Pricing 2017-10-05T19:02:18+00:00

Pricing & Plans

A Configuration for Every Enterprise

Plans Based on What You Need

Dtex offers a tiered set of plans to fit the specific needs of different types of enterprises. Just looking for visibility? Do you need alerts and the expertise of trained analysts? Or maybe integration is equally as important to you? No matter your priorities, Dtex has a configuration for you.

Dtex Signal Dtex Enterprise Dtex Platinum

Starting at

$2

/user/month

Request Quote Request Quote
USER VISIBILITY

Lightweight User Visibility

Record what users are doing across all of your Mac and Windows devices, physical and virtual, on or off network.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

Forensic Audit Trail

Use the full user audit trail to investigate and respond to both insider and cyber security incidents.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

Hunt

Quickly search and pivot. Easily find any user, device, process, file, IP, website, and any other user activity.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

Visualization and Dashboards

Set up charts, graphs, and dashboards to fit Dtex into your unique organizational and team workflow.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

Anonymization

Mask user identifiers in the system to protect employee privacy and comply with regulations.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

User Quarantine

If a bad actor is discovered, lock the user out immediately while still allowing remote access by your IT admins.

1476908184_checkmark-24 1476908184_checkmark-24
THREAT ANALYTICS

Expert-Trained Library with Thousands of Patterns

Get the combined knowledge of hundreds of investigations as out-of-the-box patterns to find known malicious activity.

1476908184_checkmark-24 1476908184_checkmark-24

Automatic Baselining and Anomaly Detection

Get alerts when users do something highly unusual compared to their own behavior or the organization’s behavior.

1476908184_checkmark-24 1476908184_checkmark-24

Data Exfiltration Analytics

Detect attacks like advanced data theft, obfuscation, bypassing security controls, and off-network activity.

1476908184_checkmark-24 1476908184_checkmark-24

Credential Misuse Analytics

Detect user behavior that indicates a privileges user abusing their credentials, or that an account has had its credentials stolen.

1476908184_checkmark-24 1476908184_checkmark-24

Potentially Malicious Software Analytics

Detect abnormal behavior such as lateral movement, privilege escalation, and other behaviors associated with malware.

1476908184_checkmark-24 1476908184_checkmark-24

Policy Violation and Negligent Insider Analytics

Detect users who are knowingly or accidentally not following your company’s security policy.

1476908184_checkmark-24 1476908184_checkmark-24
INTEGRATION

Integrate Into Your Environment

Ingest Dtex data into other systems.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

SIEM Integration

Feed Dtex data into your SIEM system and SOC workflow to match Dtex alerts and data with other log data.

User Activity Data Activity & Alerts Full Integration

UEBA Integration

Feed Dtex data into your UEBA system to analyze Dtex visbility in the context of other log or network data.

User Activity Data Activity & Alerts Full Integration

Data Warehouse / Data Lake Integration

Feed Dtex data to your central analytics repository for analysis by your data science teams.

User Activity Data Activity & Alerts Full Integration
EXPERT ANALYSIS AND INVESTIGATION SUPPORT (Enterprises under 1,000 users will incur additional services costs.)

Quarterly Summary-Level User Threat Assessment Reports

Each quarter, get a summary of your highest risk areas and how your threat profile has changed over time.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

Weekly Alert Review and Prioritization Feedback

Each week, Dtex expert analysts will review your alerts and recommend actions based on industry best practices.

1476908184_checkmark-24 1476908184_checkmark-24

Expert Support on Investigations

Includes 4 hours per month per 1,000 users enrolled in the service. Additional hours available at additional charge.

1476908184_checkmark-24 1476908184_checkmark-24

On-Going Risk Model Configuration and Tuning

Each week, Dtex analysts will recommend pattern changes to reduce false positives and respond to new threats.

1476908184_checkmark-24 1476908184_checkmark-24

Deep User Threat Assessment Analysis

Each quarter, our analysts will do a deep dive on alerts and activity to uncover unknown risks.

1476908184_checkmark-24

Dtex Labs

Access to early beta releases of future Dtex products, and a chance to weigh in on future features.

