Additional Info

CompanyDTEX Systems
Company size (employees)100 to 499
Headquarters RegionNorth America
Type of solutionSoftware


The transition towards remote working has accelerated the end of corporate perimeter-centric security, illuminating the shortcomings of legacy insider threat solutions. As enterprises struggle to strike the delicate balance between security and privacy in this new era of work, DTEX has seen growing demand for its first-of-its-kind Workforce Cyber Intelligence and Security solution.

DTEX InTERCEPT™ offers an innovative approach to data collection and analysis that centers around human activity and intent, providing organizations with the context needed to answer the Who, What, When, Where and How related to any potential insider threat situation. DTEX uses a privacy-first metadata approach to capture and synthesize hundreds of unique elements of behavioral telemetry from data, machines, applications and people to produce dynamic ‘Indicators of Intent’ and deliver holistic, real-time awareness around an organization’s activities without invading the personal privacy of employees.

Significant technology innovations in 2022 include enhancements to DTEX InTERCEPT™ for Insider Risk and DTEX InTERCEPT™ for Behavioral DLP, the industry’s first and only Zero Trust ‘People-Centric’ Endpoint DLP product. Additionally, DTEX introduced a new module fully compliant with NITTF minimum requirements for UAM and CNSSD 504.

DTEX achieved significant ecosystem expansion through new strategic partnerships including a public-private research and technology partnership with MITRE to deliver MITRE Inside-R PROTECT and a strategic partnership with GuidePoint Security to provide human-centric insider threat intelligence and security solutions. Additionally, several globally recognized organizations selected DTEX as their vendor partner of choice to mitigate insider risk in 2022. DTEX closed out 2022 with the launch of its enhanced Global Partner Program.

Finally, DTEX released its groundbreaking 2022 Insider Risk Report, which drew directly from real investigations and data collected by the DTEX i3 team. This study uncovered key industry trends, including the emergence of a fourth insider threat persona – the ‘Super Malicious Insider.’

How we are different

DTEX InTERCEPT™ extends beyond the capabilities of existing insider threat solutions in the following key areas:
- Privacy-compliant: The transition towards remote working has accelerated the end of corporate perimeter-centric security, illuminating the shortcomings of legacy insider threat solutions. This dynamic operating environment requires more than firewalls, EDR, NDR and SIEM tools to keep data secure and employees safe. Unlike first-generation Insider Threat platforms, DTEX InTERCEPT is the first and only human-centric threat intelligence platform. With its privacy-first metadata approach, DTEX uses data pseudonymization to create a full audit trail that provides insight into every step of the insider threat kill chain without the use of invasive surveillance employee mechanisms such as screen capture, keylogging, camera control or content inspection.
- Lightweight Metadata Collection at the Source: InTERCEPT’s metadata collection model uses a lightweight agent to continuously collect hundreds of unique elements of enterprise telemetry from data, machines, applications, and people. DTEX synthesizes this metadata to baseline user/device activity to identify suspicious events based upon anomalies for an individual user, departments, and the corporation, eliminating false positives and enabling earlier identification of risks and trends. Instead of taking days or weeks collating information from disparate systems only to find insufficient evidence, InTERCEPT provides the context an analyst needs to escalate and remediate an event within minutes.
- Cloud-native: DTEX InTERCEPT™’s cloud-native platform is delivering more value at a lower cost with proven near-zero impact to endpoints and the network, ensuring that the organization can focus on the actionable outputs rather than the scalability issues, configuration and maintenance overhead, and spiraling deployment and services costs commonly associated with tradition endpoint DLP, NGAV, IAM, and UEBA solutions.