Additional Info

CompanyDTEX Systems
Company size (employees)100 to 499
Type of solutionSoftware


As the first and only workforce cyber intelligence platform to put humans at the center of an organization’s cybersecurity matrix, DTEX InTERCEPT offers a new approach to data collection and analysis that genuinely expresses a human’s activity and intent, providing organizations with the context needed to escalate and remediate an event before malicious insiders attack.

Workforce cyber intelligence is more important than ever in today’s digital, distributed, and remote B2B environment because the security perimeter has evaporated, raising the stakes for insider threat detection. Historically, these products/services have taken the form of “point solutions” – technologies and software developed to address specific needs related to malicious insider threats. These first-generation solutions include user activity monitoring, internal fraud and forensics, DLP, and user behavior analytics products. The biggest problem with legacy solutions, used alone, is that they rely on machine data from cyber sensors. Applications, data and machines do not update, move or change themselves – their human operators do. This muddled, noisy signal leaves visibility gaps, creates false positives, slows reaction to real threats, and does nothing to offer “left of boom” (preventive) intelligence regarding compromised credentials, targeted external attacks, or negligent user scenarios.

DTEX remains hyper-focused on helping customers strengthen their cybersecurity posture by extending beyond the capabilities of existing insider threat solutions. In 2021 the company unveiled a myriad of platform upgrades including the release of DTEX InTERCEPT 6.5, enhancements to monitor hybrid and cloud server infrastructures, and the unveiling of DTEX InTERCEPT for Critical Infrastructure Entities, which also included offering free comprehensive Insider Threat Assessments for Critical Infrastructure Entities. Its most recent enhancement, DTEX InTERCEPT for Behavioral Data Loss Prevention, followed the launch of DTEX i3, an expanded investigations and research division focused on delivering cutting-edge insider threat behavioral studies, intelligence packages and forensic investigations.

How we are different

DTEX InTERCEPT extends beyond the capabilities of existing insider threat solutions in the following key areas:
- Privacy-compliant: Today’s enterprise is distributed, mobile and dependent on a vast set of employees and consultants to operate efficiently and effectively. This dynamic operating environment requires more than firewalls, EDR, NDR and SIEM tools to keep data secure and employees safe. Unlike first-generation Insider Threat platforms, DTEX InTERCEPT is the first and only human-centric threat intelligence platform. With its privacy-first metadata approach, DTEX uses data pseudonymization to create a full audit trail that provides insight into every step of the insider threat kill chain without the use of invasive surveillance employee mechanisms such as screen capture, keylogging, camera control or content inspection.
- Lightweight Metadata Collection at the Source: InTERCEPT’s metadata collection model uses a lightweight agent to continuously collect hundreds of unique elements of enterprise telemetry from data, machines, applications and people. DTEX synthesizes this metadata to baseline user/device activity to identify suspicious events based upon anomalies for an individual user, departments, and the corporation as a whole, eliminating false positives and enabling earlier identification of risks and trends. Instead of taking days or weeks collating information from disparate systems only to find insufficient evidence, InTERCEPT provides the context an analyst needs to escalate and remediate an event within minutes.
- Cloud-native: DTEX InTERCEPT’s cloud-native platform is delivering more value at a lower cost with proven near-zero impact to endpoints and the network, ensuring that the organization can focus on the actionable outputs rather than the scalability issues, configuration and maintenance overhead and spiraling deployment and services costs commonly associated with traditional endpoint DLP and UEBA solutions.