Dtex's Intercept Next-Gen Insider Threat Platform stops insider threats before they happen, at enterprise scale.
Lightweight Metadata Collectors
Near-zero performance impact to endpoint/network
(<0.5% CPU, 3 - 4MB per endpoint per day)
On and Off Network
Offers continuous visibility both on and off the corporate network
Windows, macOS, Linux | Laptops, Desktops, Servers | Virtual Environments (VDI, Citrix)
Real-Time Streaming Analytics
Distributed NoSQL database with streaming analytics for real-time analysis, visualization and search.
Secure, high availability cloud deployments with auto-scaling.
Scalability Across the Enterprise
Flat-file architecture, scalable to hundreds of thousands of endpoints.
Deployment is seamless and identifies risky behavior enterprise-wide - not just for POIs - in just hours.
Here’s how deployment of the Dtex Intercept Next-Gen Insider Threat Platform works:
Dtex Intercept is installed on your network or in the cloud and deployed to your endpoints.
The Next-Gen Insider Threat Platform begins alerting your team to high-risk user activity based on patent-pending DMAP+ Technology.
The Platform hones behavioral baselines using machine learning, building a stronger understanding of what normal vs. anomalous behavior looks like for each user.
Expert Dtex analysts help you with ongoing tuning, investigations, and alert triage.