DTEX Delivers Behavioral DLP and Human Forensic Telemetry for CrowdStrike Falcon Customers. READ MORE.

Insider Intelligence & Investigations

DTEX I3 works side by side with customers to respond to our platform’s findings, identify internal risks, evaluate their severity and ultimately protect from malicious, negligent and compromised users while preventing data loss. The founding members of DTEX I3 bring a combined 100+ years of experience in advanced insider threat and data loss research, analysis and hunting from notable companies, including Deloitte, Raytheon, Symantec, Sophos and more.

Download the DTEX I3 Solution Brief to learn more about the full set of Insider Risk Services.

Download Now

Counter-Insider Risk Research & Thought Leadership  

DTEX I3 brings together experienced behavioral researchers, consultants and an elite team of insider threat investigators to create an intelligence-driven, investigationready capability. The team publishes counter-insider threat research as blogs, quarterly digests and in-depth reports focused on human behaviors to help business leaders, security practitioners and regulatory bodies better understand, design, deploy and manage workforce cyber intelligence and security initiatives. 

Read DTEX I3’s latest research with the Ponemon Institute.

Download Now

Insider Risk Management-as-a-Service  

DTEX I3 IRM-as-a-Service is a subscription-based consultancy offering that provides mid-size enterprises and SLED organizations with 24x7x365 Insider Risk Detection and Mitigation support utilizing the DTEX InTERCEPT Workforce Cyber Security Platform. DTEX team members perform continuous insider risk, data loss vector and user compromise monitoring and protection.   Learn more about DTEX InTERCEPT and IRM as-a-Service.

Watch

The latest on Workforce Cyber Intelligence

Reports

2020 Insider Threat Report

How 2020 changes employee behavior and put enterprises on high alert.

Learn More

Reports

2021 State of Workforce Privacy & Risk Report

Organizations are struggling to balance workforce privacy against the need to monitor employees to reduce workforce risk.

Learn More

Blog

The Facebook Whistleblower and the Insider Threat Kill Chain

The reverberations from Facebook whistleblower Frances Haugen’s campaign will be felt for months to come. While the focus needs to be on the degree of transparency of the company’s internal research on the risks posed by the social network, it’s worth examining this story from an insider threat perspective.

Learn More

Blog

Stories from the Field - Kaseya Revil Ransomware Attacks

In this post, we’ll dive into the details of how we worked to respond to the Kaseya REvil ransomware attacks, and the specific steps my team and I took to help our customers boost their defenses.

Learn More

Blog

DTEX C-Int Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices

Cryptocurrency has garnered a significant amount of attention over the past year, as there’s been an evolution from it being an unfamiliar and highly scrutinized digital payment method to a serious investment opportunity for even the world’s most savvy investors.

Learn More

Blog

Insider Threat Advisory: NCSC Issues Updated Guidance for US Critical Infrastructure Entities

On Wednesday, March 23rd the National Counter-Intelligence and Security Center (NCSC) issued updated insider threat mitigation guidelines for all United States Critical Infrastructure entities.

Learn More
Working at home with family

Blog

Smile, You're on Camera! Lack of User Behavior Monitoring Leaves Verkada Exposed

The recent breach of Silicon Valley start-up Verkada by the hacker collective APT 69420 using an administrative account feels like Groundhog Day. Certainly, the fact that a username and password for an administrator account was available on the internet is a huge problem.

Learn More

Put Workforce Cyber Intelligence to work for you.

Start a free trial of DTEX and experience how you can secure and optimize your organization.