Dtex's Intercept Next-Gen Insider Threat Platform stops insider threats before they happen, at enterprise scale.


Lightweight Metadata Collectors

Near-zero performance impact to endpoint/network
(<0.5% CPU, 3 - 4MB per endpoint per day)

On and Off Network

Offers continuous visibility both on and off the corporate network

Multi-Platform Support

Windows, macOS, Linux | Laptops, Desktops, Servers | Virtual Environments (VDI, Citrix)


Real-Time Streaming Analytics

Distributed NoSQL database with streaming analytics for real-time analysis, visualization and search.

Cloud Ready

Secure, high availability cloud deployments with auto-scaling.

Scalability Across the Enterprise

Flat-file architecture, scalable to hundreds of thousands of endpoints.

Deployment is seamless and identifies risky behavior enterprise-wide - not just for POIs - in just hours.

Here’s how deployment of the Dtex Intercept Next-Gen Insider Threat Platform works:

First Hour

Dtex Intercept is installed on your network or in the cloud and deployed to your endpoints.

First Day

The Next-Gen Insider Threat Platform begins alerting your team to high-risk user activity based on patent-pending DMAP+ Technology.

First Month

The Platform hones behavioral baselines using machine learning, building a stronger understanding of what normal vs. anomalous behavior looks like for each user.


Expert Dtex analysts help you with ongoing tuning, investigations, and alert triage.

Learn More About How Dtex Intercept Next-Gen Insider Threat Platform Secures Your Business


Dtex Announces $17.5M in Funding! Read the news!

Dtex Announces $17.5M in New Funding! Read More!