Overview

Dtex helps eliminate insider threat. It can catch breaches and stop data theft with answers you can’t get anywhere else. Dtex helps catch outside infiltrators who may be targeting vulnerable users inside an organizationby preventing unusual data aggregation and privilege escalation. It finds malicious insiders and prevents them from stealing valuable data by showing you when your security controls are being bypassed. Dtex also helps protect organizations from negligent insiders by keeping data safe — both on and off the network — without restricting employees’ productivity or violating their privacy.

Products

Dtex Advanced User Behavior Intelligence Platform

The Dtex Advanced User Behavior Intelligence Platform combines technology, intelligence, and services to provide cutting-edge protection from user threats. With the platform, you can:

  • Prevent unusual data aggregation
  • Detect privilege escalation
  • See lateral movement tools
  • Detect ransomware
  • Stop data exfiltration and offline risky user behavior
  • See when security controls are misconfigured or bypassed
  • Find employees who are using equipment for illegal activities

It features:

  • Ultra-lightweight endpoint data collector
  • Advanced user behavior analytics
  • Privacy compliance
  • Thousands of known bad behavior patterns
  • Targeted alerts dashboard
  • Full integration with SIEM
  • Expert analysts and threat assessments

Resources

Insider threats can come from just about any angle, so that means you don’t just need visibility, you also need to know where to look. While the Dtex micro-agent provides the visibility, the Dtex Insider Threat Risk Model lets you know where you should be looking first.

You already know all about the insider threat and how catastrophic it can be. But how do you protect yourself? Dtex is your answer.

As a company that’s been fighting insider threat for 15 years, our investigations have uncovered commonalities in insider behavior regardless of industry or company size. Whether it’s a malicious insider or an external actor who has compromised an insider’s credentials, we tend to see insider ...

These are some of the top findings from the 2016 Costs of Insider Threats Report, which was created in partnership with the Ponemon Institute.

On March 18, 2016, the SANS Industrial Control Systems team and the Electricity Information Sharing and Analysis Center (E-ISAC) jointly published “Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case.” The report provides a consolidated list of the technical components use...

Dtex gives you the data and the visibility that you can't get anywhere else. Here's how it works, from end-to-end.

Enterprises of all shapes and sizes are taking a fresh look at their insider threat programs. As a company that’s been in the insider threat space for over 10 years, Dtex sees a number of trends converging that are making insider threat a top area of concern for CIOs and CISOs.

Insider threats can come from just about any angle. To stop them, the right solution needs to take an intelligent, user-centric approach. Dtex combines unique endpoint visibility with actionable analytics to find, target, and identify insider threats with unprecedented accuracy. Here's how Dtex work...

Manufacturing companies have troves of sensitive, valuable information. Security professionals responsible for protecting this data realize that they cannot afford to take risks – and that even the best security tools leave gaps that only endpoint visibility can fill.

Insider threat is increasingly taking center stage with security teams, and for good reason. Despite heavy investments in perimeter security, breaches are still on the rise. As workforces become more dynamic and distributed, security teams are actually finding their existing visibility and controls ...