Protect against insider threats
and foreign interference

All government agencies are required to implement measures to detect indicators of insider threat behavior on any device accessing U.S. Government information. DTEX improves on a Zero Trust security model by surfacing behavioral indicators of intent from individuals with permissions on the inside, defending ZT policies while keeping agencies left of boom.

The National Insider Threat Task Force and the Committee on National Security Systems require minimum measures for User Activity Monitoring (UAM) on all classified networks. When more extensive monitoring is needed to capture behavioral metadata, DTEX provides a range of focused observation and forensic investigation capabilities for deeper insights These include screen capture capabilities, trigger initiated focused observation, timestamp alignment to audit trail, and replay and export capability.

The rise of insider incidents within the public sector has made reaching, maintaining, and proving compliance more important than ever. DTEX satisfies the most important mandates, demonstrating operational compliance within a matter of days:
-EO 13587
-Committee on National Security Systems Directive (CNSSD) 504
-National Insider Threat Task Force (NITTF) UAM Requirements
-Infosec Registered Assessors Program (IRAP – Australia)
-SOC 2 Type II

The technologies behind DTEX and its offerings are exactly what the Federal Government needs when it comes to putting exceptional security processes in place for insider risk management.”

Tom McAndrewCEO, Coalfire