Meet Ai3, the DTEX Risk Assistant. Fast-track effective insider risk management with guided investigations.

WORKFORCE CYBER
INTELLLIGENCE

RESOURCES

A Human-Centric Approach to Operational Awareness and Risk Management

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

Solution Briefs

DTEX Predictive Endpoint Data Loss Prevention

Intellectual property, trade secrets and sensitive data are highly sought after by external adversaries as well as malicious insiders.

READ MORE

Solution Briefs

DTEX and User & Entity Behavior Analytics

Find out how DTEX replaces legacy UEBA tools to strengthen your Insider Risk Management program.

Read More

Videos

What is Next-Gen Insider Threat Management

Watch Now

Case Studies, Videos

VicTrack Protects People and Data with DTEX Systems

A look into how VicTrack uses DTEX InTERCEPT to improve the security of the organization.

Watch Now

Videos

Our Partnership with the Australian Cyber Collaboration Centre (A3C)

Learn about our partnership with the Australian Cyber Collaboration Centre.

Watch Now

White Papers

SANS Product Review: Smart Enterprise Visibility with DTEX InTERCEPT

Download this report from SANS for an assessment of how DTEX InTERCEPT can help your organization achieve its security objectives.

Download
Energy company case study insider risk management

Case Studies

Protecting Trusted Insiders: How an Energy Company Mitigated a Targeted Phishing Attack

How DTEX helped a large energy organization identify, understand and mitigate a targeted phishing attack.

Read More

Videos

Stop Insider Threats Like Roger

An in depth look at how DTEX protects your business from within.

Watch Now
MITRE and DTEX partnership announcement woman at computer insider threat

Solution Briefs

Insider Threat Protection for the Modern Enterprise

Legacy Insider Threat platforms rely on ‘person of interest’ identification and require time-consuming, full-time analyst interaction.

READ MORE

E-books

10 Tips to Strengthen Your Insider Threat Program

Get the right data. It's not enough to have a lot of data. You need data specifically tailored to detecting…

Read More
case study dtex provides visibility and context

E-books

The Insider Threat Kill Chain

DTEX analysts have identified the five steps present in nearly all insider attacks, known as the Insider Threat Kill Chain.

Read More
Telecommunications case study for insider risk management

Case Studies

How a National Telecom Company Used DTEX to Build a Data Lineage Program and Solve More Problems with Less Noise

After several failed attempts with other tools, this customer chose DTEX to detect insider threats and establish a data lineage…

Read More