Join our panel during Black Hat 2024 – Blurred Lines: Investigating the Convergence of Internal and External Threats


Protect Personal Health Information

Protect PHI from accidental loss and insider threats

48 percent of breaches in the Healthcare sector attributed to internal threat actors

Healthcare information, including diagnostic codes, medical records and billing information, is among the most sensitive personal data of all.  It is also an attractive target for hackers looking to defraud insurance companies, commit identity theft, or blackmail individuals.  DTEX InTERCEPT stops attacks early by analyzing all activities with data to identify ‘Indicators of Intent,’ long before data can be exfiltrated.

Read Insider Threat eBrief

Unfettered access to data is critical to practitioners

So is protecting that data

DTEX InTERCEPT understands the context of the user, the data, and the actions taken to identify suspicious and malicious activity before data is lost.  Because it operates at the endpoint, DTEX InTERCEPT provides visibility to all actions taken by all users, even privileged users like system administrators. It simplifies compliance with HIPAA, PIPEDA, and GDPR by maintaining evidentiary quality forensic logs of all actions taken on all data.

Read ebook Now

Protecting Data and User Privacy

Protecting sensitive data is important.

DTEX InTERCEPT protects against insider threats while protecting user privacy.  Raw data fields, including username, email, IP address, domain name and device name, are tokenized.  When evidence indicates a threat, select privileged DTEX users can de-anonymize user identities for investigations.

Learn More

The Latest On Workforce Cyber Intelligence


Protect & Respect: 7 Endpoint DLP Capabilities that Empower the Virtual Workforce

How do you protect your organization against data loss, while enabling your workforce to be productive and showing respect for…

Read More
DTEX Insider Threat Mitigation Guide resource

E-books, Solution Briefs

DTEX Insider Threat Mitigation Guide

Guidelines for evaluating Insider Threat Mitigation technology solutions and considerations for building an effective Insider Threat Detection and Response Program…

Read More

White Papers

SANS Product Review: Smart Enterprise Visibility with DTEX InTERCEPT

Download this report from SANS for an assessment of how DTEX InTERCEPT can help your organization achieve its security objectives.

Read More

Put Workforce Cyber Intelligence to work for you.

Start a free trial of DTEX and experience how you can secure and optimize your organization.