1998−2016 as SpectorSoft|
2016 renamed Veriato 
Palm Beach Gardens,|
Palm Beach County, Florida
|Mike Tierney (CEO)|
|Products||User Behavior and Employee Monitoring Software|
Founded in 1998, the company was an early entrant in internet monitoring.
In 2008, private equity firms Harbourvest Partners and WestView Capital Partners invested in the company, taking a majority ownership position. SpectorSoft originally serviced both consumer and business customers, but no longer sells software for consumer or home use.
In 2012 SpectorSoft acquired the assets of Corner Bowl Software.
In 2016 the company was renamed Veriato, Inc.
Veriato Recon — a user behavior analytics solution. The software detects and alerts on anomalies related to insider threat behaviors. It also enables review of online activity of employees during the high risk exit period.
Veriato 360 — a user activity monitoring solution enabling companies to retain, review, report and alert on employee activity. Used for monitoring higher risk employees, and for incident response, it provides visibility and contextual information.
Veriato Investigator — an employee investigation solution for temporary, focused investigations. It records detailed information on employee activity, and enables exploration and playback of the recorded data.
Veriato Log Manager — provides event and security log management. Centrally monitors Windows, Unix, Linux, switches, routers, and hubs.
Veriato Server Manager — it adds application, resource, and disk monitoring to the event and log management features found in SpectorSoft Log Manager.
Awards and honors
Spector Pro was given the PC Magazine editors' choice award in a 2002 review of six computer activity monitoring tools. In 2004, version 5.0 of Spector Pro was again given the editors' choice award from a field of four programs. In 2008 Spector 360 SR3 won the PC Magazine editors' choice award. In 2004, SpectorSoft was listed for the first time as one of Inc. magazine's Top 500 fastest-growing private companies in America, at position 224. The company achieved a position on the list once again in 2005 at number 497. In 2009 SpectorSoft made the list of Inc. 5000 Companies at number 3340. In 2010 and 2011 SpectorSoft again made the Inc. Magazine 500/5000 list.
The target audiences for SpectorSoft−Veriato products are parents who want to monitor the activity of their children on the home PC and employers who want to record the activities of their employees on company-owned workstations and laptops.
Employers may choose to monitor their employees using SpectorSoft−Veriato software. There are, however, still privacy concerns over things like personal email. SpectorSoft addresses privacy issues regularly, and has a paper authorized by a leading privacy attorney available on its website.
Educators, school administrators and school districts are required to protect students from online predators (CIPA & FERPA). Most schools use blocking and filtering solutions, which may block sites needed for research or not block new sites that have not yet been included in the filtering solution. Spector 360 works with filters to provide an additional layer of protection, and also helps keep students on-task by providing teachers and technology coordinators with reports and charts that show what web sites students visit and how long they spent on each. Keyword alerts let lab instructors or IT administrators see who may be violating a school's Acceptable Use Policy (AUP).
Some SpectorSoft−Veriato tools, especially eBlaster, can be used for criminal activities, and there have been several convictions for such misuse. Spectorsoft software contains an EULA specifying that installation must only be on machines owned by the licensee and also indicating that SpectorSoft will only cooperate with law enforcement when compelled to do so.
Since SpectorSoft−Veriato software is specifically designed to be difficult to detect and remove, the tools (especially eBlaster) can be used by thieves who wish to steal credit card information, banking information, and passwords. Installation of the software can occur without the user's knowledge or permission. Spectorsoft openly advertise that their tools will record all of a user's passwords. There have been recorded cases of this happening.
Abusive parents have used SpectorSoft−Veriato software to monitor their children's internet use.
Spectorsoft has marketed its spy software to people wanting to catch their spouses cheating. However, in the face of criminal charges and negative publicity, Spectorsoft no longer markets its products to spouses. There is, however, nothing to stop a spouse from using the products illegally. For example, a man from Michigan who installed eBlaster on a partner's personal computer was charged with four felony counts, facing up to five years in prison and $19,000 in fines, and in 2013 a Texas woman filed a criminal complaint against her estranged husband for using eBlaster to spy on her Facebook and e-mail communications.
Patent Infringement case
Patent Infringement Case Helios Software LLC et al. v. SpectorSoft Corporation has concluded. In September 2014, the Court granted summary judgment of non-infringement as to the ‘571 and ‘237 Patents. In June 2015, after a five-day trial, a jury returned a verdict of no direct or indirect infringement by SpectorSoft of the ‘304 Patent, and also found several of the asserted claims of that patent invalid as both anticipated and rendered obvious by prior art (see Docket Entry No. 615 for Civ. No. 12-081-LPS).
- "Veriato Inc.: Private Company Information - Businessweek".
