Splunk & DTEX Partner to Deliver Noise-free Human Telemetry to the SOC. READ THE NEWS HERE.


Don't forget to mix in some career-shaping wisdom as you make time for golf, beach trips and barbecues.
Join us all summer long for a series of exclusive, highly interactive seminars with thought leaders in
Industrial & Social Espionage, Privacy & Risk, Cyber Security Operations & Intelligence,
People-Centric DLP, NGAV & Forensics and Regulatory Compliance.

  • Home
  • Summer Briefing Series - J2 Software


The DTEX Virtual Summer Briefing Series brings you exclusive, emerging data, methodologies and best practices for preventing data loss, protecting employees against compromise, identifying malicious insiders and driving efficient and effective cyber security operations.


Plugging the Holes in NGAV: Why Data and Users Matter

August 26, 2021 @ 11:30 am EDT / 8:30 am PDT

Next-Gen Anti-Virus technology has greatly improved every organization’s ability to detect, identify and stop malware from infecting their endpoints, servers and networks. The efficacy of legacy solutions is undebatable. So why are we continuing to hear about continued data breaches? Join DTEX Chief Customer Success Officer Rajan Koo and DTEX customer Stephen Seljan, Security Operations Manager at Equinix, to learn how they are super-charging their NGAV tool with behavioral DLP and human activity forensics.


September 9, 2021 @ 11:30 am EDT / 8:30 am PDT

How to Ace OCC Audits: A Global Bank’s Success Story


Thursday, July 15 @ 12 pm EDT / 5 pm UK

The 2021 State of Workforce Privacy & Risk Report with the Ponemon Institute

View On Demand

July 29, 2021 @ 11:30 am EDT / 8:30 am PDT

Optimizing the SOC with Zero Trust & Insider Threat Intelligence

View On Demand



Discover the missing link for holistic, automated cybersecurity and IT operations.

Take an interactive platform tour to learn how DTEX delivers human behavioral intelligence to enrich SOC workflows and response, augment NGAV with people-centric DLP and forensics, proactively mitigate insider threats and identify operational inefficiencies.