Pular para o conteúdo principal

Review: Blackbox Security Monitor

Review: Blackbox Security Monitor: "

Computer security is a critical issue for nearly every company on the planet. Being able to monitor PCs is often one of the most challenging aspects of this task. What do you monitor? Is there a line you cross that breaks a corporate policy? Do you need to capture screen shots of an employee’s desktop? Do you need to run a keylogger? These and so many more issues are very delicate within a company.


But it’s nice to know, when you need to address these issues, there is a tool out there that can handle it. Blackbox Security Monitor is a free monitoring tool that can serve as a watchdog on your network; reporting, monitoring, alerting, and warning the administrator of certain activity.


System requirements




  • Product: Black Box Security Monitor

  • Vendor/Developer: ASM Software

  • Operating System: Windows 2000, XP, Vista, 7, Windows Server 2008, 2008 R2, 2003, 2000

  • Recommended screen resolution: 1280×800 or higher

  • Disk space required: 40MB minimum, 1GB per monitored computer recommended

  • Cost: Free


Who’s it for?


Blackbox Security Monitor is for anyone that needs to monitor basic information/status of a particular machine on a network or monitor for other activity that might go against company policy (or other policies for that matter). If you need to monitor a users’ Web activity, which applications a user is using, what searches the user is running, this is the application for you.


What problem does it solve?


Blackbox Security Monitor simplifies the challenging task of having to monitor the activity of a machine on your network. With this tool you can watch just about anything anyone is doing on any machine - so long as you have added said machine to the monitor.


Key features



  • Monitor every program launched

  • Monitor all websites and searches

  • Monitor computer usage times

  • Monitor all emails sent as well as send/receive on Hotmail/Livemail, Yahoo, Gmail, AOL, and more

  • Monitor all keystrokes typed

  • Capture screenshots

  • Monitor all network traffic

  • Configurable alerts and warnings (received instantly or via daily summary)


What’s wrong


The biggest issue with this application is not the application (or how well it works) itself, instead, it is the slippery slope of privacy. This tool should only be used in situations where an employee is suspected of suspicious activity or if there is a policy already in place that allows certain employees to monitor what other employees are doing on their PCs. Monitoring an employee’s PC without a policy could spell serious danger for the company. So use this carefully and wisely.


Bottom line for business


If you have the policy in place and you suspect an employee of either malicious intent or wrong-doing, you will be hard-pressed to find a better tool for the job than Blackbox Security Manager. It’s incredibly easy to install and configure, and does everything you need it to do and more. Just make sure this is done with a policy that will protect the company (and your job) before you even install it.


User rating


Have you encountered or used the Blackbox Security Manager? If so, what do you think? Rate your experience and compare the results to what other TechRepublic members think. Give your own personal review in the TechRepublic Community Forums or let us know if you think we left anything out in our review.


Read our field-tested reviews of hardware and software in TechRepublic’s Product Spotlight newsletter, delivered each Thursday. We explain who would use the product and describe what problem the product is designed to solve. Automatically sign up today!


Note: There is a poll embedded within this post, please visit the site to participate in this post's poll.
"

Comentários

Postagens mais visitadas deste blog

Improve Windows Security By Closing Open Ports

Improve Windows Security By Closing Open Ports : " A standard Windows operating system has a number of ports open after installation. Some of these ports are needed for the system to function properly while others might not. These ports can pose a security risk as every open port on a system might be an entry point for a malicious user. A port basically allows communication to or from the device. Characteristics are a port number, an IP address and a protocol type. This article will give you the tools at hand to identify and evaluate the open ports on your Windows system to make a decision in the end whether they can or should be closed or left open. Software programs and tools that we will use: CurrPorts : Available for 32-bit and 64-bit editions of Windows. It is a port monitor that displays all open ports on a computer system. We will use it to identify the ports and the programs that are using them. Windows Task Manager: Also used to identify the programs and link some p

Diagnosing a Blue Screen of Death Error in Windows

Diagnosing a Blue Screen of Death Error in Windows : For many years now the famous Blue Screen of Death (BSoD) has been the ultimate indication that something disastrous has happened to make your computer die, but how useful is the information in the BSoD and the respective crash dump file that Windows produces? The best article I ever found explaining the BSoD in depth is here on the Microsoft website, however it’s quite technical and doesn’t discuss how to actually troubleshoot a problem. The crash dump file is just technical details of what was being held in the computer’s memory at the time of the crash, and this will include details on every driver and service that was loaded, and every piece of software that was running. The most useful pieces of information are to be found on the BSoD itself and are highlighted on the screenshot below. These are the BSoD error name, the stop error code and the name of the driver or service that has failed (this last one might not always appea

Use BGInfo to Build a Database of System Information of Your Network Computers

Use BGInfo to Build a Database of System Information of Your Network Computers : " One of the more popular tools of the Sysinternals suite among system administrators is BGInfo which tacks real-time system information to your desktop wallpaper when you first login. For obvious reasons, having information such as system memory, available hard drive space and system up time (among others) right in front of you is very convenient when you are managing several systems. A little known feature about this handy utility is the ability to have system information automatically saved to a SQL database or some other data file. With a few minutes of setup work you can easily configure BGInfo to record system information of all your network computers in a centralized storage location. You can then use this data to monitor or report on these systems however you see fit. BGInfo Setup If you are familiar with BGInfo, you can skip this section. However, if you have never used this tool, it takes ju