Overview

Dtex helps eliminate insider threat. It can catch breaches and stop data theft with answers you can’t get anywhere else. Dtex helps catch outside infiltrators who may be targeting vulnerable users inside an organizationby preventing unusual data aggregation and privilege escalation. It finds malicious insiders and prevents them from stealing valuable data by showing you when your security controls are being bypassed. Dtex also helps protect organizations from negligent insiders by keeping data safe — both on and off the network — without restricting employees’ productivity or violating their privacy.

Products

Dtex Advanced User Behavior Intelligence Platform

The Dtex Advanced User Behavior Intelligence Platform combines technology, intelligence, and services to provide cutting-edge protection from user threats. With the platform, you can:

  • Prevent unusual data aggregation
  • Detect privilege escalation
  • See lateral movement tools
  • Detect ransomware
  • Stop data exfiltration and offline risky user behavior
  • See when security controls are misconfigured or bypassed
  • Find employees who are using equipment for illegal activities

It features:

  • Ultra-lightweight endpoint data collector
  • Advanced user behavior analytics
  • Privacy compliance
  • Thousands of known bad behavior patterns
  • Targeted alerts dashboard
  • Full integration with SIEM
  • Expert analysts and threat assessments

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- June 17, 2017


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: June 17, 2017

CMAS

Contract # CMAS 3-12-70-2247E Term: through September 30, 2017

Ohio State Contract- 534354

Contract # 534354 Term: June 17, 2017

VASCUPP

Contract Number: UVA1482501 Contract Term: May 2, 2014– June 17, 2017


Events

Archived Events

No archived events found

Resources

Insider threats can come from just about any angle, so that means you don’t just need visibility, you also need to know where to look. While the Dtex micro-agent provides the visibility, the Dtex Insider Threat Risk Model lets you know where you should be looking first.

You already know all about the insider threat and how catastrophic it can be. But how do you protect yourself? Dtex is your answer.

As a company that’s been fighting insider threat for 15 years, our investigations have uncovered commonalities in insider behavior regardless of industry or company size. Whether it’s a malicious insider or an external actor who has compromised an insider’s credentials, we tend to see insider ...

These are some of the top findings from the 2016 Costs of Insider Threats Report, which was created in partnership with the Ponemon Institute.

On March 18, 2016, the SANS Industrial Control Systems team and the Electricity Information Sharing and Analysis Center (E-ISAC) jointly published “Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case.” The report provides a consolidated list of the technical components use...

Dtex gives you the data and the visibility that you can't get anywhere else. Here's how it works, from end-to-end.

Enterprises of all shapes and sizes are taking a fresh look at their insider threat programs. As a company that’s been in the insider threat space for over 10 years, Dtex sees a number of trends converging that are making insider threat a top area of concern for CIOs and CISOs.

Insider threats can come from just about any angle. To stop them, the right solution needs to take an intelligent, user-centric approach. Dtex combines unique endpoint visibility with actionable analytics to find, target, and identify insider threats with unprecedented accuracy. Here's how Dtex work...

Manufacturing companies have troves of sensitive, valuable information. Security professionals responsible for protecting this data realize that they cannot afford to take risks – and that even the best security tools leave gaps that only endpoint visibility can fill.

The report reveals key security trends driven by malicious and negligent insiders that include a cross section of employees, contractors and partners with access to company endpoints, data and applications. Among the most alarming discoveries was that 95 percent of assessments revealed employees wer...