WORKFORCE CYBER
INTELLLIGENCE
RESOURCES
A Human-Centric Approach to Operational Awareness and Risk Management
THE LATEST ON WORKFORCE CYBER INTELLIGENCE
DTEX Predictive Endpoint Data Loss Prevention
Intellectual property, trade secrets and sensitive data are highly sought after by external adversaries as well as malicious insiders.
READ MOREDTEX and User & Entity Behavior Analytics
Find out how DTEX replaces legacy UEBA tools to strengthen your Insider Risk Management program.
Read MoreWhat is Next-Gen Insider Threat Management
Watch NowVicTrack Protects People and Data with DTEX Systems
A look into how VicTrack uses DTEX InTERCEPT to improve the security of the organization.
Watch NowOur Partnership with the Australian Cyber Collaboration Centre (A3C)
Learn about our partnership with the Australian Cyber Collaboration Centre.
Watch NowSANS Product Review: Smart Enterprise Visibility with DTEX InTERCEPT
Download this report from SANS for an assessment of how DTEX InTERCEPT can help your organization achieve its security objectives.
DownloadProtecting Trusted Insiders: How an Energy Company Mitigated a Targeted Phishing Attack
How DTEX helped a large energy organization identify, understand and mitigate a targeted phishing attack.
Read MoreStop Insider Threats Like Roger
An in depth look at how DTEX protects your business from within.
Watch NowInsider Threat Protection for the Modern Enterprise
Legacy Insider Threat platforms rely on ‘person of interest’ identification and require time-consuming, full-time analyst interaction.
READ MORE10 Tips to Strengthen Your Insider Threat Program
Get the right data. It's not enough to have a lot of data. You need data specifically tailored to detecting…
Read MoreThe Insider Threat Kill Chain
DTEX analysts have identified the five steps present in nearly all insider attacks, known as the Insider Threat Kill Chain.
Read MoreHow a National Telecom Company Used DTEX to Build a Data Lineage Program and Solve More Problems with Less Noise
After several failed attempts with other tools, this customer chose DTEX to detect insider threats and establish a data lineage…
Read More