Dtex helps eliminate insider threat. It can catch breaches and stop data theft with answers you can’t get anywhere else. Dtex helps catch outside infiltrators who may be targeting vulnerable users inside an organizationby preventing unusual data aggregation and privilege escalation. It finds malicious insiders and prevents them from stealing valuable data by showing you when your security controls are being bypassed. Dtex also helps protect organizations from negligent insiders by keeping data safe — both on and off the network — without restricting employees’ productivity or violating their privacy.


Dtex Advanced User Behavior Intelligence Platform

The Dtex Advanced User Behavior Intelligence Platform combines technology, intelligence, and services to provide cutting-edge protection from user threats. With the platform, you can:

  • Prevent unusual data aggregation
  • Detect privilege escalation
  • See lateral movement tools
  • Detect ransomware
  • Stop data exfiltration and offline risky user behavior
  • See when security controls are misconfigured or bypassed
  • Find employees who are using equipment for illegal activities

It features:

  • Ultra-lightweight endpoint data collector
  • Advanced user behavior analytics
  • Privacy compliance
  • Thousands of known bad behavior patterns
  • Targeted alerts dashboard
  • Full integration with SIEM
  • Expert analysts and threat assessments


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021


Contract Number: UVA1482501 Contract Term: May 2, 2014– December 19, 2021


Archived Events


Latest News

Dtex Systems™, a leading insider threat detection provider, today announced that it has signed a partner agreement with Carahsoft Technology Corp., the trusted government IT solutions provider and a ...



Insider threats are a growing concern for defense organizations around the world, especially in the wake of high-profile insider breaches like the infamous data theft by Edward Snowden. Dtex's User Behavior Intelligence gives defense organizations the cornerstone tool they need in order to detect an...

The advent of distributed teams, cloud applications, and porous perimeters make today's enterprise harder to protect than ever. The Dtex User Threat Platform combines privacy-conscious endpoint visibility with advanced analytics to protect companies from their greatest security vulnerability: the us...

Dtex was built from the ground up specifically to detect insider threats. With Dtex's User Behavior Intelligence, organizations around the world are finally able to achieve actionable intelligence with context, accuracy, and genuine insights.

Industry Study

Industry Study
Dtex set out to explore the root of the insider-related security challenges facing the public sector by turning to the insiders themselves. In partnership with market research firm, YouGov, the company recently surveyed government employees with security clearance across the federal, state, and loca...


The report reveals key security trends driven by malicious and negligent insiders that include a cross section of employees, contractors and partners with access to company endpoints, data and applications. Among the most alarming discoveries was that 95 percent of assessments revealed employees wer...

On March 18, 2016, the SANS Industrial Control Systems team and the Electricity Information Sharing and Analysis Center (E-ISAC) jointly published “Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case.” The report provides a consolidated list of the technical components use...

Manufacturing companies have troves of sensitive, valuable information. Security professionals responsible for protecting this data realize that they cannot afford to take risks – and that even the best security tools leave gaps that only endpoint visibility can fill.

These are some of the top findings from the 2016 Costs of Insider Threats Report, which was created in partnership with the Ponemon Institute.

Dtex gives you the data and the visibility that you can't get anywhere else. Here's how it works, from end-to-end.

You already know all about the insider threat and how catastrophic it can be. But how do you protect yourself? Dtex is your answer.