- "SpectorSoft Changes Name to Veriato to Reflect Growing Demand for Corporate Truth | Business Wire". businesswire.com. Retrieved 2016-04-11.
- "WestView Capital Partners". www.wvcapital.com. Retrieved 2015-07-31.
- "Monitoring Software | Computer And Internet Monitoring | SpectorSoft". spectorsoft.com. Retrieved 2015-07-31.
- "Release of SpectorSoft Server Manager Centralizes and Automates Server Monitoring, Provides Increased Systems Uptime and Simplified Compliance Reporting". www.spectorsoft.com. Retrieved 2015-07-31.
- "Veriato Recon | User Behavior Analytics | Insider Threats (formerly Spector 360 Recon)". veriato.com. Retrieved 2016-04-11.
- "Veriato 360 | Employee Monitoring | User Activity Monitoring Software (formerly Spector 360)". veriato.com. Retrieved 2016-04-11.
- "Veriato Investigator | Employee Investigation Software". veriato.com. Retrieved 2016-04-11.
- "Veriato Log Manager | Event Log Management | Security Log Management (formerly SpectorSoft Log Manager)". veriato.com. Retrieved 2016-04-11.
- "Server Manager | Server Management Software | Veriato (formerly SpectorSoft Server Manager)". veriato.com. Retrieved 2016-04-11.
- Glass, Brett (January 7, 2002). "Watching You, Watching Me – Spector Pro reviewed by PC Magazine". PC Magazine. Retrieved January 15, 2007.
Spector Pro – Editors Choice ... A descendant of the Netbus Trojan horse
- Delaney, Laura (March 8, 2004). "Monitoring Software- Reviewed by PC Magazine". PC Magazine. Retrieved January 15, 2007.
- Sarrel, Matthew (June 17, 2008). "Monitoring Software- Reviewed by PC Magazine". PC Magazine. Retrieved June 15, 2008.
- "Inc 500 2004 (ranked 224)". Inc Magazine. 2004. Retrieved January 15, 2007.
- "Inc 500 2005 (ranked 497)". Inc Magazine. 2005. Retrieved January 15, 2007.
- "Inc 5000 2009 (ranked 3314)". Inc Magazine. 2009. Retrieved September 9, 2009.
- "Spectorsoft – Press Mentions". Spectorsoft. Retrieved May 23, 2007.
- "2014 SC Awards Europe Winners". Retrieved 2015-09-16.
- "SpectorSoft Selected as Winner of Best of Interop 2014 Award in the Security Category". Reuters. 2014-04-08. Retrieved 2015-09-16.
- Bill Wallace, Jamie Fenton (November 15, 2000). "Analysis: Your PC could be watching you". CNN. Retrieved January 15, 2007.
- Thomas C Greene. "Spyware Trojan sends Hotmail to your boss". The Register. Retrieved April 11, 2007.
- "Ten Tips for Preparing an Effective Acceptable Use Policy" (PDF).
- David, Kopf (November 15, 2007). "Analysis: Illinois District Keeps an Eye on 'Net Abuse". THE Journal. Retrieved November 15, 2007.
- Spectorsoft Inc. "Spectorsoft Software License Agreement". Retrieved September 9, 2009.
- "Blaster Remote Installation Guide". Spectorsoft. Retrieved May 23, 2007.
eBlaster installs itself silently without any indication to the computer user that the installation has taken place
- "Capture Their Email Passwords". Netbus.org – (Owned by Spectorsoft). Retrieved April 12, 2007.
Passwords from any email account will be recorded, ... and all other passwords
- John Leyden (July 23, 2003). "'Online banking in SA was a time-bomb waiting to go off'". The Register. Archived from the original on June 23, 2004. Retrieved April 10, 2007.
- Potter, Ned (July 24, 2006). "Watching Your Kids Online". ABC News. Retrieved January 15, 2007.
- Cohen, Adam (July 2, 2001). "Internet Insecurity (page 6)". Time Magazine. Retrieved January 15, 2007.
- "Spouse-vs.-spouse cyberspying dangerous, possibly illegal – Network World". Network World. 2007. Retrieved October 23, 2007.
Fowler says SpectorSoft, which makes consumer and business versions of its surveillance software, three years ago stopped marketing its products as spouse-spying tools.
- Matt Bean (September 7, 2001). "Private electronic surveillance raising legal, rights questions". Court TV. Archived from the original on December 15, 2003. Retrieved April 10, 2007.
- Dillon Collier (May 16, 2013). "Wilson Co. woman says husband used computer software to spy on her". KENS-5. Retrieved June 12, 2013.
- IPspotlight files @ Wordpress.com: Legal opinion on Patent Infringement Case Helios Software LLC et al. v. SpectorSoft Corporation