“Foreign interference and industrial espionage are a very real threat to Critical National Infrastructure organizations. Being able to detect infiltrations early in the kill chain is an essential capability which many organizations have failed to do. DTEX’s use of behavioral indicators to detect infiltrators in alignment with the MITRE ATT&CK framework will be a priority functionality for us as adversary tactics continue to evolve.”
CISO, Australian Energy Provider
SWIFT CSC Controls
By providing real-time detection and visisibility and a full audit trail of user behavior, DTEX can also help fulfill SWIFT mandatory and advisory CSC controls. Currently, a large North American financial institution uses DTEX to address SWIFT security framework requirements and detect bank fraud by deploying DTEX collectors on tens of thousands of endpoints and hundreds of servers.
National Telecom Company
This Dtex customer is a major telecommunications company based in the Asia-Pacific region. This company is currently in the middle of a large-scale publicly-funded project to upgrade the telecommunications infrastructure. Ultimately, after several failed attempts with other tools, they chose Dtex to detect insider threats and establish a data lineage program. This case study describes why, and how.
Largest Mobile Operator in the UK
Peter Erceg managed security for one of the largest mobile operatos in the UK. Here how he does it using DTEX