Stop malicious insider attacks
All government agencies are required to implement measures to detect indicators of insider threat behavior on any device accessing U.S. Government systems. DTEX improves on a Zero Trust (ZT) security model by surfacing behavioral indicators of intent from individuals with permissions on the inside. Get full context of user actions to defend ZT policies.
Use Focused Observation when mandated
The National Insider Threat Task Force (NITTF) and the Committee on National Security Systems (CNSS) require minimum measures for User Activity Monitoring (UAM) on all classified networks. When more extensive monitoring is needed to capture behavioral metadata, DTEX provides a range of focused observation and forensic investigation capabilities for deeper insights These include screen capture capabilities, trigger initiated focused observation, timestamp alignment to audit trail, and replay and export capability.
Achieve compliance in days
The rise of insider incidents within the public sector has made reaching, maintaining, and proving compliance more important than ever. DTEX satisfies these important mandates, demonstrating operational compliance and closing gaps within a matter of days:
-Executive Order 13587
-CNSS Directive 504
-NITTF UAM Requirements
-Infosec Registered Assessors Program (IRAP – Australia)
-SOC 2 Type II
Critical featuresfor the public sector
Simplify the security stack and gain the visibility needed to identify risks earlier.
Dynamic Risk Scores
Analyze and baseline user behavior by role, department and geography and creates dynamic risk scores to accurately identify deviations.
Complete Data File Lineage
Full history of every file – in use, in motion, and at rest – on and off network to understand all content usage and modifications.
Inferred File Sensitivity & Classification
Data sensitivity algorithms apply classification labels and address content creator behavior to reinforce data labeling.
GenAI Tool Use
HTTP inspection capabilities detect interactions with generative AI chat sites to stop unauthorized sharing of sensitive information.
AI-driven Investigations
Guided investigations answer questions about who is risky and most importantly, why. This is key because the ‘why’ helps determine an appropriate response.
One-click Reporting
Insight into business risk with executive and analyst reports that include recommendations to avoid data loss events. Technical details are summarized graphically for clear understanding of key take aways and immediate action.
Government Agency Overcomes Alert Fatigue with Behavioral Context
See how one agency leveraged DTEX continuous user risk scoring to better monitor for data leaks. The DTEX off-the-shelf advanced detection rules and use cases offered quick, actionable insights and reduced alert fatigue.
Interested in Learning More?
Subscribe today to stay informed and get regular updates from DTEX