Pricing & Plans

A Configuration for Every Enterprise

Plans Based on What You Need

Dtex offers a tiered set of plans to fit the specific needs of different types of enterprises. Just looking for visibility? Do you need alerts and the expertise of trained analysts? Or maybe integration is equally as important to you? No matter your priorities, Dtex has a configuration for you.

Dtex Signal Dtex Enterprise Dtex Platinum

Starting at

$2

/user/month

Request Quote Request Quote
DEPLOYMENT*

Full Cloud Hosted (Maintained by Dtex)

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

On Premise Installation or Installation in Customer Private Cloud

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24
USER VISIBILITY

Lightweight User Visibility

Record what users are doing across all of your Mac and Windows devices, physical and virtual, on or off network.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

Forensic Audit Trail

Use the full user audit trail to investigate and respond to both insider and cyber security incidents.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

Hunt

Quickly search and pivot. Easily find any user, device, process, file, IP, website, and any other user activity.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

Visualization and Dashboards

Set up charts, graphs, and dashboards to fit Dtex into your unique organizational and team workflow.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

Anonymization

Mask user identifiers in the system to protect employee privacy and comply with regulations.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

User Quarantine

If a bad actor is discovered, lock the user out immediately while still allowing remote access by your IT admins.

1476908184_checkmark-24 1476908184_checkmark-24
THREAT ANALYTICS

Expert-Trained Library with Thousands of Patterns

Get the combined knowledge of hundreds of investigations as out-of-the-box patterns to find known malicious activity.

1476908184_checkmark-24 1476908184_checkmark-24

Automatic Baselining and Anomaly Detection

Get alerts when users do something highly unusual compared to their own behavior or the organization’s behavior.

1476908184_checkmark-24 1476908184_checkmark-24

Malicious Insider Analytics

Detect attacks like advanced data theft, obfuscation, bypassing security controls, and off-network activity.

1476908184_checkmark-24 1476908184_checkmark-24

Credential Theft Analytics

Detect attacks like unusual data aggregation, lateral movement, and privilege escalation.

1476908184_checkmark-24 1476908184_checkmark-24

Ransomware Analytics

Detect both known and unknown ransomware, plus use the forensic audit trail to improve recovery.

1476908184_checkmark-24 1476908184_checkmark-24

Policy Violation and Negligent Insider Analytics

Detect users who are knowingly or accidentally not following your company’s security policy.

1476908184_checkmark-24 1476908184_checkmark-24
EXPERT ANALYSIS AND INVESTIGATION SUPPORT

Quarterly Summary-Level User Threat Assessment Reports

Each quarter, get a summary of your highest risk areas and how your threat profile has changed over time.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

Weekly Alert Review and Prioritization Feedback

Each week, Dtex expert analysts will review your alerts and recommend actions based on industry best practices.

1476908184_checkmark-24 1476908184_checkmark-24

Expert Support on Investigations

Includes 4 hours per month per 1,000 users enrolled in the service. Additional hours available at additional charge.

1476908184_checkmark-24 1476908184_checkmark-24

On-Going Risk Model Configuration and Tuning

Each week, Dtex analysts will recommend pattern changes to reduce false positives and respond to new threats.

1476908184_checkmark-24 1476908184_checkmark-24

Deep User Threat Assessment Analysis

Each quarter, our analysts will do a deep dive on alerts and activity to uncover unknown risks.

1476908184_checkmark-24

Dtex Labs

Access to early beta releases of future Dtex products, and a chance to weigh in on future features.

1476908184_checkmark-24

Training

Your team will have full access to the resources they need to get the most value out of the Dtex platform.

Video  Live (Web Based)  On Site
INTEGRATION

Integrate Into Your Environment

Ingest Dtex data into other systems.

1476908184_checkmark-24 1476908184_checkmark-24 1476908184_checkmark-24

SIEM Integration

Integration into your SIEM system and SOC workflow to match Dtex alerts and data up with other security data.

User Activity Data Activity & Alerts Full Integration

UEBA Integration

Integration into your UEBA system to analyze Dtex data in the context of other log or network data.

User Activity Data Activity & Alerts Full Integration

Data Warehouse / Data Lake Integration

Feed Dtex data to your central analytics repository for analysis by your data science teams.

User Activity Data Activity & Alerts Full Integration

Threat Intel Integration

Integration with both third party threat intel feeds and next gen firewalls to automate your malware hunt process.

Full Integration

Email Metadata Integration

Add email metadata to Dtex’s user activity data to get a more complete view of user activity.

1476908184_checkmark-24

Active Directory / LDAP / Identity Access Integration

Integrate Dtex with your identity management systems to add additional user context to user activity records.

1476908184_checkmark-24

Custom Data Integration

Bring custom user activity data into Dtex, such as call center logs, source code, and EMM/MDM.

1476908184_checkmark-24

*Enterprises under 1,000 users will incur additional hosting/services costs.

Dtex Signal

Starting at

$2

/user/mo.

  • Option of Fully Cloud Hosted Deployment (Maintained by Dtex)

  • Option of On Prem Installation or Installation in Private Cloud

  • Lightweight User Visibility

    Record what users are doing across all of your Mac and Windows devices, physical and virtual, on or off network.

  • Forensic Audit Trail

    Use the full user audit trail to investigate and respond to both insider and cyber security incidents.

  • Hunt

    Quickly search and pivot. Easily find any user, device, process, file, IP, website, and any other user activity.

  • Visualization and Dashbaords

    Set up charts, graphs, and dashboards to fit Dtex into your unique organizational and team workflow.

  • Anonymization

    Mask user identifiers in the system to protect employee privacy and comply with regulations.

  • Quarterly Summary-Level User Threat Assessment Reports

    Each quarter, get a summary of your highest risk areas and how your threat profile has changed over time.

  • Quarterly Summary-Level User Threat Assessment Reports

    Each quarter, get a summary of your highest risk areas and how your threat profile has changed over time.

Dtex Enterprise

Request Quote

  • EVERYTHING IN DTEX SIGNAL, PLUS…

  • User Quarantine

    If a bad actor is discovered, lock the user out immediately while still allowing remote access by your IT admins.

  • Expert-Trained Library with Thousands of Patterns

    Get the combined knowledge of hundreds of investigations as out-of-the-box patterns to find known malicious activity.

  • Automatic Baselining and Anomaly Detection

    Get alerts when users do something highly unusual compared to their own behavior or the organization’s behavior.

  • Malicious Insider Analytics

    Detect attacks like advanced data theft, obfuscation, bypassing security controls, and off-network activity.

  • Credential Theft Analytics

    Detect attacks like unusual data aggregation, lateral movement, and privilege escalation.

  • Ransomware Analytics

    Detect both known and unknown ransomware, plus use the forensic audit trail to improve recovery.

  • Policy Violation and Negligent Insider Analytics

    Detect users who are knowingly or accidentally not following your company’s security policy.

  • Weekly Alert Review and Prioritization Feedback

    Each week, Dtex expert analysts will review your alerts and recommend actions based on industry best practices.

  • Expert Support on Investigations

    Includes 4 hours per month per 1,000 users enrolled in the service. Additional hours available at additional charge.

  • On-Going Risk Model Configuration and Tuning

    Each week, Dtex analysts will recommend pattern changes to reduce false positives and respond to new threats.

  • Integrate Dtex Activity & Alerts Into Your Environment

    Integrate Dtex alerts and user activity data into your SIEM, UBA, and data warehouse systems.

Dtex Platinum

Request Quote

  • EVERYTHING IN DTEX ENTERPRISE, PLUS…

  • Deep User Threat Assessment Analysis

    Each quarter, our analysts will do a deep dive on alerts and activity to uncover unknown risks.

  • Dtex Labs

    Access to early beta releases of future Dtex products, and a chance to weigh in on future features.

  • Full SIEM Integration

    Integration into your SIEM system and SOC workflow to match Dtex alerts and data up with other security data.

  • Full UEBA Integration

    Integration into your UEBA system to analyze Dtex data in the context of other log or network data.

  • Full Data Warehouse / Data Lake Integration

    Feed Dtex data to your central analytics repository for analysis by your data science teams.

  • Threat Intel Integration

    Integration with both third party threat intel feeds and next gen firewalls to automate your malware hunt process.

  • Email Metadata Integration

    Add email metadata to Dtex’s user activity data to get a more complete view of user activity.

  • Active Directory / LDAP / Identity Access Integration

    Integrate Dtex with your identity management systems to add additional user context to user activity records.

  • Custom Data Integration

    Bring custom user activity data into Dtex, such as call center logs, source code, and EMM/MDM.