DTEX Advanced User Behaviour Monitoring
DTEX Advanced User Behavioural Monitoring
Dtex provides an incredibly lightweight micro-agent on each end point and is paired with a powerful big data analysis engine to deliver user-focused visibility, intelligence, user behavioural monitoring and anomaly detection to reduce risk by showing how your users really interact with your systems and data.
Security and Privacy go Hand-in-Hand:
DTEX' s Anonymisation Makes it Possible
With the data anonymisation feature in Dtex’s Analytics Server, personal data is safer and more privacy-conscious than ever before allowing you to comply with local and international privacy legislation. We allow you to anonymise personal data – including user name and machine/domain name so that only authorised people will ever see it.
This approach ensures allows enterprises to respect company culture, maintain security, and establish privacy regulation compliance seamlessly.
DTEX provides
Micro-agent on each end point
- Advanced User Behavioural Monitoring
- Dtex’s Anonymisation
- Insider Cyber Threat
- Detect Theft of Intellectual Property
- Security Controls
- Spot Malicious Employees
- Off-Network Risky Behaviour
- Fraud and Embezzlement
- Accidental Misuse
- External Compromise of Devices
- Operational Efficiency Analysis
- IT Regulatory Compliance
- IT Visibility and Support
Advanced Human Analytics
Dtex uses four sophisticated analytical methods to show you the users who matter:
Dtex is the effective solution to your insider threat problem. J2 Software and Dtex give you real visibility into the things you do not know about. Threats evolve daily and without visibility you will constantly be guessing.
You do not need to be scared of the things you know about. Fighting the “known knowns” is simply not good enough.
User Profiling
Advanced Machine Learning
Hundreds of High Risk Behaviour Patterns
Query and Reporting Engine
Dtex provides
Micro-agent on each end point
- Advanced User Behavioural Monitoring
- Dtex’s Anonymisation
- Insider Cyber Threat
- Detect Theft of Intellectual Property
- Security Controls
- Spot Malicious Employees
- Off-Network Risky Behaviour
- Fraud and Embezzlement
- Accidental Misuse
- External Compromise of Devices
- Operational Efficiency Analysis
- IT Regulatory Compliance
- IT Visibility and Support