share, it is still entrenched as the default mobile platform supported in many organizations. SpectorSoft recognizes the role BlackBerry mobile devices play for its business customers, and it has expanded Spector 360 to be able to monitor and log activity from them.

Spector 360 provides detailed tracking and logging of activity on the platforms it monitors. Spector 360 gives IT admins the ability to view what information users are sharing, communications on messaging platforms or social networks, the websites they visit, and the applications they use. IT admins can identify and address risky behaviors that could lead to data breaches, or business disruptions.

Spector 360 7.5 now includes monitoring for BlackBerry devices. The new BlackBerry monitoring capabilities pull monitoring information from the BES Server to minimize data transfers over cellular networks, and give the IT admin visibility into call data, chat conversations, and emails sent and received from BlackBerry mobile devices.

Some organizations and IT admins believe this level of employee monitoring is spying--a sort of corporate nanny state where users are implicitly distrusted. That's the wrong perspective.

Organizations are faced with exponentially growing pools of customer data, and intellectual property that need to be protected, combined with an increasingly mobile workforce that accesses, transfers, and shares that data from virtually anywhere. It's not spying to monitor that activity--it's due diligence. The fact is that authorized users--whether intentionally or inadvertently--are the primary source of data leaks. It's simply being vigilant and proactive about protecting sensitive data and the brand reputation of the organization.

Every company has some degree of self-interest that merits monitoring user activity using a tool like Spector 360. Businesses that fall under regulatory compliance guidelines such as SOX (Sarbanes-Oxley), HIPAA (Health Insurance Portability and Accountability Act), or PCI-DSS (Payment Card Industry Data Security Standard) may even have mandates to do so.

Spector 360 monitors and records activity on BlackBerry devices. Using a tool like Spector 360 can also yield other benefits for an organization. Rather than thinking of it as a spying tool with punitive consequences for users who violate policies, you can use it as training tool. For example, you can monitor the activity of leading salespeople to learn what they do, and use that as a frame of reference to teach other salespeople how to improve their results.

While Spector 360 provides a unified view of Windows, Mac OS X, and now BlackBerry, it can't keep track of activity on Android or iOS. Unfortunately, Apple does not provide the access developers need to be able to monitor iPhones or iPads at the level that SpectorSoft does.

SpectorSoft does have monitoring for Android through its eBlaster software, but that product does not integrate with Spector 360 or provide the comprehensive cross-platform view that Spector 360 does.

Join the CSO newsletter!

Error: Please check your email address.

Tags Blackberryconsumer electronicssecurityMobile device managementmobile securitysmartphonesmobilebusiness security

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Tony Bradley

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts