Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/9/2021
04:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

DTEX Systems Releases Latest Version of Workforce Cyber Security Platform

SAN JOSE, California – February 9, 2021 – DTEX Systems, the Workforce Cyber Intelligence CompanyTM, today announced the release of its latest Workforce Cyber Security platform, DTEX InTERCEPT 6.5. The new release brings together the capabilities of user and entity behavior analytics (UEBA), endpoint data loss prevention (DLP), digital forensics and insider threat management into a cloud-native platform to empower customers to mitigate the risk of data and IP loss. 

According to DTEX’s 2021 Remote Workforce Security Report, almost 75% of organizations are concerned about the security risks introduced by the increased volume of remote workers. The most prominent remote work security concerns identified by industry experts include endpoint data loss (27%), loss of visibility of user activity (25%) and maintaining compliance with regulatory requirements (24%). With the predominance of fully remote and hybrid work models, forward-thinking organizations understand they need visibility into the behavior of their workforce on and off network in order to protect enterprise data and assets.

“Our overarching goal at DTEX is to help our customers better understand their workforces, protect their data and make smarter, more informed business decisions more rapidly,” said Mohan Koo, co-founder and CTO, DTEX Systems. “Heavy agents, constant rule tuning, false positives and limitations on employees’ access to data need to be retired in order for business and collaboration to flourish in the distributed and digital age of the enterprise. With DTEX InTERCEPT 6.5, we are providing organizations the end-to-end visibility they need to see, understand and act on risky activities and behavior that can lead to IP loss without limiting data access and mobility, creating tangled rules and policies, and driving already overworked analyst teams to the brink.”

According to Forrester Research, “visibility into user behaviors and actions, endpoint telemetry data and anomalies, access patterns and more will allow S&R pros to quickly detect potential breaches or insider abuse.” Through its patented and privacy-compliant meta-data collection and analytics engine, DTEX’s Workforce Cyber Security platform autonomously surfaces anomalous, abnormal behavior and related events via Indicators of Intent. This empowers security analysts to seamlessly thwart insider threats early in the insider threat kill chain more effectively, helping organizations mitigate the risk of data and IP loss. 

Specific capabilities and features that have been introduced and enhanced as part of this latest release include:

  • Sensitive IP and Customer Data Alerts: DTEX’s platform automatically generates immediate alerts for sensitive IP and customer data, helping organizations bolster security around their most valuable assets. Further, DTEX’s advanced behavior analytics baselines normal behavior for each end-user, enabling outliers and anomalies to be easily identified and investigated.
  • Interactive Data Lineage Map: InTERCEPT Data Lineage tracks the full history of every file, whether it is in use, in motion or at rest, providing the detailed history needed to identify and stop insider threat activity from resulting in data loss and IP theft. To further aid the investigation process, DTEX also generates Automatic User Investigation reports to streamline evidence gathering around anomalous behaviors. 
  • Data Classification Policy Templates: DTEX now provides policy templates for use with data classification and Data Labeling and Monitor (DLM) software. Plus, the InTERCEPT team has developed a patent pending “multi-factor data sensitivity” algorithm that provides next-level intelligence for decision making, as the automation understands that sensitive data often has more to do with the content creator than classification labels.
  • Data Regulation Compliance: DTEX’s Workforce Cyber Security platform supports regulatory compliance with emerging data protection regulations, including HIPAA, CCPA, GDPR, SOX, PCI DSS, ITAR and more.

To learn more about how DTEX Systems helps hundreds of global organizations mitigate the risk of data and IP loss, register for an upcoming DTEX InTERCEPT live demo here. Please also visit: www.dtexsystems.com

About DTEX Systems

DTEX Systems helps hundreds of organizations worldwide better understand their workforce, protect their data and make human-centric operational investments. Its Workforce Cyber Intelligence platform brings together UEBA, endpoint DLP, digital forensics, employee monitoring and insider threat management in one scalable, cloud-native platform. Through its patented and privacy-compliant meta-data collection and analytics engine, the DTEX platform surfaces abnormal behavioral “indicators of intent” to mitigate risk of data and IP loss and make smarter business decisions quickly. To learn more about DTEX Systems, please visit www.dtexsystems.com

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29623
PUBLISHED: 2021-05-13
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying th...
CVE-2021-32917
PUBLISHED: 2021-05-13
An issue was discovered in Prosody before 0.11.9. The proxy65 component allows open access by default, even if neither of the users has an XMPP account on the local server, allowing unrestricted use of the server's bandwidth.
CVE-2021-32918
PUBLISHED: 2021-05-13
An issue was discovered in Prosody before 0.11.9. Default settings are susceptible to remote unauthenticated denial-of-service (DoS) attacks via memory exhaustion when running under Lua 5.2 or Lua 5.3.
CVE-2021-32919
PUBLISHED: 2021-05-13
An issue was discovered in Prosody before 0.11.9. The undocumented dialback_without_dialback option in mod_dialback enables an experimental feature for server-to-server authentication. It does not correctly authenticate remote server certificates, allowing a remote server to impersonate another serv...
CVE-2021-32920
PUBLISHED: 2021-05-13
Prosody before 0.11.9 allows Uncontrolled CPU Consumption via a flood of SSL/TLS renegotiation requests.