The cornerstone of Spector 360 is the powerful Client Recorder. Capable of recording a variety of event types simultaneously, the Client Recorder automatically records employee computer activity, providing centralized visibility to computer usage across multiple devices. The Client Recorder can be undetectable or visible to the user, safeguarding company assets without impeding the employee’s workflow.

Spector 360 employs two powerful tools within Client Recorder, robust Keyword Detection & Reporting, and information packed Snapshots. Keyword Detection & Reporting allows you to specify words or phrases that might signal an immediate threat to the safety and integrity of your corporate assets. Snapshots compliment Keyword Detection & Reporting, capturing images of computer activity based on a host of monitored events.

While monitoring individual or various groupings of employees, the Client Recorder captures information for the following events:


The ease with which sensitive digital documents can be emailed to colleagues allows for critical business decisions to be made at a rapid pace. Unfortunately, it also allows for the potential theft of those documents. Spector 360 can deter, as well as track, the theft of digital corporate assets with Client Recorder’s cutting-edge email recording capabilities. Designed to ensure you have a clear record of all email sent and received through corporate email services, Client Recorder also includes industry-first capturing of webmail services such as Gmail, Hotmail, Yahoo Mail, and AOL Internet Email.

As email is sent or received on a monitored computer, Client Recorder creates an exact copy, including file attachments, and stores it securely for later review. Client Recorder has filtering capabilities so emails can be captured when they are sent or received, or if there is a particular pattern detected in the header (To/From/Subject) or body of an email. Additionally, Client Recorder can capture emails based on the format used, if attachments are detected, or the size of attachments, even if they are deleted. These granular permissions allow the capture of a range of emails, down to emails received from specific account types such as MS Outlook, Gmail, or IMAP.

File Transfer

Email is not the only vulnerability your digital assets face. Advances in technology make it increasingly easier to transport and transmit digital information. Businesses face security risks related to files downloaded from the Internet, the transfer of files via web email, and access of peer-to-peer file sharing services that can be loaded with pornographic images, spyware, adware, and pirated music, video or software.

Perhaps the single most worrisome threat is whether employees are sending company confidential information over the Internet. Client Recorder tracks the movement of files off of the company network via web mail services such as Gmail or Hotmail. Analyze captured data to determine which employee is transferring corporate assets outside of the network, capturing Snapshots and keystrokes of who the file is sent to, the name of the file sent, time-stamp information and more.

Reviewing file transfer data captured by the Client Recorder will help determine if the company is potentially at risk from downloading inappropriate or copyrighted materials like music, movies and commercial software. You can identify users exposing the company to threats, whether that is violating Acceptable Use Policies (AUP) such as downloading pornography, or pirating software using company resources.

User Activity/Inactivity

Reviewing employee productivity has never been more simple or complete. Client Recorder collects information on the computer activity and inactivity of any employee. Events such as when employees log in, when they use the mouse and keyboard, and when they are not active on the computer are all recorded. Client Recorder can even track when a web browser is open and active versus open but not the focused window.

Website Visits

As business services are increasingly available via the Internet, employees find themselves spending more and more time using a web browser to perform their job. An important part of daily workflow, the Internet can also be a source of productivity loss, as well as a potential threat to your company. Client Recorder will continually monitor every web page that is accessed by the computers on your network and save a record of those URLs and domain names.

Significantly more sophisticated than the History feature of your web browser, Client Recorder provides you with important web browsing details including: Time of Last Visit, Duration of Time on the website, Active Time on website, Total Number of Visits to the website, Page Title and more!

Additionally, you can create customized web browsing policies for different employees. Management can “Whitelist” a limited number of websites acceptable to visit for one group of users, blocking all other websites. Alternatively, you can create a less restrictive list of “Blacklisted” websites for another group, allowing them to visit any site not on the list. With Client Recorder, you will get a quick yet exact picture of each employee’s web surfing behavior, which is also used by the Dashboard to formulate trend data across your organization.

Online Search

Searching the Internet at work is a common occurrence; researching competitors, investigating job-specific training opportunities, and finding vendor websites are acceptable business uses of the web’s search features. Unfortunately, AccounTemps found that in a 2013 study, 48% of survey respondents between the ages of 18 and 34 admit to searching for a new job while at work. The Client Recorder within Spector 360 records online searches from any website where known search techniques are used.

Spector 360 looks for standard searching techniques, captures the search phrase entered by the employee, the search results URL, and other information. Use this information to understand why an employee is visiting a website. For example, find out whether an employee is searching a job website for professional growth information or to find a new job.


Working in conjunction with both Keyword Detection & Reporting and Snapshots, the Client Recorder captures every keystroke made by monitored computers on your corporate network. These keystrokes are saved, and create searchable references to actions performed by the user. When a Keyword Alert is triggered, using the Dashboard within Spector 360 to review the Snapshots of activity surrounding the keystrokes made gives management insight to the context around the event.

With Spector 360, you will know what was typed, where and when it was typed, and you will also know WHO typed it, as Spector 360 keeps a record of who is logged into the computer.

Client Recorder not only captures standard alphanumeric keystrokes, it also records "hidden" characters and keystroke combinations, such as the Shift and Ctrl key. It also records those keystrokes that aren’t typically displayed on the screen, such as when a password is typed, echoing back asterisks on the screen. However, Client Recorder can be configured to not capture passwords for specific applications, such as online banking, protecting employee privacy as necessary.

Program Activity

Understanding a user’s application activity gives insight to productivity, and so much more. By analyzing the program activity captured by Client Recorder, management can identify training opportunities for users struggling with application workflows. Reporting related to use of a program by the time it is launched, activity and time within the program, and other metrics allows you to see which users are proficient with an application or workflow, and which need additional training. Gain insight into programs most frequently used by employees, measuring productivity while ensuring adherence to corporate guidelines and Acceptable Use Policies.

Network Activity

A natural complement to Client Recorder’s website recording activities is it’s ability to record and report on network activity for each monitored computer. Recording all information about Internet connections made on a computer, you will be able to see, at-a-glance, applications that are connecting to the Internet, when the connections are made, the Internet address they connect to, ports being used, and the network bandwidth consumed by those connections.

Armed with this information you may decide to block access to TCP ports or Internet domains, remove offending applications from computers, or tighten your company’s Acceptable Use Policy (AUP).

This Internet connection activity can provide valuable insight into:

  • Which employees may be violating company policy by consuming network bandwidth with streaming media, file downloads, or other Internet activity
  • Applications connecting to the Internet that you may not have been aware of, which could have security implications
  • Which Internet resources are most frequently accessed

Document Tracking

Emailing documents is not the only opportunity for employees to steal intellectual property. Company confidential information can be placed on portable devices such as USB drives, or uploaded to cloud storage services like Dropbox. Client Recorder tracks the movement of files from monitored computers to these devices, helping pinpoint the document’s exit point.

In addition to tracking documents being copied to portable devices and cloud computing services, Client Recorder tracks documents that are printed, the employee printing it, and other related information.


The use of chat and instant messaging services within a company provides an avenue for quick communication between colleagues. However, it is also a potential threat to the company, be it from inappropriate language and harassment, theft of intellectual property, or collusion amongst coworkers. The Client Recorder in Spector 360 automatically records all conversations on popular chat/IM platforms like Skype, Yahoo, MSN and AOL. Detailed capture of chat and instant messages sent and received, and the names of the parties in the chat provides you with an information trail of every computer-based conversation taking place within the company.