1476908184_checkmark-24

Custom Dtex Integration

Work with the Dtex services team to develop custom integrations with other services, such as threat intel, active directory, etc.

Bespoke Add-On Service

Training

Your team will have full access to the resources they need to get the most value out of the Dtex platform.

Video  Live (Web Based)  On Site
DEPLOYMENT OPTIONS

Full Cloud Hosted (Maintained by Dtex)

Available in all plans
(Enterprises under 1,000 users will incur additional hosting fees.)

On Premise Installation or Installation in Customer Private Cloud

Available in all plans

Dtex Signal

Starting at

$2

/user/mo.

  • Option of Fully Cloud Hosted Deployment (Maintained by Dtex) (Enterprises under 1,000 users will incur additional hosting costs.)

  • Option of On Prem Installation or Installation in Private Cloud

  • Lightweight User Visibility

    Record what users are doing across all of your Mac and Windows devices, physical and virtual, on or off network.

  • Forensic Audit Trail

    Use the full user audit trail to investigate and respond to both insider and cyber security incidents.

  • Hunt

    Quickly search and pivot. Easily find any user, device, process, file, IP, website, and any other user activity.

  • Visualization and Dashbaords

    Set up charts, graphs, and dashboards to fit Dtex into your unique organizational and team workflow.

  • Anonymization

    Mask user identifiers in the system to protect employee privacy and comply with regulations.

  • Quarterly Summary-Level User Threat Assessment Reports

    Each quarter, get a summary of your highest risk areas and how your threat profile has changed over time.

  • Quarterly Summary-Level User Threat Assessment Reports

    Each quarter, get a summary of your highest risk areas and how your threat profile has changed over time.

Dtex Enterprise

Request Quote

  • EVERYTHING IN DTEX SIGNAL, PLUS…

  • User Quarantine

    If a bad actor is discovered, lock the user out immediately while still allowing remote access by your IT admins.

  • Expert-Trained Library with Thousands of Patterns

    Get the combined knowledge of hundreds of investigations as out-of-the-box patterns to find known malicious activity.

  • Automatic Baselining and Anomaly Detection

    Get alerts when users do something highly unusual compared to their own behavior or the organization’s behavior.

  • Data Exfiltration Analytics

    Detect attacks like advanced data theft, obfuscation, bypassing security controls, and off-network activity.

  • Credential Misuse Analytics

    Detect attacks like unusual data aggregation, lateral movement, and privilege escalation.

  • Ransomware Analytics

    Detect both known and unknown ransomware, plus use the forensic audit trail to improve recovery.

  • Policy Violation and Negligent Insider Analytics

    Detect users who are knowingly or accidentally not following your company’s security policy.

  • Weekly Alert Review and Prioritization Feedback

    Each week, Dtex expert analysts will review your alerts and recommend actions based on industry best practices.

  • Expert Support on Investigations

    Includes 4 hours per month per 1,000 users enrolled in the service. Additional hours available at additional charge.

  • On-Going Risk Model Configuration and Tuning

    Each week, Dtex analysts will recommend pattern changes to reduce false positives and respond to new threats.

  • Integrate Dtex Activity & Alerts Into Your Environment

    Feed Dtex alerts and user activity data into your SIEM, UBA, and data warehouse systems.

Dtex Platinum

Request Quote

  • EVERYTHING IN DTEX ENTERPRISE, PLUS…

  • Deep User Threat Assessment Analysis

    Each quarter, our analysts will do a deep dive on alerts and activity to uncover unknown risks.

  • Dtex Labs

    Access to early beta releases of future Dtex products, and a chance to weigh in on future features.

  • Full SIEM Integration

    Integration into your SIEM system and SOC workflow to match Dtex alerts and data with other log data.

  • Full UEBA Integration

    Integration into your UEBA system to analyze Dtex data in the context of other log or network data.

  • Full Data Warehouse / Data Lake Integration

    Feed Dtex data to your central analytics repository for analysis by your data science teams.

  • PLUS BESPOKE SERVICES, INCLUDING…

  • Custom Data Integration

    Work with the Dtex services team to develop custom integrations with other services, such as threat intel, active directory, etc.