Protect against insider threats
and foreign interference

All government agencies are required to implement measures to detect indicators of insider threat behavior on any device accessing U.S. Government systems. DTEX improves on a Zero Trust (ZT) security model by surfacing behavioral indicators of intent from individuals with permissions on the inside. Get full context of user actions to defend ZT policies.

The National Insider Threat Task Force (NITTF) and the Committee on National Security Systems (CNSS) require minimum measures for User Activity Monitoring (UAM) on all classified networks. When more extensive monitoring is needed to capture behavioral metadata, DTEX provides a range of focused observation and forensic investigation capabilities for deeper insights These include screen capture capabilities, trigger initiated focused observation, timestamp alignment to audit trail, and replay and export capability.

The rise of insider incidents within the public sector has made reaching, maintaining, and proving compliance more important than ever. DTEX satisfies these important mandates, demonstrating operational compliance and closing gaps within a matter of days:
-Executive Order 13587
-CNSS Directive 504
-NITTF UAM Requirements
-Infosec Registered Assessors Program (IRAP – Australia)
-SOC 2 Type II

The technologies behind DTEX and its offerings are exactly what the Federal Government needs when it comes to putting exceptional security processes in place for insider risk management.”

Tom McAndrewCEO, Coalfire