DTEX InTERCEPT 6.5 is Now Available – Learn More

WORKFORCE CYBER
INTELLLIGENCE

RESOURCES

A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

Reports

2020 Gartner Market Guide for Insider Risk Management Solutions

Download the report to learn more and understand how DTEX InTERCEPT maps to Gartner’s recommended evaluation considerations.

Download Now

Webinar

Williams Racing & DTEX Systems: OPERATIONAL INTELLIGENCE & EMPLOYEE PRIVACY

2020 has been the year of change and adapting to a new normal. Businesses have been challenged to provide a…

Watch Now

Reports

Smart Enterprise Visibility with DTEX InTERCEPT

Download this report and learn how DTEX InTERCEPT can help your organization achieve its security objectives.

Download

Webinar

SANS - Next-Gen Insider Threat Visibility & Prevention with DTEX InTERCEPT

In this webcast, SANS instructor Matt Bromiley reviews DTEX InTERCEPT, a platform that offers holistic visibility and provides unique insight…

Watch Now

Reports

2021 Remote Workforce Security Report

Securing the remote workforce has become a critical priority for organizations affected by the closing of offices and workplaces in…

Read More

Case Studies

Case Study: Detecting a Java Backdoor

When organizations have true visibility into how users interact with data enterprise-wide, they illuminate blind spots that help them fill…

Download Now

Case Studies

Case Study: Energy and Phishing

How DTEX helped a large energy organization identify, understand and mitigate a targeted phishing attack.

Download Now

Videos

Stop Insider Threats Like Roger

An in depth look at how DTEX protects your business from within.

Play Video

Solution Brief

Data Loss Prevention Solution Brief

Traditional Endpoint Data Loss Prevention (DLP) solutions rely on intrusive, resource intensive content inspection rules.

Read More

Solution Brief

Insider Threat Management Solution Brief

Legacy Insider Threat platforms rely on ‘person of interest’ identification and require time-consuming, full-time analyst interaction.

Read More

eBooks

Insider Threat Platform Buyers Guide

How to measure and evaluate the complex landscape of insider threat solutions and build an effective insider threat program…

Read More

eBooks

10 Tips to Strengthen Your Insider Threat Program

Get the right data. Its not enough to have a lot of data. You need data specifically tailored to detecting…

Read More