Expand the scope and protection of Microsoft 365 E5
Through enhanced integration with the Microsoft Defender suite, DTEX InTERCEPT delivers behavioral indicators of intent to detect and capture intentional data loss attempts. DTEX stops intellectual property theft by pinpointing human behavior attribution and identifying associated malware root cause to prevent the use and misuse of unsanctioned and sanctioned SaaS applications.
Data Classification and IP Protection for the Modern Enterprise
DTEX InTERCEPT extends the Microsoft Purview Information Protection data classification capabilities with policy templates and multi-factor data sensitivity algorithms to identify the precursors associated with intentional data loss incidents. Protect non-regulated intellectual property such as source code, design documentation and other unregulated data types and formats.
Track Access to SaaS Apps to Detect Anomalies in Real Time
DTEX InTERCEPT extends Microsoft Defender for Cloud Apps’ powerful identity access management capabilities to include the continuous profiling of endpoint access to all web-based resources. Detect suspicious SaaS-based uploads and anomalous behavior in real time occurring across Windows, macOS, Linux, Citrix, VMWare, and other cloud-based environments.
Critical featuresfor a proactive security strategy
Simplify the security stack and gain the visibility needed to stop data leaks.
Dynamic Risk Scores
Analyze and baseline user behavior by role, department and geography and creates dynamic risk scores to accurately identify deviations.
Complete Data File Lineage
Full history of every file – in use, in motion, and at rest – on and off network to understand all content usage and modifications.
AI Driven Investigations
Guided investigations answer questions about who is risky and most importantly, why. This is key because the ‘why’ helps determine an appropriate response.
Pseudonymization
Tokenize PII across raw data fields through DTEX patented Pseudonymization™, ensuring that DTEX can operate even under some of the strictest privacy regulations in the world.
Teachable Moments
Differentiate user intent so appropriate action is taken. Careless users can be addressed with training while malicious and compromised accounts can be blocked from doing damage.
One-click Reporting
Insight into business risk with executive and analyst reports that include recommendations to avoid data loss events. Technical detail is summarized graphically for key take aways.
DTEX Insider Threat Kill Chain
Understanding the detailed steps taken during an insider attack plays a big part in preventing a data loss incident, enabling organizations to identify issues before an insider risk turns into an insider threat.