Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Spectorsoft Rolls Out Connector for Splunk Enterprise to Fortify Enterprises Against Insider Threats

byEileen McNulty
October 9, 2014
in News
Home News

Spectorsoft, a computer monitoring and analysis tools developer announced on Tuesday a connector for Splunk Enterprise – a platform for real-time operational intelligence. The connector will allow Spectorsoft’s employee monitoring tool – Spector 360, to deliver user activity data and alerts to Splunk implementations so that insider threats such as security breaches, data thefts and fraud can be timely detected and thwarted.

“Insider threats are not easy to detect, as they involve individuals that have been granted proper access but use that access improperly. By including user activity data and alerts from Spector 360 in Splunk implementations, our customers can reduce the risk of security breaches, data theft and Fraud,” explains the COO at SpectorSoft, Mike Tierney.

“This adds a dimension of analysis that enables data from computer and network activity to be correlated with employee activity data, providing a level of insight that is unprecedented in the industry and ultimately protects a company‘s valuable assets,” he added.

A recent SpectorSoft 2014 Insider Threat Survey pointed out that almost 65 percent of IT respondents reported witnessing an insider attack, with 75 percent insider crimes going unnoticed. Spector360 helps Splunk users identify nuances of human behaviour that might indicate abuse of authorized access—from phrases used in email to the moving of IP to a personal cloud—and carry out necessary investigation thus providing visibility into user actions performed within applications, behind encryption or on cloud-based solutions, informs a Spectorsoft press release.

In the wake of the recently disclosed insider breach at AT&T and internal threats emerging as the leading cause of data breaches, Spector 360 assures to empower IT security teams to detect insider threat activity as it flows detected indicators to Splunk as event alerts where Splunk administrators can review details on user or group activity and then take appropriate action.

Follow @DataconomyMedia

(Image credit: Spectorsoft)

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

Tags: splunk

Related Posts

Texas Attorney General files lawsuit over the PowerSchool data breach

Texas Attorney General files lawsuit over the PowerSchool data breach

September 5, 2025
iPhone 17 Pro is expected to arrive with 48mp telephoto, variable aperture expected

iPhone 17 Pro is expected to arrive with 48mp telephoto, variable aperture expected

September 5, 2025
AI chatbots spread false info in 1 of 3 responses

AI chatbots spread false info in 1 of 3 responses

September 5, 2025
OpenAI to mass produce custom AI chip with Broadcom in 2025

OpenAI to mass produce custom AI chip with Broadcom in 2025

September 5, 2025
When two Mark Zuckerbergs collide

When two Mark Zuckerbergs collide

September 5, 2025
Deepmind finds RAG limit with fixed-size embeddings

Deepmind finds RAG limit with fixed-size embeddings

September 5, 2025
Please login to join discussion

LATEST NEWS

Texas Attorney General files lawsuit over the PowerSchool data breach

iPhone 17 Pro is expected to arrive with 48mp telephoto, variable aperture expected

AI chatbots spread false info in 1 of 3 responses

OpenAI to mass produce custom AI chip with Broadcom in 2025

When two Mark Zuckerbergs collide

Deepmind finds RAG limit with fixed-size embeddings

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.