Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.



A Human-centric Approach to Operational Awareness and Risk Management.

Insider Risk Insights - DTEX Blog
  • Home
  • Press
  • Dtex Systems Named Winner in the 14th Annual Info Security Product Guide’s 2018 Global Excellence Awards®

Dtex Systems Named Winner in the 14th Annual Info Security Product Guide’s 2018 Global Excellence Awards®

Company’s Advanced Enterprise DMAP Intelligence Platform Recognized for Cybersecurity Innovation

SAN JOSE, California – Mar. 23, 2018 – Dtex Systems™, a leader in user behavior intelligence and insider threat detection, announced today Info Security Products Guide has named the Dtex Advanced Enterprise DMAP Intelligence Platform as the gold winner in the “Product or Service Excellence of the Year – Endpoint Security” and the silver winner of the “Best Security Company of the Year – Software (100-499 employees).” These prestigious global awards, put on by the industry’s leading information security research and advisory guide, recognize security and IT vendors with ground-breaking products and solutions that set the bar in security technology.

“We are honored to be recognized by Info Security Products Guide as it validates the hard work the entire Dtex team has put into our technology,” said Christy Wyatt, CEO at Dtex. “It is clear that insiders pose the greatest threat to modern enterprise organizations. We are laser focused on delivering clear, near real-time visibility and actionable intelligence from the source closest to the user itself –the endpoint. We will continue to develop the advanced capabilities needed to identify and mitigate the major security challenges plaguing companies around the globe.”

As a pioneer in insider threat detection, Dtex understands the wide range of insider threat types — including negligent users, malicious actors and outside infiltrators — and is tuned to pinpoint them with greater accuracy than legacy enterprise security vendors without compromising user privacy or productivity. With the industry’s most comprehensive library of hundreds of known user threat behavior patterns — enhanced with advanced risk modeling and combined risk scoring — the Dtex Advanced Enterprise DMAP Intelligence Platform can identify abnormal user behavior and provide contextual insights that help inform action.

Over the last year, the company has reached several milestones, including:

Expansion into the APAC region with a new regional headquarters in Canberra, Australia, as well as the opening of two Centres of Excellence in the country – an R&D Centre in Adelaide and a Customer Command Centre in Canberra.Establishing strategic partnerships with leading global service providers and channel partners such as Carahsoft, Delv and Fujitsu.Delivering enterprise wide security projects for some of the largest organizations across verticals to provide executives and teams across the business with actionable business intelligence that helps protect company IP and reduce costs.

In June, the company announced the addition of several new notable features and capabilities to its platform, including:

Anonymization capabilities that help enterprises worldwide comply with GDPR and other stringent regulatory policies.A new software package that can be easily installed onto existing operating systems that allows for more control and compliance in highly regulated environments.Advanced data classification techniques to generate accurate and intelligent metadata that enables faster and comprehensive analytics for detecting complex user behavior.Additional scalability, which increases the number of endpoints supported by a single Dtex Analytics Server.

About Dtex Systems

Dtex Systems arms enterprises across the globe with revolutionary technology to protect against user threats, data breaches, and outsider infiltration. As the only solution combining unparalleled endpoint visibility with advanced analytics, Dtex is able to pinpoint threats with greater accuracy than traditional security methods without adversely impacting user productivity. To learn more, visit