BlackBerry gets vote of confidence from monitoring-software maker
- 15 January, 2013 18:11
There's good news for a change for BlackBerry maker Research in Motion, as monitoring-software vendor SpectorSoft today announced its first software support for BlackBerry in the enterprise.
"BlackBerry is very strong in certain places, like finance and government," says Nick Cavalancia, vice president of marketing at SpectorSoft, which announced Spector 360 7.5, an employee-monitoring package for centralized recording and alerting about what employees do on their Windows PCs, Apple Macs, and now company-issued BlackBerries. "The BlackBerry is still in 90 per cent of the Fortune 500. And we do believe BlackBerry is a secure mobile-device platform."
However, the latest SpectorSoft monitoring software for the enterprise, which costs $US110 per computer and $US57 per BlackBerry device, can't do as much to track employee activity on the BlackBerry as on the PC or Mac due to constraints related to mobile-platform processing and bandwidth limit and costs.
For instance, although the SpectorSoft software could capture the entire record of virtually everything an employee might do on a computer via the monitoring-software agent, there is no SpectorSoft agent for the BlackBerry and the monitoring is limited to tasks that involve real-time monitoring and recording email, chat and call-record and duration via BlackBerry server integration. Spector 360 7.5 also doesn't support BlackBerry 10, expected out by the end of the month.
But the software can be used for many purposes to watch what employees do with their BlackBerry devices. The software, which will capture emails and chat, can send alerts to IT managers if employees overstep agreed-upon uses of the BlackBerry. And it could monitor if employees appeared to be in touch with the employer's competitors, for instance, by analyzing call records, said Cavalancia.
Cavalancia said SpectorSoft has had a stand-alone consumer edition of its software since 2010 for BlackBerry that was popular and became used by companies as well that SpectorSoft decided to develop an enterprise version to be integrated into its Spector 360 enterprise package.
There's also been a consumer version for Google Android since 2011 but SpectorSoft does not yet have any for the enterprise for central management of Android devices but is considering that for the future. Cavalancia said the Apple iOS platform technically doesn't appear suited for the SpectorSoft approach.
The advent of the bring-your-own-device (BYOD) trend in enterprises is complicating things a lot in terms of monitoring, Cavalancia acknowledged. Some customers adopting BYOD policies are asking employees to sign acceptable-use policies related to personally owned mobile devices used for work to allow monitoring and the ability of the company to wipe it if need be.
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: @MessmerE. Email: firstname.lastname@example.org.
Read more about wide area network in Network World's Wide Area Network section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Tips Choosing a Cloud Service Provider
Because cloud is still a new and evolving business model, it can be argued that the decision to select a cloud service provider should be approached with even greater diligence than other IT decisions. Many providers use the same term to define very different services, “hybrid cloud” is one example, making it difficult to compare offers. This whitepaper will help enterprises evaluate their options in two critical areas: the cloud service portfolio and the service provider itself. Read now.
Implementing A Security Analytics Architecture
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim’s environment. More “free time” leads to more stolen data and more digital damage. Principally, this is because today’s security measures aren’t designed to counter today’s more advanced threats. Read on.
Advanced Persistent Threats and Real-Time Threat Management
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Read now.